Prepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014



Similar documents
Cyber Risk Checklist: Compliance with Legal Obligations Grand Rapids Cyber Security Conference April 23, 2014

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

1/23/2015. MSBO Technology Committee January 22, Examples of Online Educational Services

H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.

Key Considerations for Information Technology Governance. 900 Monroe NW Grand Rapids, MI (616)

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

Breach Notification Policy

Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments

New Privacy Laws Impacting the Health Care Work Place

Navigating the New MA Data Security Regulations

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

January An Overview of U.S. Security Breach Statutes

STANDARD ADMINISTRATIVE PROCEDURE

Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.

Indiana Social Security Number Disclosure and Security Breach Legislation

Disclaimer: Template Business Associate Agreement (45 C.F.R )

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

Healthcare Practice. Breach Notification Requirements Under HIPAA/HITECH Act and Oregon Consumer Identity Theft Protection Act. Oregon.

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

HHS Issues Breach Reporting Regulations under the HITECH Act Executive Summary

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

Data Breach and Senior Living Communities May 29, 2015

Community First Health Plans Breach Notification for Unsecured PHI

SENATE FILE NO. SF0065. Sponsored by: Senator(s) Johnson and Case A BILL. for. AN ACT relating to consumer protection; providing for

COMPLIANCE ALERT 10-12

Table of Contents. Acknowledgement

HIPAA and Privacy Policy Training

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

CYBER SECURITY A L E G A L P E R S P E C T I V E

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

Privacy Law Basics and Best Practices

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

Getting Hip to the HIPAA and HITECH Act Compliance

IDENTIFYING AND RESPONDING TO DATA BREACHES

PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN Telephone: (952) Facsimile: (952)

Special Report The HITECH Act

HIPAA Business Associate Addendum

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate

10/29/2012 CONSUMER AFFAIRS AND BUSINESS REGULATION AND DATA SECURITY LAW

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act

The ReHabilitation Center Buffalo Street. Olean. NY

Healthcare Practice. HIPAA/HITECH Act vs. the Washington Data Breach Notification Act. November 2009

FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Infinedi HIPAA Business Associate Agreement RECITALS SAMPLE

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Grand Rapids Medical Education Partners Mercy Health Saint Mary s Spectrum Health. Pam Jager, GRMEP Director of Education & Development

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

SAMPLE BUSINESS ASSOCIATE AGREEMENT

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist.

HIPAA BREACH NOTIFICATION REQUIREMENTS. Heman A. Marshall, III July 25, 2014

Healthcare Practice. HIPAA/HITECH Act vs. Oregon Consumer Identity Theft Protection Act. February 2010

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Security Breach Notification Laws. Data Privacy Survey 2014

The Legal Pitfalls of Failing to Develop Secure Cloud Services

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

HIPAA BUSINESS ASSOCIATE AGREEMENT

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA Richmond, Virginia Tel. (617) Tel. (804)

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of [Acts 1999, ch. 201, 2.

HIPAA Breach Notification Policy

HIPPA and HITECH NOTIFICATION Effective Date: September 23, 2013

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

Overview of the HIPAA Security Rule

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

REPRODUCTIVE ASSOCIATES OF DELAWARE (RAD) NOTICE OF PRIVACY PRACTICES PLEASE REVIEW IT CAREFULLY.

Clients Legal Needs in HIPAA Security Compliance

Sample Business Associate Agreement Provisions

Why Lawyers? Why Now?

Comparison of US State and Federal Security Breach Notification Laws. Current through August 26, 2015

BUSINESS ASSOCIATE AGREEMENT

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

M E M O R A N D U M. Definitions

Responding to New Identity Theft Laws

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

plantemoran.com What School Personnel Administrators Need to know

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH)

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

BUSINESS ASSOCIATE AGREEMENT

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Personal Information Protection Policy

UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S):

Transcription:

Prepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014 2014, Mika Meyers Beckett & Jones PLC All Rights Reserved Presented by: Jennifer A. Puplava Mika Meyers Beckett & Jones PLC 900 Monroe Avenue NW Grand Rapids, MI 49503 (616) 632-8000 jpuplava@mmbjlaw.com www.mmbjlaw.com

Are You at Risk of a Cybersecurity Breach? Do you: Have a website or a mobile application? Own, collect, store, or process sensitive data? Use smartphones, email, social media, cloud based services or laptops? You are at risk of cybersecurity breach!

You Need a Cybersecurity Program! Do you have in place security policies and procedures reasonably designed to protect your system and sensitive data? Reasonable security-protecting procedures will help minimize risk of liability to third parties and regulatory penalties. A cybersecurity program should address what to do in the event of a breach. The key to handling a security incident well is to prepare for it.

What if I Don t Want to Spend the Money on a Cybersecurity Program? It is far more expensive to deal with a breach than it is to take steps to put a cybersecurity program in place. Must respond to a breach. Could lose profits through disruption in operations. Could be subject to civil or regulatory action relating to the breach.

Potential Liability for Security Breaches Examples of Some Private Rights of Action. Negligence. Breach of contract. Breach of fiduciary duty. Invasion of privacy. Conversion. Unjust enrichment. Class actions. Waste of corporate assets. Abuse of control. Shareholder derivative suits.

