Download presentation
Presentation is loading. Please wait.
Published byHelena Owens Modified over 9 years ago
1
1 U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Diana S. Hare Associate General Counsel Drexel University College of Medicine Diana.Hare@drexelmed.edu
2
2 U.S. Privacy and Security Laws Contents: I.DISCLAIMER II.Audience Participation III.What’s Protected? IV.Sources of Privacy & Security Obligations - Trends V.What’s Loss, Liability, Breach? - Sanctions/Liability VI.Lessons Learned VII.Resources
3
3 I. DISCLAIMER This presentation does not include every privacy and security law and regulation in the United States. Its purpose is to provide context, key principles and trends. Thank you!
4
4 II. Audience Participation Who knows they are covered by the FTC Guidelines on protecting consumer information collected online? Who knows they are covered by HIPAA because they have an employer-sponsored health plan? Who knows they are covered by the Red Flags Rule? (And who knows what it is?)
5
5 II. Audience Participation Who knows they are covered by state data breach notification acts other than Pennsylvania? By the new federal data breach notification act? Who has not had employees or consultants lose the company’s customers’ personally identifying information, or access such data beyond their scope of authorization?
6
6 III. What’s Protected? Identity –Individually Identifiable Information –Personal Information –Education Record –Name, social security number (cf. redacted to last 4), credit card number –HIPAA has 18 Identifiers – down to stripping the Zip Code
7
7 III. What’s Protected? Sensitive Information about a Person Drug and alcohol treatment HIV Status Genetic screening Children 13 or younger Privileged communications
8
8 III. What’s Protected? Data “CIA” = –Confidentiality –Integrity –Availability Collection, Use and Disclosure Informed Consent
9
9 IV. Sources of Privacy & Security Obligations General Sources U.S. Constitution – 4th Amendment; 14th Amendment; U.S. v. Griswold Torts – Intrusion upon Seclusion; Invasion of Privacy Privileges – Judicial Codes –Accountant –Psychologist – 42 PA C.S.A. § 5944 –Sexual Abuse Victim Counseling – 42 PA C.S.A. § 5945.1 –Attorney –Physician
10
10 IV. Sources of Privacy & Security Obligations Federal Laws and Regulations and Guidance: U.S. Constitution –see above Federal Privacy Act of 1974 – 5 U.S.C. §552a FTC Consumer Online Privacy Principles 1998; Online Behavioral Advertising Principles 2009 FTC COPPA – Children’s Online Privacy Protection Rule – 16 C.F.R. 312
11
11 IV. Sources of Privacy & Security Obligations HIPAA – Health Insurance Portability and Accountability Act of 1996 and Privacy and Security Rules, 45 CFR §§ 160, 162 and 164, as Amended by HITECH Act (see below) GLB – Gramm-Leach Bliley Act (Financial Modernization Act of 1999) 15 U.S.C. §6801 et seq. and Financial Privacy Rule 16 C.F.R. 313 and Financial Safeguards Rule 16 C.F.R. 314 Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99)
12
12 IV. Sources of Privacy & Security Obligations FCRA – Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); amended by FACT Act – Fair and Accurate Credit Transactions Act of 2003 –Section 114 – Identity Theft Prevention – Red Flags Rules – 16 C.F. R. 681 –Section 116 – Proper Disposal of Consumer Information – Disposal of Consumer Report Information and Records - 16 C.F.R. 682
13
13 IV. Sources of Privacy & Security Obligations FDA – Research Data – Electronic Records and Signatures – “Part 11” – 21 C.F.R. 11
14
14 IV. Sources of Privacy & Security Obligations ARRA – American Recovery and Reinvestment Act of 2009 (“Stimulus Bill”) February 17, 2009 (www.whitehouse.gov ≥ http://frwebgate.access.gpo.gov/)www.whitehouse.gov –HITECH Act – Health Information Technology for Economic and Clinical Health Act – Division A, Title XIII of ARRA Subtitle D – Privacy - §§13400 -13424 – Amends HIPAA, substantially increases penalties (now) and new Federal Data Breach Notification as to Protected Health Information
15
15 IV. Sources of Privacy & Security Obligations State Laws: More stringent state laws on protected health information supersede HIPAA – e.g. –PA Confidentiality of HIV-Related Information Act (“Act 148”) 35 P.S §7601 et seq. Limit use of Social Security Numbers, e.g. – PA Social Security Number Privacy Act – 71 P.S. § 2601 et seq.
