The Massachusetts Data Security Law and Regulations

Size: px
Start display at page:

Download "The Massachusetts Data Security Law and Regulations"

Transcription

1 The Massachusetts Data Security Law and Regulations November 2, 2009 Boston Brussels Chicago Düsseldorf Houston London Los Angeles Miami Milan Munich New York Orange County Rome San Diego Silicon Valley Washington, D.C. Strategic alliance with MWE China Law Offices (Shanghai)

2 Massachusetts has enacted some of the most comprehensive state data security laws in the United States. The latest regulations take effect March 1, 2010, and all entities subject to these regulations must be in compliance by that date or risk substantial fines and penalties. As the March deadline looms, companies throughout the United States are wrestling with the question of whether and to what extent these laws apply to their workplace particularly if they do not do business in Massachusetts. To help companies answer that question and chart a course toward compliance, this White Paper provides a comprehensive overview of the Massachusetts data security laws and regulations. Understanding the legal framework for data security in Massachusetts is an important step toward minimizing the risk of enforcement action and avoiding litigation when facing ever-increasing threats to security in the workplace. Overview of Relevant Statutes and Regulations On August 3, 2007, Massachusetts enacted legislation to protect its residents from the growing problem of identity theft. The legislation had three principal components. First, it amended an existing consumer protection law, Massachusetts General Laws Chapter 93, to give consumers the right to obtain a security freeze on their credit report. 1 Second, it enacted a new Chapter 93H, now known as the Massachusetts security breach notification law, which took effect October 31, Chapter 93H requires, among other things, that entities notify certain state government officials, including the Massachusetts Attorney General and the Director of the Office of Consumer Affairs and Business Regulations (OCABR), in the event of a security breach, and that entities inform consumers whose personal information may have been compromised. 3 Third, it enacted a new chapter 93I requiring entities that store personal information of Massachusetts residents to destroy and dispose of that information in certain prescribed ways. 4 Chapter 93I took effect February 3, Some of the most sweeping requirements of this legislation came later in the form of regulations entitled The Standards for the Protection of Personal Information of Residents of the Commonwealth 6 (Regulations). The Regulations establish certain minimum standards that covered entities must meet to safeguard the personal information of Massachusetts residents. These Regulations are among the strictest in the nation. In addition to the security breach notification requirements, which the vast majority of states in the country already have on the books, the Regulations go one step further and require covered businesses to take proactive steps in advance of any breach in order to protect the personal information in its possession. The Regulations require full compliance by March 1, Because the first component of the identity theft legislation the amendments to Chapter 93 concerning security freezes focus more on individual consumers than the typical businesses we serve, this White Paper focuses on the second two components of the legislation, Chapter 93H (and the Regulations adopted thereunder) and Chapter 93I. We discuss each in turn below. Requirements In the Event of a Security Breach (Chapter 93H) Chapter 93H is known as the Massachusetts security breach notification rule. It defines a breach of security as the unauthorized acquisition or unauthorized use of unencrypted data or, encrypted electronic data and the confidential process or key that is capable of compromising the security, confidentiality, or integrity of personal information that creates a substantial risk of identity theft or fraud against a resident of the Commonwealth. 7 Importantly, the Massachusetts Regulations do not require notification for good faith but unauthorized acquisition of personal information as long as the personal information is not then (1) used in an unauthorized manner or (2) subject to further unauthorized disclosure. 8 Chapter 93H requires a person to notify certain entities in a prescribed way following a security breach. The statute differentiates between breaches of (1) data that may create a substantial risk of harm and (2) personal information. A security breach may occur even if personal information is not included in the data that is acquired or used without proper authorization, if the acquisition or 1 MASS. GEN. LAWS ch. 93, 56, 62A (2009). 2 MASS. GEN. LAWS ch. 93H (2009). 3 MASS. GEN. LAWS ch. 93H (2009). 4 MASS. GEN. LAWS ch. 93I (2009). 5 MASS. GEN. LAWS ch. 93I (2009) MASS. CODE REGS (2009). 7 Id. 1(a). This White Paper refers to the term security breach and breach of security interchangeably. 8 Id

