Protecting PHI and Responding to Data Thefts. Presenters Randy Gainer Partner Davis Wright Tremaine, LLP Seattle Paul Smith Partner Davis Wright Tremaine,

Slides:



Advertisements
Similar presentations
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
Advertisements

HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Steps to Compliance: Managing Business Associates PRESENTED BY.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NAU HIPAA Awareness Training
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
Randy Benson RHQN Executive Director May, Compliance Issues During Survey Compliance Officers monitor healthcare facilities (hospitals and clinics)
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Health Insurance Portability & Accountability Act (HIPAA)
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
1 Responding to Privacy Breaches: Required Actions and Their Costs September 8, 2010 Randy Gainer.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Responding to a Data Security Breach
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Nassau Association of School Technologists
Moving Health Information In An Emergency
Protection of CONSUMER information
Responding to a Data Breach 360° of IT Compliance
Paul T. Smith Davis Wright Tremaine LLP
Chapter 3: IRS and FTC Data Security Rules
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
National HIPAA Audioconferences
Move this to online module slides 11-56
Anatomy of a Common Cyber Attack
School of Medicine Orientation Information Security Training
Presentation transcript:

Protecting PHI and Responding to Data Thefts

Presenters Randy Gainer Partner Davis Wright Tremaine, LLP Seattle Paul Smith Partner Davis Wright Tremaine, LLP San Francisco Tom Byron Chief Information Officer Washington State Hospital Association

Outline Hospitals’ duties to protect patient and employee data Risks to data Actions that can prevent loss or theft Actions to respond to data breaches

Sources of Hospital Duties to Protect Data

Hospital Duties to Protect Data HIPAA Privacy and Security Rules Washington Uniform Healthcare Information Act Hospital privacy policies coupled with consumer protection statutes Common law duty of care

HIPAA Privacy Rule 45 C.F.R. § (c) requires covered entities –to have appropriate administrative, technical, and physical safeguards to protect the privacy of PHI; and –to safeguard PHI from intentional or unintentional disclosure in violation of HIPAA.

HIPAA Security Rule 45 C.F.R. § requires covered entities, among other things: –to protect against reasonably anticipated threats to the security of ePHI; –to protect against reasonably anticipated mis-uses or disclosures of ePHI; –to assure that their workforces comply with the Security Rule; –to obtain assurances of confidentiality and security from their contractors.

HIPAA Security Rule (cont’d) 45 C.F.R. §§ (a)(1)(ii)(A) & (B) require covered entities to engage in risk analysis and risk management to reduce risks to the security of ePHI to a reasonable level. 45 C.F.R. §§ (a)(2)(ii) & (d)(1) require covered entities to implement policies and procedures to safeguard their physical facilities, hardware, software, and electronic media to protect against theft. (Though (a)(2)(ii) is “addressable,” it will apply to hospitals.)

Medicare Conditions of Participation A Medicare rule, 42 C.F.R. § , requires hospitals to assure that: –patient records are confidential; –unauthorized persons cannot gain access to or alter patient records; and –patient records are released only to authorized persons in accordance with law.

WA Uniform Health Care Information Act A section of the UCHIA, RCW , requires health care providers to implement reasonable safeguards to secure health care information. RCW provides that patients may recover actual damages (though not consequential or incidental damages), attorneys’ fees, and costs.

Hospital Privacy Policies + Consumer Protection Act Hospital privacy polices may assure patients that their information will be kept confidential. In other contexts, the FTC has brought unfair trade practice claims against companies that failed to implement adequate security after claiming they would protect consumers’ data. E.g., BJ’s Wholesale Club Consent Order, FTC File No (May 2005).

Hospital Privacy Policies + Consumer Protection Act (cont’d) Plaintiffs in Gibson v. Providence claim that the hospital violated the Oregon Unlawful Trade Practices Act by representing in its privacy policy that it would protect patient data and allegedly failing to do so. A similar claim could be brought under the Wa CPA. Potential remedies under RCW include actual damages, discretional treble damages, attorneys’ fees, and costs.

Negligence Claims Plaintiffs in many data breach cases have claimed that companies that store consumer information have a duty to use reasonable care to protect the information. Litigants claim that the various statutes that address information security provide references to establish the elements of that duty.

Risks to Data

Many data thefts have been reported but we are probably not experiencing an epidemic of thefts. –73 million consumers’ data have been reported stolen or lost in the 12 months ending September –Only about 5 million individuals have reported their data have been misused.

Risks to Data (cont’d) –Rather than there being more thefts than in the past, it is likely that data breach notification statutes have uncovered a problem that already existed.

Inside Risks General employees –Janitors copied information from paper charts left at a hospital’s workstations; clerks at another hospital copied data IT employees –An IT director ed a large number of patient records to his home computer.

Inside Risks Contractors –The University of California at San Francisco hospital hired a transcriptionist to transcribe tapes. A Pakistani sub-sub-contractor threatened to post confidential medical information on the Internet unless she were paid a certain amount of money.

