Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked



Similar documents
Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Medical Identity Theft or Identity Fraud: Can You Afford the Results?

Managing Cyber & Privacy Risks

Data Breach and Senior Living Communities May 29, 2015

Privacy Rights Clearing House

Medical Information Breaches: Are Your Records Safe?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Network Security & Privacy Landscape

DATA BREACH COVERAGE

Need for Cyberliability Insurance Continues to Grow

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident.

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

CYBER SECURITY SPECIALREPORT

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

Updates within Network Security and Privacy Risk Management

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE

What Data? I m A Trucking Company!

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

The Data Breach: How to stay defensible before, during and after the incident. Alex Ricardo, CIPP/US Breach Response Services

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

AHLA. N. HIPAA Security Breaches: What Should We Be Doing to Keep Us Out of the Headlines? Diane E. Felix Armstrong Teasdale LLP Saint Louis, MO

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Cyber Liability & Data Breach Insurance Claims

2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

CYBER LIABILITY INSURANCE

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Cybersecurity Workshop

Privacy and Data Breach Protection Modular application form

Brief. The BakerHostetler Data Security Incident Response Report 2015

White Paper. Data Breach Mitigation in the Healthcare Industry

Health Care Data Breach Discovery Strategies for Immediate Response

A Privacy and Data Security Checklist for All

Anatomy of a Privacy and Data Breach

9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability.

Cyber Liability. AlaHA Annual Meeting 2013

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

The High Price of Medical Identity Theft and Fraud

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Cybersecurity: Protecting Your Business. March 11, 2015

T H E R E A L C O S T O F A D ATA B R E A C H

Network Security & Privacy Landscape

Cybersecurity. Are you prepared?

Cybersecurity: Emerging Exposures for Technology Companies. October 7, 2010

ACE Advantage PRIVACY & NETWORK SECURITY

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

10 Smart Ideas for. Keeping Data Safe. From Hackers

Why Lawyers? Why Now?

Data Breach Response Planning: Laying the Right Foundation

Information Security Addressing Your Advanced Threats

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

The Onslaught of Cyber Security Threats and What that Means to You

Cyber Insurance in an Evolving Liability Landscape: Informed, Strategic Expectations Monday, February 29, :00pm 3:00pm

Cyber-insurance: Understanding Your Risks

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

What would you do if your agency had a data breach?

Privacy & Data Security

Privacy Law Basics and Best Practices

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH

Protecting the Information of Clients, Donors, the Organization, Oh MY! Stacey Keegan November 14, 2012

Jefferson Glassie, FASAE Whiteford, Taylor & Preston

SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)

Beazley Group Beazley Breach Response. A data breach isn t always a disaster Mishandling it is.

Beazley presentation master

Cyber Insurance Presentation


WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES

HIPAA 101. March 18, 2015 Webinar

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

4/9/2015. One Year After the HIPAA Omnibus Rule: Lessons Learned in Breach Notification. Agenda

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

CYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure

Cyber Security. John Leek Chief Strategist

Cyber Security An Exercise in Predicting the Future

The Data Breach: How to stay defensible before, during and after the incident. Alex Ricardo, CIPP/US Breach Response Services

Adopting a Cybersecurity Framework for Governance and Risk Management

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014

Law Firm Cyber Security & Compliance Risks

Joe A. Ramirez Catherine Crane

Transcription:

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed in this presentation are those of the speaker. The International Society and International Foundation disclaim responsibility for views expressed and statements made by the program speakers. 11C-1

Agenda What is Medical Identity Theft? What is at risk? How does cyber hacking affect your participants? Should you consider cyber liability insurance Ensuring security with external partners Critical steps in face of security incident 11C-2

What Is Medical Identity Theft? Medical Identity Theft occurs when someone uses your personal information to: Fraudulently procure medical services Improperly acquire prescription drugs Submit fake billings to Medicare or private insurers Obtain expensive medical equipment 11C-3

Impact of Medical Identity Theft Death Medical records in shambles Physical harm Credit issues Employment issues On the hook for thousands of dollars Long term recovery and dispute resolution 11C-4

Stealing Your Medical Identity How? Cyber hackers/thieves via the web & mobile devices Malware on facility computers Misdirected emails, improper disposal of paper records Who? Dishonest patients Dishonest providers (individuals or institutions) Professional criminals/bogus providers Where? Doctors and hospitals Insurance companies Fund offices 11C-5

2014 IDTRC Breach Survey* Of 80 healthcare organizations > 40 incidents 783 breaches exposed 675 MILLION records Breaches average 416 days to detect Breaches often reported by 3 rd party 94% of providers have HC information breeches Medical ID Theft occurs in 24% of breaches! * Identity Theft Resources Center 2014 Data Breach by Category Report 11C-6

Healthcare Data Breaches Ex. Tricare: 4,901,432 Loss of backup tapes Health Net: 1,9000,000 Unknown reason Anthem: 80,000,000 Cyber hacking Taft-Hartley/Public Health Funds: Lost laptops, CDs, SSNs externally visible, paper records in dumpster * Net Diligence 2014 Survey 11C-7

Cost of Cyber Crime Report* $6 million: The median annualized cost of an attack $60 million: Total annualized cost of companies surveyed Cost of Crime: influenced by frequency of attack and type 1.7: The number of successful attacks per week Attacks from worms; malware; botnets; web based; phishing; malicious code; denial of service; stolen devices; malicious insiders 26%: The increase in cyber attacks in one year * 2014 Global Report on the Cost of Cyber Crime (257 cos.) 11C-8