3 use of the data creates a substantial risk of identity theft or fraud. In the event that personal information is acquired or used by a person who lacks appropriate authorization to acquire or use such information or is used for an unauthorized purpose, the Regulations trigger certain notification requirements, even if the security breach does not entail a substantial risk of harm. Chapter 93H 3 creates a reporting obligation when a person (1) knows or has reason to know of a breach of security or (2) when the person or agency knows or has reason to know that the personal information of such resident was acquired or used by an unauthorized person or used for an unauthorized purpose. 9 The entities that must be notified may include the owner or licensor of the personal information, the Attorney General, the Director of OCABR and any affected individual. Certain entities, such as state agencies, must report breaches to additional entities, such as the Information Technology Division or the Division of Public Records. Notification must occur as soon as practicable and without unreasonable delay. 10 Chapter 93H creates different notice requirements depending upon (1) the type of person or agency that had the security breach and (2) the type of recipient receiving the notification. The statute differentiates between persons and agencies that store but do not own or license personal information 11 and those that own or license data. 12 For parties that maintain or store but do not own or license personal information that is then disclosed without proper authorization, Chapter 93H requires notification of the security breach to additional parties, such as the owner or licensor of the personal information. 13 For owners and licensors of personal information that unauthorized users obtain as a result of a security breach, Chapter 93H requires notice to the Massachusetts Attorney General, the Director of OCABR and the affected resident. 14 The Director of OCABR will then forward the names of select consumer reporting agencies and relevant state agencies to the notifying party. The notifying party must then notify the parties identified by the Director of OCABR as soon as practicable and without unreasonable delay. 15 The Office of the Massachusetts Attorney General has stated that it will permit a delay if (1) notification would hinder a criminal investigation and (2) the law enforcement agency notifies the Attorney General of this fact. 16 The notification to the Attorney General that owners or licensors suffered a security breach or otherwise disclosed personal information without authorization requires three items of information: (1) the nature of the breach that occurred or the event that resulted in the unauthorized acquisition or use of the personal information, (2) the number of Massachusetts residents who had their personal information obtained at the time the person makes the notification, and (3) a description of the procedures that the notifying person or agency took, or anticipates taking, as a result of the incident. The notice to the affected residents must include the consumer s right to obtain a police report, information on how the resident can request a security freeze 17 and what information they will need to provide to obtain such a freeze, 18 and the fees that the consumer reporting agencies will demand. 19 Importantly, Chapter 93H constrains what the notifying party may disclose to the affected resident; the notice shall not provide the recipient with information about (1) the nature of the breach, or other type of unauthorized acquisition or use, that occurred, or (2) the number of residents of Massachusetts affected by the breach or unauthorized access or use of personal information. 20 This is quite different from other state notification rules that actually require the notifying party to disclose the nature of the breach, ostensibly so that the consumer can judge for him- or herself what is the risk of potential identity theft stemming from that breach. By contrast, Massachusetts is concerned that sharing information about the nature of the breach could further jeopardize the confidentiality of the information involved in the breach, particularly if the information is still exposed somewhere, for example, 9 Id Id. 3 (a) (b). 11 Id. 3 (a). 12 Id. 3 (b). 13 Id. 3 (a). 14 Id. 3 (b). 15 Id. 16 See Scott D. Schafer, Overview of Massachusetts Data Security Laws (June 5, 2009), in New Data Security Rules and Best Practices, Suffolk University Law School CLE Presentation, June 2009 (hereinafter Schafer), at MASS. GEN. LAWS ch. 93, 56, 62A (2009), at A security freeze precludes anyone from opening new credit in the name of the person to whom the freeze is applied or making a credit check on his or her account until the person elects to remove the freeze. A fraud alert does not preclude the affected individual from opening a new credit line or prevent credit checks by the individual or third parties. Instead, it requires notification to the affected individual whenever someone attempts to open a new line of credit for the affected individual. A fraud alert requires renewal every quarter. 18 MASS. GEN. LAWS ch. 93, 56, 62A. 19 Id. 20 MASS. GEN. LAWS ch. 93H, 3(b)

4 through internet cache pages. The bottom line is that any breach notification letter sent to a Massachusetts resident should omit the two pieces of information listed above. Furthermore, Chapter 93H provides that certain entities covered by federal breach notification laws shall be deemed in compliance with Chapter 93H, so long as the entities comply with the federally mandated procedures to which they are subject when a breach occurs and so long as they notify appropriate Massachusetts officials and affected residents. Specifically, the statue provides that a person who maintains procedures for responding to a breach of security pursuant to federal laws is deemed to be in compliance with this chapter if the person notifies affected Massachusetts residents in accordance with the... required procedures when a breach occurs;.. [as well as] the attorney general and the director of [OCABR]... as soon as practicable and without unreasonable delay[.] 21 For example, a business covered by the Health Information Portability and Accountability Act (HIPAA) that follows the HIPAA-required procedures in the event of a breach need not comply with 93H, so long as the business notifies appropriate Massachusetts officials and affected residents. 22 The statute also provides details as to what should be included in the notice to the officials. Finally, in addition to the notification requirements, Chapter 93H directs OCABR to adopt regulations relative to any person that owns or licenses personal information about a resident of the [C]ommonwealth. 23 The statute describes the purpose and objectives for the regulations, and notes that the regulations shall take into account the person s size, scope and type of business, the amount of resources available to such person, the amount of stored data, and the need for security and confidentiality of both consumer and employee information. 24 The Massachusetts Regulations In response to the Chapter 93H directive, OCABR released the first final Massachusetts Regulations on September 19, OCABR has since revised the Regulations twice and postponed the effective date several times. OCABR released the most recent final version of the Regulations on October 30, 2009, and they are set to be published in the official register on November 13, 2009, which will be the effective date of the Regulations. 26 Despite being effective on that date, full compliance with the Regulations is not required until March 1, Starting March 1, 2010, the Regulations require all persons who own or license personal information about a Massachusetts resident to have in place minimum standards regarding the protection of the security, confidentiality and integrity of such personal information. 27 As set forth in more detail below, the Regulations oblige businesses to, among other things, (1) perform risk assessments as to the security, confidentiality and integrity of any records containing personal information, (2) create a comprehensive, written information security program, (3) take reasonable steps to verify that any of their third-party service providers with access to personal information can safeguard such information in compliance with the Regulations, and (4) observe certain minimum standards for administrative, physical and computer system security compliance as well as security incident response. Five sections comprise the Regulations. Section explains the purpose and scope. Section defines terms. Section imposes several duties on owners and licensors of personal information. 28 Section specifies the minimum security requirements for securing computer systems. Section contains just one line that mandates full compliance by March 1, MASS. GEN. LAWS ch. 93H, 5 (2009). 22 See id. 23 Id. 2(a). 24 Id MASS. CODE REGS (2008) MASS. CODE REGS (2009) MASS. CODE REGS Persons who own or license are defined to also include persons who receive, maintain, process or otherwise have access to personal information in connection with the provision of goods or services or in connection with employment. Id

5 SECTION Section describes the purpose and scope of the Regulations. Fundamentally, the Regulations establish minimum standards to protect personal information consistent with Chapter 93H. 29 The stated objectives for implementing the Regulations are to (1) protect the security and confidentiality of customer information consistent with industry standards, (2) protect against unanticipated threats or hazards to the security or integrity of customer information and (3) protect against unauthorized access to or use of customer information that may result in substantial harm or inconvenience to any consumer. 30 Certain elements of these objectives are not contained within the sections of the Regulations providing directives to covered persons. For example, the concepts of consistency with industry standards or inconvenience to customers do not appear elsewhere in the Regulations. Similarly, the term customer is not defined nor is it used in the latter sections of the Regulations. Instead, those sections use the term consumer, which is likewise undefined. To date, OCABR has not explained the discrepancy nor has the Massachusetts Attorney General indicated what impact, if any, the objectives will have on enforcement. The second paragraph of Section explains that the Regulations apply to all persons that own or license personal information about a resident of the Commonwealth. 31 Notably, the Regulations do not contain a geographical limitation to their application. SECTION Section contains definitions of some of the key terms used in the Regulations. The Regulations apply to any person that owns or licenses personal information of a resident of the Commonwealth. 32 Persons include natural persons, business entities and other legal entities. 33 The phrase owns or licenses means the person receives, stores, maintains, processes or otherwise has access to personal information in connection with the provision of goods or services or in connection with employment. 34 The Regulations define personal information as a Massachusetts resident s first name and last name or first initial and last name in combination with at least that resident s (1) social security number, (2) driver s license number or other state-issued identification card number, or (3) financial account number or credit or debit card number. 35 The Regulations protect personal information contained in records that are in paper or electronic form. 36 For purposes of this White Paper, we refer to persons that own or license personal information as covered persons. SECTION For individuals and businesses seeking to comply with the Regulations, the most significant responsibility is to create, monitor and maintain a comprehensive written information security program (WISP) consistent with Section Section details numerous components that must be contained in the WISP. In addition to the various requirements contained in the Regulations, the WISP must also prove consistent with personal information safeguards contained in any other relevant state or federal regulations. 38 Section starts by describing the most practical requirements for a WISP; namely, the WISP must be written and it must comprise one or more readily accessible parts. 39 The Regulations then broadly describe the types of safeguards that should be contained in the WISP. These safeguards must include administrative, technical, and physical components that ensure the security and confidentiality of records containing personal information. 40 The types of safeguards that may be appropriate vary significantly depending upon the nature of the entity and the type of personal information involved. The Regulations prescribe a four factor risk-utility assessment to evaluate the adequacy of any individual WISP s safeguards. Those factors are: (1) the size, 29 Id (1). 30 Id. 31 Id (2) MASS. CODE REGS , Id. 34 Id. 35 Id. Under the Regulations, information lawfully obtained from publicly available resources such as federal, state or local governments is not considered personal information. 36 Id. 37 Id (1). 38 Id. 39 Id. 40 Id

6 scope and type of business of the covered person; (2) the resources available to such person; (3) the quantity of stored data; and (4) the need for security and confidentiality of both consumer and employee information. 41 Within that general framework, the second paragraph of Section lists various components which every WISP must include. First, every WISP must appoint at least one employee to maintain the program. 42 In most cases, such employee or employees will be responsible to implement the WISP in the first instance, and for continued monitoring and maintenance of the program, as well as responding to security events such as breaches. Second, the WISP must include policies and procedures to identify and assess reasonably foreseeable internal and external risks to the security, confidentiality, and/or integrity of any... records containing personal information. 43 These risk assessments require the covered person to examine and, where necessary, improve the effectiveness of existing safeguards intended to limits such risks. Areas that must be monitored and improved include, at a minimum, training of employees and contractors, 44 employee compliance with the applicable security policies and Regulations, 45 and the means for detecting and avoiding system failures that could result in the unauthorized disclosure of personal information. 46 Third, in light of the risks identified in the risk assessments, covered persons must create data security policies that effectuate the WISP s administrative, technical and physical safeguards. The types of policies required by Section fall into three general types: (1) personnel policies (including employees and third-party service providers); (2) policies relative to physical access to personal information; and (3) policies and procedures for responding to breaches of security. Personnel policies should contain all components necessary to effectively protect the security of personal information. Under Section 17.03, policies applicable to employees must, at a minimum, cover the storage, access and transportation of records containing personal information outside of the business premises, 47 and must implement measures to prevent terminated employees from accessing records containing personal information. 48 Violators of the WISP must face disciplinary measures. 49 Data security policies should apply to employees, contractors or other service providers alike. In fact, under Section 17.03, covered persons are required to take reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect personal information consistent with the [R]egulations, 50 and to prospectively require that service providers contract to implement and maintain appropriate security measures. 51 The Regulations provide that where a business has entered into a multiyear contract prior to March 1, 2010, it has a grace period of two years from that date (in other words, until March 1, 2012) to make the contract comply with the third-party service provider requirements of the Regulations. 52 In addition, the WISP must contain policies on physical access to records containing personal information. Section requires that the WISP contain reasonable restrictions on physical access to records containing personal information. 53 Physical access policies should include any restrictions that may be appropriate to protect the security of personal information, but must require that records and data containing personal information are stored in locked facilities, storage areas or containers Id. 42 Id (2)(a). 43 Id (2)(b). 44 Id (2)(b)(1). 45 Id (2)(b)(2). 46 Id (2)(b)(3). 47 Id (2)(c). 48 Id (2)(e). 49 Id (2)(d). 50 Id (2)(f)(1). 51 Id (2)(f)(2). 52 Id. 53 Id (2)(g). 54 Id

