redspin phi breach report 2012

17
© Redspin, Inc. Page 1 Breach Report 2012 Protected Health Information February 2013

Upload: redspin-inc

Post on 07-Nov-2014

576 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 1

Breach Report 2012

Protected Health Information

February 2013

Page 2: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 2

Table of Contents

3……………………Executive Summary

4……………………By the Numbers

5……………………Discussion of Results

12………….……….Conclusion and Recommendations

Appendix:

16………….…….….HIPAA Omnibus Rule Highlights

Figures and Tables:

Table 1

Top 5 PHI Breaches, 2012

p.5

Table 2

Total Large PHI Breaches, Records Impacted, 2010-2012

p.7

Table 3

Total Large PHI Breaches/Records Impacted Involving Business Associates, 2010-12

p.9

Table 4

PHI Data Breach By Source/ Device

p.11

Page 3: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 3

Executive Summary

A total of 538 large breaches of protected health information (PHI)

affecting over 21.4 million patient records1 have been reported to

the Secretary of Health and Human Services (HHS) since the

August 2009 interim final breach notification rule was issued as a

part of the Health Information Technology for Economic and

Clinical Health (HITECH) Act.

To prepare for our 3rd annual Breach Report / Protected Health Information, we spent

weeks reviewing the complete statistical data set of breaches reported to HHS since

2009. Based on our analysis, we’ve prepared an objective assessment of the overall

effectiveness of the policies and controls that have been put in place to safeguard

protected health information. By identifying significant trends and drawing attention to

specific areas in need of improvement, we hope to help the healthcare industry improve

its ability to protect patient information. That is our goal. To that end, we’ve included

Redspin’s recommendations for preventive measures and corrective action to address

the most critical weaknesses.

1 These numbers include breaches that affected >500 individuals and were reported to HHS

from August 2009 to January 17, 2013. Those that impacted less than 500 are also reported to

the HHS on an annual basis but the specifics are not made publicly available.

Page 4: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 4

By the Numbers

538 breaches of protected health information (PHI)

21,408,505 patient health records affected

21.5% increase in # of large breaches in 2012 over 2011

but… a 77% decrease in # of patient records impacted

67% of all breaches have been the result of theft or loss

57% of all patient records breached involved a business

associate

5X historically, breaches at business associates have

impacted 5 times as many patient records as those at a

covered entity

38% of incidents were as a result of an unencrypted laptop or

other portable electronic device

63.9% percent of total records breached in 2012 resulted from

the 5 largest incidents

780,000 number of records breached in the single largest incident

of 2012

Page 5: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 5

Discussion of Results

In recent years, IT security has risen to the level of enterprise risk in many industries.

Data breaches can cause significant financial harm, reputational damage, and loss of

consumer confidence. In healthcare, that risk is not limited to an individual hospital or

business associate. It is an industry-wide threat to the continued adoption of electronic

health records – the foundation for improving cost efficiency, care delivery, and patient

outcomes within the U.S. healthcare industry.

Quite a Handful. 146 breaches of protected health information affecting 2,413,397

individuals were reported to HHS in 2012. The top 5 incidents were particularly

egregious, contributing nearly two-thirds of the total number of patient records exposed

during the entire year. In striking contrast from previous years, there was little similarity

in the root causes among this year’s “top 5” breaches. From a malicious hack, to lost

back-up disks, to an email containing hundreds of thousands of patient records, these

incidents highlight the breadth and complexity of the IT security challenge facing

healthcare providers today.

