healthcare cybersecurity: new hscc guidance, managing...

63
Healthcare Cybersecurity: New HSCC Guidance, Managing Threats, Protecting Patients, Responding to Breaches Today’s faculty features: 1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 1. TUESDAY, MAY 14, 2019 Presenting a live 90-minute webinar with interactive Q&A Lee Barrett, Executive Director, CEO, EHNAC, Hartford, Conn. Sharon R. Klein, Partner, Pepper Hamilton, Irvine, Calif.

Upload: others

Post on 10-Aug-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Healthcare Cybersecurity: New HSCC Guidance,

Managing Threats, Protecting Patients,

Responding to Breaches

Today’s faculty features:

1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific

The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 1.

TUESDAY, MAY 14, 2019

Presenting a live 90-minute webinar with interactive Q&A

Lee Barrett, Executive Director, CEO, EHNAC, Hartford, Conn.

Sharon R. Klein, Partner, Pepper Hamilton, Irvine, Calif.

Page 2: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Tips for Optimal Quality

Sound Quality

If you are listening via your computer speakers, please note that the quality

of your sound will vary depending on the speed and quality of your internet

connection.

If the sound quality is not satisfactory, you may listen via the phone: dial

1-866-927-5568 and enter your PIN when prompted. Otherwise, please

send us a chat or e-mail [email protected] immediately so we can address

the problem.

If you dialed in and have any difficulties during the call, press *0 for assistance.

Viewing Quality

To maximize your screen, press the F11 key on your keyboard. To exit full screen,

press the F11 key again.

FOR LIVE EVENT ONLY

Page 3: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Continuing Education Credits

In order for us to process your continuing education credit, you must confirm your

participation in this webinar by completing and submitting the Attendance

Affirmation/Evaluation after the webinar.

A link to the Attendance Affirmation/Evaluation will be in the thank you email

that you will receive immediately following the program.

For additional information about continuing education, call us at 1-800-926-7926

ext. 2.

FOR LIVE EVENT ONLY

Page 4: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Program Materials

If you have not printed the conference materials for this program, please

complete the following steps:

• Click on the ^ symbol next to “Conference Materials” in the middle of the left-

hand column on your screen.

• Click on the tab labeled “Handouts” that appears, and there you will see a

PDF of the slides for today's program.

• Double click on the PDF and a separate page will open.

• Print the slides by clicking on the printer icon.

FOR LIVE EVENT ONLY

Page 5: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Healthcare Cybersecurity: New HSCC Guidance, Managing Threats and

Protecting Patients

May 14, 2019

Lee Barrett, Executive Director, [email protected]

Sharon Klein, Partner, Pepper Hamilton [email protected]

Page 6: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

1. Healthcare Cyber Risk Landscape

2. Overview of Healthcare Sector Coordinating Council and Audit

3. Content Review of HSCC Cyber Security Practices Guidance

4. Next Steps for HSCC

5. Other Federal and State Cyber Regulations

6. Practical Takeaways

6

TOPICS

Page 7: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

HEALTHCARE CYBER RISK LANDSCAPE

7

Page 8: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Covered entity must notify affected individuals, HHS, and in some cases, the

media

• Business associate must notify covered entity of a breach

• Notification to be provided without unreasonable delay (but no later than 60

calendar days) after discovery of breach

– Annual reporting to HHS of smaller breaches (affecting less than 500

individuals) permitted

Breach Notification Requirements

8

Page 9: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• OCR posts breaches affecting 500+ individuals on OCR website (after verification

of report)

– Public can search and sort posted breaches

– Receive over 350 reports per year

• 372 total 500 + breach reports 2016

• 377 total 500 + breach reports 2017

• 393 total 500 + breach reports 2018

• OCR opens investigations into breaches affecting 500+ individuals, and into a

number of smaller breaches

• Investigations involve looking at:

– Underlying cause of the breach

– Actions taken to respond to the breach (breach notification) and prevent future

incidents

– Entity’s compliance prior to breach

Breaches

9

Page 10: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Types of Breaches

10

Page 11: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Breaches By Location

11

Page 12: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Theft of PHI

12

Page 13: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Hacking/IT Incidents

13

Page 14: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Breaches of Laptops

14

Page 15: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Breaches of Network Servers