7 Section further requires the WISP to include policies and procedures for responding to a breach of security. At a minimum, such policies must include (1) the covered person s plan for documenting its response to any incident that involves a breach of security, (2) mandatory post-incident review and (3) the steps taken to modify existing business practices affecting personal information. 55 Finally, Section requires covered persons to undertake a program of ongoing monitoring and maintenance. The WISP must ensure that the covered entity (1) regularly monitors compliance with the WISP in a reasonably calculated way to prevent unauthorized access to or use of the personal information and (2) updates its information safeguards when necessary to mitigate risks. 56 In addition, the Regulations require the covered entity to review the scope of its security measures (1) at least annually or (2) whenever a material change occurs in the covered person s business practices that may reasonably implicate the security or integrity of those records that contain personal information. 57 SECTION Section builds upon the framework outlined in Section and imposes obligations upon covered persons with respect to systems that store or transmit personal information, including wireless systems. 58 The Regulations delineate a lengthy list of components that must, at a minimum, and to the extent technically feasible, be included in the WISP. 59 The covered person s WISP must address (1) the use of secure user authentication protocols, 60 (2) the use of secure access control measures, 61 (3) the encryption of transmissions of personal information over networks, 62 (4) the monitoring of systems, 63 (5) the encryption of all data containing personal information stored on laptops or other personal devices, 64 (6) the firewalling and patching of operating systems for systems connected to the Internet over networks, 65 (7) the installation and updating of security agent software, 66 and (8) the education and training of workers on the proper use of computer security systems and the importance of protecting personal information. 67 Covered persons must employ secure user authentication protocols. Section 17.04(1) enumerates five elements of such protocols. They include managing user IDs and other identifiers; 68 employing reasonably secure ways of assigning and determining passwords or other similar attributive technologies, including biometrics or tokens; 69 managing passwords so that they are stored in secure locations and/or in formats that sufficiently protect the data they safeguard; 70 restricting access to only active users with active accounts; 71 and blocking access to user identification after multiple unsuccessful attempts to gain access or the limitation placed on access for the particular system. 72 In addition, covered persons must implement secure access controls. 73 Such controls must limit access to records and files that contain personal information to those users who have a legitimate reason to access such personal information in order to perform 55 Id (2)(j). 56 Id (2)(h). 57 Id (2)(i). 58 Id Id. According to the Office of Consumer Affair s Frequently Asked Questions Regarding 201 CMR 17.00, the standard of technical feasibility takes reasonableness into account Id (1). 61 Id (2). 62 Id (3). 63 Id (4). 64 Id (5). 65 Id (6). 66 Id (7). 67 Id (8). 68 Id (1)(a). 69 Id (1)(b). 70 Id (1)(c). 71 Id (1)(d). 72 Id (1)(e). We have quoted this provision exactly but believe it means the protocols should include blocking access to user authentication after (1) multiple unsuccessful attempts to gain access or (2) any attempt to circumvent the limitation placed on access for the particular system. OCABR has not yet clarified the meaning of this provision. 73 Id (2)

8 their job duties. 74 The requisite secure access controls also include assigning unique user IDs and passwords to each person with access to computer systems that are reasonably designed to maintain the integrity of the security of the access controls. 75 Such user IDs and passwords must differ from default vendor-supplied passwords. 76 The Regulations require encryption 77 of all records and files that the covered person transmits so long as they (1) contain personal information and (2) travel across public networks. 78 A covered person must encrypt any data containing personal information that he or she will transmit wirelessly. 79 The Regulations also requires the encryption of personal information stored on laptops or portable devices. 80 With respect to monitoring, the Regulations require reasonable monitoring of systems. 81 unauthorized (1) use of or (2) access to personal information. 82 This includes watching for the The Regulations also impose obligations upon covered persons to protect computer systems. The WISP must include a security system that, to the extent technically feasible, includes running system security agent software that includes (1) malware safeguards and (2) reasonably up-to-date software patches and virus definitions or legacy security agent software that has the ability to receive such patches and virus definitions. 83 Covered persons must set up the system-security software to receive regularly the most current security updates. 84 The Regulations impose additional requirements on covered persons who connect systems with files containing personal information to the Internet. These include installing reasonably up-to-date (1) firewall protection and (2) operating system security patches, both of which must be reasonably designed to maintain the integrity of the personal information. 85 Finally, Section makes covered persons responsible for educating and training employees on (1) how to use computer security systems properly and (2) the importance of securing personal information. 86 SECTION The final section requires that all covered persons be in full compliance with the Regulations on or before March 1, Data Disposal Requirements (Chapter 93I) Chapter 93I creates certain requirements for disposing of and destroying personal information, which includes biometric indicators, so that it cannot practicably be read or reconstructed. 87 The statute applies to physical records as well as electronic media. The required method of data disposal or destruction is contingent upon the media type. Persons or agencies disposing of or destroying paper records must burn, redact, pulverize or shred the records so that unauthorized persons cannot read or reconstruct the personal information. 88 Persons or agencies disposing of or destroying electronic records or other types of media 74 Id (2)(a). 75 Id (2)(b). 76 Id. 77 Chapter 93H defines encrypted as a transformation of data employing a key length of at least 128 bits, unless further defined by regulations. 201 Mass. Code Regs does not further define the key length requirements for the encryption of personal information. Instead, defines encrypted as the transformation of data into a form in which meaning cannot be assigned without the use of a confidential process or key. 78 Id (3). 79 Id. 80 Id (5). 81 Id (4). 82 Id. 83 Id (7). 84 Id. 85 Id (6). 86 Id (8). 87 MASS. GEN. LAWS ch. 93I, 2(a) (b). 88 Id. 2(a)