Table 1: Top 5 PHI Breaches, 2012

COVERED ENTITY

INDIVIDUALS

AFFECTED

TYPE OF BREACH LOCATION OF BREACHED

INFORMATION

Utah Department of Health 780,000

Hacking/IT Incident Network Server

Emory Healthcare 315,000 Unknown Backup Disks

South Carolina Department of Health and Human Services 228,435

Unauthorized Access/Disclosure Email

Alere Home Monitoring, Inc. 116,506 Theft Laptop

Memorial Healthcare System 102,153 Theft

Electronic Medical Record

Page 6: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 6

The hacking incident at the Utah Department of Health is of particular concern. Given

the richness of the personal data that PHI contains, hackers are often mentioned as a

potential threat to PHI. Yet, from 2009 to date, hacking has contributed to roughly 6%

of data breaches, both in number of incidents and number of individuals affected. Many

people have been surprised at this low incident rate, perhaps to the point of

complacency. Others speculate that a significant number of smaller “hacks” have gone

undetected. But the magnitude of the Eastern European-based attack on the State of

Utah should end any complacency. The hackers exposed claims data for 780,000

Medicaid and Children’s’ Health Plan recipients. As a result, the State IT Director was

fired. Recently, a new Utah Senate bill was put forth requiring that its Department of IT

Services assemble a team of experts to ensure that security “best practices” are

followed. The proposed law also includes a requirement for an audit of the department

every two years.

In Redspin’s opinion, hacker attacks are likely to increase in frequency over the next

few years. Personal health records are high value targets for cybercriminals as they can

be exploited for identify theft, insurance fraud, stolen prescriptions, and dangerous

hoaxes. We expect that the low incidence rate of hacking during the past few years was

the calm before the storm. It is crucial for healthcare providers to “up their game” when

it comes to security defenses. The proposed Utah state law cites best practices but is

short on specifics. We’d recommend every health provider conduct an annual IT

security risk analysis and implement even more frequent penetration testing and

vulnerability assessments.

Some Signs of Improvement. In 2012, the incidents of large PHI breaches increased

by nearly 21%. However, it’s not all bad news. The corresponding total number of

patient records impacted dropped dramatically – a whopping 77% decrease year over

year. While 146 breaches affecting over 2.4 million people might not sound like

success, it is a significant improvement.

Page 7: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 7

Table 2: Total Large PHI Breaches and Records Impacted, 2010-2012

PHI Breaches Affecting > 500 Individuals 2010 2011 2012

Total # of Incidents Reported 258 121 146

Total # of Patient Records Impacted 8,313,517

10,684,591

2,413,397

We believe the privacy and security safeguards envisioned in the HITECH Act,

implemented and enforced by HHS, CMS and OCR, and recently codified in the HIPAA

Omnibus Rule are having a positive impact. Consider the number of covered entities

that conducted a HIPAA Security Risk Analysis in the latter half of 2011 and throughout

2012. Redspin alone helped nearly 100 hospitals meet the security risk analysis

requirement of Meaningful Use Core Measure14.

During the same time period, OCR began to wield its enforcement authority, publicly

announcing several high profile investigations that resulted in breach resolution

agreements. Financial penalties have been assessed per the increased levels under

the interim Breach Rule. OCR also launched its HIPAA Audit Program and, although

they audited only about 100 covered entities, the possibility that any covered entity

could be on their future audit list, brought the program home to all. As one hospital CIO

said to us: “We’d rather have OCR come in and do their audit after Redspin has helped

us conduct a security risk analysis, so they can see we haven’t been standing still.”

Indeed, the requirement to conduct periodic security risk analysis has been a Federal

regulation since the effective date of the HIPAA Security Rule in 2005. Standing still is

no longer an option. The HITECH Act, Meaningful Use, and now the HIPAA Omnibus

Rule, have all brought the issue of IT security into sharper focus.

As we move toward realizing the full promise of electronic health record (EHR)

technology, the need for IT security in healthcare has never been so great. When the

authors of the HIPAA security rule recommended periodic security risk analysis, the

pace of change in healthcare network infrastructure, applications, devices and workflow

might have only warranted periodic check-ups. In addition, the threat landscape was

Page 8: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 8

much different then. The highest risk to healthcare records was loss from fire or water

damage. Even the highest concentrations of paper files stored in archived facilities did

not approximate the amount of PHI that could today reside on a single thumb drive.

Today’s challenges call for a new ways of thinking about traditional HIPAA risk

assessments. IT security is a process not a project. A successful security program is a

repetitive cycle of thorough testing, reports of findings, remediation, and retesting. For

some aspects of an IT security program, such as policies and procedures, an annual

review will be sufficient. But to protect against new or arising threats, monthly or

quarterly vulnerability scanning, threat management, and remediation will be needed.

