Privacy and Security Concerns for Employee Benefit Plans with Service Provider Relationships. Ann Killilea, Andrew C. Liazos, and Amy C.

Size: px
Start display at page:

Download "Privacy and Security Concerns for Employee Benefit Plans with Service Provider Relationships. Ann Killilea, Andrew C. Liazos, and Amy C."

Transcription

1 VOL. 28, NO. 2 SUMMER 2015 BENEFITS LAW JOURNAL Privacy and Security Concerns for Employee Benefit Plans with Service Provider Relationships Ann Killilea, Andrew C. Liazos, and Amy C. Pimentel Recent cyber-attacks on health insurers have heightened awareness that sensitive participant and beneficiary information may not be adequately secure. There will undoubtedly be other attacks on data bases maintained by service providers to employee benefit plans, Ann Killilea (akillilea@mwe.com) is counsel at McDermott Will & Emery LLP and a member of the firm s Privacy and Data Protection Practice. She advises clients on a full range of data protection matters, including privacy assessments, policy development and implementation, international data transfers, cloud computing transactions and vendor management programs. Prior to joining the firm, Ann served for 25 years as senior inhouse corporate counsel advising large multinational companies in the information technology industry. Andrew C. Liazos (aliazos@mwe.com) is a partner in the law firm of McDermott Will & Emery LLP and he heads the firm s employee benefits practice in Boston. He regularly represents public companies and large closely held businesses on all aspects of ERISA fiduciary and plan governance matters and has extensive experience with ERISA preemption matters. Andrew has been recognized for several years as a national leader in the employee benefits field by Chambers USA, The Best Lawyers in America, Legal 500 and Corporate Counsel. He is a Fellow of the American College of Employee Benefits Counsel, which recognizes lawyers who have made outstanding contributions to the field of employee benefits, and is co-chair of the ABA Joint Committee on Employee Benefits National Institute on Executive Compensation. Amy C. Pimentel (apimentel@mwe.com) is a member of the Privacy and Data Protection Practice at McDermott Will & Emery LLP. Her practices focuses on consumer protection, privacy, and information security for private entities in a range of business sectors.

2 which raises an important question for ERISA fiduciaries: what should be done now to protect participant and beneficiary information entrusted to service providers against future attacks and unauthorized disclosure? While the extent of a fiduciary s responsibility to protect personal identifiable information of participants and beneficiaries is unclear, the fiduciary provisions of ERISA can be interpreted to impose a general duty to protect this information when it is part of a plan s administration. In addition, plan fiduciaries also may have obligations under other federal and state laws governing data privacy and security that are not preempted by ERISA. This article addresses the nature of the problem, identifies the types of data breaches that can occur with employee benefit plans, provides an overview of relevant law that may apply, and sets forth practical steps that can be taken by plan fiduciaries with service providers to address privacy and security concerns. NATURE OF THE PROBLEM There can be little doubt that ERISA plans are attractive targets for cyber-attacks, identity theft, and other forms of data malfeasance due to the broad range of personal identifiable information involved in plan administration and its potential market value. In particular, health care systems and insurers appear to be at significant risk for cyber-attack. According to a notice issued by the Federal Bureau of Investigation in April 2014, electronic health records are particularly valuable to cyber criminals, security measures are often not properly implemented, and breaches are quite common. 1 The financial costs of a successful cyber-attack are significant. A recent report with respect to data breaches affecting a broad range of companies indicates that the average cost for each lost or stolen record containing sensitive and confidential information increased over the past year from $188 to $201 per record, and that the total average cost paid by organizations increased from $5.4 million to $5.9 million. 2 Plan fiduciaries can increase these risks when providing participants sensitive personal data to service providers for plan administration (e.g., IT services, cloud services, and payroll services). Administering an employee benefit plan in the 21st century typically involves the assistance of service providers, including but not limited to third-party administrators (TPAs), outside payroll providers, benefits consultants, investment funds, investment advisors, and others. Much of benefit administration is now conducted through automated systems that rely upon the Internet. Service providers acting on behalf of employee benefit plans collect and process large amounts of personal, medical, and financial information with respect to participants and beneficiaries, including but not limited to Social Security numbers, accounts, retirement assets, and income figures. Increasing reliance on BENEFITS LAW JOURNAL 2 VOL. 28, NO. 2, SUMMER 2015

