<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; HITECH Act</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/hitechact/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Little progress made in the prevention of medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/#comments</comments>
		<pubDate>Tue, 01 Jan 2013 16:32:55 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1919</guid>
		<description><![CDATA[Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient data protection and security has made very little improvement according to the latest study from Health Information Trust Alliance (HITRUST)1.  The study reports that from 2009 to the first half of 2012, there have been 495 medical data breaches involving 21 [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Security,HIPAA,HITECH+Act,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> has made very little improvement according to the latest <a href="http://www.hitrustalliance.net/breachreport/HITRUST%20Report%20-%20U.S.%20Healthcare%20Data%20Breach%20Trends.pdf" class="broken_link" rel="nofollow">study</a> from Health Information Trust Alliance (HITRUST)<sup>1</sup>.  The study reports that from 2009 to the first half of 2012, there have been 495 <a href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/">medical data breaches</a> involving 21 million records costing roughly $4 billion.  Government organizations including VA hospitals accounted for the highest number of lost records and the states with the most health care data breaches are California, Texas and New York.  Since 2009 the total number of <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data breaches</a> at hospitals and health systems decreased only slightly but increased at smaller private physician practices, which accounted for more than 60% of the 459 breaches reviewed in the study.</p>
<p> The report also found that the majority of breaches (70 percent) were electronic and the leading cause data breach incidents were due to stolen devices such as laptops and mobile media.  However, paper records still play a role in data breaches, totaling 24 percent of medical data breaches, second only to lost laptops.  Mailing errors and improper disposal of records were the main reasons for paper-based breaches. </p>
<p>The Health Information Technology for Economic and Clinical Health (HITECH) Act states that healthcare organizations have 60 days in which to notify victims about a data breach but over 50 percent of companies failed to meet this deadline after a breach.</p>
<p>And it may get worse before it gets better if the medial industry does not find a way to protect themselves from BYOD (bring your own device) policies.  BYOD has become commonplace at smaller physician offices where medical personnel commonly look up patient information on their own smartphones without sufficient encryption or passwords in place which could pose a problem in the event that the device is lost.  In addition, due to the smaller sizes of this group, they lack the resources and awareness to properly arm themselves with the proper data breach protection<strong> </strong>in all areas of their practice.<strong>  </strong>This could expose a larger problem for the entire healthcare industry since community health records and health information is often shared between medical institutions of all sizes. </p>
<p>&nbsp;</p>
<p><sup>1</sup> HITRUST is a non-profit coalition of healthcare, business, technology and information security leaders, established to insure information security is a core value in the broad adoption of health information systems and exchanges.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/&via=Experian_DBR&text=Little progress made in the prevention of medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F&amp;title=Little%20progress%20made%20in%20the%20prevention%20of%20medical%20data%20breaches" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>5 Differentiating factors of a healthcare breach</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/#comments</comments>
		<pubDate>Tue, 10 Apr 2012 08:30:58 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1125</guid>
		<description><![CDATA[Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and loss. Federal regulations govern breach reporting. With breaches of medical records increasing 97% from 2010 to 2011, the medical field has been especially hard hit. Here’s a look at five factors [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F10%2F5-differentiating-factors-of-a-healthcare-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,healthcare+data+breach,HIPAA,HITECH+Act,Identity+Theft,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/stealing-data1.jpg"><img class="aligncenter size-full wp-image-1131" title="hand-stealing-data" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/stealing-data1.jpg" alt="" width="426" height="282" /></a></p>
<p>Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and loss. Federal regulations govern breach reporting.<br />
With <a title="Trends in healthcare data breaches" href="http://www.experian.com/blogs/data-breach/2012/03/20/trends-in-healthcare-data-breaches/" target="_blank">breaches of medical records increasing </a>97% from 2010 to 2011, the medical field has been especially hard hit. Here’s a look at five factors that make breaches in this one industry so cumbersome, dangerous and difficult to deter.<br />
 <br />
1. Heavy regulations<br />
While various state laws govern many breaches, a healthcare breach falls under federal law—both for providers and their business associates. The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act (HIPAA) in 1996 to govern PHI management. The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 further enforced it. HITECH’s tiered system of fines can cost a company as much as $1.5 million for mishandling a breach.</p>
<p>2. Black market premium<br />
By many estimates, a medical record sells for $50 on the black market, compared to just $1 for a Social Security number (SSN), according to a GovTech.com article. A single breach can be highly lucrative with an average of 49,000 records impacted per incident. This profitability makes it all the more difficult to deter medical breaches and protected health information (PHI) fraud stemming from both internal and external threats.</p>
