U.S. Department of Health and Human Services Issues Cybersecurity Guidance For Health Care Providers 

Bond Schoeneck & King PLLC
Contact

Bond Schoeneck & King PLLC

The U.S. Department of Health and Human Services (“HHS”), in conjunction with the Health Sector Coordinating Council has released cybersecurity guidelines (the “Guidelines”) to assist health care providers and inform best practices. Entitled “Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients,” the Guidelines are divided into sections for small, medium and large health care providers, recognizing that security programs will vary with the size, resources and information technology capacity of organizations. This approach is a core premise of the HIPAA Security Rule. 

Developed collaboratively between HHS and industry cybersecurity leaders, the Guidelines are consensus-based and set forth concrete recommendations. In the face of the extraordinary degree of data exchange occurring in the health care arena to accomplish population health management and value-based payment, the Guidelines are a timely and highly useful resource. 

The report that accompanied the Guidelines (“Report”) highlights the increase in the number and sophistication of cybersecurity attacks in 2016 and 2017, emphasizing that not only large but small organizations are at risk because hackers assume that smaller entities are more vulnerable to attack. The Report provides some sobering data, noting that the average data breach cost per health care record is $408, with $2.2 million as the average cost of a data breach for health care organizations. 

The Guidelines are organized to address the five cybersecurity events identified as the highest threats to health care organizations: 

  • E-mail phishing attacks, 
  • Ransomware attacks, 
  • Loss or theft of equipment or data, 
  • Data loss, and 
  • Attacks against connected medical devices with patient safety ramifications. 

The introduction to the Guidelines discusses current threats facing the health care sector. The first and second volumes of the Guidelines discuss cybersecurity practices for small, medium and large health care providers. The Guidelines are organized into 10 areas of cybersecurity practices targeted to combat the threats listed above:

  • E-mail protection systems  
  • Access management
  • Asset management
  • Vulnerability management
  • Medical device security
  • Endpoint protection systems 
  • Data protection and loss prevention
  • Network management 
  • Incident response
  • Cybersecurity policies.

For each practice, the Guidelines set forth specific recommendations organized by size of provider, covering areas such as authorization procedures, network configuration, multifactor authentication, data classification, and workforce training. The recommended practices address key elements of the HIPAA Security Rule and align with the National Institute of Standards and Technology (“NIST”) Cybersecurity Framework, the leading national standard for cybersecurity. 

The last volume of the Guidelines contains an outline for prioritizing and implementing the practices, along with policy templates and links to other resources. Overall, the Guidelines are a valuable resource for health care providers in addressing cybersecurity threats. It should be noted that while the Guidelines are voluntary, they may set an industry standard that could be used in litigation or other contexts.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Bond Schoeneck & King PLLC

Written by:

Bond Schoeneck & King PLLC
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Bond Schoeneck & King PLLC on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide