Elements of a Swift (and Effective) Response to a HIPAA Security Breach Susan E. Ziel, RN BSN MPH JD Krieg DeVault LLP Past President, The American Association.

Slides:



Advertisements
Similar presentations
H = P = A = HIPAA DEFINED HIPAA … A Federal Law Created in 1996 Health
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
The HIPAA Privacy Rule And Its Impact On Agents And Employers National Association of Health Underwriters Capitol Conference March 23, 2003 Joseph T. Holahan,
HIPAA AWARENESS TRAINING
A Guide to Compliant Data Management
Eight Strategies to Reduce Your Risk in the Event of A Data Breach Sheryl Falk December 10, 2013.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Minimum Necessary Standard Version 1.0
1 The Current Reality of HIPAA Meredith L. Borden Venable LLP © April 18, 2008 The Current Reality of HIPAA Meredith L. Borden Venable LLP © April 18,
An Overview for In-Home Service Providers Legal advice must be tailored to specific circumstances. Information provided in this presentation should not.
Hipaa privacy and Security
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Are you ready for HIPPO??? Welcome to HIPAA
Hot Topics Legal Update Jill D. Moore, JD, MPH University of North Carolina School of Government September 2014.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
Health information security & compliance
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Data Classification & Privacy Inventory Workshop
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Protecting Sensitive Information PA Turnpike Commission.
Milada R. Goturi Tonya M. Oliver Thompson Coburn LLP 1.
HIPAA PRIVACY AND SECURITY AWARENESS.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
PHASE II OF HIPAA AUDIT PROGRAM June 2016 Presented by John P. Murdoch II, Esq. of Wilentz, Goldman & Spitzer, P.A. Two Industrial Way West Two Industrial.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Data Breaches in Employee Benefits
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
National HIPAA Audioconferences
Presentation transcript:

Elements of a Swift (and Effective) Response to a HIPAA Security Breach Susan E. Ziel, RN BSN MPH JD Krieg DeVault LLP Past President, The American Association of Nurse Attorneys

2 Disclaimer The information contained in this presentation has been prepared with the understanding that the author is not engaged in rendering legal, financial, medical or other professional advice.

3 Applicable Requirements HIPAA Privacy and Security Rules State Laws Requiring Notice of Security Breaches Involving Personal Information Laws Protecting Other Information Identity Theft and Crediting Reporting Laws (ITADA, FCRA, FACTA) Industry Standards (ISO, NIST, SAS 70) Other

4 Typical Scenarios Employee sold terminally ill patient IDs resulting in fraudulent mortgages Contractor stole patient IDs and obtained fraudulent credit Hospital ER imposter collected and sold patient IDs Consultant downloaded PHI to jump drive which was lost and never retrieved

5 More Typical Scenarios Employee had laptop stolen from her unlocked car Consultant pocket PC containing client file information left behind in restaurant Loaded CDs inadvertently thrown into trash Hacker accesses data through Internet website Malicious software (virus) takes down electronic information system Unencrypted PHI ed to wrong address

6 PHI Protected by HIPAA Any health or demographic information collected from patient That is created or received by covered entity Which relates to an individuals past, present or future physical or mental health of patient and related treatment and payment functions For which there is a reasonable basis to believe the information can be used to identify the patient

7 PI Protected by State Law [e.g., IC ] Unencrypted SSN (or) Name plus one or more of the following unencrypted or unredacted data: Drivers license number State identification card number Credit card number Financial account or debit card number plus security code, password or access code

8 PHI vs. PI HIPAA Covered Entity Security Incident Electronic Media Protected Health Information Safeguards Obligations State Security Breach Laws Data Base Owner Security Breach Electronic Media Personal Information Safeguards Obligations

9 Security Incident HIPAA Any attempted or successful (and) Unauthorized access, use, disclosure, modification or destruction (of) PHI, system operations, electronic media or other components of an information system containing PHI

10 Security Breach [e.g., IC ] Unauthorized acquisition of unencrypted computerized data that compromises the security, confidentiality, or integrity of Personal Information maintained by a person, but excludes: Good faith acquisition by authorized person for authorized purposes Unauthorized acquisition of portable electronic device that is password protected Computerized data includes data transferred to another medium, including paper, microfilm, or a similar medium, even if the transferred data are no longer in a computerized format

11 Disclosure of Security Breach [e.g., IC ] if … Learns that PI was or may have been acquired by unauthorized person and Knows, should know or should have known that the unauthorized acquisition has resulted in or could result in identity deception, identity theft or fraud.

