Outline. Identity Fraud and HIPAA Data Breaches Criminal and Civil Enforcement Efforts Orlando, FL July 30, 2014 7/10/2014



Similar documents
Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now?

Tatiana Melnik Tampa, FL

HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education. September 2014

Why Lawyers? Why Now?

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September Nashville Knoxville Memphis Washington, D.C.

THE FINAL OMNIBUS HIPAA RULE: ARE YOU COMPLIANT?

Recent Developments in Privacy/Security Litigation

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HIPAA WEBINAR HANDOUT

THE HIGH PRICE OF MEDICAL RECORD PRIVACY BREACHES

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Proofpoint HIPAA Breach Report:

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

SELECT HIPAA PRIVACY AND SECURITY ENFORCEMENT ACTIONS. Current as of December attorney advertisement

Recent Developments in U.S. Law: Privacy and Information Technology Health

What do you need to know?

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

You Probably Don t Even Know

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Network Security and Data Privacy Insurance for Physician Groups

How To Write A Report On The Health Care Privacy And Security Rules Of Health Care For A Patient

Raymond: Beyond Basic HIPAA - GSHA Convention HIPAA HIPAA HIPAA. Financial. Carol Ann Raymond, MBA, Ed.S., CCC-SLP

Discussion on Network Security & Privacy Liability Exposures and Insurance

Security Compliance, Vendor Questions, a Word on Encryption

HIPAA and Privacy Policy Training

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

Texas Medical Records Privacy Act (a.k.a. Texas House Bill 300)

THE HIPAA TANGO CHOREOGRAPHING PRIVACY AND SECURITY UNDER THE FINAL RULE

HIPAA Omnibus Final Rule Changes Breach Notification & Enforcement Plus An Audit Update

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

Security Is Everyone s Concern:

HIPAA Compliance: Efficient Tools to Follow the Rules

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies

Legal Issues in Medical Office Use of Social Media. James F. Doherty, Jr. Pecore & Doherty, LLC Columbia, Maryland

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Lessons Learned from Recent HIPAA Enforcement Actions, Breaches, and Audit. Iliana L. Peters, J.D., LL.M. April 23, 2014

HIPAA AND PRIVATE CAUSES OF ACTION

Philip L. Gordon, Esq. Littler Mendelson, P.C.

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Even This Cloud Has A Silver Lining

HIPAA & HITECH AND THE DISCOVERY PROCESS

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

Health Privacy Training Seminar: Health Insurance Portability and Accountability Act ( HIPAA ) and Select State Privacy Laws

OCR UPDATE Breach Notification Rule & Business Associates (BA)

HIPAA Violations Incur Multi-Million Dollar Penalties

Managing Cyber & Privacy Risks

Getting Hip to the HIPAA and HITECH Act Compliance

HIPAA Privacy, Security, Breach, and Meaningful Use. CHUG October 2012

Lessons Learned from HIPAA Audits

HIPAA and New Technologies Using Social Media and Texting Within the Rules. Today s Objectives

HIPAA 101. March 18, 2015 Webinar

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

HIPAA/ HITECH HEALTH INSURANCE PORTABILITY ACCOUNTABILITY ACT. and. Health Information Technology for Economic and Clinical Health Act.

HIPAA Security Rule Compliance

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group

HIPAA - Breaking News!

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

HIPAA in an Omnibus World. Presented by

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

Cyber Liability. AlaHA Annual Meeting 2013

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

Understanding HIPAA Regulations and How They Impact Your Organization!

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Health Information Privacy Refresher Training. March 2013

Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell

Q: How does a provider know if their system has encryption? Do big services (gmail, yahoo, hotmail, etc.) have built-in encryption?

