Data Breaches in Employee Benefits

Slides:



Advertisements
Similar presentations
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Advertisements

HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Navigating HIPAA & Recent Healthcare Reform: What You Need to Know.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
HIPAA Regulations What do you need to know?.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Hot Topics Legal Update Jill D. Moore, JD, MPH University of North Carolina School of Government September 2014.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Implementing and Enforcing the HIPAA Privacy Rule.
E-Verify and Immigration-Related Employment Discrimination Beth Coonan BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Protecting Sensitive Information PA Turnpike Commission.
Severance Agreements: Practical Considerations to Minimize Business Disruption Elizabeth A. Coonan Ann Holden Kendell BrownWinick 666 Grand Avenue, Suite.
Milada R. Goturi Tonya M. Oliver Thompson Coburn LLP 1.
Health Information Technology for Economic and Clinical Health Act (HITECH)
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Affordable Care Act – Current Issues in Healthcare Reform Alice Helle - Cynthia Boyle Lande –
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Record Retention and Destruction Considerations Beth Coonan BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Use: Policies to Enhance Employee Productivity Elizabeth A. Coonan BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
© Copyright 2010 Hemenway & Barnes LLP H&B
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Affordable Care Act – Wellness Programs Cynthia Boyle Lande BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
Frequently Asked Questions I Get Regarding OSHA Brenton D. Soderstrum BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
PHI Breach PHI Breach Dealing Breach With HIPAA Guidelines Guidelines.
Protecting PHI & PII 12/30/2017 6:45 AM
Enforcement, Business Associates and Breach Notification. Oh my!
Protection of CONSUMER information
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Florida Information Protection Act of 2014 (FIPA)
25 TIPS FOR BUSINESS LEADERS FROM A LAWYER
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
Florida Information Protection Act of 2014 (FIPA)
Red Flags Rule An Introduction County College of Morris
Alabama Data Breach Notification Act: What 911 Districts Need to Know
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Alabama Data Breach Notification Act: What County Governments Need to Know Morgan Arrington, General Counsel Association of County Commissions of Alabama.
Compliance and Enforcement of the Privacy Rule
National HIPAA Audioconferences
Colorado “Protections For Consumer Data Privacy” Law
The Health Insurance Portability and Accountability Act
Presentation transcript:

Data Breaches in Employee Benefits Cynthia Boyle Lande BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA 50309-2510 Telephone: 515-242-2476 Facsimile: 515-323-8576 E-mail: lande@brownwinick.com

Common Problems Lost or stolen laptops or flash drives Lost or stolen cell phones with work email Hacker Disgruntled employee Mistyped fax number or email autocorrect Spreadsheets with hidden columns containing personal information Documents left in copier Records discarded without shredding

Types of Confidential Information Commonly Affected Social security number State ID/drivers license number Health insurance and claims information Medical records Financial information

Legal Regulation State Security Breach Laws HIPAA Common Law

State Security Breach Laws Currently found in most states, but no comprehensive federal law Require businesses to inform individuals of security breaches involving personal data

Iowa Security Breach Law Iowa Code Chapter 715C “Any person who owns or licenses computerized data that includes a consumer’s personal information that is used in the course of the person’s business . . . and that was subject to a breach of security shall give notice of the breach of security following discovery.”

Iowa Security Breach Law (Continued) Consumer: Any person who resides in the state of Iowa Breach of security: unauthorized acquisition of personal information maintained in computerized form by a person that compromises the security, confidentiality, or integrity of the personal information

Iowa Security Breach Law (Continued) “Personal information” means an individual’s first name or first initial and last name in combination with any one or more of the following data elements that relate to the individual if any of the data elements are not altered in such a manner that they are unreadable:

Iowa Security Breach Laws (Continued) Social security number. Driver's license number or other unique identification number created or collected by a government body. Financial account number, credit card number, or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account.

Iowa Security Breach Law (Continued) Unique electronic identifier or routing code, in combination with any required security code, access code, or password that would permit access to an individual’s financial account.

Iowa Security Breach Laws (Continued) Penalties: Calculated based on harm to consumer(s) and benefit to violators

HIPAA General duty to protect the privacy of individual health information

Who is subject to HIPAA? Covered Entity Business Associate Health Plans Health Care Clearinghouses Health Care Providers Business Associate

Protected Health Information Individually identifiable health information that is one of the following: Transmitted by electronic media; Maintained in electronic media; or Transmitted or maintained in any other form or medium.

HIPAA Data Breach The acquisition, access, use, or disclosure of protected health information in a non-permitted manner which compromises the security or privacy of the protected health information.

