Integrated Incident Management process v3 1



Similar documents
TORONTO CENTRAL LHIN COMMUNITY BUSINESS INTELLIGENCE PROJECT PRIVACY INCIDENT AND BREACH MANAGEMENT POLICY Policy No. 2

Common Privacy Framework CCIM Assessment Projects

Privacy Incident and Breach Management Policy

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER

Mohawk DI-r: Privacy Breach Management Procedure Version 2.0. April 2011

PRIVACY BREACH POLICY

Personal Information Protection Act Information Sheet 11

Montana Tech Escalation Procedures for. Security Incidents

Data Security Breach. How to Respond

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Health Care Provider Guide

Procedure for Managing a Privacy Breach

CONTENTS. Introduction Page 2. Scope.Page 2. Policy Statements Pages 2-3. Major IT Security Incidents Defined... Page 3

Encrypting Personal Health Information on Mobile Devices

Guidance on data security breach management

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

Personal Health Information Privacy Policy

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:

Guidance on data security breach management

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

Oakland Family Services - Was Your Hacked?

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

Data Security Breach Management - A Guide

PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING

Privacy Breach Protocol

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

Miami University. Payment Card Data Security Policy

Privacy and Security Incident Management Protocol

Data Security Incident Response Plan. [Insert Organization Name]

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

R345, Information Technology Resource Security 1

PRIVACY BREACH! WHAT NEXT?

IT Security Incident Management Policies and Practices

Information Security Incident Protocol

Computer Security Incident Reporting and Response Policy

INFORMATION SECURITY INCIDENT REPORTING POLICY

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Overview of Presentation

20. Exercise: CERT participation in incident handling related to Article 4 obligations

Data Breach Response Plan. 5/10/2015 RMS Hospitality Solutions Technical Services

Issue #5 July 9, 2015

Protection of Privacy

DBC 999 Incident Reporting Procedure

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Data Breach Management Policy and Procedures for Education and Training Boards

Brian Beamish. Commissioner (Acting) Ontario Information and Privacy Commission. Cyber Risk National Conference February 9, 2015

Cyber Risk in Healthcare AOHC, 3 June 2015

Follow the trainer s instructions and explanations to complete the planned tasks.

Data Breach and Senior Living Communities May 29, 2015

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE

Encryption Security Standard

HIPAA Breach Notification Policy

Ann Cavoukian, Ph.D.

Student Visa - confidentiality and Reporting Requirements

Information Security Incident Reporting & Investigation

NEXT REVIEW MAY 01, 2017

New River Community College. Information Technology Policy and Procedure Manual

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Helpful Tips. Privacy Breach Guidelines. September 2010

DUUS Information Technology (IT) Incident Management Standard

PRIVACY BREACH MANAGEMENT POLICY

ACE Advantage PRIVACY & NETWORK SECURITY

Student Data Breaches: Is Your District Prepared?

2016 OCR AUDIT E-BOOK

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014

Access & Correction Policy

Security Incident Procedures Response and Reporting Policy

Implementation Business Associates and Breach Notification

TABLE OF CONTENTS. University of Northern Colorado

Administrative Procedures Memorandum A1452

Incident Response Plan for PCI-DSS Compliance

Policy #: HEN-005 Effective Date: April 4, 2012 Program: Hawai i HIE Revision Date: July 17, 2013 Approved By: Hawai i HIE Board of Directors

Presented by Dave Olsen, CPA, President

INFORMATION AND PRIVACY COMMISSIONER OF ALBERTA

Beazley presentation master

Standard: Information Security Incident Management

DISCLOSURE STATEMENT PREPARED BY

Vanderbilt University

Passing PCI Compliance How to Address the Application Security Mandates

Considerations for Outsourcing Records Storage to the Cloud

XIT CLOUD SOLUTIONS LIMITED

How To Ensure Health Information Is Protected

The Data Breach: How to stay defensible before, during and after the incident. Alex Ricardo, CIPP/US Breach Response Services

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Policy Reference Guide

Privacy Policy Version 1.0, 1 st of May 2016

HIPAA Security Alert

Harvard University Payment Card Industry (PCI) Compliance Business Process Documentation

