Examination of a Privacy Breach

Slides:



Advertisements
Similar presentations
The Regulatory Perspective
Advertisements

Data Security Breach Code of Practice. Data Security Concerns Exponential growth in personal data holdings Increased outsourcing 3 rd countries cloud.
THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS) OFFICE FOR CIVIL RIGHTS (OCR) ENFORCES THE HIPAA PRIVACY, SECURITY, AND BREACH NOTIFICATION RULES HIPAA.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Red Flag Rules: What they are? & What you need to do
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
HIPAA Regulations What do you need to know?.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
VIU Workshop: Creating a Culture of Privacy Awareness June 12, 2013 By Justin Hodkinson OIPC Policy Analyst/Investigator Office of the Information & Privacy.
Complying with Privacy to Enable Innovation & Research
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
Mark S. Hayes – Blake, Cassels & Graydon LLP Privacy and Security – Some Observations Mark S. Hayes, Blake, Cassels & Graydon LLP 7th CACR Privacy and.
Hong Kong Privacy Code on Human Resource Management
Developing a Records & Information Retention & Disposition Program:
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
New Data Regulation Law 201 CMR TJX Video.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Practical Information Management
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Privacy and Information Management ICT Guidelines.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
OPEN UP! Introduction to handling Freedom of Information requests.
AIMS To raise awareness of some of the issues To offer advice on solutions To identify what might be considered as ‘best practice’ To launch new Policies.
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
We’ve Had A Breach – Now What? Garfunkel Wild, P.C. 411 Hackensack Avenue 6 th Floor Hackensack, New Jersey Broadway Albany,
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Privacy Practices.
Privacy Information for Advisors. Agenda PIPEDA Advisor Required Privacy Program Our MGA Privacy Program Recommendations for Advisors.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
The Health Information Protection Act. What is the Health Information Protection Act (HIPA)? HIPA is legislation that speaks to access to, and protection.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Nassau Association of School Technologists
Protecting PHI & PII 12/30/2017 6:45 AM
PRIVACY TRAINING For CAILBA members
Protection of CONSUMER information
Privacy principles Individual written policies
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
Privacy principles Individual written policies
Chapter 3: IRS and FTC Data Security Rules
Privacy Breach Response and Reporting
Privacy & Access to Information
Move this to online module slides 11-56
Red Flags Rule An Introduction County College of Morris
Good Spirit School Division
Move this to online module slides 11-56
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Examination of a Privacy Breach WHAT TO DO WHEN A PRIVACY BREACH OCCURS MISA London Region Professional Network PIM Regional Training Workshop: Privacy Breaches, Access Matrices, and Shared Policies, February 11, 2010 Kimberley Ishmael, Keel Cottrelle LLP

What is a privacy breach? A privacy breach occurs when there is unauthorized access to, or collection, use, or disclosure of, personal information Such activity is “unauthorized” if it occurs in contravention of applicable privacy legislation

Privacy & School Boards Ontario school boards are affected by the following privacy statutes: Municipal Freedom of Information and Protection of Privacy Act (MFIPPA) and Personal Health Information Protection Act (PHIPA) A school board is governed by MFIPPA; A psychologist/social worker/speech language pathologist who collects, uses and discloses health information as part of the services they provide for students of the board is governed by PHIPA as an agent

Privacy & School Boards Violations of personal privacy frequently involve the inappropriate or inadvertent disclosure of personal information contrary to section 32 (where disclosure permitted) of MFIPPA or section 12 (security provision) of PHIPA Examples: personal information may be lost (file misplaced, stolen laptop or USB) Inadvertent disclosure through human error (misdirected fax or letter) Intentional disclosures or intentional misuse is also a possibility Example: Inadequate disposal of personal information (failure to shred materials)

Violations of personal privacy can also occur by unauthorized collection of personal information contrary to s. 28 of MFIPPA Example: Failure to identify the collection of personal information on a standard form

Discovering a Privacy Breach An institution may learn that it has breached an individual’s personal privacy directly from the affected individual or organization, and/or Staff member involved in the breach i.e. person who loses USB indirectly, from other parties, such as the media or third parties, Information and Privacy Commissioner/Ontario (IPC)

Step 1: Respond Assess the situation to determine if a breach has occurred and what needs to be done; Ensure that appropriate school board staff are immediately notified of the breach, including the FOI Co-ordinator Implement privacy breach protocol or procedures

Step 2: Contain Identify the scope of the breach and take steps to contain it; Examples: Retrieve hard copies of any personal information that have been disclosed Determine whether the privacy breach would allow unauthorized access to any other personal information (ex. an electronic information system) Change file identification numbers or passwords, as necessary Document the breach and containment activities;

Step 3: Investigate Conduct an internal investigation into the breach, reviewing the circumstances surrounding the event as well as the adequacy of existing policies and procedures in place to protect personal information Type of personal information involved; Cause and extent of the breach; Individuals affected by the breach; Possible harm from the breach.