9 containing personal information must destroy or erase the media to accomplish the same ends. 89 In actual practice, this may require degaussing hard drives, running data scrubbing software utilities that include multi-pass writes over hard drives, physically destroying drives or backup tapes, or other similar actions. Under Chapter 93I, persons may contract with third-party vendors to destroy or dispose of their data. 90 These third-party vendors, however, must implement and monitor compliance with policies and procedures that prohibit unauthorized access to or acquisition of or use of personal information during the collection, transportation and disposal of personal information. 91 Under Chapter 93I, violations may result in civil fines amounting to $100 per affected data subject, with such fines capped at $50,000 for each instance of non-compliant disposal. 92 In addition, the Attorney General has the authority to recover penalties through a civil action. 93 Section 3 allows the Attorney General to bring an action pursuant to the Massachusetts Regulation of Business Practices for Consumers Protection 94 in the event of non-compliant disposal or destruction of records. Enforcement With respect to enforcement, Chapter 93 expressly permits individuals to bring suit to enforce its provisions, while both Chapters 93H (including the Regulations) and 93I only expressly permit enforcement by the Massachusetts Attorney General. Experts question, however, whether courts will also permit individuals to bring suit under the consumer protection provisions of Chapters 93 and 93A to remedy violations of Chapters 93H and 93I. In addition, there is always the potential for an individual consumer to bring actions (individually or as class representatives) in Massachusetts courts asserting tort claims and claims for unfair or deceptive business practices against companies whose actions or inactions caused them harm, such as in the case of a preventable security breach that results in theft of the consumer s identity. Furthermore, the Massachusetts Attorney General has consistently maintained that enforcement will not have geographic boundaries. This essentially means that if an out-of-state business has personal information of a Massachusetts resident, and there is a breach of security of that information, the business can expect to be held accountable in Massachusetts for failures to comply with applicable Massachusetts data security laws and regulations. Despite the Attorney General s clear conviction, courts may ultimately have to resolve the issue of jurisdiction in these cases. The determination generally comes down to whether an extraterritorial business has sufficiently availed itself of the resources of the Commonwealth of Massachusetts to be subject to the jurisdiction of its courts. To the extent a company does, in fact, do business in Massachusetts, it can expect to be held accountable in Massachusetts. To the extent a company has no physical connection to Massachusetts, it may escape the reach of the Massachusetts courts and its Attorney General. There are many types of business connections with a state, however, that courts have construed to be availing oneself of the resources of that state. For example, courts have concluded that selling goods and services on the worldwide web qualifies as availing oneself of worldwide jurisdiction. For this reason, businesses that are located outside of Massachusetts but whose businesses in any way touch Massachusetts (including through the virtual world) should consult with counsel to determine whether they have an obligation to comply with the Massachusetts data security laws. In all events, whether it is the Attorney General or individual consumers leading the charge, companies that are subject to the Massachusetts data security laws and regulations face substantial penalties and litigation costs following a security breach involving personal information of a Massachusetts resident. This, of course, is in addition to provable damages, which could potentially be tripled under Massachusetts consumer protection laws. For these reason, companies throughout the United States are wise to evaluate the extent to which they are subject to the Massachusetts data security laws and regulations and, if so, to begin to chart a course toward compliance. 89 Id. 2(b). 90 Id. 2(b) (flush language). 91 Id. 92 Id. 3; MASS. GEN. LAWS ch. 93A 4 (2009). 93 Id MASS. GEN. LAWS ch. 93A 4 (2009)

10 For more information, please contact your regular McDermott lawyer, or: Stephen W. Bernstein: Vanessa Gilbreth: Heather Egan Sussman: Stephen White: For more information about McDermott Will & Emery visit The material in this publication may not be reproduced, in whole or part without acknowledgement of its source and copyright. The Massachusetts Data Security Law and Regulations is intended to provide information of general interest in a summary manner and should not be construed as individual legal advice. Readers should consult with their McDermott Will & Emery lawyer or other professional counsel before acting on the information contained in this publication McDermott Will & Emery. The following legal entities are collectively referred to as "McDermott Will & Emery," "McDermott" or "the Firm": McDermott Will & Emery LLP, McDermott Will & Emery/Stanbrook LLP, McDermott Will & Emery Rechtsanwälte Steuerberater LLP, MWE Steuerberatungsgesellschaft mbh, McDermott Will & Emery Studio Legale Associato and McDermott Will & Emery UK LLP. McDermott Will & Emery has a strategic alliance with MWE China Law Offices, a separate law firm. These entities coordinate their activities through service agreements. This communication may be considered attorney advertising. Previous results are not a guarantee of future outcome

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00 Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

Massachusetts Identity Theft/ Data Security Regulations

Massachusetts Identity Theft/ Data Security Regulations Massachusetts Identity Theft/ Data Security Regulations Effective March 1, 2010 Are You Ready? SPECIAL REPORT All We Do Is Work. Workplace Law. In four time zones and 45 major locations coast to coast.