<p>3. Substantial harm to patients<br />
Ninety percent of healthcare organizations in a recent study agreed that breaches cause patients harm. One example of this is medical identity theft. Another study found that resolving medical identity theft costs victims $20,663, an extrapolated average. Patients with breached PHI may face even worse. They could lose their medical insurance altogether, due to abuse of their benefits by an imposter. And that imposter’s health conditions, blood type, allergies and prescriptions could end up being part of the victim’s medical file. That misinformation could lead to improper medical care, potentially resulting in a life-threatening situation for the victim.</p>
<p>4. High volume of breaches<br />
According to data from the<a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" rel="nofollow" target="_blank" class="broken_link"> Identity Theft Resource Center</a>, the overall volume of breached records increased 35% from 2010 to 2011. Yet, according to HHS data, the volume of breached PHI records increased 97% in the same timeframe. In fact, three of the top six breaches of 2011 were in healthcare, according to the Privacy Rights Clearinghouse. The numbers point to an industry in crisis. Ninety-six percent of providers in a recent study have experienced at least one breach in the past two years.</p>
<p>5. Unprepared entities<br />
The increase in medical breaches comes at a time when entities are updating their offices with both electronic health records (EHR) and mobile devices. Many are doing so without putting the proper security measures and access controls in place first. In a recent study, 81% of healthcare entities reported using mobile devices to “collect, store and/or transmit” PHI but 49% haven’t implemented any protection measures for the devices.</p>
<p>With so many different factors at play in <a title="The RX for medical breaches" href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/" target="_blank">healthcare breaches</a>, the sector will continue to be an interesting one to watch. As the HHS promotes greater transferability of EHR, the road ahead may become even rockier.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_041012_article ">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. View Now!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/&via=Experian_DBR&text=5 Differentiating factors of a healthcare breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F10%2F5-differentiating-factors-of-a-healthcare-breach%2F&amp;title=5%20Differentiating%20factors%20of%20a%20healthcare%20breach" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The dollars of a data breach</title>
		<link>http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/#comments</comments>
		<pubDate>Tue, 16 Aug 2011 15:42:48 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach costs]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=728</guid>
		<description><![CDATA[It’s no surprise that data breaches are expensive.  The exact cost of these incidents, which have only become more spectacularly headline-grabbing in recent months, is a question that the Ponemon Institute has addressed for the past six years.  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F08%2F16%2Fthe-dollars-of-a-data-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+costs,HITECH+Act,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/DataLossPreventionBusinessAdvisoryBanner.jpg"><img class="aligncenter size-full wp-image-729" title="DataLossPreventionBusinessAdvisoryBanner" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/DataLossPreventionBusinessAdvisoryBanner.jpg" alt="" width="448" height="196" /></a></p>
<p>It’s no surprise that data breaches are expensive.  The exact cost of these incidents, which have only become more spectacularly headline-grabbing in recent months, is a question that the Ponemon Institute has addressed for the past six years.  Their most recent analysis, the <a rel="”nofollow” nofollow" href="http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=ponemon" target="_blank" class="broken_link">2010 U.S. Cost of a Data Breach</a>, includes a look at 51 U.S. companies from 15 different industry sectors, all of which experienced data breaches.</p>
<p>The findings dispel any notion that data breaches are becoming less costly as data breach notification sets in amongst consumers and they presumably care less about breach incidents.  In fact, consumers are still highly concerned about data breaches, and the costs of breaches are climbing.</p>
<p>A few <a rel="”nofollow” nofollow" href="http://www.ponemon.org/blog/post/cost-of-a-data-breach-climbs-higher" target="_blank" class="broken_link">key takeaways</a> from the Ponemon study:</p>
<ul>
<li>The average cost of a data breach increased by seven percent to $7.2 million in 2010, with the cost of each compromised record now averaging $214, up from $209 in 2009.</li>
<li>Costs of a data breach include notification and legal defense costs, penalties from regulations such as the <a href="http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/" target="_blank">HITECH Act</a>, and lost customer business.</li>
<li>For the first time, malicious or criminal attacks are the most expensive cause of data breaches and not the least common one; up from 12% in 2008, to 24% in 2009, to 31% in 2010.</li>
<li>Quick responses to data breaches are more costly than slower responses – 54% more, to be precise.  With the haste to comply with state and federal regulations, some companies rush to get the notification process over with, and in the process over-notify more than needed.</li>
<li>Companies are more proactively protecting themselves from data breach threats.  For example, breaches due to systems failures, lost devices and third-party mistakes are lower than before.  And while some companies may be responding to breaches too hastily (and inefficiently), the good news is that more companies are responding to breaches within 30 days of an incident.</li>
</ul>
