davis wright tremaine llp responding to your worst security breach nightmare: when patient...

19
Davis Wright Davis Wright Tremaine Tremaine LLP LLP Responding to Your Worst Responding to Your Worst Security Breach Nightmare: Security Breach Nightmare: When Patient Information Is When Patient Information Is Stolen Stolen Rebecca L. Williams, R.N., J.D. Partner Davis Wright Tremaine LLP Seattle, WA 206-628-7769 Thomas E. Jeffry, Jr., Esq. Partner Davis Wright Tremaine LLP Los Angeles, CA 213-633-4265

Upload: gervase-jordan

Post on 13-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davis Wright Davis Wright Tremaine Tremaine LLPLLP

Responding to Your Worst Responding to Your Worst Security Breach Nightmare:Security Breach Nightmare:

When Patient Information Is StolenWhen Patient Information Is Stolen

Rebecca L. Williams, R.N., J.D.PartnerDavis Wright Tremaine LLPSeattle, [email protected]

Thomas E. Jeffry, Jr., Esq.PartnerDavis Wright Tremaine LLPLos Angeles, [email protected]

Page 2: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

2

It Can Happen to Your It Can Happen to Your OrganizationOrganizationIt Can Happen to Your It Can Happen to Your OrganizationOrganization

“Patient data stolen from Kaiser” Vallejo Times Herald, August 2006

“Computer Stolen From VA Subcontractor” Washington Post, August 2006

“Patient records stolen” Press Register, June 2006

“San Jose Arrest in theft of records South Bay patients' medical data stolen” San Francisco Chronicle, May 2005

Page 3: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

3

Finding the BalanceFinding the BalanceFinding the BalanceFinding the Balance

Strong push to electronic health information

Public and government outcry over privacyviolations and identity theft

Laws in place to protect health and electronicinformation and to notify in case of a breach

Page 4: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

4

Security Breaches HappenSecurity Breaches HappenSecurity Breaches HappenSecurity Breaches Happen

No such thing as perfect security Even with reasonable security measures,

security breaches happenHackersLost or stolen technology, e.g., laptops,

thumbdrives, PDAsDisgruntled employees

Need a prompt and effective response

Page 5: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

5

Know the Laws that May Apply: Know the Laws that May Apply: HIPAAHIPAAKnow the Laws that May Apply: Know the Laws that May Apply: HIPAAHIPAA

HIPAA criminal and civil penalties for violations of the statute, Privacy Rule and/or Security Rule

No private right of action but … Privacy Rule prohibits uses and disclosures of PHI except

as permitted or required by HIPAA Security Rule requires covered entities to

Protect against any reasonably anticipated Threats or hazards to the security or integrity of ePHI Impermissible uses and disclosure

Ensure confidentiality, availability and integrity of electronic PHI

Ensure compliance by a covered entity’s workforce

Page 6: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

6

Potentially Applicable Laws: Potentially Applicable Laws: HIPAAHIPAAPotentially Applicable Laws: Potentially Applicable Laws: HIPAAHIPAA

HIPAA Privacy RuleMitigation to the extent practicableSanctions

HIPAA Security RuleMitigation of harmful effects of security

incident No requirement to report

Page 7: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

7

Potentially Applicable Laws: FTC Act Potentially Applicable Laws: FTC Act and State Consumer Protectionand State Consumer ProtectionPotentially Applicable Laws: FTC Act Potentially Applicable Laws: FTC Act and State Consumer Protectionand State Consumer Protection

Misrepresentation of privacy and security promises

Failure to implement reasonable information security practices

Page 8: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

8

Potentially Applicable Laws: Data Potentially Applicable Laws: Data Breach NotificationBreach NotificationPotentially Applicable Laws: Data Potentially Applicable Laws: Data Breach NotificationBreach Notification

California S.B. 1386 enacted in August 2002 Increasing number of states enacting similar

notification laws Specific triggers

Usually tied to security breach and electronic information

Sometimes requires notification only for breaches of unencrypted information

May be based on recipient Timing and content requirements

Page 9: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

9

Potentially Applicable Laws: Potentially Applicable Laws: Confidentiality LawsConfidentiality LawsPotentially Applicable Laws: Potentially Applicable Laws: Confidentiality LawsConfidentiality Laws