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

Business Associate Agreement

DISASTER RECOVERY PLAN

Iowa Health Information Network (IHIN) Security Incident Response Plan

Data Protection Breach Reporting Procedure

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

Coláiste Pobail Bheanntraí

Transcription:

Integrated Incident Management Process Integrated Assessment Record (IAR) Version 3 August, 2010 Integrated Incident Management process v3 1

Table of Contents Introduction... 3 Processes... 5 Scenario 1 Incident Detected by HINP... 5 Scenario 2 Incident Detected by HIC... 8 Scenario 3 Incident Reported by Client or 3rd Party to HIC... 11 Scenario 4 Incident Reported by 3 rd Party to HINP... 14 Appendix A Incident Report... 17 Appendix B Incident Update Report... 18 Appendix C - IAR Centralized Incident Registry... 19 Integrated Incident Management process v3 2

Introduction Incident Management is the ability to provide end to end management of a series of events that are initiated in response to a Privacy or Security breach. The Integrated Assessment Record (IAR) integrated incident management process deals with IAR-related privacy and security incidents in a coordinated fashion. Incidents that involves multiple participating organizations, will involve both the (HINP) and the affected (HICs). The privacy officers at the HINP and the participating organizations will be involved. An incident is the contravention of a policy, procedure, duty or contract, or a situation of interest that results in the potential exposure of sensitive information to unauthorized parties. Each participating organization will use its existing incident management processes to handle the incidents. The following is a sample of privacy and security incidents that may occur in IAR: Printed patient assessment information is left at public area (e.g. Tim Horton) Theft, loss, damage, unauthorized destruction or modification of patient records Inappropriate access of patient information by unauthorized users Large amount of IAR records were accessed by a single individual in a short period of time (out of the ordinary) User account and password was compromised Network infrastructure is attacked by hackers Violation of joint security and privacy policies or procedures The Information & Privacy Commissioner (IPC) recommends the HINP develops a privacy breach protocol to handle any potential privacy breach incident. The protocol enables the HINP and participating organizations to response quickly and in a coordinated way during a privacy breach. The protocol also defines the roles and responsibilities of each party in this integrated environment, as such investigation and containment are more effective and efficient, and remediation will be easier to implement. Incidents can originate from the HINP or the HIC. An incident can also be reported by the clients of a HIC, or a 3rd party to the HINP or the HIC. Integrated Incident Management process v3 3

Here are the four scenarios described in this document. Scenario 1 Incident detected by the HINP IAR backup data unaccounted for (loss or stolen) IAR database hacked into by hackers Large amount of IAR records were accessed by a single individual in a short period of time (out of the ordinary) Missing data backup tape that contains server and system data, but no PHI Scenario 2 Incident detected by the HIC Printed patient assessment records lost User account and password compromised Network at HIC broken into by hackers (suspect IAR upload files have been accessed) Scenario 3 Incident reported by client or 3 rd party to HIC - Client reports: My ex-spouse working in your organization accessed my medical information and used it in our child custody case, why can he/she access my medical record? - Someone (non-patient) found printed patient assessment information on HIC letterhead left at Tim Hortons Scenario 4 Incident reported by 3 rd party to HINP Record management service provider reports to HINP that one IAR data backup tape is missing during transit Missing data backup tape that contains server and system data, but no PHI Notification of Clients PHIPA requires the Custodian to notify the clients if there is a privacy breach that involves their personal health information. In a situation where multiple HICs are investigating an incident that may affect the same client, the HINP privacy officer is to coordinate the notification to the client, this is to avoid the client receiving multiple notifications from different HICs regarding privacy breach of his/her personal health information. The HINP privacy officer will facilitate among the various HICs involved in order to develop the best notification approach to the client, it can be in a form of a joined notification letter, or the HIC that is most responsible for the incident take the lead to notify the client. This document translates these scenarios into defined processes and steps as it relates to the Integrated Assessment Record. It identifies responsibilities and clearly delineates between those tasks which should already be in place within any given Custodian and those tasks which are introduced with the IAR. Integrated Incident Management process v3 4