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting

More information

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA 02110 Richmond, Virginia 23219 Tel. (617) 502.8238 Tel. (804) 783.7579

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA 02110 Richmond, Virginia 23219 Tel. (617) 502.8238 Tel. (804) 783.7579 IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS Daniel J. Blake, Esq. Vijay K. Mago, Esq. LeClairRyan, A Professional Corporation LeClairRyan, A Professional Corporation One International Place, Eleventh Floor

More information

Designation of employee(s) in charge of the program; Identifying and assessing risks/threats and evaluating and improving

Designation of employee(s) in charge of the program; Identifying and assessing risks/threats and evaluating and improving PRIVACY & DATA SECURITY LAW JOURNAL MASSACHUSETTS On September 22, 2008, Massachusetts adopted regulations that will require businesses, wherever located, that own, license, store, or maintain information

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS

WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS Introduction Massachusetts regulations set forth minimum requirements for both the protection of personal information and the electronic storage or

More information

New Illinois Ethics Rules on Lawyers Reporting Up Responsibilities

New Illinois Ethics Rules on Lawyers Reporting Up Responsibilities New Illinois Ethics Rules on Lawyers Reporting Up Responsibilities August 13, 2009 Boston Brussels Chicago Düsseldorf Houston London Los Angeles Miami Milan Munich New York Orange County Rome San Diego

More information

2011 Data Breach Notifications Report

2011 Data Breach Notifications Report 2011 Data Breach Notifications Report December 2011 2011 Report on Data Breach Notifications History, Laws and Regulations On October 31, 2007, the Commonwealth s Data Security Breach Law, Mass. Gen. Law

More information

10/29/2012 CONSUMER AFFAIRS AND BUSINESS REGULATION AND DATA SECURITY LAW

10/29/2012 CONSUMER AFFAIRS AND BUSINESS REGULATION AND DATA SECURITY LAW International Association of Privacy Professionals Practical Privacy Series New York City MASSACHUSETTS OFFICE OF CONSUMER AFFAIRS AND BUSINESS REGULATION AND DATA SECURITY LAW Barbara Anthony Undersecretary

More information

Navigating the New MA Data Security Regulations

Navigating the New MA Data Security Regulations Navigating the New MA Data Security Regulations Robert A. Fisher, Esq. 2009 Foley Hoag LLP. All Rights Reserved. Presentation Title Data Security Law Chapter 93H Enacted after the TJX data breach became

More information

Massachusetts Residents

Massachusetts Residents Identity Theft & Fraud Protection for Identity Theft & Fraud Protection for Massachusetts Residents Copyright Notice November 2009 Joe Burns All rights reserved This PowerPoint presentation is a part of

More information

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY The Council s document management policy is intended to cover all documents produced and held by the

More information

Final Rule Establishes the Permanent Certification Program for EHR Technology

Final Rule Establishes the Permanent Certification Program for EHR Technology Final Rule Establishes the Permanent Certification Program for EHR Technology March 2, 2011 Boston Brussels Chicago Düsseldorf Houston London Los Angeles Miami Milan Munich New York Orange County Rome

More information

MFA Perspective. 201 CMR 17.00: The Massachusetts Privacy Law. Compliance is Mandatory... Be Thorough but Be Practical

MFA Perspective. 201 CMR 17.00: The Massachusetts Privacy Law. Compliance is Mandatory... Be Thorough but Be Practical MFA Perspective 201 CMR 17.00: The Massachusetts Privacy Law Compliance is Mandatory... Be Thorough but Be Practical DEADLINE FOR FULL COMPLIANCE HAS BEEN EXTENDED FROM JANUARY 1, 2010 TO MARCH 1, 2010

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 OBJECTIVE This Security Plan (the Plan ) is intended to create effective administrative, technical and physical safeguards for the protection

More information

Wellesley College Written Information Security Program

Wellesley College Written Information Security Program Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as

More information

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations

More information

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities Protecting Personal Information A Business Guide Division of Finance and Corporate Securities Oregon Identity Theft Protection Act Collecting, keeping, and sharing personal data is essential to all types

More information

Page 1. Copyright 2009. MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved.

Page 1. Copyright 2009. MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved. Page 1 Page 2 Page 3 Agenda Defining the Massachusetts Personal Data Security Law Becoming Compliant Page 4 Massachusetts Privacy Law Defining the Massachusetts Personal Data Security Law - 201 CMR 17.00

More information

SECTION-BY-SECTION ANALYSIS

SECTION-BY-SECTION ANALYSIS INTRODUCED BY CONGRESSMAN RANDY NEUGEBAUER (R-TX) AND CONGRESSMAN JOHN CARNEY (D-DE) SECTION-BY-SECTION ANALYSIS Section 1: Short Title The Data Security Act of 2015. Section 2: Purposes The purposes of

