Scared Straight: The Need for Change Beth Cate Associate General Counsel, Indiana University.

Slides:



Advertisements
Similar presentations
Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Confidentiality and HIPAA
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Presented by the Office of the General Counsel An Overview of HIPAA.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA Regulations What do you need to know?.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Health information security & compliance
Protecting Personal Information Guidance for Business.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Data Privacy and Security: Overview and Update Beth Cate Associate University Counsel.
Responding to a Data Security Breach
Security, Privacy, and the Protection of Personally Identifiable Information Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
REGULATIONS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Overview of Cybercrime
Electronic Records Management: What Management Needs to Know May 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
1 Healthcare Privacy and Security: Concepts and Challenges Dixie B. Baker, Ph.D. Chair, HIMSS Privacy and Security Advocacy Task Force.
Contact Center Security Strategies Karl Walder Director - Solutions Noble Systems.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Data Security and Privacy Overview and Update Peter Moldave October 28, 2015.
Chapter 4: Laws, Regulations, and Compliance
CH 10. Confidentiality A. Confidentiality about sensitive medical information is necessary to preserve the patient’s dignity. B. In order to receive payment.
Human Subjects Update E. Wethington, Chair, UCHS.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Public Health IT Privacy, Confidentiality and Security of Public Health Information This material (Comp13_Unit2) was developed Columbia University, funded.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Risk Transfer Alternatives
By: Eamon Callahan and Wilston Johnston
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Information Security Law Update
Privacy & Security ABC Family Practice.
Presentation transcript:

Scared Straight: The Need for Change Beth Cate Associate General Counsel, Indiana University

“The Scary” (aka External Drivers for Change) Lawsuits Regulatory Enforcement Actions by government agencies Contract-based Penalties Harm to Reputation Resource diversion Loss of Confidence and Support from Financial Supporters Alums/donors Legislatures Increased Regulation

Some scary numbers From the Privacy Rights Clearinghouse ( –Higher education accounted for 115 of 478 reported data security breaches since Feb. 15, 2005 –3,817,372 persons’ data compromised (conservative estimate) Frequency of release of sensitive personal data + associated risks = need to construct authentication and ID management systems very carefully and with eye toward risk minimization

Some grim headlines “Ohio University: Data Breach Central?” – Martin Bosworth, ConsumerAffairs.com “UCLA Data Breach Leaves 800K At Risk” – CBS News, Dec. 12, 2006 “University of Texas probes computer breach—Files illegally accessed; second intrusion in three years” – MSNBC, Apr. 24, 2006

Some (a lot) of state laws State breach notification laws –35 and counting – State privacy laws, usually specific to data element or sector And whose law applies anyway? –Many out of state residents – long arm jurisdiction? –What about international students?

And more on the way

And some federal laws FERPA –According to OFCP, need to limit and track electronic access to student records to avoid violations –Mechanisms for electronic “consent” to disclosure of student records and access to student records must be reasonably secure –Loss of federal funding, injunctions HIPAA –Privacy and Security Rules require the implementation of systems to manage, limit, and monitor access to PHI –Civil and criminal penalties for violations GLB –Schools must implement security plan with administrative, technical, and physical safeguards to protect confidentiality of covered financial information –Agency enforcement actions

And probably more on the way Feinstein bill: “Notification of Risk to Personal Data Act of 2007,” S.239 Barney Frank (chair, House Financial Services Committee) bill: Predicted….

Periodic call for enactment of Fair Information Practice Principles as broad-based federal legislation, if not enough effective self-regulation –Notice –Choice/consent –Access –Integrity/Security –Enforcement Private right of action (lawsuits) Civil/criminal enforcement by government agencies

And much use of resources Containment and implementing fixes –Ohio University: between $5.5 and 8 million ) Investigation Notice (individuals, credit bureaus, state agencies) Further communications with individuals/media –UCLA incident: 8,500 calls to hotline within first few days Any reimbursement of costs incurred by individuals undertaken by institutions

And private contract-based penalties PCIDSS – Payment Card Industry Data Security Standards –Require strong access control and tracking measures re: credit card data Penalties for noncompliance: –Fines –Loss of approval to accept credit card payments –Enhanced audit requirements

And loss of confidence by donors Ohio University: –“’It was my intention to leave a sizable endowment to OU, but not any longer,’ announced one [alumnus]. –Another signed off his May 3 with, ‘You incompetent f---ing a--holes. I will never donate a penny to you.’" (“OU has been getting an earful about huge data theft,” The Athens News (6/12/06)).

Or, as they say on the commercial side… “TJX, in public relations terminology, is in hell,” said Geri Denterlein, a Boston ‘crisis management’ expert. – (“Bank reissues cards as TJX sued over cyberscam,” Boston Herald (1/30/07)).

And heads rolling Ohio University: –CIO resignation –Director of communication network services fired –Manager of internet and school systems fired Dept. of Veterans’ Affairs Chief Information Security Officer resigned after data breach involving data of 26 million vets AOL Chief Tech Officer resigns, and two company researchers fired, after breach involving 650,000 subscribers’ data

And the possibility of criminal penalties E.g., Indiana Code (disclosure of SSNs) –Personal criminal liability for negligent, knowing, reckless, and intentional disclosures –Felony convictions punishable by up to 3 years’ imprisonment and $10K fines

And the specter of litigation E.g., Ohio University alumni/class action suit –Seeks costs of credit monitoring; less clear about actual damages and “anxiety” May be difficult for plaintiffs to win on negligence, invasion of privacy theories BUT still incur costs of defense, which can be considerable –** insurance/credit monitoring services – Louisiana state arrangement with Equifax (free daily credit monitoring, $2,500 identity theft insurance)

Legislative requirements can set standards for negligence/common law invasion of privacy actions E.g., proposed Federal Agency Data Privacy Protection Act, H.516 –All sensitive data in federal agencies must be secured by most secure encryption standard recognized by National Institute of Standards and Technology (and must be updated every 6 months) –No access by anyone without security clearance and financial disclosure; no offsite transport w/o agency IG approval –Flow down of requirements to govt contractors

So, to summarize… There are many, and increasing, external drivers for well constructed and managed authentication and identity management systems