3 technology for plan administration requires close examination of the way service providers will handle and protect this information. While managing personal security has now become a business in and of itself, privacy and data security issues have often been given short shrift when engaging and monitoring service providers for employee benefit plans. Protecting this massive amount of information is not only about complying with the Health Insurance Portability and Accountability Act (HIPAA) for medical plans. More than HIPAA compliance is at stake. A plan fiduciary cannot assume that the service providers will take care of all compliance obligations. Indeed, failure to identify and address privacy and security considerations with service providers may create exposure for ERISA fiduciaries. Section 404(a) of ERISA generally requires a fiduciary to discharge his duties with respect to a plan solely in the interest of the participants and beneficiaries and with the care, skill, prudence, and diligence under the circumstances then prevailing that a prudent man acting in a like capacity and familiar with such matters would use in the conduct of an enterprise of a like character and with like aims. Hiring a service provider to provide services to an ERISA-covered employee benefit plan is itself a fiduciary act because it requires discretionary control or authority over plan administration. Similarly, removing or retaining a service provider is a fiduciary act. 3 To date, the U.S. Department of Labor has not provided guidance regarding the contours of this responsibility. DATA BREACHES INVOLVING EMPLOYEE BENEFIT PLANS Data breaches involving employee benefit plans are not limited to the recent high profile cyber-attacks on health insurers. Even prior to these data breaches, there have been numerous other reported incidents involving employee benefit plan. A 2011 report by the Advisory Council on Employee Welfare and Pension Benefits Plans 4 identifies the following ways breaches have occurred with respect to retirement plans: Failure to install security system updates hoax (phishing attack) Downloads of plan information to a home computer Social Security numbers mailed to wrong addresses Using the same password for multiple clients Phase I audits of covered entities under HIPAA identified additional data breaches involving medical plans, including: BENEFITS LAW JOURNAL 3 VOL. 28, NO. 2, SUMMER 2015

4 Unencrypted information on laptops Failure to implement physical safeguards at workstations Return of photocopiers without erasing data contained on hard drives Lost documents with protected health information (PHI) Disposal of prescriptions in trash containers accessible to the public 5 There is little doubt that there are a myriad of ways that participant and beneficiary information may be accessed by unauthorized users. REGULATED PERSONAL INFORMATION A plan fiduciary may have an obligation to protect plan-related information separate and apart from ERISA based on the type of data that is at issue. Each information privacy statute tends to define its own particular concept of personal information. 6 These laws include the Fair Credit Reporting Act, Fair and Accurate Credit Transactions Act, the Gramm-Leach-Bliley Act, state identity theft laws, state data breach notification laws, state information security laws, state laws protecting Social Security numbers, and state laws requiring proper disposal of personal information. It is unwise to assume that these laws will not apply to ERISAcovered employee benefit plans. ERISA generally will not preempt other federal laws, and the extent to which ERISA preempts state laws is unclear. To date, the US Department of Labor has not expressed a view regarding the extent to which state laws would be preempted as relating to an employee benefit plan. 7 Although one court has found invasion of privacy claims to be preempted by ERISA, 8 it does not appear that there are reported cases finding actions by state regulators due to a data breach to be preempted by ERISA. SERVICE PROVIDER MANAGEMENT AS REGULATED ACTIVITY Providing sensitive personal information to a service provider can expose a plan fiduciary to risk. The service provider will have access to sensitive personal information outside of the protective boundaries, virtual and physical, of the plan. This access triggers additional regulatory obligations that require plan fiduciaries to take certain affirmative steps to protect that sensitive personal information. BENEFITS LAW JOURNAL 4 VOL. 28, NO. 2, SUMMER 2015

5 A plan fiduciary should not assume that the service provider will assume any obligations that the plan may have to protect sensitive personal information. Some service providers may function in a regulated industry requiring them to develop security methodologies to protect personally identifiable information, however, others do not. Service providers often do not operate in the same industry as the plan fiduciary nor are they likely to be subject to the same compliance obligations. It is prudent for plan fiduciaries to select service providers capable of protecting sensitive participant and beneficiary information and obligate them, by written contract, to protect that information. As is often said, You can outsource the work, but you cannot outsource the responsibility. It is important to check that the service provider implements appropriate privacy and security systems and that all groups with access to the plan s sensitive personal information are obligated to protect that information. These service provider relationships should be subject to substantially similar risk management, security, privacy, and other protection policies that would be expected if the plan fiduciary were conducting the activities directly. Following a data breach, regulators often review and evaluate the role of the service provider, the due diligence that was performed before selecting the service provider, and the contract provisions with respect to privacy and data security obligations and responsibilities. Without a concerted approach to address these issues, plan fiduciaries can be vulnerable on many fronts. RESPONSIBILITY FOR SERVICE PROVIDERS DATA SECURITY FAILURES A recent PricewaterhouseCoopers LLP survey observed that the percentage of cyber incidents attributed to current and former service providers, consultants, and contractors increased from 16 and 13 percent to 18 and 15 percent, respectively, in Of the companies surveyed, just over 54 percent, representing diverse industries, require third parties, including outsourcing service providers, to comply with their privacy policies. 10 Because service providers often are recognized as the weak link in any corporate privacy management program, federal and state laws have adopted requirements to address this risk to the protection of personal information. 11 Among the governing laws, enforcement actions, and industry standards requiring service provider management of regulated personal information are the following: HIPAA and its Business Associate Requirements; Federal Trade Commission (FTC) data security enforcement actions against company failures to oversee service providers with access to personal information; BENEFITS LAW JOURNAL 5 VOL. 28, NO. 2, SUMMER 2015