A successful security program must also involve employees and business partners. All

employees need to be engaged in building a culture of security – a process of internal

training, daily reminders, and visual workplace cues. Lastly, the responsibility of PHI

security now extends outside the organization. While the Omnibus rule extends

compliance with HIPAA security provisions and direct civil liability for breach to business

associates and their vendors, covered entities still retain their obligation to ensure that

its business associates are safeguarding PHI effectively.

Omnibus Arrives – Just in Time?

As mentioned above, both covered entities and business associates (BAs) now stand

more or less on equal footing (at least from the regulatory standpoint) regarding their

responsibility to safeguard PHI from breach. Over the past few years (or perhaps even

from the beginning of time), this is an area that has suffered from “woeful neglect,” so to

speak. As we have said publicly, "Hospitals clearly need greater visibility and control

over how their business partners protect the privacy and security of confidential patient

data.”

The statistics do indeed bear this out. Since late 2009, 57% of all patient records

involved in large-scale PHI breaches have involved a business associate. In raw

numbers, that’s 12,110,729 individuals!

Page 9: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 9

Table 3: Total Large PHI Breaches/Records Impacted Involving Business Associates, 2010-12

Incidents

Involving

BA

Total

Breach

Incidents

%

Involving

BA

Records

Impacted by

BA Incident

All Records

Impacted by

Breaches

%

Involving

BA

2010 51 258 19.8% 4,136,397 8,313,517 49.8%

2011 31 121 25.6% 7,078,890 10,684,591 66.2%

2012 22 146 15,1% 895,442 2,413,397 37.0%

104 525 19.8% 12,110,729 21,411,505 56.6%

It was against this backdrop that the long-awaited HIPAA Omnibus Rule was publicly

announced and published in the Federal Register on January 25, 2013 with an effective

date of March 26, 2013 and a compliance date of September 23, 2013.

Although promoted as “the most sweeping changes to the HIPAA Privacy and Security

Rules since they were first implemented,” much of the Omnibus Rule is similar to interim

regulations published in 2010-2011 as authorized under the 2009 HITECH Act.

However, the extension of the responsibility for safeguarding PHI to business

associates and their subcontractors is indeed a sea change. Not only must BAs now

comply with the HIPAA Security Rules just like their covered entity partners but they can

also be held directly and civilly liable for PHI breach.

This is a good (albeit late) start but the next steps are even more vitally important.

Compliance regulations lose steam over time unless they are aggressively enforced.

OCR, though well-intentioned, has a long way to go before they can be in a position to

audit any business associates. At best, we’ll continue to see some high profile business

associate breach penalties announced in the press. Such negative PR is attention-

grabbing but fleeting – it too wanes over time unless there is a consistent driver for

maintaining compliance and improving security.

Page 10: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 10

So where will improvements in this critical area come from, if at all? Redspin believes

that true collaboration between covered entities, business associates, vendors, law

firms, and expert security firms will be essential to building a truly secure “chain of PHI

custody” with consistent safeguards at every point. Like most challenges to improve the

common good, covered entities and BAs should accept joint responsibility and

accountability as they are both vested in the same positive outcome.

Easy for us to say! But we are not just talk. Redspin has put together a Business

Associate Risk Assessment service, including a methodology that helps hospitals

evaluate the internal controls of their business associates while building a risk model to

determine overall exposure. It serves to initiate a mutually-beneficial exercise as

hospitals and BAs can then openly discuss process improvements using a common

framework and with the shared goal of protecting PHI.

Going Mobile

In last year’s report, we noted that 39% of all PHI breaches had occurred on a laptop or

other portable device, the easiest type of device for thieves to steal or employees to

lose. That trend continued in 2012 (37.7% of total) and we continue to fear the situation

is going to get worse before it gets better. What was unusual just 18 months ago in

healthcare organizations is now routine. Smartphones, iPads, and other BYOD

computing devices now enter the healthcare workplace daily – and go home at night.