More information

COMMONWEALTH OF MASSACHUSETTS. ASSURANCE OF DISCONTINUANCE PURSUANT TO M.GX. c. 93A, S 5 I. INTRODUCTION

COMMONWEALTH OF MASSACHUSETTS. ASSURANCE OF DISCONTINUANCE PURSUANT TO M.GX. c. 93A, S 5 I. INTRODUCTION COMMONWEALTH OF MASSACHUSETTS SUFFOLK, ss. SUPERIOR COURT CIVIL ACTION NO. 14-3832 COMMONWEALTH OF MASSACHUSETTS, Plaintiff, n, ^ I v. - 8 2014 TD BANK, NA., Defendant. M'GKAcl JOS&FH 30N0VAN CLERK/^y;

More information

2015 -- S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

2015 -- S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D 0 -- S 01 SUBSTITUTE B LC000/SUB B/ S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 0 A N A C T RELATING TO CRIMINAL OFFENSES - IDENTITY THEFT PROTECTION Introduced By: Senators

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business

White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business April 10, 2012 Boston Brussels Chicago Düsseldorf Houston London Los Angeles Miami Milan Munich New York Orange

More information

2005 -- H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.

2005 -- H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 00 -- H 11 SUBSTITUTE A AS AMENDED LC0/SUB A/ STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 00 A N A C T RELATING TO IDENTITY THEFT PROTECTION Introduced By: Representatives Gemma, Sullivan,

More information

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS

Shipman & Goodwin LLP. HIPAA Alert STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS Shipman & Goodwin LLP HIPAA Alert March 2009 STIMULUS PACKAGE SIGNIFICANTLY EXPANDS HIPAA REQUIREMENTS The economic stimulus package, officially named the American Recovery and Reinvestment Act of 2009

More information

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Healthcare Compliance: How HiTECH May Affect Relationships with Business Associates Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Legal Disclaimer This information

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

Health IT: Practical Considerations for the Acquisition and Implementation of Electronic Data Warehouses

Health IT: Practical Considerations for the Acquisition and Implementation of Electronic Data Warehouses Health IT: Practical Considerations for the Acquisition and Implementation of Electronic Data Warehouses November 11, 2014 www.mwe.com Boston Brussels Chicago Düsseldorf Frankfurt Houston London Los Angeles

More information

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues Doing Business in Oregon Under the Oregon Consumer Identity Theft Protection Act and Related Privacy Risks Privacy Data Loss www.breachblog.com Presented by: Mike Porter March 10, 2009 2 Privacy Data Loss

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,

More information

SAMPLE BUSINESS ASSOCIATE AGREEMENT

SAMPLE BUSINESS ASSOCIATE AGREEMENT SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT

More information

BUSINESS ASSOCIATE AGREEMENT ( BAA )

BUSINESS ASSOCIATE AGREEMENT ( BAA ) BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

Groundbreaking Legislation on Property Tax and Sales Tax Exemptions for Illinois Hospitals

Groundbreaking Legislation on Property Tax and Sales Tax Exemptions for Illinois Hospitals Groundbreaking Legislation on Property Tax and Sales Tax Exemptions for Illinois Hospitals June 14, 2012 Boston Brussels Chicago Düsseldorf Frankfurt Houston London Los Angeles Miami Milan Munich New York

More information

M E M O R A N D U M. Definitions

M E M O R A N D U M. Definitions M E M O R A N D U M DATE: November 10, 2011 TO: FROM: RE: Krevolin & Horst, LLC HIPAA Obligations of Business Associates In connection with the launch of your hosted application service focused on practice

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT The parties to this ( Agreement ) are, a _New York_ corporation ( Business Associate ) and ( Client ) you, as a user of our on-line health record system (the "System"). BY

More information

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection

More information

FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT

FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is made and entered into to be effective as of, 20 (the Effective Date ), by and between ( Covered Entity ) and

More information

KRS Chapter 61. Personal Information Security and Breach Investigations

KRS Chapter 61. Personal Information Security and Breach Investigations KRS Chapter 61 Personal Information Security and Breach Investigations.931 Definitions for KRS 61.931 to 61.934. (Effective January 1, 2015).932 Personal information security and breach investigation procedures

More information

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

BUSINESS ASSOCIATE AGREEMENT TERMS

BUSINESS ASSOCIATE AGREEMENT TERMS BUSINESS ASSOCIATE AGREEMENT TERMS This Addendum ( Addendum ) is incorporated into and made part of the Agreement between SIGNATURE HEALTHCARE CORPORATION ("Covered Entity ) and ( Business Associate"),

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

A Practical Guide to Understanding and Complying with Massachusetts Data Security Regulations. February 2010

A Practical Guide to Understanding and Complying with Massachusetts Data Security Regulations. February 2010 A Practical Guide to Understanding and Complying with Massachusetts Data Security Regulations February 2010 Table of Contents Background... 1 Are You Required to Comply?... 1 What You Need to Do...2 Reference

More information

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information

Terms and Conditions Relating to Protected Health Information ( City PHI Terms ) Revised and Effective as of September 23, 2013

Terms and Conditions Relating to Protected Health Information ( City PHI Terms ) Revised and Effective as of September 23, 2013 Terms and Conditions Relating to Protected Health Information ( City PHI Terms ) Revised and Effective as of September 23, 2013 The City of Philadelphia is a Covered Entity as defined in the regulations

More information

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (this Agreement ), effective as of May 1, 2014 (the Effective Date ), by and between ( Covered Entity ) and Orchard Software Corporation,

More information

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN Stewart C. Miller & Co., Inc. (Business Associate) AND City of West Lafayette Flexible Spending Plan (Covered Entity) TABLE OF CONTENTS