<p>One of the more surprising findings is that negligence is still the leading cause of data breaches, at 41%, further underscoring the need for companies to strengthen their <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">security practices</a>.  On the bright side, the average breach detection and escalation costs went up by 72%, so it appears that companies are beginning to get the message that the threat of data breaches requires <a href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/" target="_blank">aggressive precautions</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/&via=Experian_DBR&text=The dollars of a data breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Encryption: Data’s best friend</title>
		<link>http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%e2%80%99s-best-friend/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%e2%80%99s-best-friend/#comments</comments>
		<pubDate>Tue, 12 Jul 2011 17:16:26 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Payment Card Industry Security Standard]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=668</guid>
		<description><![CDATA[When considering your company’s full breach prevention strategy, consider encryption a strong bodyguard that can play a big role in protecting data while also shielding your company from embarrassing and costly breaches.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F07%2F12%2Fencryption-data%25e2%2580%2599s-best-friend%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,encryption,HITECH+Act,Payment+Card+Industry+Security+Standard,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/encryption.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/encryption2.jpg"><img class="aligncenter size-full wp-image-673" title="D" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/encryption2.jpg" alt="" width="448" height="336" /></a></p>
<p>Once upon a time, in the dark ages before the Internet, <a rel="”nofollow” nofollow" href="http://www.webopedia.com/TERM/E/encryption.html" target="_blank" class="broken_link">encryption</a> was a tool confined mostly to the military.  The algorithmic schemes that convert plain text into an unreadable form, for purposes of privacy protection, naturally wasn’t considered relevant to the public.</p>
<p>Times have changed.  Now encryption is seen as an essential method to secure data and protect infrastructures from breaches, which is why web browsers automatically encrypt text when connecting to secure servers, and why security regulators are making encryption a mandatory part of many compliance practices.</p>
<p>Indeed, compliance is the number one factor driving more companies to implement encryption technologies than ever before.  According to the most recent <a rel="”nofollow” nofollow" href="http://www.symantec.com/about/news/release/article.jsp?prid=20101117_01" target="_blank" class="broken_link">Ponemon Institute’s U.S. Enterprise Encryption Trends report</a>, 69 percent of the IT and business leaders surveyed said that compliance is the reason they are adopting encryption within their company’s technologies, topping even the mitigation of data breaches (63 percent) as their paramount motivation.</p>
<p>Given that encryption is a must under a variety of newer regulations, it’s no surprise that companies feel the pressure to get on the encryption bandwagon, and that solutions involving encryption have seen the biggest increase in IT budget line items over the past year.  The <a href="http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/" target="_blank">HITECH Act</a> and various state privacy laws such as Massachusetts 201 CMR 17 are two examples of regulations which mete out stiff penalties to companies that don’t use encryption to protect sensitive data.  The Health Information Portability and Accountability Act (HIPAA), remains a <a rel="”nofollow” nofollow" href="http://www.indefenseofdata.com/2011/03/encryption-remedy-for-healthcare-data-loss/" target="_blank" class="broken_link">key driver for encryption</a>, while the <a rel="”nofollow” nofollow" href="https://www.pcisecuritystandards.org/" target="_blank" class="broken_link">Payment Card Industry Security Standard</a>, whose requirements for credit card transaction security include encryption, has become the fastest growing reason for IT organizations to use encryption.</p>
<p>Because more people are working remotely, with data flowing outside of traditional security walls, and because data breaches are on the rise, the Ponemon report concludes that encryption adoption will continue to increase in the coming years.</p>
<p>When considering your company’s full <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">breach prevention strategy</a>, consider encryption a strong bodyguard that can play a big role in protecting data while also shielding your company from embarrassing and costly breaches.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%e2%80%99s-best-friend/&via=Experian_DBR&text=Encryption: Data’s best friend&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%e2%80%99s-best-friend/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches – to prepare or not to prepare? The answer is simple.</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/#comments</comments>
		<pubDate>Tue, 17 May 2011 16:00:22 +0000</pubDate>
		<dc:creator>pluehr</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[State Law]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=566</guid>
		<description><![CDATA[All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F17%2Fdata-breaches-%25e2%2580%2593-to-prepare-or-not-to-prepare-the-answer-is-simple%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,healthcare+data+breach,HITECH+Act,PHI,PII,State+Law&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em>Our guest blogger this week is</em><em> Paul Luehr, Managing Director, General Counsel, <a href="http://www.strozfriedberg.com/professionals/xprProfessionalDetails1.aspx?xpST=ProfessionalDetail&amp;professional=11" rel="”nofollow” nofollow" target="_blank" class="broken_link">Stroz Friedberg, LLC</a> -</em> <em>a global digital risk management and investigations firm</em><em>.</em><em></em></p>
<p>All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. Healthcare institutions especially should heed the call for an incident response plan because it provides the best preventive medicine to minimize financial and reputational risks.  So <strong>PLAN</strong>, keeping in mind:  <strong><span style="text-decoration: underline;">P</span></strong>eople, the <strong><span style="text-decoration: underline;">L</span></strong>aw, and <strong><span style="text-decoration: underline;">A</span></strong>ction, with <strong><span style="text-decoration: underline;">N</span></strong>o time to waste.</p>