15

Page 16: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Breaches of Email Accounts

16

Page 17: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Breaches of Electronic Medical Records

17

Page 18: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Expect to receive over 26,000 complaints this year

• In most cases, entities able to demonstrate satisfactory compliance

through voluntary cooperation and corrective action

• In some cases, the nature or scope of indicated noncompliance

warrants additional enforcement action

• Resolution Agreements/Corrective Action Plans

– 60 settlement agreements that include detailed corrective action

plans and monetary settlement amounts

• 4 civil money penalties

As of January 31, 2019

General HIPAA Enforcement Highlights

18

Page 19: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Enforcement Actions

19

Page 20: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Business Associate Agreements

• Risk Analysis

• Failure to Manage Identified Risk, e.g., Encrypt

• Lack of Transmission Security

• Lack of Appropriate Auditing

• No Patching of Software

• Insider Threat

• Improper Disposal

• Insufficient Data Backup and Contingency Planning

• Individual Right to Access

Recurring Compliance Issues

20

Page 21: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Corrective Actions May Include:

• Updating risk analysis and risk management plans

• Updating policies and procedures

• Training of workforce

• CAPs may include 3rd party or outsidemonitoring

Corrective Action

21

Page 22: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Review all vendor and contractor relationships to ensure BAAs are in place as

appropriate and address breach/security incident obligations

• Risk analysis and risk management should be integrated into business

processes; conducted regularly and when new technologies and business

operations are planned

• Dispose of PHI on media and paper that has been identified for disposal in a

timely manner

• Incorporate lessons learned from incidents into the overall security

management process

• Provide training specific to organization and job responsibilities and on regular

basis; reinforce workforce members’ critical role in protecting privacy and

security

Some Best Practices:

Best Practices

22

Page 23: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

AUDIT

23

Page 24: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

HITECH Audit Program

• Purpose:

– Identify best practices; uncover risks and

vulnerabilities not identified through other

enforcement tools; encourage consistent

attention to compliance

24

Audit Program

Page 25: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• HITECH legislation: HHS (OCR) shall provide for periodic audits to

ensure that covered entities and business associates comply with

HIPAA regulations. (Section 13411)

• Pilot phase (2011-2012) – comprehensive, on-site audits of 115

covered entities

• Evaluation of Pilot (2013) – issuance of formal evaluation report of pilot

audit program

• Phase 2 (2016-17) – desk audits of 207 covered entities and business

associates

25

History

Audit Program

Page 26: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Phase 2 – Selected Desk Audit Provisions

• For Covered Entities:

– Security Rule: risk analysis and risk management; and

– Breach Notification Rule: content and timeliness of notifications; or

• For Business Associates:

– Security Rule: risk analysis and risk management and

– Breach Notification Rule: reporting to covered entity

• See auditee protocol guidance for more details:

http://www.hhs.gov/sites/default/files/2016HIPAADeskAuditAuditeeGuidance.pdf

26

Audit Program

Page 27: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• 166 covered entity and 41 business associate desk audits

were completed in December 2017

• Website updates with summary findings will be published

in 2019

27

Status

Audit Program

Page 28: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

OVERVIEW OF HEALTHCARE SECTOR COORDINATING COUNCIL

28

Page 29: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Healthcare Sector Coordinating Council (HSCC)

29

Page 30: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

2018 Task Groups

30

Page 31: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Publication (12/28/18) of “Section 405(d)” Health Industry

Cybersecurity Practices

• Publication (1/28/19) of Medical Technology Joint Security Plan

• CWG Charter revision with clear governance and membership criteria

• CWTG industry election of first-ever 9-member executive committee

• October 26 CWG industry letter to OIG on HER reporting and anti-

kickback cyber exception

• October 17 CWG industry letter to ONC on cyber transparency in HER

Reporting Program

• August 24 CWG industry letter to CMS on Stark Law exception

31

2018 Deliverables

Page 32: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Cybersecurity Information Sharing Act of 2015 (405(d))

32

Page 33: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Top Rollout Engagement Activities

33

Page 34: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

CONTENT REVIEW OF HSCC CYBER SECURITY PRACTICES GUIDANCE

34

Page 35: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

HPH Sector benefits

35

Page 36: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP): The HICP examines cybersecurity threats and vulnerabilities that affect the healthcare industry. It explores (5) current threats and presents (10) practices to mitigate thosethreats.