Potential Liability for Security Breaches Examples of Regulatory Action. FTC enforcement actions due to inadequate data privacy and security measures. HHS enforcement actions against entities covered by HIPAA who fail to comply with privacy and security rules. Security and Exchange Commission can take action for failure to fully or timely disclose a material data breach. State enforcement actions can overlap with federal enforcement actions relating to the same security breach.

No! Will a Cybersecurity Program Completely Insulate Me from a Breach? STILL at risk of breach! No security program is invincible.

What Do I Do if There Has Been a Breach? If you have a cybersecurity program in place, look there first for guidance. Stop continuing breaches by calling in a tech expert if necessary. Assess the extent of the breach by beginning an investigation immediately. Promptly coordinate a response to the breach.

Response to a Breach Identify regulatory requirements affecting your response to the breach. Release of some sensitive information may trigger notice obligations. State law, depending on residency of affected parties. Federal law, depending on whether information is regulated (e.g., HIPAA). Most states disclosure obligations are triggered when a company knows or reasonably believes that personal information was acquired by unauthorized third parties. Disclosures are to be made without unreasonable delay.

Michigan Data Breach Notification Law Notice of breach must be given to a Michigan resident if (i) that resident s unredacted and unencrypted Personal Information was accessed by an unauthorized person, or (ii) the resident s Personal Information was accessed in encrypted form by a person with unauthorized access to the encryption key. No notification required if the company determines that the breach has not or is not likely to cause substantial loss or injury to, or result in identity theft.

Michigan Data Breach Notification Law Breach = the unauthorized access and acquisition of data that compromises the security or confidentiality of Personal Information maintained by a covered entity as part of a database of Personal Information regarding multiple individuals. In determining whether a breach has occurred, the covered entity must act with the care an ordinarily prudent entity in a similar position would exercise under similar circumstances.

Michigan Data Breach Notification Law Personal Information = first name or first initial and last name linked to one or more of the following regarding a Michigan resident SSN. Driver s License or Michigan ID card number. Financial account number, or credit/debit card number in connection with any required code that would permit access to the resident s financial accounts. Entities covered by this law ( covered entity ) = any individual, partnership, corporation, LLC, association, or other legal entity, or any department, board, commission, office, agency, authority, or other unit of state government of Michigan that owns or licenses data including personal information of a Michigan resident.

Michigan Data Breach Notification Law The statute provides directives regarding The method of notice required. The content of the notice. The timing of notification (generally, without unreasonable delay). Whether notice must be provided to consumer reporting agencies. Whether notice requirements under another statute (e.g., HIPAA) replace the state requirements.

Michigan Data Breach Notification Law Methods of notice Written notice to recipient s postal address. Electronic notice if (i) the recipient has consented to receive electronic notice; (ii) the covered entity has an existing business relationship with the recipient that includes periodic electronic communications such that the covered entity reasonably believes that it has the recipient s current email address; or (iii) the covered entity conducts its business primarily through internet account transactions or on the internet.

Michigan Data Breach Notification Law Methods of notice Telephonic notice if (i) the notice is not given by use of a recorded message; (ii) the recipient has consented to receive notice by telephone, or if the covered entity also provides notice by the above methods if the notice by telephone does not result in a live conversation between the covered entity and the recipient within 3 business days after the initial attempt to provide telephonic notice.

Michigan Data Breach Notification Law Substitute method of notice If the covered entity demonstrates that the cost of providing notice would exceed $250,000 or that notice would have to be provided to more than 500,000 Michigan residents Email notice if the covered entity has email addresses for the recipients; Conspicuous posting on the covered entity s website; and Notification to major statewide media, which must include a telephone number or website address a person may use to obtain additional information.

Michigan Data Breach Notification Law Content of notice Written in a clear and conspicuous manner. Describe the breach in general terms. Describe the type of personal information that is the subject of the unauthorized access or use. Generally describe what the covered entity has done to protect data from further security breaches Include a phone number where the recipient can obtain assistance or additional information. Remind recipients of the need to remain vigilant for incidents of fraud and identity theft.

Michigan Data Breach Notification Law Notice of a security breach that has not occurred that is given with intent to defraud is a misdemeanor punishable by up to 30 days imprisonment and $250 per violation. Covered entities which fail to provide notice may be ordered to pay a cure fine of up to $250 for each failure, not to exceed $750,000 per security breach. These penalties do not affect the availability of civil remedies under state or federal law.

Tread Carefully in Communications Comply with legal disclosure obligations. Avoid waiving privilege of confidential communications. Manage litigation risks. Develop a communications strategy. Internal, to stakeholders, employees, etc. Public, including press releases and notices to customers.

Third Party Involvement in Data Breach Response Evaluate which third parties to bring in to assist. Forensic investigator. Law enforcement. Insurance agent (to see whether breach is covered). Public relations team. Legal counsel.

Questions? Jennifer Puplava jpuplava@mmbjlaw.com (616) 632-8050 Disclaimer: This presentation is to assist in a general understanding of some of the legal issues involved, and is not intended as legal advice. Persons with particular questions should seek the advice of counsel.