More information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT Note: This form is not meant to encompass all the various ways in which any particular facility may use health information and should be specifically tailored to your organization. In addition, as with

More information

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act International Life Sciences Arbitration Health Industry Alert If you have questions or would like additional information on the material covered in this Alert, please contact the author: Brad M. Rostolsky

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

On-Site Medical Clinic Guidelines

On-Site Medical Clinic Guidelines On-Site Medical Clinic Guidelines Amy Gordon, Partner Daniel Gottlieb, Partner Dale Van Demark, Partner July 24, 2013 www.mwe.com Boston Brussels Chicago Düsseldorf Frankfurt Houston London Los Angeles

More information

Regulatory Update: HITECH s HHS and FTC Security Breach Notification Requirements

Regulatory Update: HITECH s HHS and FTC Security Breach Notification Requirements Regulatory Update: HITECH s HHS and FTC Security Breach Notification Requirements August 27, 2009 Boston Brussels Chicago Düsseldorf Houston London Los Angeles Miami Milan Munich New York Orange County

More information

Massachusetts MA 201 CMR 17.00. Best Practice Guidance on How to Comply

Massachusetts MA 201 CMR 17.00. Best Practice Guidance on How to Comply Massachusetts MA 201 CMR 17.00 Best Practice Guidance on How to Comply Massachusetts MA 201 CMR 17.00 Best Practices for Compliance 1 Overview MA 201 CMR 17.00 has been in the news for the last 18 months.

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

COUNCIL POLICY NO. C-13

COUNCIL POLICY NO. C-13 COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative

More information

China IT Law and Practice

China IT Law and Practice China IT Law and Practice Henry Chen MWE China Law Offices Licensed in the PRC and the New York State of the U.S. Commissioner of the Economic Committee of All China Lawyers' Association Secretary-General

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...

More information

BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information

BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information I. PREAMBLE ( Covered Entity ) and ( Business Associate ) (jointly the Parties ) wish to enter into an Agreement to comply with the requirements

More information

UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S):

UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S): UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S): THIS AGREEMENT is made by and between UNIVERSITY PHYSICIANS OF BROOKLYN, INC., located at 450 Clarkson Ave., Brooklyn,

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement This Business Associate Agreement (the Agreement ) is made by and between Business Associate, [Name of Business Associate], and Covered Entity, The Connecticut Center for Health,

More information

Latham & Watkins Health Care Practice

Latham & Watkins Health Care Practice Number 928 September 9, 2009 Client Alert Latham & Watkins Health Care Practice Violation of this rule will be treated by the FTC as an unfair or deceptive act in violation of the Federal Trade Commission

More information

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers

HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Compliance Tip Sheet National Hospice and Palliative Care Organization www.nhpco.org/regulatory HHS Issues New HITECH/HIPAA Rule: Implications for Hospice Providers Hospice Provider Compliance To Do List

More information

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of 1999. [Acts 1999, ch. 201, 2.

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of 1999. [Acts 1999, ch. 201, 2. http://www.michie.com/tennessee/lpext.dll/tncode/12ebe/13cdb/1402c/1402e?f=templates&... Page 1 of 1 47-18-2101. Short title. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

CMS Seeks Improved Quality of Care, Patient Engagement Through Stage 2 Meaningful Use Criteria

CMS Seeks Improved Quality of Care, Patient Engagement Through Stage 2 Meaningful Use Criteria September 12, 2012 CMS Seeks Improved Quality of Care, Patient Engagement Through Stage 2 Meaningful Use Criteria The Centers for Medicare & Medicaid Services (CMS) published on September 4, 2012, a final

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS

More information

Privacy Legislation and Industry Security Standards

Privacy Legislation and Industry Security Standards Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,

More information

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American

More information

HIPAA Business Associate Addendum

HIPAA Business Associate Addendum HIPAA Business Associate Addendum THIS HIPAA BUSINESS ASSOCIATE ADDENDUM (this Addendum ) is by and between ( Covered Entity ) and TALKSOFT CORPORATION ( Business Associate ) (hereinafter, Covered Entity

More information

what your business needs to do about the new HIPAA rules

what your business needs to do about the new HIPAA rules what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or

More information

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the

More information

Responding to New Identity Theft Laws

Responding to New Identity Theft Laws Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BA Agreement ) is entered into by Medtep Inc., a Delaware corporation ( Business Associate ) and the covered entity ( Covered Entity

More information

Model Business Associate Agreement

Model Business Associate Agreement Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model

More information

Breach Notification Policy

Breach Notification Policy 1. Breach Notification Team. Breach Notification Policy Ferris State University ( Ferris State ), a hybrid entity with health care components, has established a Breach Notification Team, which consists

More information

HIPAA and Privacy Policy Training

HIPAA and Privacy Policy Training HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training

More information

Articles. Three Large States Revise Their Security Breach Notification Laws and Texas Applies Its Law to Residents of Some Other States to Boot

Articles. Three Large States Revise Their Security Breach Notification Laws and Texas Applies Its Law to Residents of Some Other States to Boot Three Large States Revise Their Security Breach Notification Laws and Texas Applies Its Law to Residents of Some Other States to Boot Jeff Dodd IP and Technology Developments - October 2011 October 25,

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT COLUMBIA AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is entered into as of ( Effective Date ) by and between The Trustees of Columbia University in the City of

More information

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the

More information

Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments

Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments Jill Moore UNC Institute of Government April 2007 In 2005, the N.C. General Assembly passed

More information