On Thu, Nov 13, 2014 at 01:56:04PM PST, Bill Bogstad spake thusly:
> I'm not so sure.   If the data was encrypted in place (never left his
> systems) then
> it was never disclosed to inappropriate parties and my reading of that
> link is that this would not be considered a breach.   Not that this
> would make me happy as a patient...

There are several issues here:

1. They likely have no assurance (in the form of some sort of network
monitoring, bandwidth graph, netflow/sflow, IDS, DLP, or whatever) that the
data never left his systems other than "that's how cryptolocker usually works".
Whether the bad guys accessed your data in-place (and clearly they did access
it because they encrypted it) or whether they copied it out en-mass is a
significant technical difference but a breach nonetheless. Section 13402 of the
HITECH Act (a sort of amendment to the HIPAA rules established years ago)
requires a Covered Entity (CE, such as a dentist) to provide notification to
affected individuals and to the Secretary of HHS following a discovery of a
breach of unsecured Protected Health Information.

2. Not only is data compromise/exfiltration a HIPAA-significant event but data
loss/unavailability is too. It does not necessarily trigger the breach
notification rule but certainly can trigger HIPAA enforcement action if DHHS
becomes aware.

3. The lack of backups is a serious issue regardless of this event. I know they
said the backups were encrypted too but nobody is going to consider those
backups if they were online and accessible to the intruders. All CEs must
securely back up "retrievable exact copies of electronic protected health
information" (45 CFR §164.308(7)(ii)(A)) which they have not done. With regards
to the issue of backups alone they are at the very least likely also in
violation of:

45 CFR §164.308(7)(ii)(B)
45 CFR §164.308(a)(1)
45 CFR §164.312(b)(1) 
45 CFR §164.312(b)(2)(i)

The actual text of these laws can be read here:
http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/adminsimpregtext.pdf

4. The Security Rule of HIPAA requires organizations to “implement policies and
procedures to prevent, detect, contain, and correct security violations.” which
is spelled out in (45 CFR §164.308(a)(1)). This is a broad-catch all which can
be used to nail anyone who has a security incident affecting HIPAA regulated
data.

Pardon me for shilling as I have never mentioned it before in years on this
list but it seems apropos at this point to say that Copilotco publishes a
whitepaper on HIPAA compliance which explains HIPAA requirements in a server
environment (Linux focused but broadly applicable). Email me if you want a
copy.

-- 
Tracy Reed, RHCE     Digital signature attached for your safety.
Copilotco            PCI/HIPAA/SOX Compliant Secure Hosting
866-MY-COPILOT x101  http://copilotco.com

Attachment: pgpXe8_524r5U.pgp
Description: PGP signature

_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to