Data Security and Privacy Overview and Update Peter Moldave October 28, 2015.

Slides:



Advertisements
Similar presentations
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Advertisements

1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Developing a Records & Information Retention & Disposition Program:
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA Collaborative of Wisconsin PAYMENT, COLLECTIONS, AND ACCEPTED BENEFITS FURTHER DEFINITION OF THE PRIVACY RULE Copyright HIPAA Collaborative.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Electronic Records Management: What Management Needs to Know May 2009.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
HIPAA PRIVACY AND SECURITY AWARENESS.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Dino Tsibouris (614) Vendor Contracts: What You Need and What You May Be Missing.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Advanced Issues in Privacy: Drafting and Negotiating Business Associate Contracts Thomas E. Jeffry, Jr. Partner Davis Wright Tremaine LLP Los Angeles,
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
The Protection of Personal Information Bill 13 February
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Dino Tsibouris (614) Updates on Cloud, Contracting, Privacy, Security, and International Privacy Issues Mehmet Munur (614)
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Data protection—training materials [Name and details of speaker]
Privacy and Security Considerations in Research and Clinical Trials February 28, 2013 Joanna K. Napp, J.D., M.P.H. Chief Privacy Officer and Compliance.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Protection of Personal Information Act An Analysis on the impact.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
An Information Security Management System
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
HIPAA CONFIDENTIALITY
Obligations of Educational Agencies: Parents’ Bill of Rights
Disability Services Agencies Briefing On HIPAA
Current Privacy Issues That May Affect Your Credit Union
Employee Privacy and Privacy of Employee Information
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Building a Vertical Around Regulated Industries to Increase Your Business
Student Privacy in the age of big data
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Data Security and Privacy Overview and Update Peter Moldave October 28, 2015

Topics to cover today: Data Security Data Privacy Data Integrity Specific Issues with Regulated Data

Examples of situations that companies face Storage of employee and customer personal data Use of credit reports for employment decisions Use of health data for marketing Technological features required to comply with regulations

Data security and data privacy are not the same thing Data security is about protecting data from unauthorized access Data privacy is about restrictions on collection or use of (personal) information Data protection may be combination of privacy and security

Data integrity is separate from data security and data privacy Ensuring data is available and useful Data integrity issues are in some ways opposite to those of privacy and security

Data Protection Regulation US has no general (federal) data protection requirement Specific US items may need more specific consideration, i.e. Gramm-Leach-Bliley, HIPAA, COPPA, Fair Credit Reporting, State Data Protection European rules on data protection are more general Safe Harbor update

Examples where data security and data privacy issues come up “Normal” companies (i.e. not “internet”) Employee records State data security (SSN’s etc.) Hiring decisions State data security & Fair Credit Reporting Customer relationships Information about EU customers Services provided to healthcare companies Are you a “business associate” Use of on-line resources Are your records appropriately protected?

Examples (cont.) “Internet” companies i.e. product provided over internet Obligations regarding customer data Obligations regarding customer’s customers data Ability to use data to improve products, provide services to other than the immediate customer Obligations regarding method of storage/protection of data

Some terminology to use Personally Identifiable Information (“PII”) A data protection (US state law) concept Information associated with a particular individual Example definition under Massachusetts data protection law: Name + account number Personal Health Information (“PHI”) A HIPAA concept Information relating to a health care services provided to an individual Can including billing information

Terminology (cont.) HIPAA US federal law regulating health information Generally covers health care providers Can also extend to “business associates” Graham-Leach-Blighly US federal law regulating privacy of financial information Generally covers financial institutions

Terminology (cont.) Data subject/subject individual What individual is the data being gathered about Generic terminology/EU privacy terminology Aggregated data Data which has been combined so that it does not reflect any particular individual

Terminology (cont.) Customer What organization is utilizing the information supplied by the Content company concerning the data subject End User May be the same as the data subject, maybe a person at the Customer organization

Terminology (cont.) Encryption A method of transforming data so that it is not immediately readable by an unauthorized third party Clear text The original unencrypted data

Rights/Liability Interests of the content company (Data Privacy) Use restriction obligation to data subject, source (Data Security) Security protection obligation to data subject (Data Integrity) Data integrity of concern to data recipient, not to subject

Rights/Liability (cont.) Interests of the data subject (Data Privacy) Use restriction obligation to data subject (Data Security) Security protection obligation to data subject (Data Integrity) Data integrity not relevant to subject

Rights/Liability (cont.) Customer (Data Privacy/IP) Use restriction obligation to data subject, source (Data Security) Security protection obligation to data subject (Data Integrity) Data integrity of concern to Customer

