Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C....

34
© 2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17, 2009 David A. Mebane, Esq. Saint Barnabas Health Care System Senior Vice President for Legal Affairs (973) 322-4042 [email protected] Andrew E. Blustein, Esq. Garfunkel, Wild & Travis, P.C. Partner/Director (516) 393-2218 (201) 883-1030 [email protected]

Transcript of Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C....

Page 1: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

© 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Before, During and After a Security Incident:

How to Prepare and Respond

September 17, 2009 David A. Mebane, Esq.

Saint Barnabas Health Care SystemSenior Vice President for Legal Affairs

(973) [email protected]

Andrew E. Blustein, Esq.Garfunkel, Wild & Travis, P.C.

Partner/Director(516) 393-2218(201) 883-1030

[email protected]

Page 2: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 2 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

AGENDA

In today’s presentation we will review the following:

• Background: What is the Goal of the Thief?• Legal Landscape• Before: Preparing for a Security Incident • During: Responding to a Security Incident• After: Documenting Actions and Preventing

Future Incidents

Page 3: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 3 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

What is the Goal of the Thief?

Page 4: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 4 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

What is the Goal of the Thief?

• Identity theft (e.g., taking someone’s personal information to access his or her financial accounts).

• Medical identity theft (e.g., assuming another person’s identity in order to receive medical care or submit false claims).

• Obtaining access to an individual’s personal information for curiosity or financial gain (e.g., selling a famous person’s medical records).

Page 5: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 5 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Identity Theft is on the Rise• In 2005, identity theft resulted in corporate and

consumer losses of $56 billion dollars.1• In 2005, medical identity theft accounted for 3

percent of identity theft crimes or 249,000 of the estimated 8.3 million people who had their identities stolen.1

• Various non-profit agencies have reported that, since 2006, identity theft continues to be a serious concern for health care providers.

• August 17, 2009 – three New Jersey men were indicted in the largest identity theft case ever prosecuted with over 130 million credit and debit card numbers stolen.

1. World Privacy Forum, Medical Identity Theft: The Information Crime that Can Kill You. Spring 2006.

Page 6: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 6 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape to Combat the Rise in

Identity Theft

Page 7: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 7 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape Federal Trade Commission

• The Federal Trade Commission (“FTC”) requires creditors (which has been interpreted as including hospitals and other providers who defer payment for services) to implement “Identity Theft Prevention Programs.” Such Programs must include policies and procedures to detect, prevent and mitigate identity theft.

• The FTC has announced that enforcement of these rules will begin November 1, 2009

Page 8: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 8 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HIPAA

• HIPAA requires Covered Entities to implement technical, administrative and physical safeguards to protect patient information.

Page 9: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 9 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HIPAA

• HIPAA requires covered entities to mitigate the harmful effects of unauthorized disclosures.

• The challenge in addressing mitigation is to identify what is reasonably required and/or necessary to protect the patients.

Page 10: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 10 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HITECH Act

• Under the new HITECH Act and breach regulations (effective September 23, 2009), Covered Entities will be required to notify patients of breaches that (1) involve unsecured protected health information and (2) pose a significant risk of financial reputational, or other harm to the individual.

• In addition, Covered Entities must inform the Department of Health and Human Services (“DHHS”) of breaches either in an annual report or, if such breaches involve more than 500 people, immediately in writing.Note: Breaches involving more that 500 people will be posted on the DHHS website.

Page 11: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 11 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HITECH Act

Timeframe for Notification

• A covered entity must send the notification without unreasonable delay and in no case later than 60 calendar days after the breach is discovered by the covered entity.

• A breach is considered to be discovered when the incident become known (or should have become known with reasonable diligence), not when the covered entity or business associate concludes the investigation.

Page 12: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 12 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HITECH Act Practice Tip

The “clock starts to tick” on the covered entity’s reporting obligation as soon as the breach is (or should have been) discovered. Therefore, covered entities should ensure their workforce members and other agents are adequately trained and aware of the importance of timely reporting and the consequences of failing to do so.

Page 13: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 13 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HITECH Act

Determining Whether There is a Reporting Obligation

• HHS envisions that the following steps will be taken to determine if a breach has occurred: 1. Determine whether there has been an impermissible use

or disclosure of unsecured PHI under the Privacy Rule.2. Determine and document whether there is a significant

risk of financial, reputational or other harm to the individual.

3. Consider whether the breach falls under one of the limited exceptions (e.g., an unintentional use of PHI by employee of a covered entity, if the use was in good faith, within the course and scope of employment and does not result in further use or disclosure) .

Page 14: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 14 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HITECH Act

What is Unsecured PHI?• Unsecured PHI is PHI that is not secured

through the use of a technology or methodology, specified by DHHS that renders the PHI unusable, unreadable or indecipherable to unauthorized individuals.

• Examples of technology to secure information include data encryption and shredding of paper records.

• Guidance regarding the steps that must be taken to “secure” PHI can be found at:http://www.hhs.gov/ocr/privacy.

Page 15: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 15 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HITECH Act

Determining Harm

• When performing the risk assessment to determine if there has been a significant harm from the breach, covered entities need to consider a number of factors including the following:

Who impermissibly used the PHI? To whom was the PHI impermissibly disclosed? What type and amount of PHI was disclosed?

Page 16: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 16 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HITECH Act

Content of Notice • The notice to the affected patients must include

at least the following: A brief description of what happened (e.g., date of the breach, date of the discovery of the breach).A description of the types of unsecured PHI that were involved in the breach.Any steps individuals should take to protect themselves from potential harm resulting from the breach.A brief description of what the covered entity involved is doing to investigate the breach, to mitigate the harm and to protect against any further breaches. Contact procedures for individuals to ask questions or learn additional information (i.e., toll free telephone number, e-mails address, web site or postal address).