Forrester Research reports that 37% of information workers are using BYOD at work

before policies are even in place.

CMS has included a specific call-to-action in Stage 2 meaningful use that reemphasizes

the “addressable” requirement in the HIPAA Security Rule governing the encryption of

data-at-rest. Why not make this mandatory – at least on portable devices? Stricter

policies and more encryption are clearly called for. We suspect the “wiggle room” in the

HIPAA Security Rule was kept it tact by CMS, rather than risk that a stricter encryption

requirement would delay the pace of Stage 2 attestation.

Page 11: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 11

BYOD just makes it worse. With BYOD, the users need to have more say in the matter.

Owning the devices creates both a legal and psychological differences regarding usage.

Employers and employees must work towards truly mutually acceptable policies or

there is a risk, employees will just do what they want. No one has found the ideal

solution yet. With Redspin’s mobile device security assessments, we offer a

methodology that enables IT management to have increased engagement with their

healthcare workers and get their buy-in, while deploying simpler encryption methods

and offering more security awareness training. We think this approach has the best

chance of success but ultimately, it will be the future breach statistics that tell the tale.

Table 4: PHI Data Breach by Source / Device

Pre-2012 2012

Laptop and other portable device 151 39.2% 55 37.7%

Paper 92 23.9% 31 21.2%

Computer 56 14.5% 20 13.7%

Server 38 9.9% 15 10.3%

Other 18 4.7% 18 12.3%

Email 7 2% 4 2.7%

Electronic Health Record 6 1.6% 2 1.4%

X-Ray 5 1.3% 0 0

Back-up Tapes 4 1% 1 0.6%

Hard Drives 3 0.8% 0 0

Mail, Postcards 3 0.8% 0 0

CD 2 0.5% 0 0

Total 385 100% 146 100%

Another area to keep a close watch on is unauthorized access. The 3rd largest breach

in 2012 occurred at the South Carolina Department of Health and Human Services

when an employee (now ex-employee) emailed himself 228,000 patient records.

Malicious hackers are not the only group to realize the value of a stolen health record

Page 12: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 12

when used for illegal purpose – it may be your own employees. Incidents of insider

threat are on the rise and can only be prevented by a comprehensive security program

– not a once a year risk assessment but an integrated program of policies, controls,

technical safeguards, organizational accountability, enforcement, training, and

leadership.

Conclusions and Recommendations

Four years ago, the Health Information Technology Economic and Clinical Health

(HITECH) Act was signed into law to promote the adoption and meaningful use of

health information technology. Subtitle D of the HITECH Act addressed the privacy and

security concerns associated with the electronic transmission of health information

through several provisions that strengthened the civil and criminal enforcement of the

HIPAA rules.

Those provisions have been put into effect through a series of interim rules and

enforcement actions, ultimately culminating with the recent publication in the Federal

Register of the HIPAA Omnibus Rule. While reserving comment on the piecemeal

implementation of privacy and security rules, the 4 year anniversary of HITECH seems

a good time to assess how well those provisions have been working. Most importantly,

with the Omnibus Rule now in place, let’s look at the most significant security

challenges that lay ahead.

While the authors of the HITECH Act foresaw the need to strengthen HIPAA privacy

and security as an essential and concomitant element of achieving meaningful use of

health information technology, they clearly underestimated the complexity of the task.

The breach tally speaks for itself – 538 large-scale PHI breaches impacting over 21

million patients, and an additional estimated 60,000 smaller breaches affecting millions

more, reported to HHS since the Fall of 2009.

So what went wrong? First, IT security is complicated because today’s technology world

is incredibly dynamic, the number of endpoints too great. Such hyper-connectedness

can lead to a single change creating a multiplicity of new vulnerabilities, oversights, or

mistakes. IT security can’t simply be legislated or completely enforced. Policies and

Page 13: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 13

enforcement play an important role, but like good parenting, they don’t guarantee

results.

