Download our ungated guide to high-quality penetration testing.
Organizations that fall under the purview of HIPAA have to respond quickly to a cyber attack. The Office for Civil Rights (OCR) under the U.S. Department of Health and Human Services (HHS) issued a step-by-step guide to aid organizations. As a covered entity, your organization must have a contingency plan and incident procedures in the event of a security breach.
The first step is to put your contingency plan into action. In order to comply with HIPAA, you should already have established procedures to respond to a cyber security incident.
You should tell law enforcement there has been a breach. Depending on the circumstances of the breach, these agencies may tell you to refrain reporting the breach further, specifically to affected individuals and the media, if that may jeopardize an investigation.
Cyber threat indicators are described in detail by the Cybersecurity Information Sharing Act of 2015 (CISA). In essence, they establish how the incident happened. They are of interest to information sharing and analysis organizations (ISAOs).
You are required to report the incident to the Office of Civil Rights. OCR considers breaches reportable unless the personal health information was encrypted at the time of the incident. The specific reporting requirements differ depending on whether the breach involved the health information of more or less than 500 individuals.For breaches involving less than 500 people:
The OCR guidelines use the word "must" in its directive for points one and four, while they use the word "should" for points two and three. Although reporting the incident to law enforcement and informing relevant agencies of cyber threat indicators may only be recommended, it is advisable to follow all OCR instructions. This will help mitigate further cyber security threats on a national basis and remove any doubt of your compliance with HIPAA guidelines.HIPAA-covered entities can take comfort in the guidelines from the OCR about how to handle a cyber security threat or breach. By following these steps, you can fulfill your legal obligations and uphold your commitment to those whose information you keep secure.NetWorks Group has a suite of solutions that will help you manage risk to sensitive healthcare data and achieve compliance. Contact us today to learn more!
Security news, tips, webinars, and more straight to your inbox.