Vendor Management Challenge Doing More with Less



Similar documents
Implementation Business Associates and Breach Notification

Business Associate Agreement (BAA) Guidance

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

White Paper on Financial Institution Vendor Management

THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS

STANDARD ADMINISTRATIVE PROCEDURE

Surviving a HIPAA violation One Agency s Experience Presented by: Roger Shindell. Topics Covered Part One. Topics Covered Part Two.

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Am I a Business Associate?

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS

Evolving Issues for Healthcare IT Contracting

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

Isaac Willett April 5, 2011

BUSINESS ASSOCIATE ADDENDUM

GUIDANCE FOR MANAGING THIRD-PARTY RISK

Business Associate Agreement

Third Party Risk Management 12 April 2012

Network Security & Privacy Landscape

BUSINESS ASSOCIATE AGREEMENT

Sample Business Associate Agreement Provisions

Discussion on Network Security & Privacy Liability Exposures and Insurance

BUSINESS ASSOCIATE AGREEMENT

Health information privacy and security. Norton Rose Fulbright US LLP October 6, 2015

Outsourcing Technology Services A Management Decision

MMA SAMPLE FORM *REVIEW CAREFULLY & ADAPT TO YOUR PRACTICE*

UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S):

Data Breach and Senior Living Communities May 29, 2015

HIPAA BUSINESS ASSOCIATE AGREEMENT

Vendor Management Panel Discussion. Managing 3 rd Party Risk

It s a New Regulatory Landscape: Do You Know Where Your Business Associates are and What They are Doing?

Business Associates, HITECH & the Omnibus HIPAA Final Rule

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

BUSINESS ASSOCIATE AGREEMENT. Recitals

HIPAA Privacy Rule Policies

Cloud Computing: Legal Risks and Best Practices

Disclaimer: Template Business Associate Agreement (45 C.F.R )

SAMPLE BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

Roadmap. What is Big Data? Big Data for Educational Institutions 5/30/2014. A Framework for Addressing Privacy Compliance and Legal Considerations

Personal Information Protection Act Information Sheet 11

BUSINESS ASSOCIATE AND DATA USE AGREEMENT NAME OF COVERED ENTITY: COVERED ENTITY FEIN/TAX ID: COVERED ENTITY ADDRESS:

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v , rev

BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc.

OFFSHORE OUTSOURCING IN HEALTH CARE: PRIVACY AND SECURITY CONCERNS

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND

HIPAA BUSINESS ASSOCIATE AGREEMENT

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

BUSINESS ASSOCIATE AGREEMENT

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA Business Associate Contract. Definitions

CFPB Readiness Series: Compliant Vendor Management Overview

BUSINESS ASSOCIATE AGREEMENT

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT

Violation Become a Privacy Breach? Agenda

BUSINESS ASSOCIATE AGREEMENT

Protecting Privacy & Security in the Health Care Setting

Preparing for the HITECH September Deadline: Tips for Negotiating Effective Business Associate Agreements under HIPAA.

Vendor Security Risk Management

Appendix : Business Associate Agreement

CORL Dodging Breaches from Dodgy Vendors

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

Procedure for Managing a Privacy Breach

Risk Management of Outsourced Technology Services. November 28, 2000

Health Plan Select, Inc. Business Associate Privacy Addendum To The Service Agreement

A s a covered entity or business associate, you have

BUSINESS ASSOCIATE AGREEMENT

Third-Party Vendor Compliance Programs: The Value, the Need, the Risk

Negotiating EHR Acquisition Contracts

Credit Union Liability with Third-Party Processors

PCL2\ \1 CYBER RISKS: RISK MANAGEMENT STRATEGIES

BUSINESS ASSOCIATE AGREEMENT FOR ATTORNEYS

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

Note to Users: Page 1 of 5

A Privacy and Data Security Checklist for All

HIPAA and Privacy Policy Training

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist.

