SlideShare une entreprise Scribd logo
1  sur  15
Cyber Liability/ Data Breach
Protection
The Policy with Risk Management
Services
Do you know?
• When the new federal HIPAA/HITECH final ruling
became law? March 26, 2013
• When is the law enforceable? Sept. 23, 2013
“These changes not only greatly enhance a patient’s privacy rights and protections,
but also strengthen the ability of my office to vigorously enforce the HIPAA privacy
and security protections, regardless of whether the information is being held by a
health plan, a health care provider or one of their business associates”.
Leon Rodriguez, Director of the Office of Civil Rights
What is new to the federal law?
• Business Associates/Business Associates
Agreements
• Notice Requirements (Federal & your State)
• Penalty Structure: $100-$50,000 per violation
maximum $1,500,000 for all violations of an
identical provision per year
Examples of Legal Requirements
• Federal Laws
– Health information (HIPAA/HITECH)
– Financial information (Graham-Leach Bliley Act)
– Education information (FERPA)
– Information of children under 13 (COPPA)
– Sensitive employee information (GINA, FMLA)
• State Laws
– Breach notification in 46 states
– Disclosure of SSNs
– Processing of Medical information
– Destruction/Disposal
– “Reasonable measures” to safeguard personal information
State Laws
46 of 50 states plus the District of Columbia, Puerto
Rico & the Virgin Islands have data breach laws
related to Personal Information (PI); many contain
subsets of data that may be contained within medical
records- Personal Health Information (PHI)
States w/o laws: Alabama, Kentucky, New Mexico, and South Dakota
• Usually protects data of residents residing in the state from certain
types of disclosures
• CEs and BAs must be aware of these laws in the event of a breach
• Differing requirements regarding who must be notified (State
Attorney General, law enforcement, media outlets, the individual),
the timing for such notice, and the manner of the notice
OCR /State Attorney General Investigations
Hospice of North Idaho
• 12/31/12: Theft of unencrypted laptop with EPHI of 41 patients
• First HIPAA breach settlement involving less than 500 patients
• $50,000 payment
Ashley Industrial Molding, Inc Employee Welfare Benefit Plan (Indiana)
• 8/09/11: Hacking/IT incident of 506
Massachusetts Mutual Life Insurance Company, MassMutual Financial
Group
• 6/5/13: The 401(k) retirement plan information of certain clients
was inadvertently exposed when a MassMutual account manager
sent an email on May 8. Names, Social Security
numbers, investment elections, and account balances
Attorneys General Beginning to Use
HIPAA Enforcement Authority
Accretive Health, Inc. sued by Minnesota AG
• Suit followed breach of 23,000 patient’s PHI
• AG used combination of HIPAA and state law to close
Accretive down in MN for two-year period
• 7/31/12: $2.5M fine
South Shore Hospital sued by Massachusetts AG
• Suit followed breach of PHI of 800,000 patient’s PHI on
unencrypted back-up tapes lost during shipment
• 5/24/12: $750,000 fine
Research
Brown & Brown-Tampa Programs Division’s
research to find the best product to meet your
client’s needs yielded the Beazley Breach Response
Select.
Beazley Breach Response was involved in 6 of 9 major breaches in the
United States last year sending out 9.6 million notices.
Excellent Coverage including Risk Management
Services.
Policy Highlights
If a breach occurs one call to report it & Beazley takes over…
• Privacy Liability
• Privacy Notification Expense
• Regulatory Liability
– HIPAA/HITECH Fines & Penalties
• Network Security Liability
• Media/Website Liability
• Public Relations and Crisis Management Expense
• Credit Monitoring Expense
• Legal and Forensic Expense
• Theft Resolution Services
• Cyber Extortion Loss
• Data Protection Loss
• Business Interruption Coverage
Coverage Limits
• Information Security & Privacy Liability $1,000,000*
• Regulatory Defense & Penalties $100,000*
• Website Media Content Liability $100,000*
• Payment Card Industry(PCI) fines and Cost $50,000
* Higher limits available upon request
Coverage Limits Continued
• Privacy Breach Response Services*
– Notification to Individual Clients 25,000 individuals
– Credit Monitoring 3 Credits Bureaus for 12 months
– Identity Theft Resolutions Up to 5,000 cases
– Foreign Notification $50,000
*Breach Response Services are OUTSIDE of the Limits
of Liability
• First Party Coverage
– Cyber Extortion Included
– Data Protection Loss Included
– Forensic Expense $50,000**
– Business Interruption Loss Included
** higher limits available upon request
Scope of Services (1)
Step-by-Step Procedures to
Lower Risk
• Understand the scope of
“personal information” (“PI”)
• Determine where PI is stored
• Collect/retain the minimum
amount of PI required for
business needs
• Destroy PI when no longer
needed
• Risk assessment guidance
• Develop and implement an
Incident Response Plan
On-line Compliance Materials
• Federal and state
compliance materials
• Summaries of federal and
state laws
• Sample policies &
procedures
• Continuing updates and
electronic notification of
significant changes
Scope of Services (2)
Periodic Newsletter &
“Privacy Posts”
• Sent by email
• Significant changes in federal
and state laws/regulations
• Breach and data security news
• Links to related On-line
information
Privacy Posts for events
requiring immediate
attention
Phone/E-mail Support
Consultants & attorneys
answer questions, including:
• Health care & HIPAA
compliance issues
• Data breach prevention
issues
• Data Security best practices
• Computer forensic issues
Scope of Services (3)
Training Modules
• On-line training material
– Specific, to-the-point
• Awareness bulletins &
posters
• Webinars
– for privacy compliance and IT
staff
Handling Data Breaches
Guidance provided to:
• Respond to a data breach
Questions???
Thank you
& look forward to quoting for you soon!!!
Martha Oddo 813-222-4133 moddo@bbprograms.com
Urvish Patel 813-222-4358 upatel@bbprograms.com

Contenu connexe

Tendances

Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection ActYizi
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
Cyber Security from MN Government perspective
Cyber Security from MN Government perspectiveCyber Security from MN Government perspective
Cyber Security from MN Government perspectiveAnn Treacy
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Burton Lee
 

Tendances (20)

Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
GDPR Summary
GDPR SummaryGDPR Summary
GDPR Summary
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Box 10
Box 10Box 10
Box 10
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Box 13
Box 13Box 13
Box 13
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Overview Data Privacy Bill India
Overview Data Privacy Bill IndiaOverview Data Privacy Bill India
Overview Data Privacy Bill India
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Popi act presentation
Popi act presentationPopi act presentation
Popi act presentation
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
Cyber Security from MN Government perspective
Cyber Security from MN Government perspectiveCyber Security from MN Government perspective
Cyber Security from MN Government perspective
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 

En vedette

Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012Don Grauel
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
2015.10.06 Cyber Risks
2015.10.06 Cyber Risks2015.10.06 Cyber Risks
2015.10.06 Cyber RisksFERMA
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationFERMA
 
Cyber liability insurance and your security program
Cyber liability insurance and your security programCyber liability insurance and your security program
Cyber liability insurance and your security programScott Takaoka
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceSecureAuth
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveIISPEastMids
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 

En vedette (14)

Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
2015.10.06 Cyber Risks
2015.10.06 Cyber Risks2015.10.06 Cyber Risks
2015.10.06 Cyber Risks
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentation
 
Cyber liability insurance and your security program
Cyber liability insurance and your security programCyber liability insurance and your security program
Cyber liability insurance and your security program
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspective
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 

Similaire à Cyber liability insurance and risk management program

Cyber & Data Risk Insurance
Cyber & Data Risk Insurance Cyber & Data Risk Insurance
Cyber & Data Risk Insurance Rachel Hamilton
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
HIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersHIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersJason Karn
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!catherinecoulter
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!catherinecoulter
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Xiaoming Zeng
 
Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceThomas Bronack
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleMichigan Primary Care Association
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityJake Facer
 
Cybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmCybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmNext Dimension Inc.
 

Similaire à Cyber liability insurance and risk management program (20)

Cyber & Data Risk Insurance
Cyber & Data Risk Insurance Cyber & Data Risk Insurance
Cyber & Data Risk Insurance
 
HITECH-Changes-to-HIPAA
HITECH-Changes-to-HIPAAHITECH-Changes-to-HIPAA
HITECH-Changes-to-HIPAA
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
HIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersHIPAA and Privacy for Researchers
HIPAA and Privacy for Researchers
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
 
Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry compliance
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Hipaa Goes Hitech
Hipaa Goes HitechHipaa Goes Hitech
Hipaa Goes Hitech
 
Cybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmCybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law Firm
 

Dernier

letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Kempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdfKempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdfHenry Tapper
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notesongomchris
 
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...Amil baba
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...amilabibi1
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Precize Formely Leadoff
 
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...Amil baba
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 

Dernier (20)

letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
Kempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdfKempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdf
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notes
 
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.
 
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth AdvisorsQ1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 