Processes Scenario 1 Incident Detected by HINP Integrated Incident Management Processes 1.0 Detection Escalation Incident Handling Reporting 1.10 Client(s) receives notification of breach from HIC 1.7 HIC initiates internal incident handling process 1.8 Internal processes to handle incident 1.9 Send incident resolution to HINP 1.2 Create incident record in incident registry 1.1 Incident is detected by or reported to HINP 1.6 HINP notifies the most responsible HIC Yes 1.3 Does incident involves other HIC? No 1.4 Internal processes to handle Incident 1.5 Update incident resolution in incident registry *Note: Shaded boxes indicate steps or tasks which should currently exist within the Custodian and. Non-shaded boxes indicate steps which are being introduced with the implementation of the IAR. Integrated Incident Management process v3 5

Ref No. Task / Step Owner Artifacts Integrated Incident Management Process Scenario 1 Incident detected by HINP Sample scenarios: IAT backup data unaccounted for (either loss or stolen) IAT database was hacked in by hackers Large amount of IAR records were accessed by a single individual in a short period of time (duration out of ordinary) Missing data backup tape contains server and systems information only (with no PHI) 1.1 The incident is detected by the normal incident detection and monitoring process at the HINP or staff at HINP reported incident internally to HINP privacy officer. Incident Report 1.2 HINP keeps track of incidents by creating a record in the Incident Registry 1.3 HINP Privacy Officer triages the reported/detected incident, and determines if the incident involves other participating organizations/hics. If incident involves other HICs, then the Privacy Officer notifies the most responsible HIC. (Ref 1.6) If incident involves only the HINP, then the Privacy Officer initiates the internal incident management process. (Ref 1.4) The HINP has to inform the affected HIC within 24 hours of receiving the incident report (in accordance with the Data Sharing Agreement) 1.4 HINP executes internal processes to handle the reported/detected incident. 1.5 HINP updates incident registry with details of incident resolution. Incident Registry Incident Registry 1.6 HINP notifies the most responsible HIC about the Incident Report Integrated Incident Management process v3 6

incident. If applicable, the HINP continues to investigate and contain the incident, and provides all supporting information to assist the internal incident handling at the HIC. 1.7 The most responsible HIC initiates the internal incident handling process 1.8 The HIC executes internal processes to handle the reported/detected incident. 1.9 HIC sends incident resolution details to HINP Updated incident report 1.10* Client receives notification from HIC regarding the privacy breach of their respective record(s). This is part of the HIC s internal incident handling procedure. *Note: In a situation where multiple HICs are investigating an incident that may affect the same client, the HINP privacy officer is to coordinate the notification to the client, this is to avoid the client receiving multiple notifications from different HICs regarding privacy breach of his/her personal health information. The HINP privacy officer will facilitate among the various HICs involved in order to develop the best notification approach to the client, it can be in a form of a joined notification letter, or the HIC that is most responsible for the incident take the lead to notify the client. Integrated Incident Management process v3 7

Scenario 2 Incident Detected by HIC Most Responsible HIC HINP HIC Client *Note: Shaded boxes indicate steps or tasks which should currently exist within the Custodian and. Non-shaded boxes indicate steps which are being introduced with the implementation of the IAR. Integrated Incident Management process v3 8

Ref No. Task / Step Owner Artifacts Integrated Incident Management Process Scenario 2 Incident detected by HIC Sample scenarios: Printed patient assessment records were lost User account and password was compromised IAR upload files has been compromised possibly by hackers breaking-in to network at participating organization (HIC) 2.1 The incident is detected by the normal incident detection and monitoring process at the HIC or staff at HIC reports incident internally to HIC privacy officer. Incident Report 2.2 HIC privacy officer triages the reported/detected incidentcontainment is the first priority- and determines if the incident involves other participating organizations/hics. If incident involves other HICs, then the HIC sends the incident report to the HINP. (Ref 2.6) If incident involves only the local HIC, then the HIC initiates internal incident management process. (Ref 2.3) The HIC has to notify the HINP within 24 hours of receiving the incident report if the incident is determined to affect other HICs as well (in accordance with the Data Sharing Agreement) 2.3 HIC initiates internal processes to handle the reported/detected incident. 2.4 HIC sends the incident resolution detail to the HINP. Updated incident report 2.5 HINP creates or updates incident record with the resolutions in the incident registry. Incident Registry 2.6 HIC privacy officer sends the incident report to the HINP Incident Report 2.7 HINP creates incident in the incident registry and notifies Incident report Integrated Incident Management process v3 9

