<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data security Archives - Herrin Health Law, P.C.</title>
	<atom:link href="https://herrinhealthlaw.com/category/data-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://herrinhealthlaw.com/category/data-security/</link>
	<description>Comprehensive Legal Services Dedicated to the Healthcare Industry</description>
	<lastBuildDate>Wed, 30 Oct 2024 10:29:16 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://herrinhealthlaw.com/wp-content/uploads/2018/03/cropped-Herrin-Health-Law-Favicon-BC-64x-32x32.png</url>
	<title>Data security Archives - Herrin Health Law, P.C.</title>
	<link>https://herrinhealthlaw.com/category/data-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Charitable Giving Fraud and Other Online Dangers</title>
		<link>https://herrinhealthlaw.com/charitable-giving-fraud-and-other-online-dangers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=charitable-giving-fraud-and-other-online-dangers</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Wed, 30 Oct 2024 10:16:48 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=1474</guid>

					<description><![CDATA[<p>Don't fall victim. Learn how to spot red flags, protect yourself, and ensure your generosity online reaches those truly in need.</p>
<p>The post <a href="https://herrinhealthlaw.com/charitable-giving-fraud-and-other-online-dangers/">Charitable Giving Fraud and Other Online Dangers</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In today’s digital world, charitable giving can be a click away—but so can the risk of falling victim to scams. <em>Charitable Giving Fraud and Other Online Dangers</em> dives into the emotional tactics cybercriminals use to deceive generous donors, especially in times of crisis, from Veterans Day to natural disasters like the Maui fires. With millions lost to online charity scams, this article reveals eye-opening statistics and outlines essential steps to protect yourself and ensure your support reaches the right hands. Ready to learn how to spot red flags and give with confidence? <a href="https://herrinhealthlaw.com/wp-content/uploads/2024/10/Herrin-Charitable-Giving-Fraud-Online-Dangers-Fall-2024-In-House-Defense-Quar.pdf" target="_blank" rel="noopener">Read on! (PDF) </a></p>
<p><a href="https://herrinhealthlaw.com/wp-content/uploads/2024/10/Herrin-Charitable-Giving-Fraud-Online-Dangers-Fall-2024-In-House-Defense-Quar.pdf" target="_blank" rel="noopener">As published in DRI&#8217;s <em>In-House Defense Quarterly</em>, Fall 2024, pp 20-22.</a></p>
<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of<span> </span><a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta, Ga. Herrin offers more than 30 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology. Reach him at 404-459-2526 or<span> </span><a href="mailto:barry.herrin@herrinhealthlaw.com">barry.herrin@herrinhealthlaw.com.</a></em></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://herrinhealthlaw.com/charitable-giving-fraud-and-other-online-dangers/">Charitable Giving Fraud and Other Online Dangers</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Disrupting the Talk about Privacy and Security &#8220;Disruption&#8221;</title>
		<link>https://herrinhealthlaw.com/disrupting-talk-privacy-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=disrupting-talk-privacy-security</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Thu, 06 Aug 2020 01:03:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=1134</guid>

					<description><![CDATA[<p>The overbroad and ubiquitous use of the term "disruption" in the technology context, particularly with reference to computer data privacy and security, may backfire among certain audiences. Here's how to not lose your credibility. </p>
<p>The post <a href="https://herrinhealthlaw.com/disrupting-talk-privacy-security/">Disrupting the Talk about Privacy and Security &#8220;Disruption&#8221;</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p></p>
<p>The overbroad and ubiquitous use of the term &#8220;disruption&#8221; in the technology context, particularly with reference to computer data privacy and security, may backfire among certain audiences. Here&#8217;s how to not lose your credibility.</p>
<p><span style="font-size: 15px;">As published in the </span><em style="font-size: 15px;">ISSA Journal</em><span style="font-size: 15px;"> August 2020, volume 18, issue 8, pages 23 to 25. ISSA is the Information Systems Security Association International.</span></p>
<p><span style="font-size: 15px;">For the entire article, please </span><a href="https://herrinhealthlaw.com/wp-content/uploads/2020/08/Herrin-ISSA-Privacy-Security-202008.pdf" target="_blank" rel="noreferrer noopener" style="font-size: 15px;"><strong>click this link</strong></a><span style="font-size: 15px;"> for the printer-friendly PDF.</span></p>
<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of <a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta, Ga. Herrin offers more than 30 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology. Reach him at 404-459-2526 or <a href="mailto:barry.herrin@herrinhealthlaw.com">barry.herrin@herrinhealthlaw.com</a>.</em></p>
<p></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><p>The post <a href="https://herrinhealthlaw.com/disrupting-talk-privacy-security/">Disrupting the Talk about Privacy and Security &#8220;Disruption&#8221;</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 12 Information Security Recommendations for Businesses Operating in a Quarantined World</title>
		<link>https://herrinhealthlaw.com/top-12-information-security-recommendations-for-businesses-operating-quarantined-world/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-12-information-security-recommendations-for-businesses-operating-quarantined-world</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Mon, 06 Apr 2020 15:54:30 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=1070</guid>

					<description><![CDATA[<p>Unplanned remote working is causing many businesses significant information security and privacy challenges. Here's how to safeguard these environments.</p>
<p>The post <a href="https://herrinhealthlaw.com/top-12-information-security-recommendations-for-businesses-operating-quarantined-world/">Top 12 Information Security Recommendations for Businesses Operating in a Quarantined World</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><a rel="noreferrer noopener" href="https://herrinhealthlaw.com/wp-content/uploads/2020/04/Top12InfoSecurityTips.pdf" target="_blank">Printer-friendly PDF</a></p>
<p><strong>By DRI Cybersecurity and Data Privacy Committee and the DRI Center for Law and Public Policy</strong></p>
<p>Authors: <br />Stephen E. Reynolds, Ice Miller LLP<br />Barry S. Herrin, Herrin Health Law, PC<br />Leon Ravenna, KAR Global<br />Laura C. Fey, Esq., Fey LLC</p>
<p><!-- /wp:post-content --></p>
<p><!-- wp:paragraph {"backgroundColor":"very-light-gray"} --></p>
<p class="has-background has-very-light-gray-background-color">We hope that all of you are feeling well and staying safe. Recognizing that many of you and your colleagues are confronting significant information security and data privacy challenges right now, the DRI Cybersecurity and Data Privacy Committee and the DRI Center for Law and Public Policy have teamed up to prepare and provide you with DRI&#8217;s Top 12 Information Security Recommendations for Law Firms and Other Businesses Operating in a Quarantined World.</p>
<p><!-- /wp:paragraph --></p>
<p><!-- wp:paragraph --></p>
<p><!-- /wp:paragraph --></p>
<p><strong>1. Use a Virtual Private Network (VPN): </strong>Businesses should consider using a VPN to secure remote access to their organization&#8217;s systems, documents, and contacts. If a business does not have remote VPN available, remote workers should be encouraged to assess their home network security and consider changing the password to their home internet routers.</p>
<p><strong>2. Advise Employees to Confirm Home Routers are Updated: </strong>Businesses should advise all employees working remotely to update their home routers to the current revision.</p>
<p><strong>3. Install Multi-Factor Authentication (MFA):</strong> Businesses should consider utilizing MFA, which creates an additional authentication step on top of inputting a password, adding an extra level of security to network login or email credentials.</p>
<p><strong>4. Use Antivirus Software: </strong>Businesses should require antivirus software on any computer accessing your infrastructure.</p>
<p><strong>5. Monitor Online Behavior and Consider Disabling Certain Access:</strong> Businesses should enable online auditing software to make sure employees aren&#8217;t navigating around the Internet unsafely. Consider disabling access to personal emails and Facebook from business supplied technology. Consider limiting remote access to &#8216;trusted&#8217; devices. Consider enabling &#8216;lock, wipe, kill&#8217; technology for personal devices connecting to business platforms.</p>
<p><strong>6. Beware of Phishing Emails: </strong>Businesses should circulate regular reminders to remote workers to stay vigilant for phishing emails and working with their information technology team to enhance their spam and phishing filters.</p>
<p><strong>7. Disable Virtual Assistants: </strong>Employees should be required to turn off Alexa and other virtual assistants while any work-related information is being discussed &#8212; they are always listening.</p>
<p><strong>8. Securely Store and Transmit Confidential Electronic Information:</strong> Where appropriate, businesses should consider acquiring secure cloud storage and requiring remote workers to store all confidential information on the cloud where only authorized employees are permitted access, rather than on their local machines. Remote workers should encrypt documents and email communications that contain confidential information. Alternatively, if possible, consider disabling saving to remote terminals and drives and disabling USB ports to prevent use of portable drives.</p>
<p><strong>9. Securely Store and Share Physical Copies of Confidential Information: </strong>Remote workers should be reminded not to leave confidential information out in the open and to store such documents in a secure location. Maintain a &#8216;clean desk&#8217; policy for work at home. Any sharing of physical copies of confidential information should be handled in a secure manner. Documents with confidential information should be shredded when no longer needed. Consider disabling remote printing or printing to other than networked printers.</p>
<p><strong>10. Install Home Firewall: </strong>If possible, executives and other employees should set up a home firewall for an extra level of security.</p>
<p><strong>11. Securely Take Confidential Phone Calls: </strong>When conducting phone conversations, especially where confidential information will be shared or discussed, remote workers should take such calls in a private room away from other persons.</p>
<p><strong>12. Remember Physical Security: </strong>Remote workers should always lock their devices (whether a computer or mobile device) when unattended. Remote workers should also always lock their doors when leaving their home without their devices, even for a short period of time.</p>
<p><!-- wp:block {"ref":1100} /--></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><p>The post <a href="https://herrinhealthlaw.com/top-12-information-security-recommendations-for-businesses-operating-quarantined-world/">Top 12 Information Security Recommendations for Businesses Operating in a Quarantined World</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Teleworking due to COVID-19? Protect PHI from security threats, starting with this policy.</title>
		<link>https://herrinhealthlaw.com/teleworking-due-to-covid-19-protect-phi-from-security-threats-with-this-policy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=teleworking-due-to-covid-19-protect-phi-from-security-threats-with-this-policy</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Tue, 24 Mar 2020 01:55:23 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=1063</guid>

