x
Data Security for Employer Health Plans in the Wake of Anthem and Premera – April 29, 2015

Total Views  :   1230
Total Likes  :  0
Total Shares  :  0
Total Comments :  0
Total Downloads :  0

Add Comments
Presentation Slides

1) April 25, 2015 DATA SECURITY FOR EMPLOYER HEALTH PLANS IN THE WAKE OF ANTHEM AND PREMERA Peter Sloan Pete Enko Anthem’s data breach announcement in February,1 followed by the March disclosure by Premera Blue Cross of a strikingly similar cyber-attack,2 sent waves of alarm through both the health care industry and the employer health plan community. The scale of these companion breaches is astonishing. With current estimates of 78.8 million affected individuals for Anthem and 11 million for Premera, the collective size ranks among the largest data breaches in history – involving more individuals than the Target, Home Depot, Sony, or JP Morgan Chase breaches.3 As HIPAA breaches, Anthem and Premera are twin tsunamis. The HHS Office of Civil Rights’ (OCR) public listing of HIPAA breaches affecting 500 or more persons, from 2009 to the present, includes a total of 909 security breaches reported to OCR by HIPAA-covered medical providers, healthcare clearing houses, and health plans. Until now, health plans have been a backwater of HIPAA breaches, comprising only 13 percent of these OCR-reported incidents. But the Anthem and Premera breaches by themselves account for more than four-fifths of the 110 million total individuals affected by all OCRreported HIPAA breaches over the last six years.4 Anthem and Premera signal a sea change in the threat environment for health plans, a new reality that requires a fresh look at data security. Prudent employers with selffunded group health plans should take that fresh look now, by strengthening the data security provisions in their services agreements with third-party plan administrators (TPAs), and also by updating their HIPAA-required security risk assessments. It’s Time for BAA 2.0 In the days following Anthem’s breach announcement, employer benefit managers and in-house legal counsel were adrift.

2) Who would be responsible for making HIPAA and state law notifications to the thousands of affected members of their group health plans? What about required notifications to federal or state regulators, or to the media? And what about liabilities and exposures for any future claims? For answers, employers pulled out their administrative services agreements and BAAs with Anthem-affiliated TPAs… only to find no clear provisions for the Anthem scenario. In the Anthem aftermath, many employers found (1) no delegations for making HIPAA notifications and (2) no provisions for security, breach exposures, and notification responsibilities regarding PII. In a pre-Anthem/ Premera world, that makes sense. Going forward, however, health plan BAAs should reflect the security requirements, breach notification and response delegations, and allocations of breach liabilities in a manner appropriate for this new threat environment. BAAs should reflect the security requirements, response delegations, and allocations of breach exposures appropriate for this new threat environment. Accordingly, BAA 2.0 should: Under HIPAA, a self-funded health plan is a Covered Entity, responsible for making the required breach notifications to affected individuals, the media, and OCR.5 The TPA is the HIPAA Business Associate, responsible under HIPAA rules solely for notifying the Covered Entity of the protected health information (PHI) breach.6 And to the extent that state breach notification laws are applicable,7 notification responsibilities generally rest upon the entity that “owns or licenses” the individuals’ personally identifiable information (PII).8 Breach notification obligations may be delegated contractually. OCR’s HIPAA guidance indicates that a Covered Entity can assign to its Business Associate the making of required notifications regarding breaches involving the Business Associate.9 Similarly, under state PII breach notification laws, the entity that owns or licenses PII can contractually require another to make notifications on its behalf. Address the security of both PHI and PII. TPAs inevitably will have custody of PII on behalf of group health plans. At least nine states impose affirmative data security program requirements on entities that maintain PII. Rather than merely obligating the TPA to comply with HIPAA, BAAs should also require that TPAs comply with state security program mandates and establish prudent safeguards for PII. Clarify response obligations for both PHI and PII breaches. The BAA should spell out the responsibilities of the plan and the TPA in the event of a data breach under both HIPAA and state breach notification laws. Delegations of responsibility for notifying individuals, regulators, and others should be clearly expressed. Allocate liabilities and indemnities for breach response. The TPA’s security and breach response obligations should be welllinked to the liability and indemnification provisions of the administrative services agreement and the BAA. The employer should consider the feasibility of requiring that the TPA maintain adequate cyber insurance, with the plan as an endorsed insured under the policy. Many factors beyond data security are involved when an employer selects a TPA for its group health plans. Cost is, of course, centrally important. But the data security posture of the TPA should not be an afterthought, particularly if the TPA has had a history of data security incidents.10 Husch Blackwell LLP | Data Security for Employer Health Plans in the Wake of Anthem & Premera | April 25, 2015 2