Step 4: To Notify or Not to Notify? Notify individuals whose personal information has been disclosed, by telephone or in writing, if necessary Include detailed information such as what happened; the nature of the privacy breach and the mitigating actions taken by the board; If personal information that could lead to identity theft has been disclosed, affected individuals should be provided with information on steps they can take to protect themselves Section 12(2) of Ontario’s PHIPA includes a requirement for breach notification: “A health information custodian that has custody or control of personal health information about an individual shall notify the individual at the first reasonable opportunity if the information is stolen, lost, or accessed by unauthorized persons.”

Report the privacy breach to the office of the Information and Privacy Commissioner (IPC), as appropriate Note that the type and extent of the breach will influence your decision to notify the IPC Type of personal information involved; Cause and extent of the breach; Individuals affected by the breach; Possible harm from the breach; Likelihood of a complaint.

Step 5: Implement Change Address the situation on a systemic basis School board procedures or practices may warrant review or revision Breach may identify areas for employee training on privacy and security Evaluate the response and determine the effectiveness of the remedial action

Proactive Measures to Avoid Privacy Breaches Comply with the privacy laws governing the collection, retention, use and disclosure of personal information set out in MFIPPA and PHIPA Comply with the regulations under the Acts governing the safe and secure disposal of personal information and the security of records Ensure appropriate clauses for compliance in legal agreements with service providers Obtaining advice from your board’s legal department and FOI Co-ordinator Consulting with the IPC’s Policy and Compliance Department in appropriate situations Consider random spot audits of privacy policy compliance Develop an information culture that respects privacy, mitigates risk, and increases awareness

Benefits of a Privacy Breach Protocol Mitigate the damage by immediately preventing further inappropriate disclosures of personal information Assure complainants and affected persons as well as the public, the media, and the IPC that the matter is taken seriously; and Ensure that policies and procedures comply with the privacy protection provisions of MFIPPA and PHIPA and that staff are properly trained

Recent Cases PHIPA, Report No.: HI-050055-1(2006) A laptop belonging to an employee of a school board that contained the personal health information of 37 students was stolen. Section 12(2) notification requirement was met by sending notification letters to students’ parents. Complaint resolved by way of informal resolution. Health information custodian agreed to update their policies and procedures to ensure compliance with the Act. In addition, educational measures were undertaken to ensure staff were aware of their obligations under the Act.

MFIPPA – Report No. MC-020008-1 Complaint alleged that a teacher verbally disclosed a student’s probable grade on an art assignment with two other students, contrary to MFIPPA IPC confirmed that verbal disclosure of personal information falls under privacy provisions as long as the information exists or existed at one time in recorded format In this instance, grade reportedly disclosed was not the same as grade recorded thus did not qualify as “personal information” under the Act However, IPC questioned the school practice relating to display of artwork and recorded grade as lacking reasonable measures to prevent unauthorized access, contrary to Reg. 823 IPC recommended a board policy to prevent the unauthorized disclosure of student grades, specifically addressing the issue of verbal disclosures as well as the issue of displaying students’ assignments

Privacy Breach at the Durham Health Department On December 21, 2009, IPC was notified by Durham’s Officer of Health that a nurse had lost a USB memory stick containing the personal health information of over 83,000 individuals who had attended H1N1 immunization clinics in Durham The personal information included names, addresses, telephone numbers, dates of birth, health card numbers and health history. The memory stick was not encrypted, despite the fact that the encryption of mobile devices was required as of Order HO-004 in 2007. The IPC issued an Order (HO-007) on January 14, 2010 clearly outlining the IPC’s expectation that all personal health information stored on any type of mobile device in Ontario be protected with strong encryption

Theft at OTIP 3 laptops containing addresses and social insurance numbers of approximately 8600 elementary teachers was stolen from an OTIP office in Waterloo on December 3, 2009 The laptops had been locked to docking stations; The information contained on the laptops was not encrypted OTIP notified any insured teacher members whose information may have been compromised by letter advising of the incident and provided a toll-free number for the recipient to contact in the event further details were requested OTIP Spokesperson, Julie Millard, stated that it took fraud experts nearly two weeks of forensic work to pinpoint what information had been taken, and the holiday break delayed the process so affected teachers were informed in mid January 2010 “Because of what’s happened we’re working faster to encrypt all our communication devices by March 2010– laptops, Blackberries, even USB keys”

References Privacy & Information Management Toolkit, 2008 Information and Privacy Commissioner/Ontario, What to do if a privacy breach occurs: Guidelines for government organizations, December 2006 Information and Privacy Commissioner/Ontario, What to do When Faced With a Privacy Breach: Guidelines for the Health Sector Breach Notification: A Sound Business Practice, CIPC Seminar, May 2006 Information and Privacy Commissioner/Ontario, A Privacy Breach Has Occurred – What Happens Next?, 2001 Information and Privacy Commissioner/Ontario, Privacy Breaches: It Can Happen To You (What Not To Do), 2006 Encrypt Your Mobile Devices: Do It Now - PHIPA Order HO-007