Healthcare Horizons Webinar Series:

2014 Core Training 1

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:

INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION

January An Overview of U.S. Security Breach Statutes

HIPAA Cyber Security: Your Vendor is a Back Door to Your Server

Community First Health Plans Breach Notification for Unsecured PHI

MCCP Online Orientation

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

HIPAA Privacy and Information Security Management Briefing

HIPAA Security & Compliance

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

What s New with HIPAA? Policy and Enforcement Update

HIPAA Privacy and Security

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Transcription:

LeadingAge Florida s 50 th Annual Convention and Exposition Identity Fraud and HIPAA Data Breaches Criminal and Civil Enforcement Efforts Orlando, FL July 30, 2014 James Robnett Special Agent in Charge for the Tampa Field Office IRS Criminal Investigations Tatiana Melnik Attorney Melnik Legal PLLC (Tampa, FL) Outline I. Why is the IRS at Leading Age? II. Identity Theft Overview Why it Matters in Healthcare Private Plaintiffs III. HIPAA Enforcement What is HIPAA? Why do We Care? Who are the Enforcers? Case Studies IV.Best Practices 1

2

3

4

Sentenced to 10 years Outline I. Why is the IRS at Leading Age? II. Identity Theft Overview Why it Matters in Healthcare Private Plaintiffs III. HIPAA Enforcement What is HIPAA? Why do We Care? Who are the Enforcers? Case Studies IV.Best Practices 5

What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Protected Health Information Applies to Covered Entities Business Associates Subcontractors What is HIPAA? Modified by the HITECH Act in 2009 Expanded scope of coverage direct enforcement against BAs and Subcontractors Mandatory penalties What is HIPAA? Has implementing regulations 4 Rules: Security Rule Privacy Rule Generally called the HIPAA Rules Enforcement Rule Breach Notification Rule 6

Healthcare Data Breach Reports Submitted to the Office of Civil Rights for Breaches Impacting 500+ Individuals Year Why Do We Care? Data Breach Statistics Number of Breaches Reported to OCR 1,2 No. of Breaches Listing Theft of Laptop, Desktop, Server, or Portable Device Number of Patients Impacted 2013 182 68 (37% to total breaches) 6,971,141 2012 212 93 (44%) 2,276,248 2011 179 72 (40%) 11,180,673 2010 221 100 (45%) 5,512,852 1 Count based on breach date and not posted date as of Jan. 12, 2014. Count may change with new reports. 2 Breach counted for each year occurred. For example, the Duke University Health System reported a breach that took place from 4/21/2004 2/16/2012. This breach is counted once for each of 2010, 2011, and 2012. Why Do We Care? Data Breach Statistics Healthcare Data Breach Reports Submitted to the Office of Civil Rights for Breaches Impacting Fewer Than 500 Individuals Year Number of Breaches Reported to OCR Number of Patients Impacted 2010 25,000+ 50,000+ 2009 5,521 approx. 12,000 (9/23/2009 12/31/2009) Majority of small breach reports in 2009 and 2010 involved misdirected communications and affected just one individual each: clinical or claims record mistakenly mailed or faxed to wrong individual test results sent to the wrong patient files attached to the wrong patient record emails sent to the wrong addresses member ID cards mailed to the wrong individuals Source: OCR Annual Report to Congress, Aug. 15, 2011 Why Do We Care? Costs to Repair A Data Breach Source: Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis 7

Why Do We Care? Costs to Repair A Data Breach Source: Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis Caveats: (1) Global Study (2) Sample size: 314, of those 1% was healthcare Why Do We Care? Costs to Repair A Data Breach Average organizational cost of data breach More than $5.85 million Average post data breach costs Almost $1.6 million Average lost business costs Approx. $3.3 million Source: Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis Why Do We Care? Enforcement Enforcement is up Who are the enforcers? Private Plaintiffs States Attorney s General 8

Private Plaintiffs Most actions are class actions Difficult to win Article III Standing an injury in fact a causal connection between the injury and the challenged action that the injury can be redressed by a favorable decision How did me losing your information hurt you? How much money did you lose? Private Plaintiffs AvMed Health Plan In 2009, unencrypted computers stolen from office during a break in Class action filed in Florida Theory: Some portion of the premiums was to go to security Was dismissed in July 2011 and revived by the Eleventh Circuit in Sept. 2012 Private Plaintiffs AvMed Health Plan Why this Case Matters: Settled in October 2013 for $3M, agreed to: Some class members suffered mandatory security training for identity employees theft while others did mandatory training on appropriate not laptop use and security But, all class members can updating company computers with collect additional from the Settlement security Fund $10 for every year they were mechanisms, including GPS tracking technology customers (up to $30) new password protocols and full AvMed disk chose encryption to settle rather technology on all company computers than investigate harm done to physical security upgrades other class members review and revision of written policies and procedures for information security 9