6 State information security laws requiring oversight of datarelated service providers; The Gramm-Leach-Bliley Act; and Payment Card Industry Data Security Standards. 12 The FTC enforcement actions provide useful examples of the requirements expected of an entity that shares sensitive personal data with external service providers. In a number of its enforcement actions, the FTC has critiqued companies for inadequate third party management 13 and, most recently, has taken enforcement actions to make the point. 14 The message is clear that the FTC is now requiring companies to: (1) exercise due diligence before hiring data-related service providers; (2) have appropriate protections of personal information in their contracts with data-related service providers; and (3) take steps to verify and monitor that the data-related service providers are adequately protecting the information. The FTC s service provider case, In re GMR Transcription Services Inc., provides an example of these allegations and consent order requirements. The GMR case involved the inadvertent exposure of personal medical data maintained by GMR, a company that provides medical transcription services. The FTC concluded that GMR s failure to adequately choose, contract with, and oversee a data service provider constituted an unfair and deceptive trade practice in violation of Section 5 of the Federal Trade Commission Act. 15 According to the FTC complaint, GMR failed to adequately verify that its data service provider implemented reasonable and appropriate security measures to protect the personal information stored on the provider s network and computers. Moreover, the FTC faulted GMR for failures in contracting with its data service provider. The FTC alleged that GMR failed to: (1) require the provider by contract to adopt and implement appropriate security measures to protect personal information; and (2) take adequate measures to monitor and assess whether the provider employed measures to appropriately protect personal information under the circumstances. The FTC additionally found GMR to be deficient in conducting due diligence before hiring its data service provider. Under the terms of GMR s settlement with the FTC, GMR and its owners are prohibited from misrepresenting the extent to which they maintain the privacy and security of consumers personal information. BENEFITS LAW JOURNAL 6 VOL. 28, NO. 2, SUMMER 2015

7 Further, they must establish a comprehensive information security program that will protect consumers sensitive personal information, including information the company provided to independent service providers. In addition, the company must have the program evaluated both initially and every two years by a certified third party. As is typical of these FTC enforcement actions, the settlement will remain in force for the next 20 years. The GMR settlement signals that the FTC will hold companies to a high bar with regard to third-party vendor management and oversight when it involves personal information. In addition to the FTC, state attorneys general have required companies to incorporate vendor management programs in settlement agreements for violations under state consumer protection statutes. For example, in late 2014, six state attorneys general 16 collectively entered into an Assurance of Voluntary Compliance with PointRoll, Inc., that was intended to resolve the states investigation into whether PointRoll engaged in any unlawful or deceptive trade practices in violation of the state consumer protection statutes. 17 As part of its settlement agreement and for the protection of its consumer information, PointRoll was required to implement a privacy program that included taking reasonable steps to select and use only certain third-party service providers. Those providers must either agree to comply with PointRoll s privacy policies and data security protocols, or be subject to policies and protocols that are at least equivalent to those of PointRoll. Certain state laws reflect a similar approach. At least 12 states 18 require all companies that process personal information of a resident of that state regardless of industry to implement safeguards designed to protect such information. Under these state information security laws, the term personal information generally is defined to include an individual s name in combination with some other piece of data that could be used to commit fraud or identity theft, such as a payment card number, financial account number, Social Security number, or any other government-issued identifier. Massachusetts is particularly noteworthy in its explicit requirement for effective service provider management. Before a company can provide its personal information to a service provider, the Massachusetts Data Security Regulation affirmatively requires that the company: (1) Take reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect such personal information; and (2) Require such third-party service providers by contract to implement and maintain such appropriate security measures for personal information. 19 Each state s law applies only to the extent that the plan fiduciaries maintain personal information about a resident of that particular BENEFITS LAW JOURNAL 7 VOL. 28, NO. 2, SUMMER 2015

8 state. If the plan does not process any personal information of a Massachusetts resident and will not be sending any Massachusetts information to a service provider, then Massachusetts law will not apply. However, even then, there is no question that it has become a generally accepted practice and an advisable risk mitigation tool for companies in any industry to implement a data-related service provider management program that meets these obligations. STEPS TO TAKE In light of the foregoing considerations, the plan fiduciary should consider taking the following steps when selecting and contracting with service providers that will handle sensitive personal information of participants and beneficiaries: Conduct Effective Due Diligence The starting point for defining service provider privacy requirements is to understand the plan fiduciary s own privacy and data security requirements. Then it will want to determine, based on the services that would be provided by the service provider, which requirements apply. This work will likely be conducted during the request for proposal (RFP) process and can be built into the RFP documents requiring service providers to respond to the due diligence. The plan fiduciary may want to include some of the service provider s representations, made during due diligence, into the binding contract terms. There are many subject areas to explore during the due diligence phase. For example: What is the track record of the service provider? What are its resources? How will the service provider use the personal information? Where will the personal information be stored and processed? Does the service provider itself intend to use subcontractors, including its affiliates, and where are they located? What security does the service provider apply to personal information? Will the service provider provide the security that the plan fiduciary requires based on its own obligations? What reporting does the service provider provide? What auditing is done (i.e., Service Organization Controls (SOC) 1 and SOC 2 reports)? BENEFITS LAW JOURNAL 8 VOL. 28, NO. 2, SUMMER 2015

9 The due diligence should be documented in a manner that provides the plan fiduciary with a defensible record should a data breach occur and its service provider practices be challenged. A list of due diligence questions designed to elicit these and other critical security issues is advisable. Recommended Contracting Practices for Privacy and Data Security Issues When the due diligence is complete, the plan fiduciary will want to ensure that appropriate protections are built into its service provider contract. These protections include thoughtful contractual provisions related to confidentiality, appropriate and limited use of the provided data set, data security, audit rights, risk allocation, and remedies. The plan fiduciary should consider including a detailed security schedule in order to provide sufficient detail on required security obligations. Ongoing service provider monitoring and management also are essential. The level of oversight needed will depend on the amount and sensitivity of the personal information being processed. Apart from other commercial contracting issues, the service provider contract should address many privacy and data security issues. For example: Privacy and data security obligations should be separate from confidentiality obligations. The service provider should agree to cooperate with the plan fiduciary to enable the plan fiduciary to meet its regulatory and legal obligations. The service provider s use of personal information must be limited as necessary to the delivery of the services. As between service provider and the plan fiduciary, the plan fiduciary is the owner of the personal information. 20 The service provider s use of subcontractors should be subject to the plan fiduciary s consent and subject to the service provider s obligation to flow-down privacy and data security obligations. Security obligations should be detailed and added to the minimum security requirements as dictated by law. The service provider s reporting obligations should be specified with respect to any compromise of personal data or compromise of a system(s) containing personal data. BENEFITS LAW JOURNAL 9 VOL. 28, NO. 2, SUMMER 2015

10 The service provider should be required to reimburse the plan fiduciary for expenses, costs, and the like associated with any data breach occurring under its control. The service provider s auditing requirements must be specified. The service provider s obligations for data retention, disposal, and destruction obligations should be consistent with the plan fiduciary s regulatory obligations. Risk allocation provisions relating to privacy, data security, and confidentiality deserve careful attention. These are not regulatory issues; rather, they are commercial issues indicative of the leverage and relationship between the parties. Among these issues are: (1) whether damages for violations of confidentiality, privacy, and data security obligations are unlimited or capped by a limitation of liability or by a special limitation of liability devoted to these issues (i.e., a super cap ), and (2) whether the recommended service provider s full hold-harmless indemnity for third-party claims based on privacy and data security violations is unlimited or capped by a limitation of liability or by a super cap. Oversight and Monitoring A plan fiduciary s oversight responsibilities do not end when the contracts are signed. Action should be taken to assess whether service providers are adhering to the agreed-upon practices for data privacy and security. In addition, agreed-upon practices should be reviewed and updated from time to time in light of the shifting and evolving threats to ensure that the service provider is keeping current with reasonable security practices. CONCLUSION Employee benefit data breaches will recur and are now a fact of life. Plan participants and beneficiaries have become sensitized to the vulnerability of their personal information and it is reasonable to expect that they will look to plan fiduciaries to protect that information. State regulators and the FTC are alert to these issues as is the US Department of Labor. Given that service providers often have been the point of entry for attacks on plan data, plan fiduciaries are well served by conducting defensible due diligence in selecting providers, incorporating specific privacy and data security obligations into BENEFITS LAW JOURNAL 10 VOL. 28, NO. 2, SUMMER 2015