Exceptions Unintentional, good-faith acquisition, access, or use by a workforce member or authorized person. Inadvertent disclosure by authorized person to another authorized person. Disclosure to unauthorized person where it is reasonable to believe the PHI cannot be retained.

HIPAA Data Breaches Any non-permitted use or disclosure of PHI presumed to be a “breach” unless the Covered Entity or Business Associate demonstrates “a low probability that the protected health information has been compromised” based on 4 factors.

HIPAA Data Breaches (Continued) The nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification. The unauthorized person who used the PHI or to whom the disclosure was made.

HIPAA Data Breaches (Continued) Whether the PHI was actually acquired or viewed. The extent to which the risk to the PHI has been mitigated.

Responding to a HIPAA Breach Fewer than 500 individuals affected by breach of “unsecured” PHI: Notify Individuals in writing without unreasonable delay and no later than 60 days after discovery Maintain log of breaches Notify Secretary of HHS within 60 days of end of calendar year

Responding to a HIPAA Breach (Continued) More than 500 individuals affected by breach of “unsecured” PHI: Notify Secretary of HHS within 60 days from discovery of breach Notify prominent local media outlets within 60 days from discovery of breach

HIPAA Civil Penalties Covered entity or business associate did not know and by exercising reasonable diligence would not have known of the violation: $100 to $50,000 per violation Not to exceed $1,500,000 for identical violations during a year Violation due to reasonable cause and not willful neglect $1,000 to $50,000 per violation Not to exceed $1,5000,000 for identical violations during a year

HIPAA Civil Penalties (Continued) Violation due to willful neglect but corrected within required time period: $10,000 to $50,000 per violation Not to exceed $1,500,000 for identical violations during a year Violation due to willful neglect and not corrected: $50,000 per violation

HIPAA Criminal Penalties Knowingly obtain or disclose PHI Up to 1 year in prison Offenses committed under false pretenses Up to 5 years in prison Offenses committed for personal gain or malicious harm Up to 10 years in prison

Common Law Causes of Action Negligence Duty of Care Breach of Duty Causation Damages Contract

Target Example Facts: In November of 2013, hackers installed malware on Target’s system. The objective was to obtain credit card and personal information of Target customers as they shopped for the holiday season. Target stored this information on its system after purchasers completed purchases. Target had malware detection and other data security measures in place, but they did not trigger steps to stop the malware from collecting customer data until approximately the middle of December. The Target data breach was made publicly known by the news media, rather than Target.

Blue Cross and Blue Shield of Tennessee Example Facts: In March of 2012, 57 computer hard drives containing PHI of over 1 million individuals were stolen from a BCBST facility. The information on the hard drives included names, social security numbers, diagnosis codes, dates of birth, and health plan ID numbers. BCBST self-reported this breach to HHS.

Affinity Health Plan Example Facts: Affinity returned a leased copy machine before deleting PHI affecting 344,579 individuals from the hard drive. CBS Evening News subsequently purchased the photocopier and discovered the breach. After discovering the breach, Affinity filed a breach report with OCR.

Kaiser Foundation Health Plan Example Facts: In 2011, an external hard drive from the Kaiser Foundation Health Plan was sold to a member of the public at a thrift store. The hard drive contained addresses, dates of birth, and social security numbers for over 20,000 employees. The Kaiser Foundation Health Plan obtained the hard drive in December of 2011, completed an investigation, and notified affected individuals in March of 2012.

Best Practices Develop, implement, and regularly update data protection policies and procedures Obtain and store limited amounts of information Segregate the most highly confidential information and limit the number of users who have access

Best Practices (Continued) Provide appropriate training to employees who will have access to confidential information Police implementation of these policies and procedures

Responding to Data Breaches Identify breadth and cause of data breach Promptly provide notices as required by law Assist affected individuals in remedying breach to extent possible Review processes and procedures that allowed breach to occur, and determine whether it is practicable to improve those processes and procedures going forward

Questions? ?

Website: www.brownwinick.com Toll Free Phone Number: 1-888-282-3515 OFFICE LOCATIONS: 666 Grand Avenue, Suite 2000 Des Moines, Iowa 50309-2510 Telephone: (515) 242-2400 Facsimile: (515) 283-0231 616 Franklin Place Pella, Iowa 50219 Telephone: (641) 628-4513 Facsimile: (641) 628-8494 DISCLAIMER: No oral or written statement made by BrownWinick attorneys should be interpreted by the recipient as suggesting a need to obtain legal counsel from BrownWinick or any other firm, nor as suggesting a need to take legal action. Do not attempt to solve individual problems upon the basis of general information provided by any BrownWinick attorney, as slight changes in fact situations may cause a material change in legal result.