Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Recent headlines have reported a startling number of security breaches and information thefts. A major university notified 120,000 of its alumni after a computer containing fundraising information including addresses and Social Security numbers was hacked by an unknown intruder; a subsidiary of the Lexis Nexis group announced that the records of 32,000 individuals may have fallen into the hands of thieves using the passwords of legitimate subscribers; Bank of America reported the loss of backup tapes containing the financial records of up to 1.2 million federal employees; payroll outsourcer PayMaxx faced allegations that it had exposed 25,000 customer records, including W-2 information, online; and cell phone provider T-Mobile released information about a hacker who was able to exploit a security weakness in a commercial software package to access customer records, sensitive government documents, private e-mail and candid celebrity photos.
These stories have caught the attention of federal lawmakers, who are proposing legislation to address the security vulnerabilities in a world where personal data is increasingly available through digital media. But computer security is already a matter of law for many companies that provide health benefits for their employees. April 20, 2005 was the effective date for regulations regarding the security of electronic health information under the Health Insurance Portability and Accountability Act of 1996 (HIPAA Security Rule). (Note, “Small health plans,” or those with less than $5 million in receipts, have an additional year to comply [April 20, 2006]. For further information on how to calculate “receipts” in determining whether your plan is “small,” go to the Centers for Medicare and Medicaid Services [CMS] HIPAA Web site: www.cms.hhs.gov/hipaa/ hipaa2 /default.asp, select “Frequently Asked Questions” and then search for “small health plans.”) As was the case with the HIPAA Privacy requirements that went into effect in April 2003, all individual or group health plans that provide or pay for the cost of health care are covered. This means employer-sponsored medical plans, medical expense reimbursement accounts, and any separate dental and vision plans, whether provided through the purchase of insurance (fully insured plans) or paid directly out of company assets (self-insured plans).
Information Covered By the HIPAA Security Rule
A health plan or health insurer's HIPAA Privacy program addressed all protected health information (PHI) maintained or created by or on behalf of the plan, whether on paper, in a computer system or communicated orally. The HIPAA Security Rule addresses a small sub-set of PHI: electronic protected health information, or e-PHI. This means information in databases, in word processing documents on computers, and conveyed in e-mails — in other words, all PHI that is maintained or transmitted electronically. If some or all of a plan's e-PHI is in the hands of vendors or third-party administrators, then the plan must enter into an appropriate contractual arrangement with the vendors and/or third-party administrators (see the discussion below regarding business associate contracts). Even if an employer has outsourced most of its plan administration functions to an insurer or a third-party administrator, it is probable that at least some e-PHI remains in-house, even if it is just e-mails responding to employee inquiries about benefits or coverage.
HIPAA Security Rule Requirements
If a plan maintains or transmits any e-PHI, it will have to satisfy all of the HIPAA Security Rule requirements. At a basic level, the Rule requires health plans to protect the confidentiality, integrity and availability of e-PHI. This goes beyond just privacy – the Security Rule is also intended to ensure health information is not improperly altered or destroyed, and that e-PHI can be accessed even in cases of emergency (system shut downs, for example). The Rule is broken down into three categories:
For each category, the Rule defines specific standards and “implementation specifications” that consist of basic security protocols, such as audit logs, unique user identifiers, and password management. Some of the implementation specifications are “addressable,” meaning that you need to adopt them only if reasonable and appropriate for the health plan, but these decisions must be documented – “addressable” does not mean “optional.” The HIPAA Security Rule includes a chart listing all of the standards and implementation specifications; the chart and the regulation are available at www. cms.hhs.gov/hipaa/ hipaa2/regulations /security/03-3877. pdf. (For more detailed information about the HIPAA Security standards, please visit the Wiggin and Dana LLP Web site at www.wiggin.com/pubs/ advisories.asp, click on “HIPAA Advisory” and then select “Summary of HIPAA Security Rule.”)