11 a binding agreement with the service provider, and monitoring the service provider s ongoing compliance with those obligations. These steps should reduce the risk of data breaches affecting the sensitive personal information of plan beneficiaries and participants and, if one occurs, reduce the exposure of the plan and its fiduciaries. NOTES 1. FBI Cyber Division, Private Industry Notification, Health Care Systems and Medical Devices at Risk for Increased Cyber Intrusions for Financial Gain (April 8, 2014), 2. IBM and Ponemon Institute LLC, 2014 Cost of Data Breach Study: United States, (May 2014). 3. See Advisory Council on Employee Welfare and Pension Benefit Plans, Privacy and Security Issues Affecting Employee Benefit Plans (November 2011) (the 2011 ERISA Advisory Council Report ) (setting forth recommendation that the U.S. Department of Labor provide guidance concerning the protection of PII [personal identifiable information] as a fiduciary responsibility and the extent PII of benefit plan participants and beneficiaries should be protected in plan administration ). Available at ERISA Advisory Council Report (describing the current legal environment with respect to data privacy obligations outside of ERISA). 5. The U.S. Department of Health and Human Services Office for Civil Rights has recently sent pre-audit screening surveys to a pool of covered entities that may be selected for a second phase of audits of compliance with the HIPAA Privacy, Security and Breach Notification Standards. See McDermott Will & Emery LLP, OCR Launches Phase 2 HIPAA Audit Program with Pre-Audit Screening Surveys (May 18, 2015) (describing the selection of Phase 2 audit recipients, the audit process, and steps to take in preparing for Phase 2 audits). 6. Some statutory approaches define personal as meaning any information that identifies a person. Others focus on nonpublic information, exemplified by the Gramm-Leach-Bliley Act, which defines personally identifiable financial information as nonpublic personal information. Still, others, notably state data breach notification laws, list specific types of data that constitute personal information triggering data breach notification requirements. These definitions tend to include data that could be used to commit financial fraud or identity theft, such as a person s first name and last name, or first initial and last name in combination with a Social Security number, driver s license number, financial account number, or credit or debit card number. Many states are amending their current data breach notification laws to broaden the definition of personal information to include a person s name in combination with a birth or marriage certificate, medical and health insurance information, unique biometric data, and a username or address in combination with a password. See, e.g. Wyoming Senate Bill S.F.36, available at last accessed May 17, 2015; Florida Information Protection Act of 2014 (SB 1524), available at String=&URL= /0501/Sections/ html, last accessed May 17, BENEFITS LAW JOURNAL 11 VOL. 28, NO. 2, SUMMER 2015

12 7. In 2011, the Joint Committee on Employee Benefits of the American Bar Association requested informal guidance that breach of a state law violation due to an administrator providing personally identifiable information to service providers to generate approved participant communications would be preempted by ERISA because it interfered with plan administration. The US Department of Labor declined to answer the question, noting that it would need to review the specific state statute and how [the] statute relates to an ERISA Plan. See Q&A 19 Preemption, Questions and Proposed Answers for the Department of Labor Staff for the 2010 Joint Committee on Employee Benefits Technical Session held on May 5, 2010, available at aba/migrated/2011_build/employee_benefits/2010dol_qa.authcheckdam.pdf, last accessed May 17, In re GM, 3 F.3d 980 (6th Cir. 1993) (finding a right to privacy claim preempted by ERISA in the context of an alleged breach of Employee Assistance Plan confidentiality provision). 9. See PwC, CIO and CSO magazines, Global State of Information Security Survey 2015, available at last accessed May 17, See Id. 11. Industry standards under applicable law requiring service provider management of regulated personal information include the following: (1) HIPAA and its Business Associate Requirements; (2) FTC data security enforcement actions against company failures to oversee service providers with access to personal information; (3) state information security laws requiring oversight of data-related service providers; (4) Gramm-Leach-Bliley Act; and (5) the Payment Card Industry Data Security Standards. See Information Supplement: Third-Party Security Assurance, Third-Party Security Assurance Special Interest Group, PCI Security Standards Council (Aug. 2014), available at PCI_DSS_V3.0_Third_Party_Security_Assurance.pdf. See also 2011 ERISA Advisory Council Report (describing the legal environment with respect to laws that may apply outside of ERISA). 12. See Information Supplement: Third-Party Security Assurance, Third-Party Security Assurance Special Interest Group, PCI Security Standards Council (Aug. 2014), available at Security_Assurance.pdf, last accessed May 17, See, e.g., Complaint, In re Credit Karma, Inc., File No (Aug. 13, 2014), available at pdf, last accessed May 17, 2015; Complaint, In re CBR Systems, Inc. File No (April 29, 2013), available at cases/2013/05/130503cbrcmpt.pdf, last accessed May 17, See, e.g. Decision and Order, In re Snapchat, Inc., File No (Dec. 23, 2014), available at The FTC ordered Snapchat to develop a comprehensive privacy security program that included the use of reasonable steps to select and retain service providers capable of maintaining security practices consistent with th[e] order, and requiring service providers by contract to implement and maintain appropriate safeguards to protect the privacy and confidentiality of personal information. 15. See Complaint, In re GMR Transcription Services, Inc., File No (Jan. 31, 2014), available at BENEFITS LAW JOURNAL 12 VOL. 28, NO. 2, SUMMER 2015

