Privacy Initiatives

advertisement
Susan Blair, MSJ, MBA, CIPP, CCEP, CIA
Chief Privacy Officer, University of Florida
DO
PLAN
WATCH




Privacy Complaint: An allegation by an individual
that an organization is not complying with the
requirements of the federal privacy and/or
security regulations or the organization’s own
policies and procedures related to the privacy /
security of personal information.
Privacy Incident: A known or suspected action,
inconsistent with the organization’s privacy
policies and procedures, or an adverse event,
related to restricted or sensitive information.
250
200
All Other
150
Research
Personal
Academic
100
Health
50
0
2003
2004
2005
2006
2007
2008
250
200
150
UF Campus
Health Ctrs
100
50
0
2003
2004
2005
2006
2007
2008







PHI: 3,440
PHI/PII: 335,353
PII: 825
Student Record: 4,955
PII/Student Record: 13,516
Financial: 2
Human Resources: 32

College of Dentistry: 334,238#/7

College of Medicine: 3,501/91

Academic Technology-CLAS: 11,562/2

College of Engineering: 4,423/3

Reitz Union: 612/1

IFAS: 271/2

College of Education: 145/1

*Number of Violations/Incidents
#334,234 were both PHI and PII violations
Genetic Information Nondiscrimination Act
Red Flag Rules
American Reinvestment and Recovery Act (ARRA)
Health Information Technology for Economic and
Clinical Health Act (HITECH)



Results of genetic tests for
individuals or family members that
provides any data about medical
history; includes predictive testing
Mandates modification of HIPAA’s
Privacy Rule so that genetic
information is treated as protected
health information; became effective
May 21, 2009
Confidentiality safeguards required
for collection, maintenance, and
storage; also limits disclosure of
genetic information.


FTC Red Flag Rules, became
effective May 1, 2009 but delayed
to August 1, 2009
Written ID Theft Prevention
Program for any ‘covered account’
for individuals or households.
 regularly extending, renewing, or
continuing credit;
 regularly arranging for such credit;
 acting as an assignee of an original
creditor








Inventory and Risk Assessment of
Accounts
Board of Trustees Review and Approval
of Written Policies and Procedures
Red Flags Training
Departmental Procedures & Training
Compliance Audits
Cross-reference to Critical Incident
and Breach Notification Plan and SSN
Monitoring
Add or revise contract language to require
contractors to establish a written identity
theft program or to mirror the
University’s Red Flags Program
Audit compliance at least annually.


Restrictions on Disclosures prohibited with
limited exceptions (as required by law)
Enforcement by State Attorney General
◦
◦
◦
◦

Civil case (violation) on interest to state residents
Damages and court fees to be awarded
Federal court venue
Effective for violations that occurred after enactment
Tiered Civil Monetary Penalties Collected
◦ Employees or individuals can be found liable under
HIPAA.

Minimum Penalties

Maximum Penalties
“Did not know”
◦ Tier A
$100
◦ Tier A $25,000
“Reasonable cause”
◦ Tier B
$1,000
◦ Tier B
“Willful neglect”
◦ Tier C $10,000
◦ Tier C $250,000
“Uncorrected violation”
◦ Tier D $50,000
◦ Tier D $1,500,000
Minimum per Violation
Annual Maximum
$100,000
August 2009: Breach notification
provisions and PHI breach notification
February 2010: Business Associates
and Marketing
August 2010: Minimum Necessary and
Prohibition on sale of electronic health
records/PHRs.
January 2011: Accounting for
Disclosures
February 2011: Enforcement for
‘willful neglect’

Section 13402 requires HIPAA
covered entities to notify affected
individuals of a breach of
“unsecured protected health
information”
◦ “Not secured through the use of a
technology or methodology specified by
the Secretary of HHS through guidance”

April 17th HHS Guidance
recommends either encryption or
destruction.

Encryption According to National Institute of
Standards and Technology (“NIST”) or Federal
Information Processing Standards (“FIPS”):
◦ “Data at rest” - NIST 800-111, Guide to Storage
Encryption Technologies for End User Devices
◦ “Data in motion” – FIPS 140-2, including
 NIST 800-52, Guidelines for the Selection and Use of
Transport Layer Security Implementation
 NIST 800-77, Guide to IPSet VPNs
 NIST 800-113, Guide to SSL VPNs

Destruction :
◦ Paper, film, or other hard copy media must be
shredded or destroyed to the extent that the PHI
cannot be read or reconstructed.
◦ Electronic media must be cleared, purged or
destroyed such that the PHI cannot be retrieved,
and such destruction must be consistent with
NIST 800-88, Guidelines for Medical Sanitization.

Notification: Sets thresholds for triggering
breach notification requirements as well as
parameters for the method, content, and
timing of the notification. For example,
◦ Must provide notice to consumers and FTC within 60
days of discovery;
◦ Notice must include mitigation details; and
◦ If 10 or more individuals cannot be reached, must
post conspicuously for six months on homepage of
website; or, provided to print and broadcast media
outlets in areas affected by breach.

Applies to breaches discovered on or after
September 18, 2009.


Over 50 colleges and universities have experienced
multiple reported privacy incidents since 2001. At a
state level, California is home to seven twice
breached universities, while Ohio follows at four
schools.
At least four universities have experienced five or
more publicized privacy incidents.




Purdue University (7)
Ohio University (5)
University of Florida (5)
University of Iowa (5)











Stanford University 72,000
University Georgia: 4,250
University Akron: 800
University of Florida: 101
Ohio University 492
Tennessee Tech: 990
University Texas: 2,500
University of Maryland 23,000
Penn State: 677
Georgetown University: 38,000
University of Florida: 1,900












University Minnesota: 3,100
Long Island University: 30,000
Middle Tenn. State: 1,500
Texas A&M: 3,000
Harvard University: 6,600
Binghamton University: 300
University of Miami: 2,100,000
University of Florida: 11,300
University of Utah: 2,200,000
University of Florida: 344, 448
Oklahoma St. University:
70,000
UC San Francisco: 3, 569







Data-rich information systems
creating a natural target.
Outdated and non-enforced data
security safeguards.
Sophisticated intruders with
potential criminal intent.
Careless or inattentive data
systems management.
Negligent hiring practices or
employee misuse of data.
Demonstrated opportunities for
repeat access.
Business partners or research
sponsors who fail to protect
information.


Seminal means “Highly original and
influencing the development of future
events”.
When does Privacy Breach cause
harm?
◦ Identity theft and financial fraud
◦ Offensive publication of illicitly acquired PII
◦ Limit economic opportunities, i.e. job
applicant

Canada, Australia, New Zealand are
codifying that privacy-security
breaches can cause harm.



Federal Precedent: Ninth Circuit
Court (Stollenwerk) opined that
‘harm’ was not necessary for class
action lawsuits resulting from
data breach.
Partnering of Federal Agencies:
FTC joined OCR to pursue claims
against CVS with settlement costs
of $2.25 million. Also, FTC can
levy penalties where identity theft
results.
States’ Action: ARRA permits
states’ AG to sue for damages on
behalf of residents.




Increased Governmental
Regulations, especially for identity
theft and healthcare operations
Emerging Technology Risks
and Expanding Data Security
Obligations
Probable Civil Case Law
Developments as well as
Enhanced Enforcement,
especially from state AGs.
Continuing infrastructure and
resource challenges
UF Privacy Office
◦ http://privacy.ufl.edu
◦ 352-273-5094
◦ Toll-free Hotline: 866-876-4472
Download