					<description><![CDATA[<p>With restrictions forcing teams to work remotely, itâ€™s more critical than ever that we batten down the hatches. Free policy template provided. </p>
<p>The post <a href="https://herrinhealthlaw.com/teleworking-due-to-covid-19-protect-phi-from-security-threats-with-this-policy/">Teleworking due to COVID-19? Protect PHI from security threats, starting with this policy.</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Securing personal health information (PHI) can be a meticulous task inside your organization&#8217;s firewall. With restrictions now in place forcing teams to work remotely, many for the first time, and with unfamiliar technology, it&#8217;s more critical than ever that we batten down the hatches.</p>



<p>PHI can include physical records, electronic records or spoken information. Think medical bills, lab test results, health records and histories <em>any</em>thing that includes a personal identifier. These types of data are highly sought after on the dark web, posing a critical need for strict policies and practices.</p>



<p>Staying vigilant applies to remote workers with company equipment as well as personal hardware. If you rely on third-party vendors to manage billing, medical records, precertification, quality reviews or the like, ask if measures are in place to combat hackers and breaches in this new environment. </p>



<p>In the meantime, here&#8217;s a customizable <a aria-label="Remote Working Obligation (opens in a new tab)" href="https://herrinhealthlaw.com/wp-content/uploads/2020/03/Herrin-Working-Remotely-Policy-Template.docx" target="_blank" rel="noreferrer noopener">Remote Working Obligations</a> template to help you think through safeguards. There is no such thing as too much cybersecurity.</p>



<p>Remote technology doesn&#8217;t have feel like we&#8217;re playing tin-can telephone (as nostalgic as that sounds). But we do need to play intelligently.</p>



<p>Our warmest wishes to all for staying healthy and safe.</p>



<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of&nbsp;<a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta, Ga. Herrin offers more than 30 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology. Reach him at 404-459-2526 or&nbsp;<a href="mailto:barry.herrin@herrinhealthlaw.com">barry.herrin@herrinhealthlaw.com</a>.&nbsp;</em></p>



<p></p>
<p>The post <a href="https://herrinhealthlaw.com/teleworking-due-to-covid-19-protect-phi-from-security-threats-with-this-policy/">Teleworking due to COVID-19? Protect PHI from security threats, starting with this policy.</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Automation as a cure for stupid? When it comes to passwords, yes.</title>
		<link>https://herrinhealthlaw.com/password/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=password</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Tue, 08 Jan 2019 05:00:53 +0000</pubDate>
				<category><![CDATA[Data security]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=789</guid>

					<description><![CDATA[<p>People canâ€™t agree on whether passwords are dead or dying, but some password selection and retention behaviors are downright dangerous. Which ones?</p>
<p>The post <a href="https://herrinhealthlaw.com/password/">Automation as a cure for stupid? When it comes to passwords, yes.</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>For those of us who are old enough to remember Mr. Blackstone&#8217;s Best and Worst Dressed Lists coming out around media-awards season, the concept of the 10 Best or 10 Worst of anything is old hat. ESPN used that for its top sports-plays segment for years, and we asked to rank the top 10 of everything &#8212; craft beers, locally-sourced, lightly killed burger pavilions, handyman services, you name it.</p>



<p>However, one place where this kind of list-building can really have an effect on your cybersecurity is to pay attention to the people that track commonly used &#8212; or, in many cases, stupidly used &#8212; passwords. There are many such lists, but TeamsID&#8217;s list<a href="#_edn1">[i]</a> ranks the top 100 worst. In many cases, this list is similar to those published every year by the <em>Wall Street Journal</em>.<a href="#_edn2">[ii]</a> Why is it similar? Because people can get lazy and systems haven&#8217;t been changed specifically to eliminate this behavior.</p>



<p>So, here&#8217;s a tip for all you system folk out there. Please, whatever you do, disable the following passwords in your systems:</p>



<ul class="wp-block-list">
<li>password</li>



<li>Password</li>



<li>passw0rd</li>



<li>123456</li>



<li>1234567</li>



<li>12345678</li>



<li>qwerty</li>



<li>princess</li>



<li>111111</li>



<li>sunshine</li>



<li>letmein</li>



<li>admin</li>



<li>iloveyou</li>



<li>football</li>



<li>All of the above variants with a &#8216;1&#8217; or a &#8220;!&#8221; or both added at the end</li>
</ul>



<p>Although everyone can&#8217;t agree on whether passwords are dead or dying, whether multi-factor authentication is the way to go, whether pass-phrases are better than passwords, and similar arguments, I hope everyone can agree that these password selection and retention behaviors are dangerous. Remember, the criminals read the same papers we do.</p>



<p>Happy New Year!</p>



<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of <a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta, Ga. Herrin offers more than 30 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology. Reach him at <a href="tel:404-459-2526">404-459-2526</a> or <a href="mailto:barry.herrin@herrinhealthlaw.com">barry.herrin@herrinhealthlaw.com</a>.</em></p>



<hr class="wp-block-separator has-css-opacity"/>



<p><a href="#_ednref1">[i]</a> <a href="https://www.teamsid.com/100-worst-passwords-top-50/" target="_blank" rel="noreferrer noopener" aria-label="https://www.teamsid.com/100-worst-passwords-top-50/ (opens in a new tab)">https://www.teamsid.com/100-worst-passwords-top-50/</a></p>



<p><a href="#_ednref2">[ii]</a> <a href="https://www.wsj.com/articles/2018-in-the-numbers-caffeine-fixes-asylum-seekers-and-bad-passwords-again-11545393601?mod=searchresults&amp;page=1&amp;pos=8" target="_blank" rel="noreferrer noopener" aria-label="https://www.wsj.com/articles/2018-in-the-numbers-caffeine-fixes-asylum-seekers-and-bad-passwords-again-11545393601?mod=searchresults&amp;page=1&amp;pos=8 (opens in a new tab)">https://www.wsj.com/articles/2018-in-the-numbers-caffeine-fixes-asylum-seekers-and-bad-passwords-again-11545393601?mod=searchresults&amp;page=1&amp;pos=8</a></p>
<p>The post <a href="https://herrinhealthlaw.com/password/">Automation as a cure for stupid? When it comes to passwords, yes.</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity insurance &#8212; the basics</title>
		<link>https://herrinhealthlaw.com/cybersecurity-insurance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-insurance</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Tue, 08 Jan 2019 04:10:12 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insurance]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=786</guid>

					<description><![CDATA[<p>Potential insureds must critically evaluate cybersecurity insurance prices. Learn which coverages are vital and how compliance plays a critical role.</p>
<p>The post <a href="https://herrinhealthlaw.com/cybersecurity-insurance/">Cybersecurity insurance &#8212; the basics</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In October of 2002, <em>The Economis</em>t magazine wrote that &#8220;total security was impossible&#8221; and that insurance would be how businesses managed the financial aspects of cyber risk. Since then, security attacks have changed and become more deceptive and complex, and cyber defenses have become more technologically dependent. The insurance market, though maturing, is not developing at as rapid a pace as the criminal industry and the technological response.</p>



<p>Potential insureds cannot wait for the waters to calm, and must critically evaluate cybersecurity insurance prices and coverage options. The first and most important of these coverages should be the coverage of costs related to managing breaches, to include expenses related to the investigation, remediation efforts, and patient notification. Other costs that may also be incurred are credit monitoring services, damages associated with identity theft, damages associated with recovery of data, damages incurred due to having to reset EHR systems, and damages to reconstruct or recover websites and other Internet presences. Business continuity expenses (for workarounds or loss of revenue due to a cybersecurity incident) might also need coverage, especially as most standard commercial policies now exclude cyber-related risks from their covered losses. Finally, coverage for rogue employees and insider threats needs to be a part of the insurance discussion and any available coverage needs to be understood.</p>



<p>What coverage a healthcare enterprise can purchase and how much that coverage costs may also change based on how the enterprise addresses these critical aspects of compliance:<br></p>



<ul class="wp-block-list">
<li>The enterprise should be able to show that it is in compliance with HIPAA, including those provisions that require security and privacy risk assessments and proof of a plan of mitigation and remediation. Insurers likely will not cover losses resulting from a gap in HIPAA compliance, especially because there is a legal obligation on the enterprise to find out what those are.</li>
</ul>



<ul class="wp-block-list">
<li> Insurers may impose requirements for technology controls (such as encryption, for example) beyond those mandated by HIPAA. Some coverages require more secure and more robust email systems that are more resistant to phishing and spoofing, and other coverages may even require intentional phishing attacks by the insured&#8217;s IT department or vendors to gauge compliance with training.</li>
</ul>



<ul class="wp-block-list">
<li> The training requirements for new employee onboarding and access by non-employee contractors may need to meet certain criteria beyond HIPAA workforce awareness training.</li>
</ul>