13 pdf, last accessed May 17, 2015; Agreement Containing Consent Order, In re GMR Transcription Services, Inc., File No ( Jan. 31, 2014), available at ftc.gov/system/files/documents/cases/140203gmragree.pdf (13 PVLR 211, 2/13/14), last accessed May 17, 2015; Decision and Order, In re GMR Transcription Services, Inc., File No (Aug. 21, 2014) available at cases/140821gmrdo.pdf, last accessed May 17, Attorneys general from Connecticut, Florida, Illinois, Maryland, New Jersey, and New York. 17. See Assurance of Voluntary Compliance, In re Pointroll, Inc. (Dec. 10, 2014), available at last accessed May 17, Arkansas, California, Connecticut, Florida, Indiana, Maryland, Massachusetts, Nevada, Oregon, Rhode Island, Texas, and Utah. 19. See 201 Mass. Code Reg (2008) (emphasis added). See also Nev. Rev. Stat (requiring encryption for personal information transmitted electronically outside of a security system). 20. This is a critical term and one that is often neglected. Failure to address this ownership issue could have implications beyond these privacy and data security issues. For example, such an omission could adversely affect the right of the plan fiduciary to obtain the data upon expiration or termination of the agreement. Copyright 2015 CCH Incorporated. All Rights Reserved. Reprinted from Benefits Law Journal, Summer 2015, Volume 28, Number 2, pages 81 92, with permission from Wolters Kluwer, New York, NY, ,

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

Privacy Law Basics and Best Practices

Privacy Law Basics and Best Practices Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations

More information

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,

More information

DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL

DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL State AGs have been very active in the leadership of data privacy protection initiatives across the country, and have dedicated considerable

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Managing risk associated with third-party outsourcing

More information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com

More information

HIPAA Compliance: Efficient Tools to Follow the Rules

HIPAA Compliance: Efficient Tools to Follow the Rules Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability

More information

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting

More information

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security

More information

Privacy Legislation and Industry Security Standards

Privacy Legislation and Industry Security Standards Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,

More information

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection

More information

HIPAA and Privacy Policy Training

HIPAA and Privacy Policy Training HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information

Jefferson Glassie, FASAE Whiteford, Taylor & Preston

Jefferson Glassie, FASAE Whiteford, Taylor & Preston Jefferson Glassie, FASAE Whiteford, Taylor & Preston 2 * 3 PII = An individuals first name and last name or first initial and last name in combination with any one or more of the following data elements

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

what your business needs to do about the new HIPAA rules

what your business needs to do about the new HIPAA rules what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

Tape Vaulting Audit And Encryption Usage Analysis

Tape Vaulting Audit And Encryption Usage Analysis Tape Vaulting Audit And Encryption Usage Analysis Prepared for Public Presentation (includes SB 1386, Gramm Leach Bliley, and Personal Data Protection and Security Act of 2005 Customer Information Protection

More information

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now?

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now? Outline MOR-OF Education and Medical Expo August 23, 2014 Tatiana Melnik Melnik Legal PLLC tatiana@melniklegal.com 734-358-4201 Tampa, FL I. HIPAA Compliance II. Why Should You Care? A. Market Pressure

More information

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013 Welcome to ChiroCare s Fourth Annual Fall Business Summit October 3, 2013 HIPAA Compliance Regulatory Overview & Implementation Tips for Providers Agenda Green packet Overview of general HIPAA terms and

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Protecting Personal Information in Third Party Hands An Overview of Legal Requirements

Protecting Personal Information in Third Party Hands An Overview of Legal Requirements Protecting Personal Information in Third Party Hands An Overview of Legal Requirements Margaret P. Eisenhauer 1 6 January 2006 U.S. companies are increasingly subject to fiduciary-like duties with regard

More information

Massachusetts Identity Theft/ Data Security Regulations

Massachusetts Identity Theft/ Data Security Regulations Massachusetts Identity Theft/ Data Security Regulations Effective March 1, 2010 Are You Ready? SPECIAL REPORT All We Do Is Work. Workplace Law. In four time zones and 45 major locations coast to coast.

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is by and between ( Covered Entity ) and Xelex Digital, LLC ( Business Associate ), and is effective as of. WHEREAS,

More information

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on

More information

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you

More information

Data Breach Response Planning: Laying the Right Foundation

Data Breach Response Planning: Laying the Right Foundation Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

A s a covered entity or business associate, you have

A s a covered entity or business associate, you have Health IT Law & Industry Report VOL. 7, NO. 19 MAY 11, 2015 Reproduced with permission from Health IT Law & Industry Report, 07 HITR, 5/11/15. Copyright 2015 by The Bureau of National Affairs, Inc. (800-372-1033)

More information

THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS

THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS Data Law Group, P.C. Kari Kelly Deborah Shinbein YOU CAN T OUTSOURCE COMPLIANCE! Various statutes and regulations govern