Technical Volume 1: Cybersecurity Practices for Small Health Care Organizations: Technical Volume 1 discusses the ten Cybersecurity Practices along with Sub-Practices for small health care organizations.

Technical Volume 2: Cybersecurity Practices for Medium and Large Health Care Organizations: Technical Volume 2 discusses the ten Cybersecurity Practices along with Sub-Practices or medium and large health care organizations.

Resources and Templates: The Resources and Templates portion includes a variety of cybersecurity resources and templates for end users to reference.

Cybersecurity Practices Assessments Toolkit (Appendix E-1): This tool helps organizations prioritize their cyber threats and develop their own action plans using the assessment methodology outlines in the Resources and Templates volume. This tool is st9ll under development. To receive an advance copy, please contact us at [email protected].

36

Deliverables December 2018

Page 37: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Mandated by Section 405(d) of the Cybersecurity Act of 2015 (Public Law 114-

113)

– 4 volumes

• Main document

• Technical Vol(s) 1 and 2

• Resources and Templates

• Common set of voluntary, consensus-based and industry-led guidelines, best

practices, methodologies, procedures and processes to reduce cybersecurity

risks

• Five Risks of Healthcare Industry

• Ten Cybersecurity Threats

37

U.S. Health and Human Services Health Industry Cyber Security Practices: Managing Threats and Protecting Patients

Page 38: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

1. Email phishing attacks

2. Ransomware attacks

3. Loss or theft of equipment or data

4. Insider, accidental or intentional data loss

5. Attacks against connected medical devices that may affect patient

safety

38

Five Risks of Healthcare Industry

Page 39: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

1. Email protection systems

2. Endpoint protection systems

3. Access management

4. Data protection and loss prevention

5. Asset management

6. Network management

7. Vulnerability management

8. Incident response

9. Medical device security

10. Cybersecurity policies

39

Ten Cybersecurity Threats

Page 40: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Technical Volumes

40

Medium Organization

Cybersecurity Practice Sub-Practice

1 – E-mail Protection Systems A. Basic E-mail Protection ControlsB. Multifactor Authentication for

Remote E-mail AccessC. E-mail EncryptionD. Workforce Education

2 – Endpoint Protection Systems

2.M.A Basic Endpoint Protection Controls

3 – Access Management A. IdentityB. Provisioning, Transfers and De-

Provisioning ProceduresC. AuthenticationD. Multifactor Authentication for

Remote Access

4 – Data Protection and Loss Prevention

A. Classification of DataB. Data Use ProceduresC. Data SecurityD. Backup StrategiesE. Data Loss Prevention

5 – Asset Management A. Inventory of Endpoints and ServersB. ProcurementC. Secure Storage for Inactive DevicesD. Decommissioning Assets

Page 41: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Technical Volumes

41

Cybersecurity Practice Sub-Practice

6 – Network Management A. Network Profiles and FirewallsB. Network SegmentationC. Intrusion Prevention SystemsD. Web Proxy ProtectionE. Physical Security of Network

Devices

7 – Vulnerability Management A. Host/Server Based ScanningB. Web Application ScanningC. System Placement and Data

ClassificationD. Patch Management, Configuration

Management, and Change Management

8 – Incident Response A. Security Operations CenterB. Incident ResponseC. Information Sharing/ISACs/ISAOs

9 – Medical Device Security A. Medical Device ManagementB. Endpoint ProtectionsC. Identity and Access ManagementD. Asset ManagementE. Network Management

10 – Cybersecurity Policies 10.M.A Policies

Page 42: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

NEXT STEPS FOR HSCC

42

Page 43: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Continued 2019 pursuit of objectives formed into outcome-specific task groups

focused on implementing 2017 Healthcare Industry Cyber Security Task force

recommendations:

1. Define and streamline leadership, governance, and expectations for

healthcare industry cybersecurity

2. Increase the security and resilience of medical devices and health IT

3. Develop the healthcare workforce capacity necessary to prioritize and

ensure cybersecurity awareness and technical capabilities

4. Increase healthcare industry readiness through improved cybersecurity

awareness and education

5. Identify mechanisms to protect R&D efforts and intellectual property from

attacks and exposure

6. Improve information sharing of industry threats, risks, and mitigations

43

2019 Plan Ahead

Page 44: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Initiatives Under Consideration

44

Page 45: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Follows Financial Services and Electric Sector Models

• Aligns with Health Care Industry Cyber Security Task

Force recommendation for HHS CEO Engagement

• Provides ability to align strategic initiatives in other forums

• Ability to raise resources

• Strategic advisor to SCC; elevates discipline on

deliverables

45

CEO Council Proposal

Page 46: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Strengthened “culture of leadership” in CWG:

• EC leadership routinely identifying and

recruiting new leaders within membership

• Expanded cross-sector representation of

largest subsector stakeholders

• Increased membership and participation of

senior executive decision-makers

• Task Group work products distributed and

endorsed by relevant national industry

associations; adopted by market movers

• Collaborative mechanisms for measuring

adoption, implementation and results across

relevant subsectors

Leadership Measures• Increased demand (exceeding supply) for

Chairs/ExecCom/TG leadership roles

• Formation of plan for 2020 CEO Council

• Increase “proactive thinking” andorganizational in-kind contributions

• Average 50% attendance in TG workstreams

• Two member contributions to website per month

• Increased traffic on webchat platform

Representation Measures

• Subsector representation each at 85%of market (metric to be defined)

• % of member representative titles at VP or above / % increase of that figure over 2018

Implementation Measures

• At least the 2 largest associations by membership per subsector distributing/endorsing relevant work products with follow-up monitoring and measuring plan.

2019 Strategic Plans & Measures

Strategic Planning

46

Page 47: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

OTHER FEDERAL AND STATE CYBER REGULATIONS

47

Page 48: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Lessons learned from 50+ data security

related enforcement actions

• Start with security

• Control access to data sensibly

• Require secure passwords and authentication

• Store sensitive personal information securely and protect it during transmission

• Segment your network and monitor who is trying to get in and out

• Secure remote access to yournetwork

• Apply sound security practiceswhen developing new products

• Make sure your service providers implement reasonable security standards

• Put procedures in place to keep your security current and address vulnerabilities that may arise

• Secure paper, physical media and devices

FTC’s Start with Security Guidance

48

Page 49: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

CALIFORNIA CONSUMER PRIVACY ACT

49

Page 50: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

How did we get here?

– Data Breaches

– GDPR

– Cambridge Analytica

Ballot initiative proposed for November 2018 ballot.

California Consumer Privacy Act of 2018/AB 375 (CCPA) signed into law on June

28, 2018 - a few days after it was introduced in the CA legislature.

By the IAPP’s estimate, the Act could apply to more than 500,000 businesses in

the US alone; more if analyzed beyond the US.

50

Background

Page 51: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Broad Reach

51

“Businesses”

Applies to any business that collects or sells personal information

from or about consumers that determines the purposes and means of

the processing of consumers’ personal information.

Page 52: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Broad Reach

Businesses

+

Meets One or More Criteria:

Has gross annual revenues in excess of$25M;

Annually buys, sells, or receives or shares for commercial purposes, personal information of 50K + consumers, households, or devices; and/or

Derives 50% + of its annual income from selling consumers’ personal information

Business:

52

A sole proprietorship, partnership, limited liability company, corporation, association, or other legal entity that is organized or operated for the profit or financial benefit of its shareholders or other owners

Page 53: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Broad Reach

53

“Collect” or “Sell”

• Collect: Buying, renting, gathering, obtaining, receiving, or accessing

any personal information pertaining to a consumer by any means.

• Sell: Selling, renting, releasing, disclosing, disseminating, making

available, transferring, or otherwise communicating orally, in writing, or

by electronic or other means, a consumer’s personal information by the

business to another business or a third party for monetary or other

valuable consideration.