<ul class="wp-block-list">
<li> Insurers may require that contractors providing &#8216;business associate&#8217; services be separately insured as a first layer of defense against cost, and that those business associate policies explicitly cover the covered entity for losses and damages caused by the business associate.</li>
</ul>



<ul class="wp-block-list">
<li>The purchased coverage, as with certain types of malpractice insurance, should be based on the &#8216;date of detection&#8217; as opposed to &#8216;date of intrusion.&#8217; It is so difficult, even with the best system monitoring tools, to determine when a breach or incident actually first occurred, so the enterprise does not want to be locked into a technical dispute with the insurer about when the hack &#8216;should have been&#8217; detected.</li>
</ul>



<ul class="wp-block-list">
<li> The policy should explicitly address whether offshore operations will be covered. Significant risks are associated with outsourcing certain data manipulation and management functions to countries or regions that have stronger privacy and data security rules than the United States.</li>
</ul>



<p>Finally, and regardless of what specific coverage requirements your policy contains, any policy&#8217;s limits need to avoid &#8216;cannibalizing&#8217; limits, in which the costs of defense reduce the limits available to pay damages or judgments. As with professional malpractice and commercial general liability coverage, the best coverage separates costs of defense from claims expenses.</p>



<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry Herrin </a>(<a href="mailto:barry.herrin@herrinhealthlaw.com" target="_blank" rel="noreferrer noopener" aria-label="barry.herrin@herrinhealthlaw.com (opens in a new tab)">barry.herrin@herrinhealthlaw.com</a>) is an attorney and Fellow of AHIMA. He is admitted to the bar in Florida, Georgia, North Carolina, and the District of Columbia and often speaks at the FHIMA Annual Meeting.</em></p>



<ul class="wp-block-list">
<li>&#8220;Putting It All Together,&#8221; <em>The Economist</em> (October 24, 2002)</li>



<li>Koo, &#8220;More Incident Data Needed for Cybersecurity Insurance,&#8221; Bloomberg BNA (March 28, 2016)</li>



<li>Even though there is almost a universal recognition in the law enforcement and security communities that these programs do no good at all, as the sophisticated hacker knows to wait out the 1 to 2 years of service before making use of the stolen data.</li>
</ul>



<p><em>As published in the November 2018 FHIMA Monthly Newsletter. Reprinted with permission.  </em></p>
<p>The post <a href="https://herrinhealthlaw.com/cybersecurity-insurance/">Cybersecurity insurance &#8212; the basics</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>All I want for Christmas is &#8230; to keep my data private and secure</title>
		<link>https://herrinhealthlaw.com/christmas-keep-data-private-secure/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=christmas-keep-data-private-secure</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Thu, 20 Dec 2018 12:13:52 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Herrin Health Law]]></category>
		<category><![CDATA[holiday safety]]></category>
		<category><![CDATA[holiday security]]></category>
		<category><![CDATA[online shopping security]]></category>
		<category><![CDATA[online shopping security tips]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=773</guid>

					<description><![CDATA[<p>Data privacy is spotlighted during our frenzy of holiday shopping, but needs to be a year-â€˜round way of life. Learn how to "hide, lock and take."</p>
<p>The post <a href="https://herrinhealthlaw.com/christmas-keep-data-private-secure/">All I want for Christmas is &#8230; to keep my data private and secure</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>No, it doesn&#8217;t rhyme, and you can&#8217;t dance to it, but it&#8217;s what the smart shopper should be adding to his list for the jolly old elf.</p>



<p>In case you missed them, several federal agencies, including the Federal Trade Commission (FTC) and Federal Bureau of Investigation (FBI), publish safety advisories this time of year to help folks not get scammed or predated upon by cyberspace criminals. For purposes of this reminder, let&#8217;s analogize them to the &#8216;hide, lock, take&#8217; signs you see at all shopping mall parking lots in America.</p>



<h3 class="wp-block-heading">HIDE</h3>



<ul class="wp-block-list">
<li>Buy online only from reputable sites that you have shopped with in the past. Beware of gift card offers or &#8220;too good to be true&#8221; pricing on sought-after gifts, especially from unknown sites.</li>



<li>Don&#8217;t respond to &#8216;click here&#8217; offers from merchants. Don&#8217;t respond to ads on social media sites. Don&#8217;t respond to surveys online or on social media asking for personal information. Don&#8217;t download apps or attachments from links in emails. Just <em>don&#8217;t</em> do it.</li>



<li>If you&#8217;re one of those people who can&#8217;t resist posting pictures of everything you do, don&#8217;t post pictures of concert or sports tickets, because criminals will use the bar codes to create fake tickets and take your seat. </li>



<li>If you get a phone call, text or email from someone purporting to be the fraud control agents of your bank or credit card company, don&#8217;t respond. Instead, call the number on the back of your card or on your bank statement and ask if there has been any unusual activity.</li>
</ul>



<h3 class="wp-block-heading">LOCK</h3>



<ul class="wp-block-list">
<li>Use different passwords for different online shopping sites.</li>



<li>Encrypt your computer.</li>



<li>Use antivirus and other defensive software, and keep updates current.</li>



<li>Don&#8217;t use truthful information in those &#8220;security questions&#8221; that you are asked to backstop your identity online. If I<br>can get your mother&#8217;s maiden name, the street where you grew up, your first car, your high school mascot, and your best friend from your social media posts, so can the bad guys.</li>



<li>Don&#8217;t give out your social security number unless it&#8217;s absolutely necessary. HINT: in most cases, it&#8217;s not absolutely necessary. And especially be wary of a person asking for your SSN AND your date of birth, as this is an invitation for financial identity theft.</li>



<li>&#8220;Freeze&#8221; your credit report with the three main agencies (Equifax, Experian and TransUnion) so you control when to apply for new credit.</li>
</ul>



<h3 class="wp-block-heading">TAKE</h3>



<ul class="wp-block-list">
<li>If you&#8217;re one who upgrades to the newest phone each year, be sure to scrub all data from those phones and remove any portable storage devices that live in them.</li>



<li>Ditto for new computers.  Once you transfer the data to the new box, destroy the data on the old box with a Department of Defense quality wiping/overwriting program. Or, simply take out &nbsp;the drive and break it into tiny bits with a hammer.</li>



<li>Make sure you maintain control of your credit cards and driver&#8217;s license. </li>



<li>Limit what you carry when you shop. Leave all cards that aren&#8217;t for shopping at home, because their loss or theft could compromise your identity.</li>



<li>If possible, shop online with only one card. It will make looking for and finding fraud easier. Use the same strategy for physical shopping as well. This may mean you lose some sales or point accumulation possibilities, but those aren&#8217;t worth the hassle of recovering from theft or impersonation. Or just get that <em>gold</em> card &#8212; you know, the one that advertises for extra points or extra cash; yeah, THAT one.</li>



<li>Have the merchant email you a receipt instead of taking a physical receipt, if possible.</li>
</ul>



<p>And let&#8217;s not forget to practice physical security and situational awareness while we are all out and about:</p>



<ul class="wp-block-list">
<li>Park in well-lit spaces. </li>



<li>Don&#8217;t leave valuables visible in your car. </li>



<li>Ask for a security escort to your car if you&#8217;re uneasy.</li>



<li>And, even though the Boy Scout in me rebels at this notion, decline help from well-meaning people to load your car or hold your keys/purse/children while you fumble around. Get store staff or mall security to do this for you. Or, better yet, shop with other adult friends and family members who can help do this.</li>
</ul>



<p>Finally, with all of the online shopping and delivery
happening this time of year, remember: </p>



<ul class="wp-block-list">
<li>If someone isn&#8217;t going to be home to receive a delivery, have the packages delivered to another physical location. Both FedEx and UPS allow for delivery to one of their storefronts at no additional charge in most cases.</li>



<li>Shred return labels and shipping documents you won&#8217;t use later. This prevents criminals from knowing where you shop and sending you a spoofed email from that merchant (which you should NOT click on). You should already have a shredder for those credit card offers, convenience checks, prescription documents that come with your pharmacy refills, and other sensitive papers. If not, tell Santa you need one.</li>



<li>Break down shipping boxes and make sure they fit in the trash can. Piling lots of boxes at the curb is a &#8216;welcome mat&#8217; for the home break-in teams that cruise about.</li>
</ul>



<p>Data privacy is spotlighted during our frenzy of holiday shopping, but you need this to be a year-round way of life. Otherwise, your financial and personal data will be a gift that keeps on giving to the cybercriminal community even after you&#8217;ve taken down the tree and blown your New Year&#8217;s resolution to start exercising more.&nbsp; Maybe if you had an app that Bluetooths to your scale so you can track your weight on your phone, and then send that personal data to a website that analyzes your BMI and diet. Oh, wait, that&#8217;s <a aria-label="another blog (opens in a new tab)" href="https://herrinhealthlaw.com/what-amazons-health-care-model-wont-look-like/" target="_blank" rel="noreferrer noopener">another blog</a>.</p>



<p>Merry Christmas! </p>



<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of&nbsp;<a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta, Ga. Herrin offers more than 30 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology. Reach him at <a href="tel:404-459-2526">404-459-2526</a> or <a href="mailto:barry.herrin@herrinhealthlaw.com">barry.herrin@herrinhealthlaw.com</a>.</em></p>
<p>The post <a href="https://herrinhealthlaw.com/christmas-keep-data-private-secure/">All I want for Christmas is &#8230; to keep my data private and secure</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Risk in Health Care</title>
		<link>https://herrinhealthlaw.com/cybersecurity-risk-in-health-care/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-risk-in-health-care</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Sun, 08 Apr 2018 12:30:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Electronic Medical Record]]></category>
		<category><![CDATA[Insurance]]></category>
		<guid isPermaLink="false">http://hhl.healthwealthmarketing.com/?p=397</guid>