Page 17: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 17 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape HITECH Act

Substitute Notice• If there is insufficient contact information for

some of the affected individuals or some notifications are returned undeliverable, the covered entity must provide substitute notice for the unreachable individuals (e.g., if greater than 10 individuals, conspicuous notice on the covered entity’s website or conspicuous notice in major print or broadcast media, and a toll free phone number, active for 90 days).

Page 18: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 18 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Legal Landscape State Laws

• Many State laws require health care entities to (1) protect the confidentiality of patient information; and (2) notify affected individuals and law enforcement if there is unauthorized access to an individual’s social security number, driver’s license number and/or credit card number and password.

• These State laws vary and need to be closely analyzed in order to understand the reporting obligation

• Unless the State law directly conflicts with the HITECH breach reporting obligations, the elements of both the State law and the HITECH Act apply.

Page 19: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 19 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Steps to Take Before a Security Breach Occurs

Page 20: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 20 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Steps to Take Before a Security Breach Occurs

• Establish appropriate technical safeguards to protect patient information.

Require encryption for laptops and other portable devices.Establish remote access roles specific to applications and business requirements.Prohibit the installation of unsecured “homemade” software on laptops.

Page 21: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 21 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Steps to Take Before a Security Breach Occurs

Technical Safeguards (cont.)Establish system firewalls. Appropriately and thoroughly destroy patient information once it is no longer needed.Install, use and regularly update virus protection software.

For additional information on technical safeguards for portable devices, see CMS Guidance located at: http://www.cms.hhs.gov/SecurityStandard/Do wnloads/SecurityGuidanceforRemoteUseFinal.p df.

Page 22: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 22 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Steps to Take Before a Security Breach Occurs

• Establish policies regarding the protection of patient information transmitted from remote locations.

• Discuss with vendors the responsibility for responding to security incidents including time frames for key vendors to report such incidents and steps to be taken if a security incident occurs.

• Perform routine audits of employee access to PHI and let employees know that such audits will occur.

Page 23: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 23 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Steps to Take Before a Security Breach Occurs

• Establish a security incident response program

Assign an individual to be responsible for organizing responses to security incidents (e.g., the security officer) (the “Team Leader”).Appoint a core team to conduct the investigation (e.g., representatives from IT, human resources, risk management, legal and security departments).

Page 24: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 24 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Steps to Take Before a Security Breach Occurs

Establish a security incident response program (cont.)

• Prepare written policies that address the process for internal reporting:

What needs to be reported internally (e.g., all stolen laptops, complaints regarding unauthorized access). To whom reports regarding potential breaches need to be made.Timeframes for reporting (e.g., immediately).

Page 25: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 25 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Steps to Take Before a Security Breach Occurs

Establish a security incident response program (cont.)

• Require the investigative team to prepare a mini report for management with an internal analysis and short-term recommendations.

• Educate and re-educate staff regarding the procedures for reporting security breaches, and as part of such education, publicize “scenarios” that actually occur.

Page 26: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 26 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

How to Respond to a Security Breach

Page 27: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 27 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

How to Respond to Security Breaches

• Include in-house counsel in the response process• Consider including outside counsel in order to:

Provide insight into the legal implications of unauthorized disclosures.Offer attorney-client confidentiality protections to the investigation, when state law permits.Allow for a neutral analysis of the event.

Practice Tip: Establish a policy in advance for when outside counsel should be called (e.g., large disclosures, potential criminal acts).

Page 28: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 28 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

How to Respond to Security Breaches

• Initiate an investigation immediatelyEmpower the Team Leader to be the point person for the investigation and include in the investigation process relevant technical and administrative staff as well as staff directly involved in the incident.Immediately consider whether reports need to be made to authorities.Consider:

– What information was potentially disclosed?– What technical safeguards were in place?– How many people were affected?– How the information could be used adversely against such

individuals?

Page 29: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 29 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

How to Respond to Security Breaches

• Determine whether notification of patients is required:

In order to comply with applicable state law.In order to comply with the HITECH Act (e.g., breaches involving unsecured protected health information). In order to “mitigate” any harmful effects of the security incident.

Page 30: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 30 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

How to Respond to Security Breaches

• Consider whether additional steps, in addition to notification, need to be taken to mitigate the harmful affects of the security incident, for example:

Do the affected individuals need to be offered credit monitoring?Do additional audits need to be performed on other employees?Do any employees need to be immediately terminated or suspended? Do any technical safeguards need to be installed?

Page 31: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 31 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Documenting Actions and Preventing Future Incidents

Page 32: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 32 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Preventing Future Incidents

• Incorporate lessons learned into existing procedures (e.g., were internal reporting and investigation fast and efficient).

• Determine whether any sanctions need to be taken against staff.

• Determine whether vendors need to be terminated.

• Consider whether additional technical safeguards need to implemented (e.g., encryption).

• Include the breach on annual log reported to HHS.

Page 33: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 33 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Preventing Future Incidents

• Modify policies, as necessary.• Re-educate staff regarding lessons learned.• Look for repeating patterns (e.g., one patient

area that has multiple incidents).• Include the unauthorized disclosure on the

accounting of disclosures.• Include any sanctions on the HIPAA sanctions

log.• Ensure that investigation notes and reports were

appropriately detailed and that they are maintained.

Page 34: Before, During and After a Security Incident: How to …©2009 GARFUNKEL, WILD & TRAVIS, P.C. Before, During and After a Security Incident: How to Prepare and Respond September 17,

1259221.ppt 34 © 2009 GARFUNKEL, WILD & TRAVIS, P.C.

Questions