[BreachExchange] Key Takeaways from OCR’s Latest HIPAA Fine: Hospital to Pay $3.2 Million for Its Cybersecurity Violations
Inga Goddijn
inga at riskbasedsecurity.com
Wed Feb 15 19:38:33 EST 2017
http://www.lexology.com/library/detail.aspx?g=e6b94cbd-40f8-4a39-96c5-f2d1943141a1
Earlier this month, the U.S. Department of Health and Human Services,
Office for Civil Rights (OCR), has announced a Health Insurance Portability
and Accountability Act of 1996 (HIPAA) civil money penalty of $3,217,000.00
against Children’s Medical Center of Dallas (Children’s), a pediatric
hospital that is part of Children’s Health, the seventh largest pediatric
health care provider in the nation. OCR based this penalty on its finding
that Children’s failed to comply with HIPAA Security Rule over many years
and that Children’s impermissibly disclosed unsecured electronic protected
health information (ePHI) when it suffered two data breaches that were
reportable to OCR.
*The Breaches *
- On January 18, 2010, Children’s reported to OCR the loss of an
unencrypted, non-password protected BlackBerry device at an airport on
November 19, 2009. The device contained the ePHI of approximately 3,800
individuals.
- On July 5, 2013, Children’s reported to OCR the theft of an
unencrypted laptop from its premises sometime between April 4 and April 9,
2013. The device contained the ePHI of approximately 2,462 individuals.
Because Children’s devices were unencrypted, Children’s was obligated to
report their loss, along with the unsecured ePHI they contained, to the
HHS. Had Children’s devices been encrypted, it could have taken advantage
of the “safe harbor” rule, pursuant to which covered entities and business
associates are not required to report a breach of information that is not
“unsecured.”
*The Investigation*
- OCR’s investigation revealed that, in violation of HIPAA Rules,
Children’s (1) failed to implement risk management plans, contrary to prior
external recommendations to do so, and (2) knowingly and over the course of
several years, failed to encrypt, or alternatively protect, all of its
laptops, work stations, mobile devices, and removable storage media.
- OCR’s investigation established that Children’s knew about the risk
of maintaining unencrypted ePHI on its devices as far back as 2007.
- Despite this knowledge, Children’s issued unencrypted BlackBerry
devices to nurses and allowed its workforce members to continue using
unencrypted laptops and other mobile devices until 2013.
*The Takeaways*
- *Implement HIPAA Safeguards. * HIPAA covered entities and business
associates should implement appropriate administrative, physical, and
technical safeguards to ensure the confidentiality, integrity, and
availability of ePHI, as required by the Security Rule
<https://www.hhs.gov/hipaa/for-professionals/security/index.html>.
- *Don’t delay. * If you are a HIPAA covered entity or business
associate, your Legal and IT should ensure that the safeguards are
implemented entity-wide and without any undue delays. Your employees travel
for business and probably take work home. You quite literally could be one
lost device away from a disastrous data breach and a multi-million dollar
fine.
- *Encrypt your ePHI. *An important technical safeguard is encryption of
ePHI, which is not expressly, but effectively required under HIPAA, since
only breaches of *unsecured* ePHI must be reported to the HHS. *See *45
C.F.R. § 164.408
<https://www.gpo.gov/fdsys/granule/CFR-2011-title45-vol1/CFR-2011-title45-vol1-sec164-408>
.
- *Don’t lose your encryption key.* The encryption key should be stored
separately from the ePHI. As specified in the HIPAA Security Rule, ePHI is
encrypted by “the use of an algorithmic process to transform data into a
form in which there is a low probability of assigning meaning without use
of a confidential process or key” (45 CFR 164.304 definition of
encryption
<https://www.gpo.gov/fdsys/pkg/CFR-2016-title45-vol1/pdf/CFR-2016-title45-vol1-sec164-304.pdf>)
*and such confidential process or key that might enable decryption has
not been breached*.
- *Security is (usually) not a DIY project.* For many covered entities
and business associates, implementation of the Security Rule is outside of
their wheelhouse. Hiring a reputable, skilled technology vendor to
implement the physical safeguards, and hiring an knowledgeable outside
legal counsel to ensure compliance with all aspects of the Security Rule,
as well as to ensure a certain level of privilege protection, can go a long
way to avoiding a reportable data breach.
As discussed in our previous post, “Top Five Data Breach Trend Predictions
for 2017,”
<http://www.carpedatumlaw.com/2017/01/top-five-data-breach-trend-predictions-2017/>
medical identity theft is likely to remain cybercriminal’s top target this
year, since medical information is lucrative and easy to exploit. After
all, compared to a stolen credit card number, a stolen medical record
offers so much more personal information. Healthcare organizations need to
ensure they have proper, up-to-date security measures in place, including
data-breach response plans, ePHI encryption, and adequate employee training
about the importance of security.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20170215/e199d36b/attachment.html>
More information about the BreachExchange
mailing list