Getting to HIPAA Security Compliance
Health plans that maintain and transmit e-PHI but which have not yet addressed HIPAA Security compliance should take the following steps:
Practical Pointers
Most health plans will not be starting HIPAA Security from scratch. At least part of what you need probably is already in place, such as locks on the doors to your office and unique user IDs and passwords to log into your computer systems. As part of HIPAA Privacy implementation, you may have already “cleaned house” by limiting the PHI (electronic or otherwise) you receive from your vendors and TPAs. The HIPAA Privacy and Security Rules also overlap to a limited degree, and some of the work to comply with HIPAA Privacy can be used and/or supplemented to meet your HIPAA Security compliance obligations. For instance, as part of your HIPAA Privacy compliance you should have established a sanctions policy that addresses disciplinary action for the improper use or disclosure of PHI, and implemented a training program for educating employees about the importance of protecting confidential health information. These policies can be easily modified to include HIPAA Security.
Larger employers also may have information security programs already in place. Because the standards in the HIPAA Security Rule generally are derived from industry practices in information security, your existing program may be sufficient to meet many of the requirements. However, you still need to document what is in place, assess any additional measures that may be necessary, and document how you have complied with each of the Security Rule standards.
Consequences
Like HIPAA Privacy, the government regulators charged with enforcing the HIPAA Security standards have stated that they will take a “complaint based' approach to enforcement, and that they will emphasize voluntary compliance , such as working with covered entities to develop corrective action plans. On March 25, 2005, the regulators published information about how individuals can file a complaint regarding noncompliance with HIPAA Security and other rules. The Centers for Medicare and Medicaid Services (CMS) has authority to impose civil monetary penalties for violations with maximum penalties of $25,000 per standard violated.
Conclusion
Computer and information security likely will continue to be a hot topic, both in the press and in legislatures around the country. Informing yourself about HIPAA Security and taking the necessary steps will ensure your health plan is in compliance now, and also will help prepare you for additional regulatory requirements that may be forthcoming. It cannot happen without the involvement of your IT staff, but it is not a question for IT alone. Pull together a cross-disciplinary team with the appropriate knowledge base, take a step-by-step approach to compliance, and build on what you already have. IT consultants and/or legal counsel may be necessary to give advice on questions specific to your health plan.
Recent headlines have reported a startling number of security breaches and information thefts. A major university notified 120,000 of its alumni after a computer containing fundraising information including addresses and Social Security numbers was hacked by an unknown intruder; a subsidiary of the Lexis Nexis group announced that the records of 32,000 individuals may have fallen into the hands of thieves using the passwords of legitimate subscribers;
These stories have caught the attention of federal lawmakers, who are proposing legislation to address the security vulnerabilities in a world where personal data is increasingly available through digital media. But computer security is already a matter of law for many companies that provide health benefits for their employees. April 20, 2005 was the effective date for regulations regarding the security of electronic health information under the Health Insurance Portability and Accountability Act of 1996 (HIPAA Security Rule). (Note, “Small health plans,” or those with less than $5 million in receipts, have an additional year to comply [April 20, 2006]. For further information on how to calculate “receipts” in determining whether your plan is “small,” go to the Centers for Medicare and Medicaid Services [CMS] HIPAA Web site: www.cms.hhs.gov/hipaa/ hipaa2 /default.asp, select “Frequently Asked Questions” and then search for “small health plans.”) As was the case with the HIPAA Privacy requirements that went into effect in April 2003, all individual or group health plans that provide or pay for the cost of health care are covered. This means employer-sponsored medical plans, medical expense reimbursement accounts, and any separate dental and vision plans, whether provided through the purchase of insurance (fully insured plans) or paid directly out of company assets (self-insured plans).