Specific confidentiality requirements, particularly health care and financial information

Superconfidentiality requirements in health care Substance abuse (State and Federal) Mental health and developmental disabilities AIDS, HIV Genetic information

Federal Privacy Act Other laws

Be aware

Page 10: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

10

Investigate the BreachInvestigate the BreachInvestigate the BreachInvestigate the Breach

Identify a single point person responsible for investigation

Build a team Identify needed expertise

Inclusion of attorneys In-house Outside counsel

Determine scope of breach Investigate fully Report internally

Page 11: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

11

Notify Law Enforcement?Notify Law Enforcement?Notify Law Enforcement?Notify Law Enforcement?

Determine whether a crime seems likely to have been committed

If so, law enforcement notification generally is prudent

Be sure disclosures to law enforcement comply with applicable law, such as HIPAA

Verify with law enforcement before notifying workforce, people affected or the public Do not want to impede an

ongoing investigation

Page 12: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

12

Decision as to Whether to NotifyDecision as to Whether to NotifyDecision as to Whether to NotifyDecision as to Whether to Notify Types of persons to be notified

Directors, members/shareholders Workforce Oversight agencies Individuals whose information may have been affected The public

Each category requires a different analysis Considerations include:

Notification laws Duties to mitigate (e.g., will notification diminish the chance of

identity theft?) Industry custom and practice Ethical obligations Preference of the organization

Page 13: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

13

Timely Notification as AppropriateTimely Notification as AppropriateTimely Notification as AppropriateTimely Notification as Appropriate Carefully craft notice; consider including

Basic information about breach Measures taken to address breach Guidance on actions affected persons can take to protect

themselves Corrective action plan to avoid similar problem in the future

Timing and content may be dictated by data breach or other laws If law enforcement is involved, verify whether notification will

interfere with investigation Be prepared to respond to those notified

Phone banks Website Adequate and trained staffing

Point person for dealing with mediaor public (may not be the same as theperson running the investigation)

Page 14: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

14

SanctionsSanctionsSanctionsSanctions

Did any workforce act or fail to act in a manner that should result in sanctions? Up to any including termination Sanctions to be consistently applied

May prove helpful when dealing with oversight and enforcement agencies

May want to consider a policy requiring workforce to cooperate fully in investigation (or face disciplinary action)

Page 15: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

15

Fixing and MitigatingFixing and MitigatingFixing and MitigatingFixing and Mitigating

Plan of correction Need to assess causes of

security breach What information was involved? Who was affected? How did it happen?

Address immediate actions to remedy the breach at hand

HIPAA Privacy and Security Rules require mitigation Need to determine what actions,

if any, will mitigate adverse effects

Page 16: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

16

Plan of Correction to avoid similar future breachesAsk questions

Did all that information need to be on the laptop?

Security fixesRevisit applicable policies, procedures,

and protocolsTraining/re-training of entire workforceConcentrated training on more directly

affected personnelOther actions

Fixing and MitigatingFixing and MitigatingFixing and MitigatingFixing and Mitigating

Page 17: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

17

Contacting Outside Agencies/ Contacting Outside Agencies/ Cooperating in Outside InvestigationCooperating in Outside InvestigationContacting Outside Agencies/ Contacting Outside Agencies/ Cooperating in Outside InvestigationCooperating in Outside Investigation

Decision as to whether to notify outside agencies May be required May be recommendable

Types of parties to be notified JCAHO State licensure Attorneys General offices

But not OCR (no process for self-reporting)

Page 18: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

18

Continuing OperationContinuing OperationContinuing OperationContinuing Operation

Organization needs to continue operations while addressing security breach

Often resources are strained

Page 19: Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner

Davi

s W

rig

ht

Tre

main

eD

avi

s W

rig

ht

Tre

main

e

LL

PL

LP

19

QuestionsQuestionsQuestionsQuestions