					<description><![CDATA[<p>Learn the current state of healthcare data privacyÂ and security, legal issues that need attention,Â risks of the growing use of remote technologies, health and wearable technology, and finally cybersecurity insurance as a way to mitigate the financial costs of breach.</p>
<p>The post <a href="https://herrinhealthlaw.com/cybersecurity-risk-in-health-care/">Cybersecurity Risk in Health Care</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>As published in Health Law Developments, The Newsletter of the Health Law Section State Bar of Georgia</em></strong><br />
<a href="https://www.gabar.org/committeesprogramssections/sections/healthlaw/upload/Health_Law_Winter_18_NL.pdf"><strong><em>Winter 2018</em></strong></a></p>
<p><strong>Abstract</strong></p>
<p>The need for constant availability and integrity of patient data means that many organizations compromise on privacy and security, often to their detriment. This article discusses the current state of healthcare data privacy and security, examines the legal issues requiring attention, discusses risks of the growing use of remote technologies, health and wearable technology, and finally discusses cybersecurity insurance as a way to mitigate the financial costs of breach.</p>
<p><strong>The Current State</strong></p>
<p>Notwithstanding the imperative of the federal Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its Privacy and Security Rule,<sup>3 </sup>the era of interoperability has created a de-emphasis on the confidentiality of medical information while, at the same time, creating a tremendous emphasis on integrity and availability.</p>
<p>Findings from the Health Care Industry Cybersecurity Task Force in its final report of June 2, 2017<sup>4</sup>show that, of the three aims of cybersecurity confidentiality, integrity, availability), availability is the most important. You cannot take care of patients without having availability of information. Having high availability of patient information is especially important with hospitals that operate 24&#215;7 and 365 days a year. Second to availability was integrity of data. The HCIC report specifically stated that integrity of data is important for protecting patient safety, which is directly implicated when it comes to connected medical devices and patients whose health can be directly impacted by the operation of the medical device. However, the report recognizes that the drive to interoperability has resulted in the confidentiality of medical information being de-prioritized and asserts that healthcare data confidentiality must remain top of mind.</p>
<p>A 2017 KLAS survey reports that 41 percent of respondents said their health systems dedicate less than three percent of the IT budget to cybersecurity, primarily because IT leadership has been focused on implementing electronic health record systems and dealing with interoperability challenges.<sup>5</sup></p>
<p>Task Force Imperative four calls for an increase [in] healthcare industry readiness through improved cybersecurity awareness and education. However, the increase in readiness requires a holistic cybersecurity strategy. Organizations that do not adopt a holistic strategy not only put their data, organizations, and reputation at risk, but also – most importantly – the welfare and safety of their patients.</p>
<p>In the healthcare industry specifically, the financial impact of cybersecurity breaches is grim. One in three Americans were affected by healthcare breaches in 2015, according to a report from Bitglass.<sup>6 </sup>That’s more than 113 million individuals. Each lost or stolen medical record costs a healthcare organization $363 per record on average, per a Ponemon Institute report.<sup>7 </sup>The anecdotal record is not any more pleasant: Hollywood Presbyterian’s information systems were held hostage in Feb. 2016 for $3.6 million in Bitcoin,<sup>8</sup> and more and more healthcare enterprises are creating reserves for data ransom. A 2016 IBM study quoted by <em>SC Media UK</em> showed that, in the United States, 70 percent of businesses receiving a ransomware demand paid to get their data back, with 50 percent of those paying more than $10,000 and a further 20 percent paying more than $40,000.<sup>9</sup></p>
<p>No matter the technology used in the healthcare industry today – e-signature software, EHR platforms, wearable devices, smartphones, tablets, or other software or hardware – providers can either work to mitigate risk or watch the organization spiral into potentially uncontrollable vulnerability. Today’s electronic environment leaves little room for laissez-faire security efforts if a healthcare provider wants to remain safe from attack and protected from the financial consequences of the inevitable.</p>
<p><strong>Why HIPAA Still Matters</strong></p>
<p>HIPAA in general, and the Security Rule in particular, imposes specific compliance burdens on healthcare covered entities. Any use or disclosure of electronic protected health information (ePHI) not in compliance with the Privacy and Security Rules or more stringent state law constitutes a violation of HIPAA.<sup>10</sup> The failure of a covered entity to implement sufficient security measures regarding the transmission of and storage of ePHI to reduce risks and vulnerabilities to a reasonable and appropriate level is also a violation.<sup>11</sup> Likewise, a failure to implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain ePHI into and out of its facility, and the movement of these items within its facility, are violations.<sup>12</sup> And, once a security incident occurs, the failure to timely identify and respond to a known security incident, mitigate the harmful effects of the security incident, and document the security incident and its outcome are all violations.<sup>13</sup></p>
<p>At the time of writing, most of the Security Rule fines and penalties assessed by the US Department of Health and Human Services Office for Civil Rights (OCR) relate solely or primarily to either (1) theft of devices containing unsecured ePHI or (2) failure to conduct a security risk assessment that is discovered when another privacy or security breach is investigated. Examples of such traditional enforcement activity in recent times include the August 2015 announcement of a $750,000 settlement against Cancer Care Group, P.C. for the theft of an employee laptop containing ePHI on 55,000 individuals, the December 2013 announcement of a $150,000 settlement against Adult &amp; Pediatric Dermatology, P.C. for the theft of a thumb drive containing ePHI on 2,200 patients, and the announcement of settlements by Idaho State University and University of Washington Medicine for failure to conduct privacy and security risk assessments and failure to adequately adopt security measures. Were this still the level of involvement by OCR in ePHI enforcement, a shrug of the CIO’s shoulders and a promise to encrypt all ePHI data at rest would be the universal response.</p>
<p>However, in recent times the enforcement focus has shifted to more core system security functions and away from the low hanging fruit of lost or stolen data-carrying devices. For example, a $850,000 settlement paid by Lahey Clinic Hospital in 2015 specifically references the failure to assign a unique user name for identifying and tracking user identity with respect to a particular workstation,<sup>14</sup> failure to have a working audit trail capability with respect to workstation activity,<sup>15</sup> and the failure to restrict physical access to workstations generally to authorized personnel. A similar enforcement activity against South Broward Hospital District in February 2017 resulted in a $5,500,00 settlement payment based on improper access to ePHI by over a dozen individuals exposing in excess of 80,000 patient records and the failure of the covered entity to implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports<sup>16 </sup>and to implement policies and procedures that establish, document, review, and modify a user’s right of access to a workstation, transaction, program, or process.<sup>17 </sup>Several enforcement activities also resulted in settlements for failure to have business associate agreements in place with third-party vendors responsible for storing ePHI.<sup>18 </sup>Just as the environment for bad cyber behavior has matured, so has the OCR’s level of understanding of system and enterprise failures of the healthcare community.</p>
<p><strong>The Healthcare Internet of Things</strong></p>
<p>The task of HIPAA compliance and compliance with cybersecurity best practices is being made harder with the proliferation of Internet-connected services in the healthcare industry. As recently as 2012, a Ponemon Institute survey reported that 69 percent of respondents did not even address the security of US Food and Drug Administration (FDA) approved medical devices in their IT security or data protection activities.<sup>19 </sup>Since that time, over five billion devices – not including smartphones – have connected to the Internet, and that number is expected to grow to between 25 billion and 50 billion by 2025.<sup>20</sup></p>
<p>The healthcare industry has particular patient safety risks associated with these devices, as revealed in a 2012 US Government Accountability Office report on the lack of action by the FDA to expand its consideration of information security for medical devices.<sup>21 </sup>A November 2015 Wired.com survey listed the seven healthcare device types most vulnerable to hacking or other violation which included drug infusion pumps, Bluetooth-enabled defibrillators, blood refrigeration units, and CT scanners – the failure of any of which would create tremendous patient risk. We have grown far beyond the fear of hacking the vice president’s pacemaker.<sup>22</sup></p>
<p>The fact that smartphones are not included in this total is worrisome, as the growth in potential cyber risk due to smartphone use is even more troubling. 84 percent of health applications for smartphones that were approved by the FDA were found to create HIPAA violations and were hackable.<sup>23 </sup>Also worrisome is the continued increase in the use of smartphones to transmit and receive unsecured ePHI (primarily by text message) for patient treatment by healthcare professionals, in spite of HIPAA’s requirements and facility rules attempting to limit such activity.<sup>24 </sup>Most health care enterprises gave up the fight over bring your own device, or BYOD, rules due to provider pressure a long time ago anyway. Although study results vary, as of 2014 upward of 90 percent of healthcare organizations permit employees and clinicians to use their own mobile devices to connect to a<br />
provider’s network or enterprise systems.<sup>25</sup></p>
<p>One has to wonder what OCR’s response to all of this would be in light of the settlement agreements mentioned earlier: the decision not to impose device accountability for provider convenience may be fertile ground for future fines and penalties. And there is always the modern privacy paradox: health care consumers voluntarily share endless amounts of personal health information with applications on their smartphones, resulting in data being stored who knows where on the Internet without them thinking if it is convenient for them<sup>26</sup>; however, these same consumers continue to resist the same sharing activities by their own healthcare providers, even if such activity would result in faster and better health care.<sup>27</sup></p>
<p><strong>Cybersecurity Insurance</strong></p>
<p>In October of 2002, <em>The Economist</em> magazine opined<sup>28</sup> that total security was impossible and that insurance would be the way that businesses mitigated the financial risk caused by this lack of security. Since that time, both security defenses and security attacks have proliferated, changed, and become more aggressive and complex. However, the cybersecurity insurance market, though maturing, is not developing at as rapid a pace. Some issues that remain to be explored are due to the relative newness of the coverage and the lack of good predictive actuarial models.<sup>29</sup></p>