Managing General Agents (MGAs) Guideline

Professional Solutions Insurance Company. Business Associate Agreement re HIPAA Rules

Our Commitment to Information Security

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES

Third Party Relationships

BUSINESS ASSOCIATE AGREEMENT

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Personally Identifiable Information (PII), Protected Health Information (PHI), and Federal Information Requirements

Business Associate Agreement

Sustainable HIPAA Compliance: Protecting Patient Privacy through Highly Leveraged Investments

FirstCarolinaCare Insurance Company Business Associate Agreement

Model Business Associate Agreement

Statement of Guidance: Outsourcing All Regulated Entities

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

SaaS. Business Associate Agreement

HIPAA (The Health Insurance Portability and Accountability Act)

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

Transcription:

Vendor Management Challenge Doing More with Less Megan Hertzler Assistant General Counsel Director of Data Privacy Xcel Energy Boris Segalis Partner InfoLawGroup LLP Session ID: GRC-402 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification: Intermediate

Why You Should Care: From the Trenches Let s talk personal information What are the real-world consequences of failure to address data privacy and security in the contracting process? Time - Distractions for highly skilled human resources that could be spending time adding value to the business Money - Overtime, consultants, counsel, breach notice costs; often unrecoverable Embarrassment, Reputation, Morale, Investigations = Money! Real-world examples of failed process No data protection due diligence at the outset Agreement with vendor did not address data security terms beyond general obligation of confidentiality Any guess what happened next? 2

Why You Should Care: Example A Employee information stolen from vendor s unencrypted laptop Vendor informs customer concurrently with sending notice of the breach to customer s employees Customer does not have time to: Prepare internal call center FAQs Draft employee communications Ascertain responsibilities under the law Ensure vendor communication to employees is compliant

Why You Should Care: Example B Upgrade results in exposure of SSNs Delay notifying customer for a month Short window between telling customer and providing notice to customer s employees Customer placed under time crunch and has no leverage in the notification process 4

Learning Objectives Enhance awareness of legal and business requirements Identify business challenges for front line negotiation team Develop vendor management tools for front line personnel Implement effective compliance oversight

Outsourcing Benefits & Challenges Benefits Reduced cost Better technology Competitive advantage Challenges Privacy and data security Negotiation team knowledge Delay Increased costs Costly surprises

Vendor Management Solution Roadmap Understand obligations and consequences of inaction Make privacy and security integral part of selection process Classify data based on risk Develop contracting tools and options for frontline personnel Provide training and awareness Share compliance burden

View From Space: What s Our Goal? Select vendors that take privacy and security seriously Engage and empower company resources to make informed judgment calls Be flexible in privacy and security requirements Help vendors avoid and mitigate privacy and information security issues by providing guidance

Legal Requirements Vendor Oversight State information security laws Federal (GLB, FCRA Red Flags, HIPAA) Foreign (EU Directive and local laws) Derivative Liability Pending federal legislation State breach laws HIPAA Foreign (EU Directive and local laws)

Contracting Lifecycle Integrate privacy and security into the process Documented in a single resource: Playbook Program must address all stages of the lifecycle Data Classification Project Initiation RFP Negotiation Oversight

Vendor Management Tools Data Classification More Sensitive Less Sensitive PHI NPI Payment card data Consumer report data Breach data EU sensitive data Other data business deems sensitive Everything else that identifies an individual or device

Vendor Management Tools Project Initiation Project initiation survey answers threshold questions IT and Legal use judgment to evaluate responses and determine path forward Is Personal Information involved? Will vendors have access to the data? Is it an existing relationship? Sensitivity of data, type of data subjects Type of disclosure and its purpose Volume of disclosure & associated risk Initial assessment of risk issue spotting Cross-border data transfer issues

Vendor Management Tools Project Initiation Question Response Next Steps Where are the Check all that apply: Determine individuals to whether Agent U.S. whom the must establish a information EU/EEA/Switz legal basis for pertains located? cross-border Others (List): transfer of Personal Information

Vendor Management Tools Project Initiation Question Response Next Steps To how many 1-999 Determine individual records whether to 1,000-9,999 will service require Agent to providers have 10,000-99,999 obtain access? information 100,000-499,999 security incident 500,000 or more insurance coverage

Vendor Management Tools Project Initiation Question Response Next Steps Will third parties Yes Because of reidentification have access to No Personal concerns, Information that TBD access to has been anonymized or If Yes, describe aggregated data anonymized or data: still requires, aggregated? Data Protection Assessment Questionnaire