In HITECH, the Interim Breach Rule, and the Omnibus Rule, much of the focus was put

on breach reporting, and indeed, that reporting is an essential part of patient/consumer

protection. Patients have a right to know if their confidential health information has been

inappropriately disclosed or exposed. But such notifications are, after all, after the fact

Patients also have the a priori right to trust that their health information is being

appropriately safeguarded. This is why Redspin tells our clients: “Sure we’ll help you

meet or maintain HIPAA compliance or attest to Meaningful Use but our real goal is to

help you safeguard PHI from data breach.”

Since the accelerated deployment of IT in healthcare began, we’ve stressed that

security is a foundational element for its successful implementation and adoption.

Legislation, programs, policies, or controls that are intended to drive improvements in

security must first recognize that effective security is about lowering risk. The aim is not

to find and fix all vulnerabilities or eradicate every threat. The goal is to reduce the

likelihood of occurrence and limit the potential damages of breach.

Looking backward is only useful to the extent it can help better inform our future

direction. Starting back in 2009-2010, the healthcare industry was asked to change.

Hospitals and other eligible providers were offered huge financial incentives to do so.

EHR systems were deployed; providers were encouraged to show “meaningful use” of

those systems quickly. Conducting a HIPAA security risk analysis was required under

the EHR incentive program – and many interpreted this requirement as pertaining just

to the EHR and systems directly connected to the EHR.

The problem is that once electronic health records were born, they were bound to find

their way onto other devices, into other applications, and even transmitted to other

places. The proliferation of portable devices and media within all IT environments that

store PHI increase the likelihood of breach exponentially. How many providers included

their internal applications in their last HIPAA Security Risk Analysis? How many security

assessments of business associates were included in the covered entity’s HIPAA Risk

Page 14: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 14

Analysis? Most BAs were not prepared for the responsibility they assume simply by

being in possession of PHI – and still aren’t.

And what about healthcare workers? Few healthcare employees outside of IT could tell

you what their corporate IT security policies are, much less how those actually pertain to

their email, laptop, or personal iPhone. Would the average healthcare employee know

how to encrypt “data-at-rest.” Was the level of IT security awareness of employees who

had access to PHI considered in a HIPAA Security Risk Analysis?

These are tall tasks, underestimated four years ago and urgently needed now. We want

to help drive the changes necessary in healthcare IT security so that PHI breaches are

a rare exception, rather than a once a week news story. In the beginning of this report,

we promised recommendations and here they are. Remember we advocate that your

mindset be about lowering risk. Focus on reducing the likelihood of PHI breach

occurrence and limit the potential damages of those breaches.

First, conduct a HIPAA Security Risk Analysis. It is just the starting point… but get

started! Redspin preaches that security assessments are not projects but rather part of

a continuous process of durable improvements. As such, we believe HSRAs should be

conducted on annual or at least bi-annual basis. While a comprehensive security

assessment has a shelf life, you’ll be far more secure if you also assume there is an

expiration date.

Second, implement a regular process for an ongoing vulnerability scanning and

remediation, and integrate those reports into your IT security risk assessments. Don’t

wait for the HSRA cycle to come around again before doing the vulnerability scanning –

use a monthly or quarterly schedule so that you can compare results and see what

you’ve fixed, what you haven’t, and what new vulnerabilities may have arisen. If you

don’t have the resources to do this yourself, Redspin has an automated service that can

do it for you.

Page 15: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 15

Third, insist on encryption of data on all portable devices. Just do it! Lost or theft of

unencrypted portable devices has made up over a third of all large breaches to date.

We recognize that there are still significant hurdles – clumsy technology, budgetary

constraints, and user-training needs. As painful as they may be, they don’t compare

with the pain of a major breach incident due to a lost device chock full of PHI. The costs

of forensics, reparations, attorney’s fees, an OCR investigation/civil penalty, potential

class action lawsuits, and negative publicity can easily run into millions and millions of

dollars.

Fourth, business associates have accounted for 57% of all patient records breached

since we started the tally.. We recommend hospitals conduct a specific ”portfolio” risk

analysis as it relates to the dozens or even hundreds of vendors, contractors, and

consultants they work with. Ultimately, the hospital has every right to insist that their

partners conduct regular, third-party security assessments as a requirement of doing

business together. Covered entities and business associates need to work together to

fix this problem.

