Being Cyber-Secure AND Cyber-Compliant
In his Cross-Border Concerns column, Stephen Treglia analyzes the question: How is it possible that a computer system can be so well locked-down that no hacker can successfully gain access, and yet the entity in charge of protecting that data be considered out-of-compliance?
October 30, 2017 at 02:45 PM
9 minute read
There's a very familiar phrase in the cybersecurity world that is rapidly becoming of critical importance to lawyers as well. You can be cyber-compliant and not be cyber-secure. You can be cyber-secure and not be cyber-compliant.
The first half of that equation should be pretty self-evident to everyone. Anyone, including lawyers in the United States, can be fully compliant with every single type of regulation and law that attempts to protect personal or private data, and it can still leak out and be seen by unauthorized persons.
It's the second half of that equation that can surprise people. How is it possible that a computer system can be so well locked-down that no hacker can successfully gain access, and yet the entity in charge of protecting that data be considered out-of-compliance?
The answer is that compliance isn't just about whether critical data is successfully protected, but how it is protected. If such protection is not in the manner required by cybersecurity laws and regulations, the entity required to follows these rules can be subjected to substantial penalties and fines even though not a single piece of data intended to be protected was leaked due to any fault of that entity.
Why should lawyers care? They should because the law is increasingly evolving to require holders of critical personal data who provide services to certain types of businesses to follow specific cybersecurity procedures or else face such financial consequences.
This trend started in the United States in 2009, with the passage of the Health Information Technology for Economic and Clinical Health (HITECH) Act by Congress. This Act was created to fill many of the enforcement gaps that had existed in the Health Insurance Portability and Accountability Act (HIPAA) of 1996.
One of the breakthrough concepts of the HITECH Act was the creation of the requirement that “Business Associates” (BA) which provide certain types of services to the “Covered Entities” (CE) governed by HIPAA must comply with the same cybersecurity rules mandated of CEs. This was done to respond to a way utilized by CEs to minimize their exposure to HIPAA's requirements.
Prior to the HITECH Act, if a CE (in the HIPAA-regulated environment, think of doctors, dentists, hospitals, clinics, health insurance providers, etc.) outsourced functions to a third-party service provider, and the provider lost any of the CE's information regarding an identifiable patient's designated medical information (basically, any diagnosis, prognosis, treatment or payment for such), neither the CE nor the third-party provider suffered any HIPAA violation consequences. That would occur because the CE didn't cause the loss of any protected data, and the third-party provider was, by statutory definition, not a CE and, hence, not covered by HIPAA.
Congress ended this version of three-card monte by extending HIPAA's requirements to a CE's downstream of providers, defined as BAs under the HITECH Act. 45 CFR §164.502(a)(3). Significantly, the definition of BA was not spelled out by way of profession but by manner of service, and “legal services” were specifically included. 45 CFR §160.103(1)(i)(B)(ii). Hence, it would appear that not only are lawyers considered BAs of a HIPAA CE, but anyone who provides legal service.
No more dramatic example of how dangerous this symbiotic relationship can become when cybersecurity violations committed by a third-party service provider generates regulatory headaches for the provider's upstream client than is demonstrated by the story of Accretive Health, a Chicago-based hospital revenue cycle management company, acting as a BA to its CE, North Memorial Health Care of Minnesota. (In January 2017, Accretive changed its name to R1 RCM, Inc.)
On July 25, 2011, an unencrypted laptop in the possession of an Accretive employee was stolen out of a car rented by the employee. It was ultimately determined that the theft resulted in the loss of Protected Health Information (PHI) of 9,497 North Memorial patients. PHI of another health care provider that was also lost as a result of this laptop theft is not the subject of this article.
One of the several amendments created by the HITECH Act now permits state attorneys general to institute HIPAA actions. Minnesota Attorney General initiated a civil complaint against Accretive in January 2012, alleging violations of HIPAA and other provisions of state and federal law. In July 2012, Accretive and the Attorney General settled the action for $2.5 million, with an agreement that Accretive not operate again in Minnesota for at least two years and as many as six years, at the discretion of the Attorney General.