More information

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Compliance Tip Sheet National Hospice and Palliative Care Organization www.nhpco.org/regulatory HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Hospice Provider Compliance To Do List

More information

HIPAA Cyber Security: Your Vendor is a Back Door to Your Server

HIPAA Cyber Security: Your Vendor is a Back Door to Your Server HIPAA Cyber Security: Your Vendor is a Back Door to Your Server Prepared for the American Health Lawyers Association s Fraud and Compliance Forum held October 6, 2014 John E. Kelly, Esq. Member Bass, Berry

More information

Data Privacy and Security: A Primer for Law Firms

Data Privacy and Security: A Primer for Law Firms Data Privacy and Security: A Primer for Law Firms All We Do Is Work. Workplace Law. In four time zones and 46 major locations coast to coast. www.jacksonlewis.com JACKSON LEWIS SERVING THE DIVERSE NEEDS

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

Law Firm Cyber Security & Compliance Risks

Law Firm Cyber Security & Compliance Risks ALA WEBINAR Law Firm Cyber Security & Compliance Risks James Harrison CEO, INVISUS Breach Risks & Trends 27.5% increase in breaches in 2014 (ITRC) Over 500 million personal records lost or stolen in 2014

More information

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July 2012. Tex Med. 2012;108(7):33-37.

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July 2012. Tex Med. 2012;108(7):33-37. Zip It! Feds, State Strengthen Privacy Protection Practice Management Feature July 2012 Tex Med. 2012;108(7):33-37. By Crystal Conde Associate Editor When it comes to enforcing HIPAA data security and

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK SECURITY AND THEFT OF DATA COVERAGE APPLICATION Name of Insurance Company to which application is made NOTICE: THIS POLICY PROVIDES CLAIMS MADE COVERAGE.

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information

More information

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1 Data Breach Response Basic Principles Under U.S. State and Federal Law ABA Litigation Section Core Knowledge January 2015 1 I. Introduction Data breaches have become an unfortunate reality for many of

More information

Recent Developments in Privacy/Security Litigation

Recent Developments in Privacy/Security Litigation Recent Developments in Privacy/Security Litigation Elizabeth F. Hodge February 25, 2015 Privacy & Security Enforcement HIPAA Office for Civil Rights State Attorneys General Federal Trade Commission (FTC)

More information

Health Information Privacy Refresher Training. March 2013

Health Information Privacy Refresher Training. March 2013 Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal

More information

Navigating the New MA Data Security Regulations

Navigating the New MA Data Security Regulations Navigating the New MA Data Security Regulations Robert A. Fisher, Esq. 2009 Foley Hoag LLP. All Rights Reserved. Presentation Title Data Security Law Chapter 93H Enacted after the TJX data breach became

More information

THE COMMONWEALTH OF MASSACHUSETTS. Division of Insurance. Arbella Indemnity Insurance Company, Inc.

THE COMMONWEALTH OF MASSACHUSETTS. Division of Insurance. Arbella Indemnity Insurance Company, Inc. THE COMMONWEALTH OF MASSACHUSETTS OFFICE OF CONSUMER AFFAIRS AND BUSINESS REGULATION Division of Insurance Report on the Comprehensive Market Conduct Examination of Arbella Indemnity Insurance Company,

More information

ACE Advantage PRIVACY & NETWORK SECURITY

ACE Advantage PRIVACY & NETWORK SECURITY ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with

More information

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute

More information

Model Business Associate Agreement

Model Business Associate Agreement Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model

More information

Discussion on Network Security & Privacy Liability Exposures and Insurance

Discussion on Network Security & Privacy Liability Exposures and Insurance Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter

More information

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA 02110 Richmond, Virginia 23219 Tel. (617) 502.8238 Tel. (804) 783.7579

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA 02110 Richmond, Virginia 23219 Tel. (617) 502.8238 Tel. (804) 783.7579 IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS Daniel J. Blake, Esq. Vijay K. Mago, Esq. LeClairRyan, A Professional Corporation LeClairRyan, A Professional Corporation One International Place, Eleventh Floor

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the

More information

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com

More information

Managing data security and privacy risk of third-party vendors

Managing data security and privacy risk of third-party vendors Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected

More information

Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell

Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell Who s Afraid Of A Big Bad Breach?: Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell Overview Identifying the laws that protect personal information and protected

More information

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300)

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300) Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300) Ricky Link, Coalfire ISACA North Texas and IIA Fort Worth Chapters The Petroleum Club of Fort Worth March 4, 2014 1 About Coalfire Coalfire

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT Note: This form is not meant to encompass all the various ways in which any particular facility may use health information and should be specifically tailored to your organization. In addition, as with

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

How To Manage The Risks Of An Erisa Fiduciary

How To Manage The Risks Of An Erisa Fiduciary Mitigating fiduciary liability for defined contribution plan investment decisions Vanguard commentary June 2013 Executive summary. In recent years, several high-profile class-action lawsuits have alleged