3) Employers can point to the Anthem and Premera breaches, along with any known, prior security incidents involving the TPA, when negotiating toward a more robust BAA. Employers should also consider asking for documentation that provides reasonable assurance about the TPA’s security measures, such as a SOC 2 audit report on service provider security controls. It’s Time for an Updated Security Risk Assessment HIPAA requires health plans to conduct a security risk assessment,11 and to reassess the adequacy of security controls at least annually and whenever changed circumstances warrant.12 Results of the risk assessment and periodic evaluations must be documented in writing and retained for at least six years after no longer in effect.13 When a breach triggers an OCR investigation, one of the first items requested by OCR will be a copy of the up-to-date security risk assessment and most recent periodic evaluation. managers use a portal to connect with their TPA’s data systems for plan administration. Group health plan employers should update their security risk assessments now, in light of the Anthem and Premera breaches and the current threat environment. A compliant security risk assessment is not merely a gap analysis comparing security practices to the security requirements of HIPAA and other applicable laws. It also includes the identification of threats, vulnerabilities, and risks to protected information, leading to the strengthening of the plan’s data security posture. Documentation of the updated risk assessment is also crucial to protect the plan in the event of a data breach. Employers with small- to medium-sized health plans might be tempted to view themselves as too insignificant for hacking or other security intrusions. But Social Security numbers and health data are far more valuable on the black market than the cardholder data targeted in large retailer cyber-attacks.14 Moreover, the employer health plan may not be the hackers’ ultimate objective. Speaking of “too small of a target,” the same could have been said for HVAC service provider Fazio Mechanical – reportedly the hackers’ entry point into retailer Target’s network through a supplier portal.15 Similarly, most benefits Husch Blackwell LLP | Data Security for Employer Health Plans in the Wake of Anthem & Premera | April 25, 2015 3

4) See https://www.anthemfacts.com/. Anthem’s website states that Anthem discovered the cyber-attack on January 29, 2015, and that Anthem believes the intrusion “happened over the course of several weeks beginning in early December 2014.” Id. 8 See http://premeraupdate.com/. The Premera Blue Cross website indicates that Premera discovered its cyber-attack on the same day as Anthem, January 29, 2015, and that “the initial attack occurred on May 5, 2014.” Id. 10 1 2 http://www.informationisbeautiful.net/visualizations/ worlds-biggest-data-breaches-hacks/. 3 See, e.g., Cal. Civ. Code § 1798.82(a). 78 Fed. Reg. 5650-51. See also http://www.hhs.gov/ ocr/privacy/hipaa/administrative/breachnotificationrule/ index.html. 9 For example, in July 2013 Anthem’s corporate predecessor Wellmark Inc. entered into a $1.7 million resolution agreement with OCR regarding a security compromise of the names, dates of birth, addresses, Social Security Numbers, telephone numbers and health information of approximately 612,000 individuals during 2009 and 2010. http://www.hhs.gov/ocr/privacy/hipaa/ enforcement/examples/wellpoint-agreement.pdf. 4 https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf. 11 45 CFR § 164.308(a)(1)(ii)(A). 5 45 C.F.R. §§ 160.103 & 164.404–164.408. 12 45 CFR § 164.308(a)(8). 6 45 C.F.R. §§ 160.103 & 164.410. 13 45 CFR § 164.316(b)(2)(i). Forty-seven states, the District of Columbia, and three US territories have PII breach notification laws, with various definitions of what constitutes PII and a breach requiring notifications. Most such statutes contain exceptions from notification requirements for entities subject to, and which comply with, breach notification requirements under HIPAA or those of other functional regulators. 7 See http://www.npr.org/blogs/ alltechconsidered/2015/02/13/385901377/the-blackmarket-for-stolen-health-care-data. 14 See, e.g., http://krebsonsecurity.com/tag/faziomechanical-services/. 15 Contacts For Health Plan Data Security Peter Sloan Kansas City, MO peter.sloan@huschblackwell.com 816.983.8150 Pete Enko Kansas City, MO peter.enko@huschblackwell.com 816.983.8312 About Our Data Security Team Husch Blackwell’s Data Security Team helps clients with security compliance and risk management, data breach response, and risk mitigation, including security risk assessments and breach response readiness planning. The team is part of the firm’s Information Governance Group, which provides interdisciplinary expertise in Privacy, Data Security, and Information Management to help clients satisfy information compliance requirements and manage risk while maximizing information value. About Our Firm Husch Blackwell is an industry-focused, full-service litigation and business law firm with offices in 15 U.S. cities and in London. We represent national and global leaders in major industries including energy and natural resources; financial services; food and agribusiness; healthcare, life sciences and education; real estate, development and construction; and technology, manufacturing and transportation. © Husch Blackwell LLP. Quotation with attribution is permitted. This publication contains general information, not legal advice, and it reflects the authors’ views and not necessarily those of Husch Blackwell LLP. Specific legal advice should be sought in particular matters. Husch Blackwell LLP | Data Security for Employer Health Plans in the Wake of Anthem & Premera | April 25, 2015 4