In March 2016, the U.S. Department of Health and Human Services Office for Civil Rights (OCR), the federal agency that oversees HIPAA/HITECH compliance, entered into a $1.55 million settlement with North Memorial over the Accretive incident. Healthitsecurity News, op. cit. OCR alleged no involvement by North Memorial over the loss of its patients' protected data. Instead, it found that the hospital had not entered into a valid BA written agreement, spelling out all of Accretive's duties and responsibilities with respect to the hospital's PHI, nor had the hospital shown adequate supervision over Accretive's handling of its data. For example, it had not conducted a risk analysis of Accretive's cybersecurity procedures, a HIPAA requirement.
The Accretive/North Memorial hospital story should be setting of major alarms to all law firms that handle a healthcare providers PHI. As a BA to a CE, every law firm is required to follow the same cybersecurity requirements for protecting PHI that are required of the firm's clients.
These requirements can be extremely daunting. They include, inter alia: written internal policies and procedures over handling protected data such as data protection and destruction, written agreements with clients and the law firm's subcontractors about the handling of the PHI, incident response plans and assignment of duties when breaches occur, data mapping (to determine the location of protected data), encryption of sensitive data (or protection of equal security), employee training, internal auditing of compliance, internal testing of employees and procedures to ensure compliance, yearly review of all processes, maintaining updated systems and software.
And although the health care industry paved the way for the concept of shared responsibility for the protection of sensitive data, the information highways governments and regulators are insisting being protected by CEs and their downstreams are only increasing, with no likelihood of abating any time in the future. Granted, President Donald J. Trump has advocated at some length about the need to roll back the tide of government regulation, but those pertaining to cybersecurity do not yet appear to be on his radar screen.
While the president has strongly advocated for healthcare reform, he has only directed his attention so far toward the Affordable Care Act of 2009. The HITECH Act is, instead, part of the American Recovery and Reinvestment Act of 2009. Moreover, his newly appointed OCR Director, has expressed an interest in aggressively pursuing HIPAA actions as evidenced by his $2.5 settlement this April with CardioNet, the first ever assessment made against a wireless health services provider.
Even should President Trump demonstrate a willingness to pull back on HIPAA/HITECH laws and regulations, other cybersecurity provisions of equal or greater strength are beyond his control. New York recently enacted what are considered to be among the harshest data protection requirements to date of any financial institutions that come within the purview of New York's Banking Law, Insurance Law or Financial Services Law. In that New York is the center of many of the world's financial institutions, these new regulations, which went into effect just prior to Labor Day, should have a broad effect throughout the worldwide community.
Entitled “Cybersecurity Requirements for Financial Services Companies,” at 23 NYCRR 500, it empowers the New York Department of Financial Services (DFS) to impose virtually all the cybersecurity requirements found in the HIPAA/HITECH arena, along with a few additional onerous duties. For example, every financial service provider (likewise called a “Covered Entity”) must appoint a Chief Information Security Officer who must report to the entity's Board of Directors so that it can certify every year that it is in compliance with the DFS regulations. Furthermore, the rules applicable to all CEs are to be equally enforced against all “Third-Party Service Providers.” While the DFP regulations do not specifically mention legal services in this definition, the clause is so broadly worded that law firms with financial service clients must be considered covered by these regulations as well.
Lastly, the European Union's General Data Protection Regulations (GDPR) take effect in May, 2018. Unlike data regulations in the United States, the GDPR will apply to all personal data in any company's possession, regardless of the entity's function or business. And unlike the current regulatory structure, which only applies to businesses with a physical presence in an EU member state, the GDPR will apply to any entity “doing business” there. This will easily expand those protections to American law firms with EU clients.
This continuing trend toward greater security of personal information data must mean only one thing to the legal profession. The only available recourse is to begin instituting recognized cybersecurity protocols as soon as possible, whether accomplished in-house or outsourced. There is no reasonable basis to believe this evolution will be reversing itself any time in the future.
Stephen Treglia is the former head of the cyber crime unit at the Nassau County district attorney's office and currently consults with data protection companies and law firms.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllThe Unraveling of Sean Combs: How Legislation from the #MeToo Movement Brought Diddy Down
When It Comes to Local Law 97 Compliance, You’ve Gotta Have (Good) Faith
8 minute readDeposing Former Mayor Bill de Blasio; Misrepresentations To Induce Investment: This Week in Scott Mollen’s Realty Law Digest
Trending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250