The Ins and Outs of the Missouri Data Breach Notification Law

Similar documents
Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments

H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

SECTION-BY-SECTION ANALYSIS

S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

BUSINESS ASSOCIATE AGREEMENT TERMS

BUSINESS ASSOCIATE AGREEMENT

STANDARD ADMINISTRATIVE PROCEDURE

Identity Theft Prevention and Security Breach Notification Policy. Purpose:

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA Richmond, Virginia Tel. (617) Tel. (804)

Evolution of HB 300. HIPAA passed in 1996 Originally, HIPAA only directly impacted certain covered entities :

COMPLIANCE ALERT 10-12

SaaS. Business Associate Agreement

Business Associate Agreement

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Updated HIPAA Regulations What Optometrists Need to Know Now. HIPAA Overview

Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law

51ST LEGISLATURE - STATE OF NEW MEXICO - SECOND SESSION, 2014

SENATE FILE NO. SF0065. Sponsored by: Senator(s) Johnson and Case A BILL. for. AN ACT relating to consumer protection; providing for

Healthcare Horizons Webinar Series:

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

Comparison of US State and Federal Security Breach Notification Laws. Current through August 26, 2015

Community First Health Plans Breach Notification for Unsecured PHI

DATA BREACH NOTIFICATION POLICY

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of [Acts 1999, ch. 201, 2.

BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc.

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

BUSINESS ASSOCIATE AGREEMENT

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions

BUSINESS ASSOCIATE AGREEMENT

SAMPLE BUSINESS ASSOCIATE AGREEMENT

Prepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014

HIPAA BUSINESS ASSOCIATE AGREEMENT

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act

The ReHabilitation Center Buffalo Street. Olean. NY

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate

BUSINESS ASSOCIATE AGREEMENT

HIPAA Business Associate Agreement

HIPAA AND MEDICAID COMPLIANCE POLICIES AND PROCEDURES

January An Overview of U.S. Security Breach Statutes

FirstCarolinaCare Insurance Company Business Associate Agreement

Terms and Conditions Relating to Protected Health Information ( City PHI Terms ) Revised and Effective as of September 23, 2013

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS

BUSINESS ASSOCIATE AGREEMENT

Business Associate Agreement Involving the Access to Protected Health Information

UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S):

SAMPLE BUSINESS ASSOCIATE AGREEMENT

Five Rivers Medical Center, Inc Medical Center Drive Pocahontas, AR Notification of Security Breach Policy

Preferred Professional Insurance Company Subcontractor Business Associate Agreement

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

BUSINESS ASSOCIATE AGREEMENT HIPAA Omnibus Rule (Final Rule)

HIPAA BUSINESS ASSOCIATE AGREEMENT

Please print the attached document, sign and return to or contact Erica Van Treese, Account Manager, Provider Relations &

COUNCIL POLICY NO. C-13

HIPAA means the Health Insurance Portability and Accountability Act of 1996, Public Law

Business Associate and Data Use Agreement

BUSINESS ASSOCIATE AGREEMENT

DATA BREACH CHARTS (Current as of December 31, 2015)

New Privacy Laws Impacting the Health Care Work Place

BUSINESS ASSOCIATE AGREEMENT ( BAA )

Overview of the HIPAA Security Rule

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule

Breach Notification Policy

Business Associates Agreement

HIPAA Business Associate Addendum

BUSINESS ASSOCIATE ADDENDUM. WHEREAS, Provider (as defined below) has a contractual relationship with FHCCP requiring this Addendum;

Business Associate Agreement

BUSINESS ASSOCIATE AGREEMENT

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009

HIPAA BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Disclaimer: Template Business Associate Agreement (45 C.F.R )

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

BUSINESS ASSOCIATE AGREEMENT

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia (404) (404)

BUSINESS ASSOCIATE AGREEMENT

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2005 H 2 HOUSE BILL 629 Committee Substitute Favorable 5/18/05

Data Breach Notification: State and Federal Law Requirements. Good News

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

KRS Chapter 61. Personal Information Security and Breach Investigations

RED FLAG RULES FREQUENTLY ASKED QUESTIONS

HIPAA for Business Associates

Privacy and Data Security Update for Defense Contractors

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

Definitions. Catch-all definition:

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Transcription:

The Ins and Outs of the Missouri Data Breach Notification Law Paul Satterwhite Husch Blackwell Sanders LLP 2010 Husch Blackwell Sanders LLP HUSCHBLACKVVELL SANDERS LLP

The Ins and Outs of the Missouri Data Breach Notification Law Paul Satterwhite Husch Blackwell Sanders LLP 03010 Hucrn Vackwell Sanders LLP HUSCHtiegilii The Problem Information security breaches can have harmful impacts on victims: - Identity theft - Loss of money in debit accounts - Unauthorized charges on credit accounts - Large legal fees to remediate - Fear The Solution Missouri's Data Breach Notification Law. - House Bill 62, effective August 28, 2009 - Missouri 45 th State to Adopt 1

Who must comply? Group 1 - "Any person that owns or licenses personal information of residents of Missouri" - "Owns or licenses" includes personal information that a business retains as part of the internal customer account of the business or for the purpose of using the information in transactions with the person to whom the information relates. 111/11.1111111111F.,...,...,_. '... ' V I'.." -. '. Who must comply? Group 2 - "Any person that maintains or possesses records or data containing personal information of residents of Missouri that the person does not own or license" kg v i I ILISCHI&C,61ny Personal Information Is... "Personal information": - an individual's first name or first initial and last name; and Social Security number; Driver's license number or other unique identification number; Financial account information; Unique electronic identifier; Medical information; or Health Insurance information. 4:4 IL;S:1.111S1., i 2

What is the trigger? 2 elements: - Breach of security; and - Discovery or notice of the breach What is the trigger? "Breach of security" or "breach" means: - Unauthorized access to and - Unauthorized acquisition of - Personal information - Maintained in computerized form - By a person that compromises the security, confidentiality, or integrity of the personal information. Good faith acquisition... WHUSCH IS: What is the trigger "Discovery or notice of the breach" - Undefined in the statute - To be safe, look into notification requirements as soon as something appears to be a possible breach. 10.1111111111111111F 3

What must be done? First, "provide notice to the affected consumer" Situations when notice is not required or may be delayed: - Not required when... - May be delayed... I IUSCI1BLPCK What must be done? The notification shall be: - Made without unreasonable delay; - Consistent with the legitimate needs of law enforcement; and - Consistent with any measures necessary to determine sufficient contact information and to determine the scope of the breach and restore the reasonable integrity, security, and confidentiality of the data system. HUSCH BL What must be done? Notice to consumer must describe: - The incident - The type of personal information that was obtained; - A telephone number that the affected consumer may call for further information and assistance; - Contact information for consumer reporting agencies; and - Advice. HUSCHBLACA SANDER 4

What must be done? Allowable methods for notice to consumer: - Written notice; - Electronic notice (with restrictions); - Telephonic notice; or - Substitute notice. What must be done? Second, "notify, without unreasonable delay, the attorney general's office and [certain] consumer reporting agencies" ONLY IF YOU "provide notice to more than one thousand consumers at one time" What must be done? Different notice protocol is sufficient if: - A person complies with its own notice procedures as part of an information security policy for the treatment of personal information, and whose procedures are otherwise consistent with the timing requirements of [the statute]." - A person complies with "procedures for a breach of the security of the system pursuant to the laws, rules, regulations, guidances, or guidelines established by its primary or functional state or federal regulator." 5

What happens to violators? When someone doesn't comply with the Missouri Data Breach Notification Law: - The attorney general may sue for (1) actual damages and (2) civil penalties not to exceed $1 50,000 per breach of security - No private right of action How Can We Be Proactive? In reviewing data security programs, your company should consider how the internet is used at your company, how data is stored and how third parties may gain access to your systems. You should consider: Establishing a central executive or management employee to serve as a plan coordinator; Identifying reasonably foreseeable internal and external risks to security, including electronic access points and physical (i.e. paper) access points; I IUSCH BLACK SANDE How Can We Be Proactive? You should also consider: Addressing any red flag rules which may apply to your company (and adjust the plan accordingly); and Ensuring safeguards extend to your employees and contractors. li 5i I BLACKWELL SAND.. I, 6

What Other Laws May Apply? HITECH - Effective February 2010 - Patient/client health information HIPAA HYPOTHETICALS QUESTIONS??? HUSCHNiASNI1f 7