<p>While the market matures, there are various factors that potential insureds should evaluate closely as they shop for and price out cybersecurity insurance. The first and most important of these coverages should be the coverage of costs related to managing breaches, to include expenses related to the investigation, remediation efforts, and patient notification. Other costs that may also be incurred are credit monitoring services,<sup>30</sup> damages associated with identity theft, damages associated with recovery of data, damages incurred due to having to reset EHR systems, and damages to reconstruct or recover websites and other Internet presences. Business continuity expenses related to workarounds or loss of revenue due to a cybersecurity incident might also need coverage, especially as most commercial policies of this type are figuring out how to exclude cyber-related risks from their covered losses. Finally, but not least importantly, coverage for rogue employees and insider threats needs to be a part of the insurance package.</p>
<p>The type of coverage a healthcare enterprise can obtain, and the premiums therefor, may be affected by certain underwriting considerations, all of which should inform the enterprise’s compliance efforts:</p>
<ul>
<li>The enterprise should be able to show that it is in compliance with HIPAA, including those provisions that require security and privacy risk assessments and proof of a plan of mitigation and remediation. Insurers likely will not cover losses resulting from a gap in HIPAA compliance, especially because there is a legal obligation on the enterprise to find out what those are.</li>
<li>The potential insured needs to know what the insurer’s requirements are for encryption beyond those mandated by HIPAA. Some coverages require more secure and more robust email systems that are more resistant to phishing and spoofing, and even other coverages may require intentional phishing attacks by the insured’s IT department or vendors to gauge compliance with training.</li>
<li>The training requirements for new employee onboarding and access by non-employee contractors may need to meet certain criteria beyond HIPAA workforce awareness training.</li>
<li>Insurers may require that contractors providing business associate services be separately insured as a first layer of defense against cost.</li>
<li>The potential purchaser needs to be on the lookout for what is referred to in the industry as cannibalizing coverage, in which the costs of defense reduce the limits available to pay damages or judgments. The best coverage separates costs of defense from claims expenses.</li>
<li>The purchased coverage, as with certain types of malpractice insurance, should be based on the date of detection as opposed to date of intrusion. It is so difficult, even with the best system monitoring tools, to determine when a breach or incident actually first occurred, so the enterprise does not want to be locked into a technical dispute with the insurer about when the hack should have been detected.</li>
<li>The prospective insured needs to know whether offshore operations will be covered. Significant risks are associated with outsourcing certain data manipulation and management functions to countries or regions that have stronger privacy and data security rules than the United States. In particular, the European Union takes a dim view of American-style discovery and most likely will not permit the compelled return of data from an EU vendor in litigation pending in United States courts.</li>
</ul>
<p><strong>Conclusions</strong></p>
<p>The growth of connected devices, connected physicians, and connected patients will continue to push healthcare facilities to provide more interoperability for health data than ever before. These same technological pressures will make it easier for cybercriminals and disgruntled employees to compromise the data upon which everyone relies for reliable patient care, because an increase in interoperability in most cases creates an increase in gaps in security. Healthcare systems need to recognize this risk as a direct threat to patient care, and not just to its financial and technology resources. A holistic security approach, combining effective cybersecurity practices, HIPAA training and compliance, and appropriate insurance coverages will be the best way to address this growing area of opportunity and risk in the future.</p>
<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of <a href="https://herrinhealthlaw.com/">Herrin Health Law, P.C</a>., in Atlanta. Herrin offers more than 25 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology.</em></p>
<p><strong>Endnotes</strong></p>
<ol>
<li>Originally published in the September 2017 ISSA Journal, the monthly publication of the Information Systems Security  Association (ISSA)  Developing and Connecting Cybersecurity Leaders Globally  <a href="http://www.issa.org/?page=ISSAJournal">www.issa.org/?page=ISSAJournal</a>. Reprinted with permission.</li>
<li>Barry S. Herrin, JD, FAHIMA, FACHE, is the founder of Herrin Health Law P.C. in Atlanta, Georgia. Herrin has over 25 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is both a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association and holds a Certificate in Cyber Security from the Georgia Institute of Technology. He may be reached at <a href="https://barry.herrin@herrinhealthlaw.com">https://barry.herrin@herrinhealthlaw.com</a>.</li>
<li>45 CFR Parts 160 and 164; the enabling legislation is found at 42 U.S.C. Section 1320a-7c.</li>
<li>Report on Improving Cybersecurity in the Health Care Industry, Health Care Industry Cybersecurity Task Force (June 2017) <a href="https://www.phe.gov/Preparedness/planning/CyberTF/Documents/report2017.pdf"> https://www.phe.gov/Preparedness/planning/CyberTF/Documents/report2017.pdf</a>.</li>
<li>Center for Connected Medicine report, The Internet of Medical Things: Harnessing IoMT for Value-Based Care, July 2017  <a href="https://www.connectedmed.com/files/assets/common/downloads/publication.pdf">https://www.connectedmed.com/files/assets/common/downloads/publication.pdf</a>.</li>
<li>Bitglass. Bitglass Healthcare Breach Report 2016, Bitglass  <a href="https://pages.bitglass.com/BR-Healthcare-Breach-Report-2016_PDF.html">https://pages.bitglass.com/BR-Healthcare-Breach-Report-2016_PDF.html</a>.</li>
<li>Larry Ponemon, Cost of Data Breaches Rising Globally, Says &#8216;2015 Cost of a Data Breach Study: Global Analysis,’  Security Intelligence, May 27, 2015 <a href="https://securityintelligence.com/costof-a-data-breach-2015"> https://securityintelligence.com/costof-a-data-breach-2015</a>.</li>
<li>Vincent Lanaria, Hackers Hold Hollywood Hospital’s Computer System Hostage, Demand $3.6 Million As Patients Transferred, Tech Times, 16 February 2016  <a href="http://www.techtimes.com/articles/133874/20160216/hackers-hold-hollywood-hospitals-computer-system-hostage-demand-3-6-million-as-patientstransferred.htm">http://www.techtimes.com/articles/133874/20160216/hackers-hold-hollywood-hospitals-computer-system-hostage-demand-3-6-million-as-patientstransferred.htm</a>. The hospital eventually paid $17,000 in Bitcoin.</li>
<li>Max Metzger, Your Money or Your Files: Why Do Ransomware Victims Pay Up? SC Magazine UK, May 25, 2017  <a href="https://www.scmagazineuk.com/your-money-or-your-files-why-do-ransomwarevictims-pay-up/article/664211/">https://www.scmagazineuk.com/your-money-or-your-files-why-do-ransomwarevictims-pay-up/article/664211/</a>.</li>
<li>45 C.F.R. §§ 160.103 and 164.502 (a). NOTE: CFR 45, Parts 160 and 164 can be found at US Electronic Code of Federal Regulations: Title 45 Public Welfare, Subchapter C Administrative Data Standards and Related Requirements: 160-164  <a href="https://www.ecfr.gov/cgi-bin/text-idx?SID=fbc57ba7be313c69e19aa1e78ac97adf&amp;mc=true&amp;tpl=/ecfrbrowse/Title45/45CsubchapC.tpl">https://www.ecfr.gov/cgi-bin/text-idx?SID=fbc57ba7be313c69e19aa1e78ac97adf&amp;mc=true&amp;tpl=/ecfrbrowse/Title45/45CsubchapC.tpl</a></li>
<li>45 C.F.R. §164.308(a)(1)(ii)(B)</li>
<li>45 C.F.R. § 164.310(d)(1)</li>
<li>45 C.F.R. § 164.308(a)(6)(ii)</li>
<li>45 C.F.R. § 164.312(a)(2)(i)</li>
<li>45 C.F.R. § 164.312(b)</li>
<li>45 C.F.R. §164.308(a)(l)(ii)(D)</li>
<li>45 C.F.R. § 164.308(a)(4)(ii)(C)</li>
<li>As examples, see the July 18, 2016 Resolution Agreement with Oregon Health &amp; Science University in which $2,7 million was paid and the September 23, 2016 Resolution Agreement with Care New England Health System in which $400,000 was paid.</li>
<li>John Glaser, The Risky Business of Information Security: With Growing Threats to Patient Privacy and Increasing Sanctions by Regulators, Make Data Security Central to Your Business, Hospitals &amp; Health Networks, August 12, 2014  <a href="http://www.hhnmag.com/articles/4064-the-risky-business-of-informationsecurity">http://www.hhnmag.com/articles/4064-the-risky-business-of-informationsecurity</a>.</li>
<li>The Florida Bar, 8th Annual FUNdamentals: The Legal Implications of the &#8216;Internet of Things’, Course 2232R (September 16, 2016)</li>
<li>GAO, Report to Congressional Requesters: Medical Devices: FDA Should Expand Its Consideration of Information Security for Certain Types of Devices, United States Government Accountability Office, August 2012  <a href="http://www.gao.gov/assets/650/647767.pdf">http://www.gao.gov/assets/650/647767.pdf</a>.</li>
<li>Lisa Vaas, Doctors Disabled Wireless in Dick Cheney’s Pacemaker to Thwart Hacking, Naked Security, Sophos, 22 Oct 2013 <a href="https://nakedsecurity.sophos.com/2013/10/22/doctors-disabled-wireless-indick-cheneys-pacemaker-to-thwart-hacking/">https://nakedsecurity.sophos.com/2013/10/22/doctors-disabled-wireless-indick-cheneys-pacemaker-to-thwart-hacking/</a>.</li>
<li>Ibid.</li>
<li>Ibid. (citing a 2015 University of Chicago survey finding that over 70 percent of its medical residents improperly sent ePHI by text messages).</li>
<li>John Glaser, The Risky Business of Information Security: With Growing Threats to Patient Privacy and Increasing Sanctions by Regulators, Make Data Security Central to Your Business, Hospitals &amp; Health Networks, August 12, 2014  <a href="http://www.hhnmag.com/articles/4064-the-risky-business-of-informationsecurity">http://www.hhnmag.com/articles/4064-the-risky-business-of-informationsecurity</a>.</li>
<li>Shannon Barnet, Millennials and Healthcare: 25 Things to Know, Becker’s Hospital Review, August 04, 2015  <a href="http://www.beckershospitalreview.com/hospital-management-administration/millennials-and-healthcare-25-things-to-know.html">http://www.beckershospitalreview.com/hospital-management-administration/millennials-and-healthcare-25-things-to-know.html</a>. 71 percent of Millennials surveyed by Harris would use a mobile app to share health care data with providers. See also Mintel, Sixty Percent of Millennials Willing to Share Personal Info with Brands, Mintel, March 7, 2014  http://www.mintel.com/press-centre/social-andlifestyle/millennials-share-personal-info, in which the study reports that 60% of Millennials would be willing to provide details about their personal preferences and habits to marketers, and, of those that would not initially provide such information, 30% would do so after receiving an incentive offer such as a discount off future purchases.</li>
<li>Denver Nicks, Survey: Millennials Care about Privacy (But Not So Much in Japan), Time, Nov. 07, 2013  <a href="http://techland.time.com/2013/11/07/survey-millennials-care-about-privacy-but-not-somuch-in-japan/">http://techland.time.com/2013/11/07/survey-millennials-care-about-privacy-but-not-somuch-in-japan/</a>. Only 4% of respondents would be comfortable with data being used for a purpose outside of its original context. The study also says that these preferences vary by economic status, with high-income worried more about data privacy than low-income people.</li>
<li>Putting It All Together, <em>The Economist</em> (October 24, 2002)</li>
<li>Koo, More Incident Data Needed for Cybersecurity Insurance, Bloomberg BNA (March 28, 2016)</li>
<li>Even though there is almost a universal recognition in the law enforcement and security communities that these programs do no good at all, as the sophisticated hacker knows to wait out the 1-2 years of service before making use of the stolen data.</li>
</ol>
<p>The post <a href="https://herrinhealthlaw.com/cybersecurity-risk-in-health-care/">Cybersecurity Risk in Health Care</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beyond passwords: How NIST cybersecurity framework gives risk management a boost</title>
		<link>https://herrinhealthlaw.com/beyond-passwords-nist-cybersecurity-framework-risk-management/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=beyond-passwords-nist-cybersecurity-framework-risk-management</link>
		