Vendor Management Tools Vendor Assessment IT and Legal are key stakeholders in building an assessment tool Focus on processing information, not just on gathering it Include with RFP (existing vendors complete for new projects) Ability to safeguard data becomes evaluation criteria For single-source, assessment is the basis of due diligence and follow-up IT leads evaluation with help from Legal Judgment, not scoring

Vendor Management Tools Vendor Assessment Question Response CRI CI Evaluation Will service provider access, collect, store, use, disclose or otherwise process Personal Data in aggregated or deidentified format? Yes No If yes, describe aggregation method Verify information will not be used other than for the benefit of customer and that information cannot be reidentified. Same as CRI Acceptable Not Acceptable Additional Due Diligence Required

Vendor Management Tools Vendor Assessment Question Response CRI CI Evaluation Does service provider regularly test and monitor key administrative, technical and physical controls, systems and procedures that safeguard Personal Data? Yes No If yes, how often is testing performed? Required; evaluate the response in light of heightened risks associated with processing CRI Required; evaluate the response in light of lower risks associated with processing CI Acceptable Not Acceptable Additional Due Diligence Required

Vendor Management Tools Vendor Assessment Assessment based on information gathered and business judgment Security / privacy must be balanced against business interests Zero-tolerance approach is insufficient and implacable After assessing, engagement is key Work with vendors to meet requirements Automate evaluation mechanics, not the thought process

Vendor Management Tools Negotiation Key negotiation points Sensitive data vs. less sensitive data Information security incident definition Scope of legal privacy/data security obligations Sub-contractor oversight requirements Information security incident reporting requirements Record-keeping requirements

Vendor Management Tools Negotiation FAQs empower front-line personnel respond to questions

Vendor Management Tools Negotiation Pre-determined negotiating positions provide negotiating flexibility Default Provision Objections Response Fallback Provision 1.4 Industry Standards means industry standards and best practices relating to the privacy, confidentiality or security of Personal Data Definition is too broad and does not provide sufficient specific guidance Compliance with industry standards often is a potential minimum benchmark (regulatory compliance, common law negligence, reasonable) 1.4 Industry Standards means [the ISO 27001/27002]

Vendor Management Tools Negotiation (con t) Default Provision Objections Response Fallback Provision 2.6.1 Notify Company within 48 hours of any reasonably suspected Information Security Incident We need more time to confirm whether an Incident actually occurred Must inform ASAP as soon as vendor reasonably suspects an incident has occured No fallback

Vendor Management Tools Oversight Oversight is an integral part of a vendor management program Should be a collaborative process, designed to help vendors meet your requirements Recommended privacy/security controls Focus on prevention Risk assessment process Cooperate if something goes wrong Incident investigation process Breach notification process

From the Trenches: A Brighter Future Goal: data protection concerns are raised early in the contracting process Benefits of early action: Vendor refuses contractual protections for SSNs; determined that vendor did not need access to SSNs and worked on replacing vendor for future projects Customer avoids engaging vendor that was unable to identify/commit to countries where data would be processed, contrary to customer s data protection requirements

From the Trenches: What if? Why You Should Care: Example A Employee information stolen from vendor s unencrypted laptop Vendor informs customer concurrently with sending notice of the breach to customer s employees Why You Should Care: Example B Upgrade results in exposure of SSNs Delay notifying customer for a month Short window between telling customer and providing notice to customer s employees Customer placed under time crunch and has no leverage in the notification process 4 Customer does not have time to: Prepare internal call center FAQs Draft employee communications Ascertain responsibilities under the law Ensure vendor communication to employees is compliant Different vendors Early notice for impacted individuals Customer would have been the decision maker Response strategy Notice Legal obligations Indemnification for legal cost

Apply Program Within 3 months evaluate existing vendor management program Identify vendors that have access to PI Review contracts Engage senior management Follow up with vendors Within 6 months prepare key vendor management tools Project assessment questionnaire Vendor assessment/annual reporting questionnaire Get assistance with contractual terms

Questions? Megan J. Hertzler Assistant General Counsel & Director of Data Privacy Xcel Energy Megan.hertzler@xcelenergy.com 612.215.4589 Boris Segalis Partner InfoLawGroup LLP Bsegalis@infolawgroup.com 646.389.1289