the most responsible HIC about the incident & Incident registry 2.8 The most responsible HIC initiates internal processes to handle the reported/detected incident. 2.9 HIC executes the internal incident handling process. 2.10 HIC sends the incident resolution detail to the HINP. Updated incident report 2.11* Client receives notification from HIC regarding the privacy breach of their respective record(s). This is part of the HIC s internal incident handling procedure. Client notification form *Note: In a situation where multiple HICs are investigating an incident that may affect the same client, the HINP privacy officer is to coordinate the notification to the client, this is to avoid the client receiving multiple notifications from different HICs regarding privacy breach of his/her personal health information. The HINP privacy officer will facilitate among the various HICs involved in order to develop the best notification approach to the client, it can be in a form of a joined notification letter, or the HIC that is most responsible for the incident take the lead to notify the client. Integrated Incident Management process v3 10

Scenario 3 Incident Reported by Client or 3rd Party to HIC Most Responsible HIC HINP HIC Client/3 rd Party *Note: Shaded boxes indicate steps or tasks which should currently exist within the Custodian and. Non-shaded boxes indicate steps which are being introduced with the implementation of the IAR. Integrated Incident Management process v3 11

Ref No. Task / Step Owner Artifacts Integrated Incident Management Process Scenario 3 Incident reported by client Sample scenarios: A client of a HIC finds out his/her ex-spouse working at the HIC accessed his/her medical information and used it in his/her child custody case. He/she is wondering why ex-spouse can access his/her medical record for such a purpose. 3.1 Clients or 3 rd party contacted HIC privacy officer, or other HIC staff, to report the incident. Custodian Incident report 3.2 HIC Privacy Officer reviews the incident report received (containment is the first priority) from client or internal staff. Custodian Incident report 3.3 HIC Privacy Officer triages the reported incident, and determines if the incident involves any other participating organizations/hics. If incident involves other HICs, then the HIC sends the incident report to the HINP. (Ref 3.7) If incident involves only the local HIC, then the HIC initiates the internal incident management process. (Ref 3.4) The HIC has to inform the HINP within 24 hours of receiving the incident report if the incident is determined to affect other HIC as well (in accordance with the Data Sharing Agreement) 3.4 HIC initiates internal processes to handle the incident. 3.5 HIC sends the incident resolution detail to the HINP. Updated incident report 3.6 HINP creates or updates incident registry with details of Incident Integrated Incident Management process v3 12

incident resolution. Registry 3.7 HIC sends incident report to HINP Incident Report 3.8 HINP creates incident in the incident registry and notifies the most responsible HIC about the incident 3.9 The most responsible HIC initiates internal processes to handle the reported/detected incident. Incident report 3.10 HIC executes the internal incident handling processes. 3.11 HIC sends the incident resolution detail to the HINP. Updated incident report 3.12* Client receives notification from HIC regarding the privacy breach of their respective record(s). This is part of the HIC s internal incident handling procedure. Client notification form *Note: In a situation where multiple HICs are investigating an incident that may affect the same client, the HINP privacy officer is to coordinate the notification to the client, this is to avoid the client receiving multiple notifications from different HICs regarding privacy breach of his/her personal health information. The HINP privacy officer will facilitate among the various HICs involved in order to develop the best notification approach to the client, it can be in a form of a joined notification letter, or the HIC that is most responsible for the incident take the lead to notify the client. Integrated Incident Management process v3 13

Scenario 4 Incident Reported by 3 rd Party to HINP Integrated Incident Management Processes 4.0 Detection Escalation Incident Handling Reporting Client 4.11 Client(s) receives notification of breach from HIC Most Responsible HIC 4.8 HIC initiates internal incident handling process 4.9 Internal processes to handling incident 4.10 Send incident resolution to HINP 3 rd Parties HINP 4.3 Creates incident in incident registry 4.2 HINP reviews the incident report from 3 rd party 4.1 3 rd party reports incident to HINP 4.7 HINP notifies the most responsible HIC Yes 4.4 Does incident involves other HIC? No 4.5 Internal processes to handle incident 4.6 Update incident resolution in incident registry *Note: Shaded boxes indicate steps or tasks which should currently exist within the Custodian and. Non-shaded boxes indicate steps which are being introduced with the implementation of the IAR. Integrated Incident Management process v3 14

