Ransomware Attacks Addressed in HIPAA Security Guidance | Practical Law

Ransomware Attacks Addressed in HIPAA Security Guidance | Practical Law

The Department of Health and Human Services (HHS) has addressed how Security Rule standards under the Health Insurance Portability and Accountability Act (HIPAA) may help HIPAA covered entities and business associates prevent and recover from ransomware attacks, incidents of which have increased dramatically during 2016 to date.

Ransomware Attacks Addressed in HIPAA Security Guidance

Practical Law Legal Update w-002-7911 (Approx. 7 pages)

Ransomware Attacks Addressed in HIPAA Security Guidance

by Practical Law Employee Benefits & Executive Compensation
Published on 14 Jul 2016USA (National/Federal)
The Department of Health and Human Services (HHS) has addressed how Security Rule standards under the Health Insurance Portability and Accountability Act (HIPAA) may help HIPAA covered entities and business associates prevent and recover from ransomware attacks, incidents of which have increased dramatically during 2016 to date.
HHS has issued guidance addressing how HIPAA covered entities (CEs) and business associates (BAs) may apply standards under the HIPAA Security Rule to prevent and recover from ransomware attacks (see Practice Note, HIPAA Security Rule and the HIPAA Privacy, Security, and Breach Notification Toolkit). The guidance also addresses whether HIPAA breach notification is required if ransomware infects a CE's or BA's computer systems.

How Ransomware May Attack User Data

According to HHS, ransomware is a type of malware that essentially hijacks data and denies rightful users access to the data by encrypting it "with a key known only to the hacker who deployed the malware, until a ransom is paid" (regarding other forms of malicious software, see Legal Update, Malware Leads to $750,000 HIPAA Settlement). After the attack occurs, the rightful user is instructed to pay the hacker a ransom to obtain a decryption key. The ransom may need to be paid in the form of a "cryptocurrency," such as Bitcoin (see Legal Update, Compensation Paid in Bitcoin is Subject to Employment Taxes under IRS Notice 2014-21).

Preventing Ransomware Infections Using the HIPAA Security Requirements

In HHS's view, existing standards under the HIPAA Security Rule may be used to prevent the introduction of ransomware. For example, the Security Rule standard for implementing a security management process requires CEs and BAs to:
  • Conduct a risk analysis to identify threats and vulnerabilities to electronic protected health information (ePHI).
  • Adopt security measures to reduce or remediate risks that are identified.
HHS also interprets this standard as requiring adoption of procedures to protect against and detect malicious software.
Addressing the scope of risk analyses required under the security management process standard, HHS would expect CEs and BAs to adopt measures as part of the security management process to reduce risks to ePHI "throughout an organization's entire enterprise." HHS acknowledges that there is not a HIPAA Security Rule standard or implementation specification for updating firmware. However, HHS believes that an entity should, as part of its risk analysis, identify and address risks to ePHI from network devices that use obsolete firmware.

HIPAA Security and Ransomware Recovery

In its ransomware guidance, HHS indicates that the Security Rule requires CEs and BAs to adopt policies to assist them in responding to and recovering from ransomware attacks. Specifically, CEs and BAs must implement a data backup plan as part of maintaining an overall contingency plan (see Practice Note, HIPAA Security Rule: Contingency Plan), including activities such as:
  • Disaster recovery and emergency operations planning.
  • Periodic testing of the contingency plan.
The contingency plan (or an organization's business continuity plan) may need to be activated in response to a ransomware attack.

Ransomware Attacks are HIPAA Security Incidents

Under the HHS guidance, the presence of ransomware (or any malware) on a CE's or BA's computer systems is a security incident under the Security Rule. As a result, security incident procedures, which also are required under the Security Rule, may need to be used in response to a ransomware attack (see Practice Note, HIPAA Security Rule: Security Incident Procedures and NIST SP 800-61 Rev. 2 (Computer Security Incident Handling Guide); see also Legal Update, HHS Issues HIPAA Security Rule Mapping to NIST Cybersecurity Framework). These procedures should allow a CE or BA to (among other responses):
  • Detect and perform a preliminary analysis of the ransomware.
  • Recover from the ransomware attack by restoring data lost during the attack and resuming business-as-usual activities.
The guidance addresses initial analysis and follow-on incident response activities involving ransomware attacks, which include:
  • Determining the scope of an incident (that is, assessing which networks, systems, or applications were impacted).
  • Identifying the incident's origin and how it occurred.
  • Containing the ransomware's propagation and restoring lost data.
  • Assessing whether there was a breach of PHI because of the security incident.

Role of HIPAA Training in Identifying Ransomware Attacks

According to HHS, a CE's or BA's workforce should receive training (under HIPAA's training requirement) to detect and report situations involving malware (see Standard Document, HIPAA Training for Group Health Plans: Presentation Materials). Indicators of a ransomware attack might include an inability to access files while the ransomware is encrypting, deleting, or relocating data. Upon identifying a ransomware attack, a CE or BA should immediately activate its security incident response plan, which plan should include isolation of infected computer systems to halt the spread of the attack.

HIPAA Breach Implications

Whether the presence of ransomware is a HIPAA breach is a fact-specific assessment, and the guidance includes guidelines for making this determination (see Practice Note, HIPAA Breach Notification Rules for Group Health Plans). If ePHI is encrypted due to a ransomware attack, HHS takes the view that a breach has occurred because the ePHI has been acquired and is therefore an unauthorized disclosure under the HIPAA Privacy Rule (see Practice Note, HIPAA Privacy Rule).
For example, an entity may need to consider the ransomware's effect on the integrity of PHI. The impact may be severe if, for example, the ransomware encrypts the data and then deletes the original data and leaves only the data in encrypted form.
Under the HIPAA breach notification rules, a breach of PHI is presumed to have occurred unless the CE or BA can show that there is a low probability that PHI was compromised based on the factors. Otherwise, the CE or BA must satisfy the applicable breach notification rules, which include notification to affected individuals, HHS, and (in some cases) the media (see Practice Note, HIPAA Breach Notification Rules for Group Health Plans: What Is a Breach Requiring Notification?).

Reportable Breaches

The guidance also addresses whether it is a reportable breach if ePHI that is encrypted by the ransomware was already encrypted to comply with HIPAA. According to HHS, if ePHI was already encrypted by a CE or BA under accepted standards, so that it is no longer unsecured PHI, then:
  • The entity need not conduct a risk assessment under HIPAA to evaluate whether there is a low probability of compromise.
  • HIPAA breach notification is not required.
However, additional analysis may be required to ensure that the entity's encryption (as opposed to the ransomware's encryption) rendered the PHI unreadable, unusable, and indecipherable to unauthorized individuals.

Practical Impact

Given that downloaded malware has already been the basis of a HIPAA settlement agreement (see Legal Update, Malware Leads to $750,000 HIPAA Settlement), it is probably only a matter of time before a ransomware attack results in similar assessments. As a result, this HHS guidance offers CEs and BAs a useful starting point for how HHS would evaluate the effectiveness of an entity's procedures and safeguards for preventing and responding to a ransomware attack. In many respects, HHS appears to view ransomware attack preparedness as an extension of the standards and implementation specifications that are already required under the Security Rule. Also, as is the case in other HIPAA privacy and security contexts, a CE or BA that can demonstrate appropriate efforts to train its workforce will be better-positioned to handle a post-incident investigation by HHS (see Standard Document, HIPAA Training for Group Health Plans: Presentation Materials and Practice Note, HIPAA Enforcement and Group Health Plans: Penalties and Investigations).