16
16 IV. Sources of Privacy & Security Obligations Data Breach Notification Acts – –California and Massachusetts lead the trends –PA – Breach of Personal Information Notification Act – 73 P.S. § 2301 –NJ – New Jersey Identity Theft Prevention Act – N.J.S.A. § 56:11- 44 et seq. and new draft rules with comment period closed 2/13/09 –DEL – Computer Security Breaches – Title 6, Chapter 12B
17
17 IV. Sources of Privacy & Security Obligations Torts – see above Privileges – Judicial Codes (see above)
18
18 IV. Sources of Privacy & Security Obligations Industry Standards – PCI – Payment Card Industry
19
19 IV. Sources of Privacy & Security Obligations Key obligations shared: Risk assessment Administrative, Physical and Technical Safeguards Policies and Procedures Training Sanctions
20
20 - Trends in Privacy and Security Laws Trends in Laws: Mandatory encryption Mandatory and prompt reporting of data breaches Increased penalties; enforcement Increased third party vendor oversight, liability Board level responsibility (e.g. Red Flags Rule)
21
21 -Trends in Privacy and Security Data breaches Increased Identity Theft Class Actions
22
22 V. What’s Loss, Liability, Breach? Unauthorized Access Loss that reasonably could lead to theft
23
23 - Sanctions/Liability for Violations: Examples Laws: Section 5 of the FTC Act - unfair or deceptive acts States – “Baby FTC Acts” HIPAA HITECH Act
24
24 - Sanctions/Liability for Violations: Enforcement Actions; Lawsuits: –Providence Health – unencrypted tapes – OCR/CMS/HIPAA sanction; 1 st monetary penalty ($100K) - Treatment Assocs of Victoria – TX AG – charge - unlawfully dumping client records in publicly accessible garbage; TX Identity Theft Act and Baby FTC Act –Heartland Payment Systems, N.J. – (payment card processor); hacker; PCI standards; Class Action – on behalf affected financial institutions
25
25 - Sanctions/Liability for Violations: Enforcement Actions; Lawsuits: –CVS – dumped prescription labels in dumpster. OCR and FTC JT enforcement: HIPAA Privacy Rule and FTC Act; $2.25 million; FTC 20 year monitoring. –Premier Capital Lending – GLB Privacy and Security Rules; customer data. Mortgage broker gave access that was used improperly. –Mortgage Broker Gregory Navone – consumer info into unsecured dumpster; FCRA Disposal Rule violation charged w/failure to implement training & exercise oversight of service providers.
26
26 VI. Privacy & Security – Lessons Learned Access is key; audit logs Audit/Assessment of Risks Effective Policies and Procedures Sanction employees Train employees It is internal employees and consultants with authorized access
27
27 VI. Privacy & Security – Lessons Learned Vendor management/Due diligence – not just contractual language required by HIPAA, GLB, Red Flag Rules, etc. Encryption Data Breach – Prepare Incident Reporting Team/Committee Mandatory Reporting Insurance
28
28 VII. Privacy & Security - Resources Data breach remedial products: –Credit monitoring products – negotiate contract (Experian) –Debix –Insurance coverage purchased (Data breach for one company cost $65K in postage alone!)
29
29 VII. Privacy & Security - Resources FTC.gov OCR Listserv (Office of Civil Rights – DHHS) CMS – HIPAA Security Rule NIST - National Institute of Standards and Technology www.nist.gov; Computer Security Resource Center (http://csrc.nist.gov); (Draft) Guide to Protecting Confidentiality of Personally Identifiable Information - 1/13/09 www.nist.govhttp://csrc.nist.gov IAPP www.privacyassociation.orgwww.privacyassociation.org
30
30 U.S. Privacy & Security Laws Questions? Diana S. Hare Associate General Counsel Drexel University College of Medicine 215.255.7842 Diana.Hare@drexelmed.edu
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.