Cyber liability insurance and risk management program

  • 1. Cyber Liability/ Data Breach Protection The Policy with Risk Management Services
  • 2. Do you know? • When the new federal HIPAA/HITECH final ruling became law? March 26, 2013 • When is the law enforceable? Sept. 23, 2013 “These changes not only greatly enhance a patient’s privacy rights and protections, but also strengthen the ability of my office to vigorously enforce the HIPAA privacy and security protections, regardless of whether the information is being held by a health plan, a health care provider or one of their business associates”. Leon Rodriguez, Director of the Office of Civil Rights
  • 3. What is new to the federal law? • Business Associates/Business Associates Agreements • Notice Requirements (Federal & your State) • Penalty Structure: $100-$50,000 per violation maximum $1,500,000 for all violations of an identical provision per year
  • 4. Examples of Legal Requirements • Federal Laws – Health information (HIPAA/HITECH) – Financial information (Graham-Leach Bliley Act) – Education information (FERPA) – Information of children under 13 (COPPA) – Sensitive employee information (GINA, FMLA) • State Laws – Breach notification in 46 states – Disclosure of SSNs – Processing of Medical information – Destruction/Disposal – “Reasonable measures” to safeguard personal information
  • 5. State Laws 46 of 50 states plus the District of Columbia, Puerto Rico & the Virgin Islands have data breach laws related to Personal Information (PI); many contain subsets of data that may be contained within medical records- Personal Health Information (PHI) States w/o laws: Alabama, Kentucky, New Mexico, and South Dakota • Usually protects data of residents residing in the state from certain types of disclosures • CEs and BAs must be aware of these laws in the event of a breach • Differing requirements regarding who must be notified (State Attorney General, law enforcement, media outlets, the individual), the timing for such notice, and the manner of the notice
  • 6. OCR /State Attorney General Investigations Hospice of North Idaho • 12/31/12: Theft of unencrypted laptop with EPHI of 41 patients • First HIPAA breach settlement involving less than 500 patients • $50,000 payment Ashley Industrial Molding, Inc Employee Welfare Benefit Plan (Indiana) • 8/09/11: Hacking/IT incident of 506 Massachusetts Mutual Life Insurance Company, MassMutual Financial Group • 6/5/13: The 401(k) retirement plan information of certain clients was inadvertently exposed when a MassMutual account manager sent an email on May 8. Names, Social Security numbers, investment elections, and account balances
  • 7. Attorneys General Beginning to Use HIPAA Enforcement Authority Accretive Health, Inc. sued by Minnesota AG • Suit followed breach of 23,000 patient’s PHI • AG used combination of HIPAA and state law to close Accretive down in MN for two-year period • 7/31/12: $2.5M fine South Shore Hospital sued by Massachusetts AG • Suit followed breach of PHI of 800,000 patient’s PHI on unencrypted back-up tapes lost during shipment • 5/24/12: $750,000 fine
  • 8. Research Brown & Brown-Tampa Programs Division’s research to find the best product to meet your client’s needs yielded the Beazley Breach Response Select. Beazley Breach Response was involved in 6 of 9 major breaches in the United States last year sending out 9.6 million notices. Excellent Coverage including Risk Management Services.
  • 9. Policy Highlights If a breach occurs one call to report it & Beazley takes over… • Privacy Liability • Privacy Notification Expense • Regulatory Liability – HIPAA/HITECH Fines & Penalties • Network Security Liability • Media/Website Liability • Public Relations and Crisis Management Expense • Credit Monitoring Expense • Legal and Forensic Expense • Theft Resolution Services • Cyber Extortion Loss • Data Protection Loss • Business Interruption Coverage
  • 10. Coverage Limits • Information Security & Privacy Liability $1,000,000* • Regulatory Defense & Penalties $100,000* • Website Media Content Liability $100,000* • Payment Card Industry(PCI) fines and Cost $50,000 * Higher limits available upon request
  • 11. Coverage Limits Continued • Privacy Breach Response Services* – Notification to Individual Clients 25,000 individuals – Credit Monitoring 3 Credits Bureaus for 12 months – Identity Theft Resolutions Up to 5,000 cases – Foreign Notification $50,000 *Breach Response Services are OUTSIDE of the Limits of Liability • First Party Coverage – Cyber Extortion Included – Data Protection Loss Included – Forensic Expense $50,000** – Business Interruption Loss Included ** higher limits available upon request
  • 12. Scope of Services (1) Step-by-Step Procedures to Lower Risk • Understand the scope of “personal information” (“PI”) • Determine where PI is stored • Collect/retain the minimum amount of PI required for business needs • Destroy PI when no longer needed • Risk assessment guidance • Develop and implement an Incident Response Plan On-line Compliance Materials • Federal and state compliance materials • Summaries of federal and state laws • Sample policies & procedures • Continuing updates and electronic notification of significant changes
  • 13. Scope of Services (2) Periodic Newsletter & “Privacy Posts” • Sent by email • Significant changes in federal and state laws/regulations • Breach and data security news • Links to related On-line information Privacy Posts for events requiring immediate attention Phone/E-mail Support Consultants & attorneys answer questions, including: • Health care & HIPAA compliance issues • Data breach prevention issues • Data Security best practices • Computer forensic issues
  • 14. Scope of Services (3) Training Modules • On-line training material – Specific, to-the-point • Awareness bulletins & posters • Webinars – for privacy compliance and IT staff Handling Data Breaches Guidance provided to: • Respond to a data breach
  • 15. Questions??? Thank you & look forward to quoting for you soon!!! Martha Oddo 813-222-4133 moddo@bbprograms.com Urvish Patel 813-222-4358 upatel@bbprograms.com