Information Covered By the HIPAA Security Rule
A health plan or health insurer's HIPAA Privacy program addressed all protected health information (PHI) maintained or created by or on behalf of the plan, whether on paper, in a computer system or communicated orally. The HIPAA Security Rule addresses a small sub-set of PHI: electronic protected health information, or e-PHI. This means information in databases, in word processing documents on computers, and conveyed in e-mails — in other words, all PHI that is maintained or transmitted electronically. If some or all of a plan's e-PHI is in the hands of vendors or third-party administrators, then the plan must enter into an appropriate contractual arrangement with the vendors and/or third-party administrators (see the discussion below regarding business associate contracts). Even if an employer has outsourced most of its plan administration functions to an insurer or a third-party administrator, it is probable that at least some e-PHI remains in-house, even if it is just e-mails responding to employee inquiries about benefits or coverage.
HIPAA Security Rule Requirements
If a plan maintains or transmits any e-PHI, it will have to satisfy all of the HIPAA Security Rule requirements. At a basic level, the Rule requires health plans to protect the confidentiality, integrity and availability of e-PHI. This goes beyond just privacy – the Security Rule is also intended to ensure health information is not improperly altered or destroyed, and that e-PHI can be accessed even in cases of emergency (system shut downs, for example). The Rule is broken down into three categories:
For each category, the Rule defines specific standards and “implementation specifications” that consist of basic security protocols, such as audit logs, unique user identifiers, and password management. Some of the implementation specifications are “addressable,” meaning that you need to adopt them only if reasonable and appropriate for the health plan, but these decisions must be documented – “addressable” does not mean “optional.” The HIPAA Security Rule includes a chart listing all of the standards and implementation specifications; the chart and the regulation are available at www. cms.hhs.gov/hipaa/ hipaa2/regulations /security/03-3877. pdf. (For more detailed information about the HIPAA Security standards, please visit the Wiggin and Dana LLP Web site at www.wiggin.com/pubs/ advisories.asp, click on “HIPAA Advisory” and then select “Summary of HIPAA Security Rule.”)
Getting to HIPAA Security Compliance
Health plans that maintain and transmit e-PHI but which have not yet addressed HIPAA Security compliance should take the following steps:
Practical Pointers
Most health plans will not be starting HIPAA Security from scratch. At least part of what you need probably is already in place, such as locks on the doors to your office and unique user IDs and passwords to log into your computer systems. As part of HIPAA Privacy implementation, you may have already “cleaned house” by limiting the PHI (electronic or otherwise) you receive from your vendors and TPAs. The HIPAA Privacy and Security Rules also overlap to a limited degree, and some of the work to comply with HIPAA Privacy can be used and/or supplemented to meet your HIPAA Security compliance obligations. For instance, as part of your HIPAA Privacy compliance you should have established a sanctions policy that addresses disciplinary action for the improper use or disclosure of PHI, and implemented a training program for educating employees about the importance of protecting confidential health information. These policies can be easily modified to include HIPAA Security.
Larger employers also may have information security programs already in place. Because the standards in the HIPAA Security Rule generally are derived from industry practices in information security, your existing program may be sufficient to meet many of the requirements. However, you still need to document what is in place, assess any additional measures that may be necessary, and document how you have complied with each of the Security Rule standards.
Consequences
Like HIPAA Privacy, the government regulators charged with enforcing the HIPAA Security standards have stated that they will take a “complaint based' approach to enforcement, and that they will emphasize voluntary compliance , such as working with covered entities to develop corrective action plans. On March 25, 2005, the regulators published information about how individuals can file a complaint regarding noncompliance with HIPAA Security and other rules. The Centers for Medicare and Medicaid Services (CMS) has authority to impose civil monetary penalties for violations with maximum penalties of $25,000 per standard violated.
Conclusion
Computer and information security likely will continue to be a hot topic, both in the press and in legislatures around the country. Informing yourself about HIPAA Security and taking the necessary steps will ensure your health plan is in compliance now, and also will help prepare you for additional regulatory requirements that may be forthcoming. It cannot happen without the involvement of your IT staff, but it is not a question for IT alone. Pull together a cross-disciplinary team with the appropriate knowledge base, take a step-by-step approach to compliance, and build on what you already have. IT consultants and/or legal counsel may be necessary to give advice on questions specific to your health plan.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.