<p><strong><span style="text-decoration: underline;">P</span></strong>eople – Define the responsibilities of a coordinated incident response team. Don’t act alone. A good response team should include key internal players (In-house Counsel, IT, Compliance/Security, HR and Public Relations), as well as outside experts who confront data breaches on a regular basis (trusted Attorneys, Forensic Analysts and Fraud Monitors). These external experts can help restore key business functions, preserve crucial forensic evidence, strengthen data security, address victims’ needs, and communicate effectively with regulators and the public.</p>
<p><strong><span style="text-decoration: underline;">L</span></strong>aw – Track fast-changing data breach laws, privacy regulations, and notification mandates <em>before</em> a breach should occur.  This can help your organization identify protected health or personally identifiable information (PHI/PII which may trigger liability), navigate the HITECH Act and state law, understand reporting timelines, and effectively reach select constituents (i.e. Health and Human Services, victims, law enforcement and/or the media).</p>
<p><strong><span style="text-decoration: underline;">A</span></strong>ction – Outline clear action items to accomplish within the first seventy-two hours. One early misstep can destroy crucial evidence, delay an effective response, and trigger government penalties or class-action lawsuits.</p>
<p><strong><span style="text-decoration: underline;">N</span></strong>o time to waste – Remember that time is of the essence. <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">Once a breach is identified</a>, the clock starts ticking and may require immediate notice to regulators and/or notification to individual victims within 60 days.  </p>
<p>A comprehensive preparedness plan can promote extraordinary efficiencies when a breach threatens a healthcare entity. So, <strong>create your PLAN now.</strong></p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Download the free Data Breach Response Guide by Experian!" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_051711_article ">Download your free Data Breach Response Guide!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/&via=Experian_DBR&text=Data breaches – to prepare or not to prepare? The answer is simple.&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do your business associates know how they will be affected by HITECH?</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:30:30 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=37</guid>
		<description><![CDATA[Just as the healthcare industry came up to speed on the regulations defined  in The Health Information Technology for Economic and Clinical Health ("HITECH") Act, additional modifications are being proposed. These proposed rules focus on expanding obligations and penalties for covered entities (CEs) to now include business associates (BAs). So why is this significant? ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fdo-your-business-associates-know-how-they-will-be-affected-by-hitech%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,healthcare,HIPAA,HITECH+Act,Identity+Theft+Resource+Center,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><img class="size-full wp-image-129 alignnone" title="medical doctor" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/medical-doctor.jpg" alt="" width="521" height="260" /></p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p>Just as the <a href="http://www.experian.com/data-breach/healthcare-data-breach.html" target="_blank">healthcare industry</a> came up to speed on the <a href="http://www.hipaasurvivalguide.com" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">regulations defined</span></a> in The Health Information Technology for Economic and Clinical Health (&#8220;HITECH&#8221;) Act, additional modifications are being proposed. These <span style="text-decoration: underline;"><a href="http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/breachnotificationifr.html" target="_blank" class="broken_link" rel="nofollow">proposed rules</a></span> focus on expanding obligations and penalties for covered entities (CEs) to now include business associates (BAs).</p>
<p>So why is this significant? For two reasons. First, combined with the HITECH Act, the new rules will expand both the application of certain HIPAA Security and Privacy requirements and penalties to business associates.  Secondly, the proposal expands the definition of BA to include subcontractors who handle health information. Subcontractors would be considered BAs and are subject to direct liability under the HIPAA rules.</p>
<p>Many provider networks, physician practices and insurance plans work with outside vendors to manage their businesses and patient health information.  Many of these providers are BAs who use sub-contractors.  Under the proposed new regulations, these subcontractors must also be HIPAA compliant and follow the HITECH regulations or face penalties. This also means that CEs could be held liable when a BA does not comply.</p>
<p>How well does your company know its business associates…<em>and the businesses that they do business with</em>? As health care organizations expand their operations, it is imperative that due diligence is performed to avoid potential liability stemming from non-compliant vendors.  <a href="http://www.abanet.org/health/esource/Volume5/10/Nosowsky.html" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Some privacy professionals</span> </a>feel the best way to prevent liability under the new requirements is to be proactive about adhering to compliance standards.</p>
<p>Companies should consider actively working with their <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">vendors </a>to address the stringent HITECH requirements and ensure that anyone that falls under the BA category is aware of the full implications as it relates to HITECH and HIPAA.  The more proactive you are the better chance you have of avoiding potentially heavy fines due to the ignorance of a BA that was not aware of the law.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/&via=Experian_DBR&text=Do your business associates know how they will be affected by HITECH?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>