Ref No. Task / Step Owner Artifacts Integrated Incident Management Process Scenario 4 Incident reported by 3 rd party Sample scenarios: Record management service provider reports to HINP, one IAR backup data tape is missing during transit. Missing data backup tape contains server and systems information only (with no PHI) 4.1 3 rd party reports incident to HINP Incident report form 4.2 HINP Privacy Officer reviews the received incident report from 3 rd party. 4.3 HINP creates incident in incident registry Incident Registry 4.4 HINP Privacy Officer triages the reported incident, and determines if the incident involves other participating organizations/hics. If incident involves other HICs, then the HINP privacy officer notifies the most responsible HIC about the incident. (Ref 4.7) If incident involves only the HINP, then the HINP initiates the internal incident management process. (Ref 4.5) The HINP has to inform the other affected HICs within 24 hours of receiving the incident report if the incident is determined to affect other HICs as well (in accordance with the Data Sharing Agreement) 4.5 HINP initiates internal processes to handle the reported incident. 4.6 HINP updates the incident resolution detail in the incident registry. Incident Registry Integrated Incident Management process v3 15

4.7 HINP notifies the most responsible HIC Incident report 4.8 The most responsible HIC initiates internal processes to handle the reported/detected incident. 4.9 HIC executes the internal processes to handle the incident. 4.10 HIC sends the incident resolution detail to the HINP. Updated incident report 4.11* Client receives notification from HIC regarding the privacy breach of their respective record(s). This is part of the HIC s internal incident handling procedure. Client notification form *Note: In a situation where multiple HICs are investigating an incident that may affect the same client, the HINP privacy officer is to coordinate the notification to the client, this is to avoid the client receiving multiple notifications from different HICs regarding privacy breach of his/her personal health information. The HINP privacy officer will facilitate among the various HICs involved in order to develop the best notification approach to the client, it can be in a form of a joined notification letter, or the HIC that is most responsible for the incident take the lead to notify the client. Integrated Incident Management process v3 16

Appendix A Incident Report Integrated Assessment Record (IAR) System Incident Report Fax No: (321) 987-6543 1. Contact Information To be completed by the individual submitting this report First Name Last Name Date (dd/mm/yyyy) Email Phone No. Organization Title / Position Address (street, city, province, postal code) 2. Incident Description Describe the incident below. Date of Incident (dd/mm/yyyy) Involves PHI? Reported By Description / Details 3. Incident Management Incident # Internal Reference # Date of Incident (dd/mm/yyyy) Assigned to Incident Receipt Date (dd/mm/yyyy) Containment Action Follow-up Action Most Responsible (Primary) Organization Follow-up Date (dd/mm/yyyy) Other Organizations (if any) Resolution Status Resolution Date (dd/mm/yyyy) Notes Integrated Incident Management process v3 17

Appendix B Incident Update Report Integrated Assessment Record (IAR) System Incident Update Fax No: (321) 987-6543 1. Contact Information To be completed by the individual submitting this update First Name Last Name Date (dd/mm/yyyy) Email Phone No. Organization Title / Position 2. Incident Information Incident # Internal Reference # Client Contacted? Date of Contact Update Notes Integrated Incident Management process v3 18

Appendix C - IAR Centralized Incident Registry Incident # Reported By Incident Date (dd/mm/yyyy) Most Responsible (Primary) Org Secondary Orgs PHI Involved? (Y/N) Actions Taken Action Dates (dd/mm/yyyy) Is client notified of incident? (Y/N) Incident Resolution Status ABCD- 1234 John Smith 13/05/2010 HIC A HIC C HIC W HIC Z Notified Secondary Orgs Rejected/Resolved/Arbitration Integrated Incident Management process v3 19 Incident Resolution Dates (dd/mm/yyyy)