12 Important Safeguards Laws and regulations, institutional policy Access and crowd control Marking and labeling documents Engaging counsel and asserting privilege at appropriate time BAAs and non-disclosure agreements Information and electronic media management

13 Laws, Regulations and Institutional Policy (Most stringent) laws and regulations Medicare conditions of participation State licensure HIPAA and other privacy/security laws (Adopted) institutional policy Reported HIPAA security incident Confirmed HIPAA security breach

14 Does Your HIPAA Policy Define All of These Terms? Access or Acquisition Availability Confidentiality Disclosure Electronic Media Encryption Identity Deception or Theft Integrity Personal Information Privacy Privacy Incident Protected Health Information Redacted Security Security Incident Unauthorized Access or Acquisition

15 Does Your HIPAA Policy Include These Provisions? How to report both HIPAA privacy and security incidents The members of the rapid response team How to implement contingency plan Essential steps to proper investigation Who decides whether The incident qualified as an unauthorized access and The unauthorized access has or could have resulted in identity deception or theft; fraud

16 Does Your HIPAA Policy Address Sanctions? Level 1: Careless Access to PHI Level 2: Intentional Access to PHI for Personal Reason or Gain Level 3: Intentional Access to PHI for Financial Gain or Malice

17 Access and Crowd Control Premises and workstations Keys and passwords Workforce, business associates and business visitors Mobile electronic media Communication in any form/medium Face to face Telephone, facsimile, Mobile electronic media

18 Information and Electronic Media Management Inventory and Mapping Back-up Fixed vs. mobile Transmission Storage Transfer and re-use Retirement and destruction

19 Investigational Materials Segregated and Labeled Confirm applicable privilege Establish policy and procedure Separate investigational files Document footers claiming privilege Prepared in anticipation of litigation or administrative proceeding

20 Engaging Counsel and Asserting Privilege Timely Segregate privileged communications Only counsel and essential persons present for privileged communications Clear counsel reporting relationship Clearly labeled and contains legal advice No third party disclosures Work product created with intent to remain confidential

21 What If You Need to Engage an Expert? Types of Experts and Advisors Public Relations Forensic Specialists Other Engagement by Counsel Nature of Services Establish Communication Rules Dont Forget the BAA

22 Identity Theft Protections Report incident to credit reporting agencies Annual credit reports Credit protection services Identity theft insurance Other

23 Proper Use of Service Agreements and BAAs Parties Scope of services Scope of PHI access Safeguards required Reporting of inadvertent disclosures Indemnification Return or destruction of protected information Termination

24 Does Your BAA Incorporate All of These Terms? Comply With HIPAA and Other Laws Governing Privacy and Security of PHI and PI Institute Administrative, Physical and Technical Safeguards Protect Privacy of PHI and Security of EPHI Report Security Incidents Indemnify for Violations of HIPAA and Other Laws

25 Key Elements of an Effective (and Swift) Response Plan #1. Notify Your Key Need to Know Persons; Establish Phone Conference Schedule #2. Set Mitigation Experts in Motion #3. Notify Counsel and Engage Necessary Experts

26 Key Elements of an Effective (and Swift) Response Plan #4. Establish a Public Relations Plan #5. Conduct and Document a Confidential Investigation Process #6. Secure Evidence and Maintain Chain of Custody

27 Key Elements of an Effective (and Swift) Response Plan #7. Corrective Action Plan and Progress Reports #8. Determine Notification Obligations #9. HIPAA Accounting Obligations

28 Key Elements of an Effective (and Swift) Response Plan #10. Call Center Arrangements #11. Institute Identity Theft Precautions, If Necessary #12. Be Prepared to Respond To External Investigations

29 Resources (OCR) urityMaterials.asp#TopOfPage (CMS) urityMaterials.asp#TopOfPage Breach_laws_May05.pdf (State Laws) Breach_laws_May05.pdf ml (NIST) ml (FTC) (Susan Ziel)