Page 54: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Broad Reach

54

Personal Information

• “Personal information” means information that identifies, relates to, describes,

is capable of being associated with, or could reasonably be linked, directly or

indirectly, with a particular consumer or household

– Far broader than typical US law (GDPR-esqe)

• Classics such as contact information, IP address, biometric information,

geolocation data plus:

– “Commercial information” including purchase records and consuming

histories or tendencies

– “Internet or other electronic network activity information”

– “Audio, electronic, visual, thermal, olfactory, or similar information”

– “Professional or employment-related information”

– “Inferences drawn” from any personal information

Page 55: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Broad Reach

55

Consumers

“Consumer” = Natural person who is California resident

Resident includes any individual who is in California “other than for a temporary or transitory purpose” or domiciled in California but outside California for temporary or transitory purpose

Could apply to information collected from California resident inside or outside California, unless “every aspect of the commercial conduct (relating to the consumers personal information) takes place wholly outside of California”

Includes employees, students, tenants, customers, business contacts,visitors to website…

Page 56: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Transparency

– General disclosures in traditional privacy notices but with more details

mandated

Consumer Rights

– Right to Know/Access

– Right to Deletion

– Right to Opt-Out of “Sale”

– Right to be Free From Discrimination

56

Transparency / Consumer Rights

Page 57: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Consumers may bring private individual or class actions if:

– The consumer’s nonencrypted or nonredacted personal information (as

defined by CA data breach notification statute) is subject to an

unauthorized access and exfiltration, theft or disclosure

– As a result of the businesses violation of the duty to implement and

maintain reasonable security procedures and practices appropriate to the

nature of the information

May recover $100 to $750 per violation or actual damages, whichever is

higher;

If the CA AG decides to pursue a case, civil penalties of $2,500 per violation,

or $7,500 for each intentional violation.

CA AG Rulemaking – Final rules due by July 1, 2020

57

Enforcement: Individual or Class Actions / CA Attorney General

Page 58: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

PRACTICAL TAKEAWAYS

58

Page 59: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

• Over the next year, businesses should:

1) Inventory the consumer-related personal information they collect and use

2) Update policies and procedures to comply with consumers’individual rights

3) Analyze all third-party contracts and amend them to prohibit the sale of personal information

4) Update systems and databases to comply with expanded individual rights (and respond to requests), such as amendment, deletion and accounting of disclosures

5) Make sure you have a person accountable for compliance

59

Practical Takeaways

Page 60: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

6) Conduct employee training on data security, new

consumer rights, and the handling of requests

7) Audit compliance internally and eternally

8) Provide third party certification to assure trust

9) Consider disciplinary action for failures to comply

10) Monitor all developments relating to legislation

11) Decide if California or other States’ residents’

information should be kept separate

60

Practical Takeaways

Page 61: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Lee Barrett

EHNAC Executive Director, CEO

[email protected]

860.408.1620

Sharon Klein, Esq., CIPP-US

Partner, Pepper Hamilton

[email protected]

949.567.3506

61

Page 62: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Promotes standards and best practices for Protected Health Information (PHI) security, privacy and confidentiality during acquisition, processing, storage and exchange.

Appointed by Dr. Donald Rucker, National Coordinator of the ONC to the Executive Steering Committee for the ONC’s Payer + Provider FAST FHIR Task Force and is a member of the HHS Cybersecurity Information Security Task Force (405d).

Works on key HIT industry initiatives that lay the foundation for health information technology – including support and implementation of important healthcare legislative mandates.

Speaks nationally on security, privacy, ransomware and cybersecurity risk management/assessment and mitigation strategies, tactics and best practices.

Lee BarrettExecutive Director & CEO | EHNACChair | National Trust Network Data Sharing and Cybersecurity Task Group860.651.6574

[email protected]

62

Page 63: Healthcare Cybersecurity: New HSCC Guidance, Managing ...media.straffordpub.com/products/healthcare-cyber... · 5/14/2019  · Health Industry Cybersecurity Practices: Managing Threats

Sharon R. Klein (CIPP/US)

Advises businesses on planning, drafting and implementing privacy, security and data protection policies and “best practices”, compliance with applicable laws, regulations and rules, and crisis management and litigation strategies for non-compliance.

Represents health care industry clients in the licensing of information technology and medical devices

Certified as an information privacy professional by the International Association of Privacy Professionals (IAPP).

Frequent writer and presenter on privacy, security and data protection matters.

Partner | Health Sciences GroupChair | Privacy, Security and Data Protection [email protected]

63