Contractual protection of data is important Problem areas/issues Overbroad clauses Indemnification Liability for events over which you have no control Confidentiality clauses; interaction with privacy policies Addressing multiple levels of source of data End user->provider->customer->third party resources

HIPAA What is covered: Protected health information maintained or transmitted electronically (“PHI”) Who is covered: Covered Entity: includes health plans, and health care providers who transmits any health information in electronic form Business Associate: includes non-health care organizations performing services to a Covered Entity involving access to PHI

HIPAA (cont.) What is required: adequate security; Business Associates Agreements (“BAA”) with Business Associates What is restricted: Use of PHI other than for provision of health care What is permitted: use for health care purposes, etc. What is not covered: aggregated data, de- identified data

Gramm- Leach-Bliley What is covered: nonpublic personal information about individuals who obtain financial products or services primarily for personal, family or household purposes; but not for business, commercial, or agricultural purposes. Who is covered: Financial institutions

GLB (cont.) What is required: develop, implement, and maintain a comprehensive information security program that contains administrative, technical, and physical safeguards to insure the security and confidentiality of customer information. 16 CFR 314.3

Fair Credit Reporting Act What is covered: “consumer report” communication any information by a consumer reporting agency bearing on a consumer’s credit worthiness,... character, general reputation, personal characteristics, or mode of living. 15 U.S.C. § 1681a(d)

FCRA (cont.) Who is covered: Consumer reporting agencies What is required: In many cases, consent from data subject; notice upon adverse actions; correction of erroneous information

FCRA (cont.) What is restricted: Use of/access to credit information for unauthorized reason (i.e. not in connection with credit etc. transaction); maintenance of certain stale or prohibited information. 15 U.S.C. § 1681c What is permitted: Use for eligibility for credit, insurance or employment purposes with consent of data subject. 15 U.S.C. § 1681b

EU Expansive view of what is covered Requirement re destruction/review by data subject Restrictions on cross-border usage Impact of recent “Safe Harbor” decision

State Data Protection Laws Overview What is covered: Personally identifiable information (“PII”), usually a name or address plus SSN or financial account number, in general only in electronic form Who is covered: In general, citizens of the applicable state What is required: Encryption of electronic PII What is restricted: In general, unauthorized disclosure of PII

Massachusetts example What is covered What is required What is not covered Actions to take on data breach

Data Security

Considerations What is the data being utilized? Plan ahead for type/form of data collection Define access control Understand location of content and encryption strategy Understand backup and archiving Contingency plan for data breach

What is content used for - internally Consistency with internal privacy policy Consistency with regulatory requirements Consistency with IP rights granted in end user agreements

What is content used for - provider Consistency with internal and provider privacy policy Consistency with regulatory requirements Consistency with IP rights granted in end user agreements Is aggregate/anonymous use permitted?

What is content used for – provider (cont.) Performance of service Monitoring of service Other uses Creating new products Selling of aggregate data

Planning ahead for data collection and storage Where is data stored Is data for separate projects/separate clients stored in separate “containers”? How is access controlled (2 factor authentication?) In what form is it stored (encrypted or unencrypted) Where are encryption keys stored How is it protected from external access (firewalls etc.)

Access to Content - Generally Purpose of access Security of information flow Agreements with third parties Conformance of theory with reality

Access to Content – Generally (cont.) Consider regulatory requirements for protection of data Consider regulatory requirements for agreements (BAA’s etc.) Consider impact of mobile usage

Access to Content – Generally (cont.) Employees Implement appropriate internal security policy Consider whether employee use of own devices is problematic Access by third parties Implement appropriate non-disclosure agreements Make sure access consistent with agreements and privacy policy

Subcontractors Consent over use of subcontractors Vetting of subcontractors Ensuring contractual provisions flow properly May require use of BAA's for HIPAA data Dealing with changes to provision

Backups and archives How is it archived? Where is it archived? Is the location acceptable based on general data protection principles? Frequency Security – encrypted vs. non-encrypted Retention period When can/must it be destroyed Stop-destruction in case of litigation

Backups and archives (cont.) Make sure document retention policy and archive process consistent Make sure litigation hold can be implemented Clarify location of data Consider ability to delete backups/archives on a client by client/project by project basis

Data Breach Exposure to liability Financial – identify theft monitoring HIPAA – regulatory actions

Contingency planning for data breach Understanding regulatory requirement and time frames Determining types of data being stored Encryption

Arrange insurance for data breach Usually E&O May be sublimits on notification Primary insurance coverage under own policy Also coverage under supplier policy Name as additional insured Concern about coverage amount

Questions? Peter Moldave Gesmer Updegrove LLP