		<dc:creator><![CDATA[Herrin Health Law]]></dc:creator>
		<pubDate>Sun, 01 Apr 2018 20:56:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=555</guid>

					<description><![CDATA[<p>Enterprise risk management is a tall order, as healthcare organization strive in earnest to mitigate their exposure to a wide array of threats and uncertainties. But what if there was a roadmap already written that could help guide the way?</p>
<p>The post <a href="https://herrinhealthlaw.com/beyond-passwords-nist-cybersecurity-framework-risk-management/">Beyond passwords: How NIST cybersecurity framework gives risk management a boost</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>Inside access control of employees a must, says health law attorney Barry Herrin.</h3>
<p>By <a href="http://www.healthcareitnews.com/author/mike-miliard">Mike Miliard</a> | March 30, 2018 | 09:49 AM<br />
<em>As published in <a href="http://www.healthcareitnews.com/news/beyond-passwords-how-nist-cybersecurity-framework-gives-risk-management-boost">Healthcare IT News.</a>  </em></p>
<p>Enterprise risk management is a tall order, as healthcare organizations strive in earnest to mitigate their exposure to a wide array of threats and uncertainties. But what if there was a roadmap already written that could help guide the way?</p>
<p>There is, says healthcare attorney Barry Herrin, founder of Herrin Health Law. It&#8217;s just too often seen as something to be filed away with health systems&#8217; cybersecurity plans.</p>
<p>The NIST Cybersecurity Framework will be familiar to many hospital IT and security personnel as they grapple with this frightening new era of weaponized malware, insider threats and nation-state hacking, of course.</p>
<p><strong>[Also: </strong><a href="http://www.healthcareitnews.com/projects/future-proofing-cybersecurity-healthcare"><strong>Hackers are prepping for future attacks. Are you?</strong></a><strong>]</strong></p>
<p>But it also contains some key provisions that could be very useful to healthcare organizations as they try to get their arms around myriad other risks and vulnerabilities, said Herrin – particularly with regard to access control.</p>
<p>It can help inform approaches to people, process and technology (in that order) for mitigation of risks across the healthcare enterprise, he said.</p>
<p>&#8220;I&#8217;ve been trying to evangelize it,&#8221; said Herrin of the idea that the cyber risk management framework can be expanded &#8220;to set expectations about how we&#8217;re going to use it to manage enterprise security – not just data security, but all kinds of security.&#8221;</p>
<p><img decoding="async" class="wp-image-160 alignleft" src="https://herrinhealthlaw.com/wp-content/uploads/2018/03/Barry-Herrin-Photo-320x375.jpg" alt="" width="93" height="109" srcset="https://herrinhealthlaw.com/wp-content/uploads/2018/03/Barry-Herrin-Photo-320x375.jpg 320w, https://herrinhealthlaw.com/wp-content/uploads/2018/03/Barry-Herrin-Photo-320x375-256x300.jpg 256w" sizes="(max-width: 93px) 100vw, 93px" />&#8220;Most people believe that access control relates to passwords – how you get into the dataset. It can mean how you physically gain access to the data room, says <a href="https://herrinhealthlaw.com/barry-herrin/">Barry Herrin</a> of Herrin Health Law.</p>
<p>It&#8217;s especially pressing these days, as the industry pursues interoperability in earnest, he said, which many seem to think should be defined as ubiquitous access to data, all the time.</p>
<p>&#8220;We make our systems porous on purpose so as many people as possible can access the data for patient care,&#8221; said Herrin. &#8220;When we do that, we create massive gaps in confidentiality, privacy and security.&#8221;</p>
<p>So how to patch those gaps? Technology isn&#8217;t enough. Since the FBI tells us that 80 percent of the threats to data come from people who&#8217;ve already been given access to it on purpose, &#8220;building the Great Firewall around your enterprise is not going to work.&#8221;</p>
<p>That means organizations have to refocus their thinking, concentrating on efforts beyond technology and casting a wider view of their workforce and the access employees are given to data. Sure, there&#8217;s tech that can help with that. &#8220;But we have to look at the controls inside the risk management framework in ways other than technology,&#8221; said Herrin.</p>
<p>The cyber framework&#8217;s first two steps are 1) to categorize your information systems&#8217; security controls, taking stock of the management, operational and technical safeguards available to protect against risk, and 2) to select an initial set of security controls, tailoring and supplementing as needed.</p>
<p>The third step is to implement those controls. But Herrin points out that the language used tends to focus on words such as &#8220;purchase,&#8221; &#8220;install,&#8221; &#8220;configure&#8221; and &#8220;test.&#8221;</p>
<p>That&#8217;s where too many healthcare organizations stop thinking about the people and the people and processes involved in risk management and begin to think of it only in terms of technology.</p>
<p>&#8220;You&#8217;ve already given the game up if that&#8217;s the talk you talk because you just assume that the control is something you buy,&#8221; he explained.</p>
<p>&#8220;Here&#8217;s the example I always use: Access control,&#8221; said Herrin. &#8220;Most people believe that access control relates to passwords – how you get into the dataset.&#8221;</p>
<p>But &#8220;access control&#8221; also can mean other things.</p>
<p>&#8220;It can mean how you physically gain access to the data room, or how to get access to the level of the data you&#8217;re supposed to get based on your job description,&#8221; he said. &#8220;It can mean an assessment of you as a threat vector rather than a vulnerability. It can mean lots of things: &#8216;Why would I let you have access to this, under these circumstances.'&#8221;</p>
<p>For example, the guidelines for the control set for access control say organizations should revalidate employees&#8217; credentials whenever their access level is increased inside the data structure.</p>
<p>&#8220;If you&#8217;re going to have access to more stuff, we need to re-vet you to make sure that it is consistent with your job description and that you don&#8217;t pose an insider threat,&#8221; said Herrin</p>
<p>During a presentation on this topic at HIMSS18, he asked the audience whose organization does that, and &#8220;no one&#8217;s hand went up,&#8221; he said. &#8220;Nobody does that. They just respond to the email from the IT department that says, &#8216;Give so and so access.'&#8221;</p>
<p>If employees had to &#8220;sign a piece of paper and sit down in front of an IT manager&#8221; to get expanded access to a hospitals data, that could lead to substantial decrease in insider threat risks.</p>
<p>&#8220;It costs you nothing but time,&#8221; said Herrin. &#8220;And it eliminates tons of vulnerabilities. There&#8217;s no FBI agent on the cyber squad, anywhere in the country, that would disagree with that statement. I&#8217;ve asked them myself.&#8221;</p>
<p>So what about expanding on the access control guidance of the cyber risk framework, and applying it other circumstances in other parts of the enterprise?</p>
<p>&#8220;Who gets access to the premises? How do we do badging? How do we verify identity? What&#8217;s our policy on looking to see whether people have badges? That&#8217;s all part of access control. You have to scope people&#8217;s access based on their job description, and in healthcare that&#8217;s absolutely mission critical.&#8221;</p>
<p>But telescoping HIPAA&#8217;s Minimum Necessary Requirement out to other parts of the enterprise is just one aspect where a more creative reading of the cybersecurity framework could lead to more robust processes and protections, said Herrin.</p>
<p>&#8220;There are tons of things you can do easily that someone has already given you guidance for if you just open the box up and look and see what&#8217;s inside,&#8221; he said. &#8220;But you have to reorient your thinking about the cybersecurity risk management framework. It cannot be about buying toys and tools. It has to be about implementing controls.&#8221;</p>
<p>For many organizations, however, the fact that it&#8217;s &#8220;not about buying something, it&#8217;s about doing something&#8221; is exactly the reason that creative thinking doesn&#8217;t take hold more often. Technology is easy; people and process are harder.</p>
<p>To that, Herrin has a simple answer: &#8220;HIPAA is out there as the hammer,&#8221; he said. &#8220;You need to pay attention to this stuff. What we know, based on what OCR is doing, that they&#8217;re looking at whether you audit people&#8217;s access to systems where you&#8217;ve not configured limitations on control. They&#8217;re spending their time right in that wheelhouse.</p>
<p>&#8220;If you&#8217;re interested in not paying a fine with two commas in it, you should at least look in the mirror and say, &#8216;What can I do to limit access to this data set,'&#8221; he said. &#8220;You have to stop looking at technology as the sole solution to system security problems. It&#8217;s going to require cultural change.&#8221;</p>
<p><em>Twitter: </em><a href="https://twitter.com/MikeMiliardHITN"><em>@MikeMiliardHITN<br />
</em></a><em>Email the writer: </em><a href="mailto:mike.miliard@himssmedia.com"><em>mike.miliard@himssmedia.com</em></a></p>
<p>The post <a href="https://herrinhealthlaw.com/beyond-passwords-nist-cybersecurity-framework-risk-management/">Beyond passwords: How NIST cybersecurity framework gives risk management a boost</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Incidents and Breaches in the Healthcare Industry (Case Study)</title>
		<link>https://herrinhealthlaw.com/security-incidents-breaches-healthcare-industry-case-study/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=security-incidents-breaches-healthcare-industry-case-study</link>
		