Private Plaintiffs R.K. v. St. Mary s Medical Center (West Virginia) Patient was admitted to St. Mary s as a psychiatric patient in March 2010 Hospital s employees accessed his records and disclosed PHI to his estranged wife and her divorce lawyer Private Plaintiffs R.K. v. St. Mary s Medical Center (West Virginia) RK sued asserting claims for (1) negligence, (2) outrageous conduct, (3) intentional infliction of emotional distress, (4) negligent infliction of emotional distress, (5) negligent entrustment, (6) breach of confidentiality, (7) invasion of privacy, and (8) punitive damages No HIPAA claim asserted St. Mary s filed a motion to dismiss arguing that claims were preempted by HIPAA St. Mary s motion was granted and RK appealed Private Plaintiffs R.K. v. St. Mary s Medical Center (West Virginia) In reversing the lower court, the West Virginia Court of Appeal noted: Finally, we note that, contrary to finding state common law claims preempted by HIPAA, several courts have found that a HIPAA violation may be used either as the basis for a claim of negligence per se, or that HIPAA may be used to supply the standard of care for other tort claims. Citing decisions from Connecticut, Missouri, North Carolina, and Tennessee Why this Case Matters: Consider your organization s current state of compliance. What would happen if the HIPAA Rules were used as the standard of care in the case of a breach? 10

Compliance issues investigated most: impermissible uses and disclosures of PHI lack of safeguards of PHI lack of patient access to their PHI uses or disclosures of more than the minimum necessary PHI lack of administrative safeguards of ephi OCR has taken action against: Entity Amount Rules Breach Incident Settlement Cignet Health $4.3M Privacy Rule, $3M for willful neglect per HITECH General Hospital Corp. & Physicians Org. UCLA Health System Denying patients access to medical records $1M Privacy Rule Left documents on subway $865,500 Privacy & Workers snooping on celebrity patients 3/1/200 9 3/9/200 9 6/5/200 9 2/4/2011 (this was not a settlement) 2/14/2011 7/5/2011 OCR has taken action against: Entity Amount Rules Breach Incident Settlement Blue Cross Blue Shield of TN Phoenix Cardiac Surgery Alaska Dept. of Health & Human Services $1.5M Privacy & $100K Privacy & $1.7M Privacy & unencrypted hard drives stolen from a leased facility posting appt. on an online, publicly accessible calendar unencrypted portable media device stolen from car of employee 11/3/200 9 (self 2/19/200 9 10/12/09 (self 3/13/2012 4/11/2012 6/25/2012 11

OCR has taken action against: Entity Amount Rules Breach Incident Settlement Massachusetts Eye and Ear Infirmary Hospice of Northern Idaho Idaho State University $1.5M Privacy & theft of unencrypted personal laptop while at conference $50K Security Rule theft of unencrypted laptop (less than 500 patients) $400K Security Rule disabled server firewall for ~ 10 mo. resulting in a breach 4/21/10 (self 2/16/11 (self 8/9/2011 (self 9/13/2012 12/17/2012 5/10/2013 OCR has taken action against: Entity Amount Rules Breach Incident Settlement Shasta Regional Medical Center $275K Privacy Rule senior leaders at co. met w/media to discuss medical services provided to a patient w/o a valid written authorization WellPoint $1.7 Privacy & software update to web based database left ephi publicly accessible 1/4/2012 (read article in LA Times) 6/18/10 (self 6/3/2013 7/8/2013 OCR has taken action against: Entity Amount Rules Breach Incident Settlement Affinity Health Plan Adult & Pediatric Dermatology Skagit County, Washington $1,215,780 Privacy and $150K Privacy, Security & Breach Notification Rules $215K Privacy, Security, and Breach Notification returned copiers to a leasing agent w/o erasing the copier hard drives theft of unencrypted personal thumb drive from employee vehicle moved ephi of 7 individuals to a publicly accessible server 4/15/10 (self 10/7/11 (self Dec. 9, 2011 (self 8/7/2013 12/24/2013 3/7/2014 12