Last but not least, conduct regular, frequent and engaging security awareness training

for all employees. This requirement has been included in every breach resolution

agreement negotiated between OCR and an offending covered entity. All employees

should understand not just the policies and procedures per se but also why those

provisions are in place – given what’s at stake. Situational training is a must – test

people in what they would do in specific situations. Implement hotlines, place posters on

walls, screensaver reminders, and monthly tips. Every dollar spent on educating your

employees on privacy and security awareness is an investment in your organizations

future success.

Page 16: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 16

Appendix: HIPAA Omnibus Rule Highlights: Business

Associates, Civil Penalties, Breach Notification

On January 17, 2013, the U.S Department of Health and Human Services (HHS) released its

final Omnibus Rule which implemented the increased HIPAA privacy and security provisions of

the HITECH Act (2009) and the Genetic Information Nondiscrimination Act of 2008 (GINA). The

rule was published in the Federal Register on January 25, 2013 with an effective date of March

26, 2013. Compliance for both Covered Entities and Business Associates is required by

September 23, 2013 (180 days from the effective date).

The three provisions of the Omnibus Rule that are most relevant to this paper are the

expansions of the privacy and security rules with regard to Business Associates, the increase in

penalties for non-compliance, a new standard for determining whether there has been a breach

of protected health information (PHI).

Expansion of Privacy and Security Rules with regard to Business Associates

The Omnibus Rule extended and expanded the definition of business associates. The term

business associate now applies equally to a subcontractor of a business associate, and that

subcontractor must comply with parts of the regulations in their own right. In addition, the

business associate definition was expanded to include health information organizations, e-

prescribing gateways, and other entities that provide data transmission services that require

access to PHI on a routine basis, and entities that offer a personal health record product.

All business associates are now required to implement HIPAA-compliance initiatives and

measures.

Increase in Penalties for Non-Compliance

The Omnibus Rule employs the civil monetary penalty structure in the HITECH Act, wherein

higher or lower penalties are assessed based of levels of culpability. Note that these civil

penalties apply to covered entities and now to business associates equally (as per above).

The penalties are structured into the following tiers:

- If the covered entity or business associate did not know and could not have known about

the violation, the penalty is between $100 - $50,000 per incident

- If the covered entity or business associate acted with “reasonable cause” (the CE or BA knew or would have known through reasonable due diligence that an act or omission would violate the rules, but did not act with “willful neglect,”) the penalty is $1,000 -$50,000 per incident

- If the CE or BA acted with willful neglect but instituted successful corrective measures within 30 days, the penalty is $10,000 - $50,000 per incident

- If the CE or BA acted with willful neglect and did not institute successful corrective measures within 30 days, then the penalty is $50,000 per incident

- All levels include an aggregate annual cap of $1.5 million for violations of identical provisions

Page 17: Redspin PHI Breach Report 2012

© Redspin, Inc. Page 17

New Standard for Determining Whether a PHI Breach Requires Notification

Previously, the determination of whether a PHI breach would require notification was based on

the so-called “harm standard,” – an assessment of the risk that said breach would cause

financial, reputational, or other harm to an individual. The Omnibus Rule does away with the

harm standard and instead states that a breach be presumed to require notification unless it can

be determined through risk assessment that there is a low probability that PHI has been

compromised by the unauthorized use or disclosure. HHS comments that it expects the risk

assessments to be thorough, conducted in good faith, documented, and that its conclusions

should be reasonable.

The exact language is contained in paragraph (2) of 45 C.F.R. § 164.402

Except as provided in paragraph (1) of this definition, an acquisition, access, use, or disclosure of protected health information in a manner not permitted under subpart E is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised based on a risk assessment of at least the following factors:

i. The nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification;

ii. The unauthorized person who used the protected health information or to whom the disclosure was made;

iii. Whether the protected health information was actually acquired or viewed; and iv. The extent to which the risk to the protected health information has been mitigated.

.