How Cyber Hacking Can Affect Fund or Participants Regulatory compliance Remediation is expensive and time consuming Aggressive laws and Attorneys General Non-Compliance can lead to fines (HIPAA, State) Reputational harm: Loss of confidence Financial loss plan sponsor or employees Litigation from impacted parties 11C-9

State Laws on Data Breaches **50 States; 47 Different Sets of Rules** Identity theft laws Consumer report laws Security breach notifications Laws protecting SSNs Personal information laws Possible private rights of action (Alabama, New Mexico, South Dakota ) 11C-10

Breach Obligations Notification to breached party? Notification to all, breached or not? Notification to media? Offer credit monitoring/id theft protection? Offer recovery? Is the breach really over? Whose obligation is it? 11C-11

Vendor Breach Considerations Begin with review of Business Associate Agreements Who owns or is responsible for the data? Sit-back or be active? Respond: Together? Separately? Not at all? 20% of breaches triggered by 3 rd party Look to contractual relationships for assumption of responsibility. Whose insurance responds and when? 11C-12

Do Participants Have Protections? Participants and beneficiaries are relying on the benefit plan officials legal obligations to protect their information. ERISA Trust law Consumer protection laws Contract language with vendors/business associates Other legal recourse? 11C-13

Member Obligations Avoid Data Losses Always check EOBs, billing statements, credit reports Request/review/annual benefits paid from insurer Keep your own copies of all your health records Review accuracy of medical records Eliminate SSN and total DOBs from records Freeze your credit with each agency 11C-14

Ways to Avoid Data Losses cont. Never share your health insurance card Shred all medical documents Never partake of free medical care Don t discard prescription bottles with your (or your pet s) information label still affixed Report and replace lost/stolen insurance cards 11C-15

Protection for Funds Policies on bringing devices to work (BYOD) Policies on taking work home/device home Policies on Social Media, internet access, cloud usage Background checks on all employees 256-bit encryption for file transfer or claims payments Two-factor authorization 11C-16

Risk Assessment Required by HIPAA/HITECH for H&W benefit plans Identity and evaluate plan s data protection and destruction practices Document the security gaps Proposes possible solutions Not a one-time event 11C-17

Eliminate or Minimize the Risk Monitor and test security systems often Minimize collection of personal data, destroy unneeded Invest in data security software Create position of Chief Information Security Officer Encrypt! Encrypt! Encrypt! (Generally a Safe Harbor) 11C-18

Critical Steps in Face of Security Incident Essential in order to effectively respond to a security breach Periodically tested under various breach scenarios Incident Response Plan typically include: IRP Team (Administrative Management, IT Professionals, and Fund Counsel, etc.) Clear guidelines categorizing threat levels Documentation guidelines Notification process including contact information 11C-19

Cyber Liability Insurance Insurance is often a cost effective solution. Premiums for this particular coverage are now very affordable for most plans. A employer s other insurance policies do not provide the needed protection since these policies were not designed for these exposures. 11C-20

Cyber Liability Insurance Used to protect plan assets Helps meet legal obligations Provides various professionals to assist in handling a data breach event Offers participants certain protections 11C-21

Comprehensive Coverage! Provides partial to full risk transfer that risk assessments and IRPs do not eliminate Provides experienced professionals Provides data-packed web sites to help create a robust internal control environment Provides first-party cost coverage not available in other policies Protects against third-party liability 11C-22

Current State of the Market Evolving coverage; broader and cheaper Many carriers; many approaches Different risk appetites; size/complexity Modular; buy only the coverage you need 11C-23

Covered First Party Costs Notification Public relations/crisis management Call center operations Credit monitoring Forensics Other potential expenses 11C-24

Third-Party Liability Coverage Triggered by a claim: Against the plan Alleging a loss Based on a wrongful act Provides defense, settlements, judgments 11C-25

Conclusion Health plans are rich in resources Breaches/Hackers are everywhere Review Business Associates agreements Medical ID Theft can be expensive to remediate Legal compliance is complex 11C-26

What Can Plans Do? Develop an Incident Response Plan (IRP) Identify the risk issues Preparation Mitigate the risk Detection and Analysis Preplan and practice a response Risk transfer Cyber liability insurance 11C-27

Key Takeaways Plan to Act NOW! Evaluate your risk Review your Business Associate Agreements Protect and control your data Plan a response for when it gets out Consider cyber liability insurance Understand coverage: Loss of data vs Theft of data 11C-28

QUESTIONS Thoughts Concerns Thank you! 11C-29

Other thoughts and considerations 11C-30

Federal Obligations Protecting PII Fair Credit Reporting Act Fair and Accurate Credit Transactions Act Gramm-Leach-Bliley Act Federal Trade Commission Protecting PHI Health Information Portability and Accountability Act (HIPAA) Health Information Technology for Economic and Clinical Health Act (HITECH) 11C-31

What About ERISA? Does not directly address how plans should protect PII/PHI. Will ERISA preemption apply? Reasonable Conclusion: Plans have to comply with many of these state disclosure and notification laws because there are no overall federal guidelines and ERISA does not directly apply. 11C-32

Still a Fiduciary Risk? Failure to protect PII/PHI may be a significant fiduciary risk! Be concerned: Fiduciary responsibility likely applies! Be diligent: It is often the process that determines your liability rather than the outcome of your efforts. 11C-33