OCR has taken action against: Entity Amount Rules Breach Incident Settlement Concentra Health Services QCA Health Plan, Inc., of Arkansas New York and Presbyterian Hospital Columbia University $1,725,220 Privacy and $250,000 Privacy and $3,300,000 Privacy and $1,500,000 theft of unencrypted laptop from office theft of unencrypted laptop from workforce member s car NYP disclosed the ephi of 6,800 patients online when server was errantly reconfigured 11/30/11 (self 2/21/12 (self Joint notification 9/27/2010 2/22/2014 (announced) 2/22/2014 (announced) 5/7/2014 (announced) A Few Identified Problems Failure to conduct a Risk Analysis in response to new environment BCBSTN Changed offices WellPoint Installed software upgrade Alaska DHHS Never conducted a risk analysis Workforce members Failure to train and train on an on going basis Failure to apply appropriate sanctions Failure to install security measures to monitor unauthorized access UCLA case workforce members repeatedly snooping on patients between 2005 08 A Few Identified Problems Portable devices Lack of encryption/security measures Lack of policies and procedures to address Incident identification, reporting, and response Restricting access to authorized users To provide [CE] with a reasonable means of knowing whether or what type of portable devices were being used to access its network Settlement Agr. with Massachusetts Eye and Ear Infirmary 13

OCR Corrective Action Plans Comprehensive Risk Analysis A written implementation report describing how entity will achieve compliance Revised policies and procedures Additional employee training Monitoring Internal and 3 rd Party Term is 1 3 years, with document retention period of 6 years HITECH includes a sort of whistleblower provision Not a true whistleblower provision because the statute does not authorize a lawsuit to recover payments Permits an individual who is harmed by an act that constitutes an offense [in violation of HIPAA to] receive a percentage of any civil monetary penalty or monetary settlement collected with respect to such offense Waiting on regulations States Attorney General Actions Based on HIPAA Minnesota AG is the first to take action against a business associate, Accretive Health, Inc. Action filed in 2012, after an unencrypted laptop containing PHI was stolen out of an Accretive employee s car Laptop contained sensitive (name, address, etc.) and highly sensitive information (mental health, STDs) 14

States Attorney General Actions Based on HIPAA Accretive settled with Minnesota AG Accretive agreed to cease all operations in Minnesota within... 90 days, or by November 1, 2012 Company is subject to an outright ban on operating in Minnesota for 2 years, after which, for the next 4 years, it can only reenter the State if the Attorney General agrees to a Consent Order regarding its business practices in the State States Attorney General Florida Current data breach law: Fla. Stat. 817.5681 New data breach legislation: SB 1524 Passed unanimously on April 30, 2014 (2) REQUIREMENTS FOR DATA SECURITY. Each covered entity, governmental entity, or third party agent shall take reasonable measures to protect and secure data in electronic form containing personal information. Federal Trade Commission FTC works for consumers to prevent fraudulent, deceptive, and unfair business practices Has authority to pursue any company that has engaged in unfair or deceptive acts or practices in or affecting commerce Has pursued companies across a number of industries Hotels, mobile app vendors, clinical labs 15

Outline I. Why is the IRS at Leading Age? II. Identity Theft Overview Why it Matters in Healthcare Private Plaintiffs III. HIPAA Enforcement What is HIPAA? Who are the enforcers? Case Studies IV.Best Practices Protecting PHI It s About Outreach & Education Five Principles To Safe Guard PHI Take Stock Lock It Plan Ahead Scale Down Pitch It 16

Take Stock KNOW WHAT PHI YOU HAVE IN YOUR FILES. FTC Protecting Personal Information : A Guide For Businesses Keep only what you need for your business Develop a written records retention policy Truncate the account information on electronically printed credit and debit card receipts FTC Protecting Personal Information : A Guide For Businesses Lock It PROTECT THE INFORMATION THAT YOU KEEP. FTC Protecting Personal Information : A Guide For Businesses 17

Pitch It FTC Protecting Personal Information : A Guide For Businesses Plan Ahead HIPAA Specific Best Practices When was the last time a Risk Analysis was conducted? Are laptops encrypted? Is BYOD permitted? Choose vendors carefully What do your business associate agreements say? Is risk properly allocated? Breaches happen to every organization Buy insurance 18

Disclaimer This slide presentation is informational only and was prepared to summarize relevant legal considerations when evaluating obligations under HIPAA/HITECH and considering identity theft issues. It does not constitute legal or professional advice. You are encouraged to consult with an attorney if you have specific questions relating to any of the topics covered in this presentation. Any Questions? James (Jim) Robnett James.Robnett@ci.irs.gov 727 568 2552 Tatiana Melnik tatiana@melniklegal.com 734 358 4201 19