More information

10/29/2012 CONSUMER AFFAIRS AND BUSINESS REGULATION AND DATA SECURITY LAW

10/29/2012 CONSUMER AFFAIRS AND BUSINESS REGULATION AND DATA SECURITY LAW International Association of Privacy Professionals Practical Privacy Series New York City MASSACHUSETTS OFFICE OF CONSUMER AFFAIRS AND BUSINESS REGULATION AND DATA SECURITY LAW Barbara Anthony Undersecretary

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

January 2007. An Overview of U.S. Security Breach Statutes

January 2007. An Overview of U.S. Security Breach Statutes January 2007 An Overview of U.S. Security Breach Statutes An Overview of U.S. Security Breach Statutes Jeffrey M. Rawitz and Ryan E. Brown 1 This Jones Day White Paper summarizes what is generally entailed

More information

Business Associate Agreement

Business Associate Agreement This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement

More information

Privacy Rights Clearing House

Privacy Rights Clearing House 10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights

More information

HIPAA Privacy Rule Policies

HIPAA Privacy Rule Policies DRAFT - Policies and Procedures PRIVACY OFFICE ASSIGNMENT AND RESPONSIBILITIES APPROVED BY: SUPERCEDES POLICY: Policy #1 ADOPTED: REVISED: REVIEWED: Purpose This policy is designed to assure the establishment

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

How To Insure An Investment Advisor

How To Insure An Investment Advisor SPOTLIGHT ON Insurance and Bonding Considerations for Registered Investment Advisors The contents of this Spotlight have been prepared for informational purposes only, and should not be construed as legal

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) is entered into by and between Professional Office Services, Inc., with principal place of business at PO Box 450, Waterloo,

More information

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129 Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Business Associate and Data Use Agreement

Business Associate and Data Use Agreement Business Associate and Data Use Agreement This Business Associate and Data Use Agreement (the Agreement ) is entered into by and between ( Covered Entity ) and HealtHIE Nevada ( Business Associate ). W

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

Ethical Considerations for Lawyers Using the Cloud

Ethical Considerations for Lawyers Using the Cloud Ethical Considerations for Lawyers Using the Cloud Presentation by Peter J. Guffin, Esq. Pierce Atwood LLP pguffin@pierceatwood.com (207) 791-1199 Maine State Bar Association Summer Meeting June 22, 2012

More information

Payment Card Industry Data Security Standards

Payment Card Industry Data Security Standards Payment Card Industry Data Security Standards January 19, 2011 Marc S. Reisler, Holland & Knight Copyright 2011 Holland & Knight LLP All Rights Reserved Data Breaches Remain a Serious Concern PCI Standards

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS Shipman & Goodwin LLP HIPAA Alert March 2009 STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS The economic stimulus package, officially named the American Recovery and Reinvestment Act of 2009

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing

More information

ACE Advantage. Employed Lawyers Professional Liability Application

ACE Advantage. Employed Lawyers Professional Liability Application ACE American Insurance Company Illinois Union Insurance Company Westchester Fire Insurance Company Westchester Surplus Lines Insurance Company ACE Advantage Employed Lawyers Professional Liability Application

More information

(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data;

(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data; Legal Updates & News Legal Updates Pending Changes to California s Data Breach Law: New Burdens for Retailers? September 2007 by Christine E. Lyon, William L. Stern Related Practices: Privacy and Data

More information

PEOs Deemed MEWAs Have State and Federal Regulatory Concerns. PEO Insider Autumn 2007. Tess J. Ferrera

PEOs Deemed MEWAs Have State and Federal Regulatory Concerns. PEO Insider Autumn 2007. Tess J. Ferrera PEOs Deemed MEWAs Have State and Federal Regulatory Concerns PEO Insider Autumn 2007 Tess J. Ferrera The Employee Retirement Income Security Act of 1974 (ERISA), with exceptions not relevant here, defines

More information

Enterprise PrivaProtector 9.0

Enterprise PrivaProtector 9.0 IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT

FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is made and entered into to be effective as of, 20 (the Effective Date ), by and between ( Covered Entity ) and

More information

Health Partners HIPAA Business Associate Agreement

Health Partners HIPAA Business Associate Agreement Health Partners HIPAA Business Associate Agreement This HIPAA Business Associate Agreement ( Agreement ) by and between Health Partners of Philadelphia, Inc., the Covered Entity (herein referred to as

More information

Fiduciary best practices:

Fiduciary best practices: Smart Paper Fiduciary best practices: Taking a prudent approach to plan management Contents Appointment of a fiduciary committee... 2 Additional considerations... 2 Written committee charter... 2 Periodic

More information

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013 Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He

More information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment 4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information