		<dc:creator><![CDATA[Barry Herrin]]></dc:creator>
		<pubDate>Tue, 06 Mar 2018 22:22:39 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<guid isPermaLink="false">https://herrinhealthlaw.com/?p=540</guid>

					<description><![CDATA[<p>When it comes to notification of breaches of patient medical information, federal and state laws vary. Providers treating patients from other states also may have regulatory burdens that they are unaware of. Understand the differences between regulatory schemes and how to comply. </p>
<p>The post <a href="https://herrinhealthlaw.com/security-incidents-breaches-healthcare-industry-case-study/">Security Incidents and Breaches in the Healthcare Industry (Case Study)</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><b><i>A Case Study in the Lack of Federal and State Coordination</i></b></h3>
<p><strong><em>As published in the <a href="http://www.issa.org/?page=ISSAJournal">ISSA Journal</a> February 2018. ISSA is the Information Systems Security Association International </em></strong></p>
<p><strong><em>Executive Summary:</em></strong><em> Federal and state laws governing notification of breach of patient medical information vary, and some of those variations are material. It is important for health care providers to understand the differences between these regulatory schemes and to comply with each. Providers located in one state and treating patients from another state may also have a regulatory burden of which they are unaware. The assistance of experienced privacy and data breach counsel should be sought when examining these issues.</em></p>
<p><strong>Introduction</strong></p>
<p>The Health Information Technology for Economic and Clinical Health Act (&#8220;HITECH Act&#8221;), enacted by Congress as a part of the American Recovery and Reinvestment Act of 2009, places a duty on covered entities to notify patients, the Secretary of the Federal Department of Health and Human Services through its Office for Civil Rights (&#8220;OCR&#8221;) and, in some cases, the media, of any breach of unsecured protected health information (&#8220;PHI&#8221;).<sup>1</sup>  Because of this obligation, it is important that health care providers develop internal systems for investigating security incidents involving unsecured PHI. Critically, although every breach of unsecured PHI is an impermissible disclosure under HIPAA, not every impermissible disclosure under HIPAA is a breach. Being able to tell the difference between the two will help covered entities avoid unnecessary, embarrassing, and potentially costly notification requirements and penalties.</p>
<p>Adding to this regulatory burden are the requirements of the several states governing patient information and its privacy. Although many states default to the federal HIPAA standard, many do not. In these states, covered entities may have different reporting requirements, definitions of data that are covered by the protections of state law, and differing penalties. Providers need to be aware of both and not make the mistake that HIPAA pre-empts all state privacy rules. Remember: only those state regulations that provide less protection for patients are replaced by HIPAA – <em>in all other circumstances, the state scheme survives</em>.<sup>2</sup></p>
<p><strong>The Federal Framework</strong></p>
<p>For federal purposes, &#8220;unsecured PHI&#8221; is defined as PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of encryption technologies or methods of physical destruction approved by OCR.<sup>3</sup> Currently approved encryption technologies and destruction methodologies are outlined in the National Institute of Standards and Technology (&#8220;NIST&#8221;) Special Publications 800-111, 800-52, 800-77, 800-113, and 800-88.<sup>4</sup> The definition should remind us that the federal HITECH breach and notification requirements <em>cover both paper and electronic records:</em> this is not just an expansion of the HIPAA Security Rule covering only electronic PHI.</p>
<p>A breach of unsecured PHI under the federal regulations occurs where (1) the PHI is acquired, accessed, used, or disclosed in a manner not permitted under the HIPAA Privacy Rule;<sup>5</sup> and (2) that compromises the security or privacy of the protected health information. The security or privacy of the information is <strong><em>presumed compromised</em></strong> for the purpose of this analysis <strong>UNLESS</strong> an exception applies (described below) OR the covered entity demonstrates that there is a low probability that the protected health information has been compromised based on a risk assessment of at least the following factors:</p>
<p>(i) The nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification;</p>
<p>(ii) The unauthorized person who used the protected health information or to whom the disclosure was made;</p>
<p>(iii) Whether the protected health information was actually acquired or viewed; and</p>
<p>(iv) The extent to which the risk to the protected health information has been mitigated.</p>
<p>Even if the breach does not pass the above analysis, it is still not a breach requiring notice and disclosure under the federal scheme if the information meets any one of the following three (3) criteria:</p>
<p>(a) It is individually identifiable health information held by the covered entity or business associate in its capacity as an employer. For example, workers&#8217; compensation information on a hospital&#8217;s employee would contain health information, but it would not be subject to these provisions.</p>
<p>(b) It is PHI that does not include one of the sixteen (16) identifiers listed at 45 C.F.R. § 164.514(e)(2) or the patient&#8217;s date of birth or the patient&#8217;s zip code.</p>
<p>(c) It is information that has been &#8220;de-identified&#8221; in accordance with the HIPAA Privacy Rule.<sup>6</sup></p>
<p><strong>A Smattering of State Schemes</strong></p>
<p>As one might expect, state legislators and regulators take very different approaches to privacy of their citizens’ personal health information and when notification of a security incident is required. A brief examination of three such regulatory schemes will illustrate the problem for health care businesses with a presence in more than one state.</p>
<p><strong><em>California</em></strong></p>
<p>Section 1280.15 of the California Health &amp; Safety Code requires certain medical providers to report any unlawful or unauthorized access to, or use or disclosure of, a patient’s medical information to the [California Department of Public Health] no later than 15 business days after the unlawful or unauthorized access, use, or disclosure has been detected by the provider, and to make the same report to the affected patient or the patient’s representative.<sup>7</sup></p>
<p>Medical information means any individually identifiable information, in electronic or physical form, in possession of or derived from a provider of health care, health care service plan, pharmaceutical company, or contractor regarding a patient’s medical history, mental or physical condition, or treatment. Individually identifiable means that the medical information includes or contains any element of personal identifying information sufficient to allow identification of the individual, such as the patient’s name, address, electronic mail address, telephone number, or social security number, or other information that, alone or in combination with other publicly available information, reveals the individual’s identity.<sup>8</sup> A breach in this context means any unlawful or unauthorized access to, [or] use [or] disclosure of medical information.<sup>9</sup> Unauthorized in this context means access, review, or viewing of patient medical information without a direct need for medical diagnosis, treatment, or other lawful use as permitted by the Confidentiality of Medical Information Act or any other statute or regulation governing the lawful access, use, or disclosure of medical information.<sup>10</sup></p>
<p>One can see immediately that the California statute is remarkably similar to the current HIPAA/HITECH statute in both the breadth of information covered and the circumstances under which that information is compromised. And both the California statute and HIPAA/HITECH exempt from the breach notification requirements incidents involving any information that is encrypted. However, the California statute does not contain any exemption from breach notification if there is a low probability that the [PHI] has been compromised as the federal scheme does: any breach meeting the California definition (and therefore, arguably, the HIPAA/HITECH definition) would require patient notification.<sup>11</sup></p>
<p>But, and importantly for our comparison, California does provide a safe harbor for health care entities involved in a breach that would qualify under both California law and HIPAA. Entities that are covered entities under HIPAA need only comply with the patient notification requirements articulated in HITECH in order to comply with the patient notice provisions of California law; however, those entities will still have to notify the California attorney general if required to do so.</p>
<p><strong><em>Florida</em></strong></p>