Outside Risks Walk-in thieves –A laptop used for patient registration in an E.R. was stolen; a desktop computer with ePHI at a clinic was stolen after hours. Thieves who steal laptops from employees’ cars –Numerous laptops with confidential information have been reported stolen.

Outside Risks (cont’d) Electronic penetration –In May 2005, attackers accessed CardSystems Solutions' networks. They found a treasure trove of unencrypted credit card data. –In March 2004, a credit card database was stolen from BJ's Wholesale Club. Three million customers’ card data were exposed to international crime gangs who produced counterfeit cards and made millions of dollars in fraudulent purchases.

Outside Risks (cont’d) Electronic penetration –Hospital systems may be penetrated as well.

Preventing Theft or Loss of PHI

Hire a Third Party to Conduct Risk Assessments Contractors experienced with hospital security issues can spot vulnerabilities that employees fail to notice. Electronic security specialists should inspect and test systems, policies, and procedures used to protect ePHI.

Re-perform Risk Assessments Regularly As your technology changes and thieves become more sophisticated, security needs to be re-assessed.

Encrypt Confidential Data and ePHI Stored on Laptops Many laptops are stolen and lost. It is unreasonable to store unencrypted data on laptops. User-friendly laptop encryption programs are available. Alternatively, data needed offsite can be accessed via a VPN.

Screen Employees and Monitor Data Employees and contractors who may have access to PHI should be carefully screened. –Information that may be used for identity theft is valuable and easily converted to cash. –Only those who can be trusted with access to such valuable information should be permitted access to it. There should be video surveillance of areas where PHI is stored.

Responding to Data Breaches

Washington Law RCW requires business to promptly notify individuals whose computerized personal information is reasonably believed to have been obtained by an unauthorized person. –“Personal information” means an individual’s first name or initial, last name, and SSN, driver’s license number, or State ID card number, or account or bank card number.

Washington Law (cont’d) –Note that the Wa. Data breach notice statute applies only to computerized data –It may nonetheless be prudent to notify individuals if a paper record with personal information is stolen

Notice of Data Breach Notice must be in writing or sent electronically in a manner that complies with E-Sign (i.e., by e- mail to an address supplied by the patient) Unless the costs of notice would exceed $250,000, in which case, –substitute notice by , web- posting, and statewide media disclosure may be substituted.

Six Steps to Respond to Data Breaches 1.Notify internal officials 2.Investigate what information was obtained and determine how 3.Determine who should notified – individuals, law enforcement, regulators, others? 4.Send notifications 5.Respond to inquiries, litigation 6.Correct security flaws, remediate damages

Step 1: Notify Internal Officials and Counsel CPO, CSO, CIO, GC, and outside counsel should be informed of the incident and of available information. Written communications to and from counsel should be marked “attorney-client privileged.”

Step 1: Notify Internal Officials and Counsel (cont’d) A team should be designated and tasked –to manage the investigation, –to contact law enforcement (if there was a theft), –to coordinate media strategy, and –to supervise the notice process.

Step 2: Investigate the Breach What information was accessed or stolen? Were “computerized data” and “personal information” obtained by an unauthorized person? If computer forensics, network security, or private investigators are needed, they should be hired by counsel to permit him or her to advise you. The consultants’ reports should be privileged.

Step 3: Determine Whom to Notify Notify senior management and the board. Notify law enforcement of theft. –Discuss with law enforcement whether to delay notifying others. Create lists of any potentially affected individuals, with notice addresses. Notify CMS, JAHCO, State AG? Notify employees, media?

Step 4: Send Notifications If individuals are to be notified: –decide whether to outsource notice; –decide whether to offer credit monitoring and other services (one year of credit monitoring is standard); –draft notice letters with potential litigation in mind; –train operators for a call-in center; draft scripts; and –post important info. and FAQs on your website.

Step 4: Send Notifications (cont’d) Notices to regulators should concisely explain what occurred and what remediation steps have been and are being taken.

Step 5: Respond to Inquiries and Litigation Respond to inquiries from individuals, employees, and the media honestly but with an understanding that everything you state may be used in court. Be prepared to defend against a class action, especially if any information is misused. Emotional distress alone should be insufficient for plaintiffs to avoid dismissal.

Step 6: Correct Security Flaws and Remediate Damages Immediately correct all vulnerabilities that may have contributed to the breach. –institute secure transport and storage of backup tapes; –encrypt ePHI and personal information on laptops; –revise procedures to account for copies of patient data; and –assure that video surveillance of areas where data are stored is functioning properly.

Step 6: Correct Security Flaws and Remediate Damages (cont’d) If your computer network was penetrated, prepare for additional attacks when the breach is disclosed. If individuals can show they suffered fraud related to the breach, compensate them. –Your claims specialist should review fraud claims. –Experts estimate that 1-4% of the population have experienced “identity theft.” –You should compensate only fraud that was probably caused by the breach at your hospital, not by another event.

Questions? Comments?

Thank you for participating! Please fill out the evaluation.