<p>The Florida Information Protection Act of 2014 (FIPA)<sup>12</sup> requires covered entities<sup>13</sup> to notify persons if a breach of security occurs with respect to a person’s personal information. FIPA defines personal information as either one of two types of information: (1) an individual’s first name or first initial and last name <em>in combination with</em> at least one of (a) a social security number; (b) a driver license or identification card number, passport number, military identification number, or other similar number issued on a government document used to verify identity; (c) a financial account number or credit or debit card number, <em>in combination with</em> any required security code, access code, or password that is necessary to permit access to an individual’s financial account; (d) <strong>any information regarding an individual’s medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional</strong>; <strong>or (e) an individual’s health insurance policy number or subscriber identification number <em>and</em> any unique identifier used by a health insurer to identify the individual</strong> OR (2) a user name or e-mail address, <em>in combination with</em> a password or security question and answer that would permit access to an online account.<sup>14</sup> A breach of security occurs when there is unauthorized access of data in electronic form containing personal information.<sup>15</sup> However, a breach is not a breach requiring notice if after an appropriate investigation and consultation with relevant federal, state, or local law enforcement agencies, the covered entity reasonably determines that the breach has not and will not likely result in identity theft or any other financial harm to the individuals whose personal information has been accessed.<sup>16</sup></p>
<p>Several things are apparent when comparing FIPA with HIPAA. First, there are fewer exceptions to the notification standard if a breach has occurred in FIPA; however, the risk protected against in FIPA (identity theft and financial harm) is arguably more narrow than the risk framework contemplated by HIPAA, which would include reputational and other non-financial risks, and could therefore more easily result in a no notice breach. Second, the exception available under FIPA requires active collaboration with law enforcement, whereas there is no such requirement in HIPAA. Third, although HIPAA could consider a breach to occur when any of the information listed in FIPA is used, accessed, acquired, or disclosed, FIPA requires those data elements to be accessed in combination with the patient’s name; thus, a release of just a patient’s name would not cause a breach under FIPA when it would under HIPAA. Fourth, FIPA requires the release of both the person’s email account AND password or access credential, whereas HIPAA requires only one of the two to be involved in a breach. Finally, and most importantly, FIPA only covers electronic information, whereas HIPAA applies to all PHI, regardless of the format in which it is maintained.</p>
<p><strong><em>North Carolina</em></strong></p>
<p>The Identity Theft Protection Act of 2005<sup>17</sup> requires businesses<sup>18</sup> and state and local government to notify people when there is a security breach involving their personal information.<sup>19</sup> For the purposes of this statute, a security breach is an incident of unauthorized access to <strong><em>and</em></strong> acquisition of <em>unencrypted<sup>20</sup></em> <em>and unredacted</em> records or <em>data containing personal information</em> where illegal use of the personal information has occurred or is reasonably likely to occur <strong><em>or</em></strong> that creates a material risk of harm to a consumer.<sup>21</sup></p>
<p>In the healthcare context, the North Carolina act may have limited application, as the types of data generally are only those relating to financial resources. However, a patient’s name, Social Security number, email addresses, biometric identifiers, fingerprints, and any other numbers or information that can be used to access a person&#8217;s financial resources,<sup>22</sup> which could include health plan beneficiary numbers and account numbers,<sup>23</sup> are protected under the North Carolina act and under HIPAA as well.</p>
<p>Without even considering the definition of personal information, note the important distinctions between the federal HIPAA framework and the North Carolina act. First, the data must be illegally accessed <strong><em>and</em></strong> acquired for the North Carolina act to apply, whereas HIPAA requires only one or the other. Second, and similar to the rule in Florida, whereas encryption of the data provides a complete exception to the breach and notice framework under HIPAA, the acquisition of the data along with the key to the encryption still constitutes a breach requiring notice in North Carolina. Third, unless criminal activity is involved, a security breach is not presumed under the North Carolina act; an analysis still must be conducted to determine whether there is a material risk of harm, which is the approach to the HIPAA breach notification scheme before its most recent amendment.</p>
<p><strong>Conclusion</strong></p>
<p>States take a varied approach to the regulation of losses of patient health information. Some regulate only electronic information (such as Florida), others only apply regulatory scrutiny if it can be shown that the information has been both accessed and acquired by an unauthorized person (such as North Carolina), and some, such as California, provide even broader protections than those found in HIPAA/HITECH. Providers operating in states with such statutes and regulations must be mindful of the differences between the federal and the operative state schemes. In addition, some states, of which North Carolina is one, would purport to regulate providers outside of the state who have protected information on its own citizens, a situation which could prove harmful to providers holding licenses in that state even though they may not have a physical presence in that state. Careful review of all of the statutes, rules, and regulations applicable to patient data safety and release is ever more critical. Providers would be well advised to seek knowledgeable counsel to guide them through these requirements.</p>
<p><em><a href="https://herrinhealthlaw.com/barry-herrin/">Barry S. Herrin</a>, JD, FAHIMA, FACHE, is the founder of <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>, in Atlanta. Herrin offers more than 25 years of experience practicing law in the areas of healthcare and hospital law and policy, privacy law and health information management, among other healthcare-specific practice areas. He is a Fellow of the American College of Healthcare Executives and a Fellow of the American Health Information Management Association. He also holds a Certificate in Cyber Security from the Georgia Institute of Technology.</em></p>
<p><strong>Citations</strong></p>
<ol>
<li>The combined regulations can be accessed at <a href="https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/combined/hipaa-simplification-201303.pdf">https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/combined/hipaa-simplification-201303.pdf</a></li>
<li>45 C.F.R. Section 160.202.</li>
<li>45 C.F.R. Section 164.402</li>
<li>45 C.F.R. Section 164.310 requires covered entities to address the &#8220;final disposition of electronic protected health information and/or the hardware or electronic media on which it is stored&#8221; and to implement procedures for &#8220;removal of electronic protected health information from electronic media before the media are made available for re-use.&#8221; The NIST criteria for electronic data destruction are available at <a href="http://csrc.nist.gov/">http://csrc.nist.gov/</a>.</li>
<li>45 C.F.R. § 164.500, et seq.</li>
<li>45 C.F.R. Section 164.502(d) permits a covered entity or its business associate to create information that is not individually identifiable by following the de-identification standard and implementation specifications in §164.514(a)-(b).</li>
<li>Section 1280.15(b) of the California Health &amp; Safety Code.</li>
<li>Section 56.05(j) of the California Civil Code.</li>
<li>Section 1280.15(a) of the California Health &amp; Safety Code.</li>
<li>Id. The Confidentiality of Medical Information Act is found at Section 56 of the California Civil Code.</li>
<li>Section 1280.15(b) of the California Health &amp; Safety Code.</li>
<li>Fla. Stat. Section 501.171.</li>
<li>The definition includes arguably only commercial entities and all units of state and local government that maintain, store, or use personal information. Fla. Stat. Section 501.171(1)(b).</li>
<li>Fla. Stat. 501.171(1)(g)(1).</li>
<li>Fla. Stat. Section 501.171(1)(a).</li>
<li>Fla. Stat. Section 501.171(4)(c).</li>
<li>N.C.G.S. Chapter 75-60 et seq.</li>
<li>The business must either be located in North Carolina or the data must be that of North Carolina residents.</li>
<li>N.C.G.S. Section 75-65(a). The term personal information: includes the information governed by N.C.G.S. Section 14-113.20(b) regarding identity theft, and includes the following pieces of information in combination with a person’s first name or first initial and last name: (1) Social Security or employer taxpayer identification numbers; (2) driver’s license, State identification card, or passport numbers; (3) checking account numbers; (4) savings account numbers; (5) credit card numbers; (6) debit card numbers; (7) Personal Identification (PIN) Code;(8) electronic identification numbers, electronic mail names or addresses, Internet account numbers, or Internet identification names; (9) digital signatures; (10) any other numbers or information that can be used to access a person&#8217;s financial resources; (11) biometric data; (12) fingerprints; (13) passwords; and (14) parent&#8217;s legal surname prior to marriage.</li>
<li>Any incident of unauthorized access to and acquisition of encrypted records or data containing personal information along with the confidential process or key shall [also] constitute a security breach. N.C.G.S. Section 75-61(14)</li>
<li>N.C.G.S. Section 75-65(a).</li>
<li>N.C.G.S. Section 14-113.20(b)((10).</li>
<li>45 C.F.R. Section 164-512(b)(2)(i)(H), (I), (P).</li>
</ol>
<p>The post <a href="https://herrinhealthlaw.com/security-incidents-breaches-healthcare-industry-case-study/">Security Incidents and Breaches in the Healthcare Industry (Case Study)</a> appeared first on <a href="https://herrinhealthlaw.com">Herrin Health Law, P.C.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
