OCR Clarifies HIPAA Rules on Sharing Patient Information on Opioid Overdoses
The U.S. Department of Health and Human Services’ Office for Civil Rights has cleared confusion about HIPAA Rules on sharing patient information on opioid overdoses. The HIPAA Privacy Rule permits healthcare providers to share limited PHI in certain emergency and dangerous situations. Those situations include natural disasters and during drug overdoses, if sharing information can prevent or lessen a serious and imminent threat to a patient’s health or safety. Some healthcare providers have misunderstood the HIPAA Privacy Rule provisions, and believe permission to disclose information to the patient’s loved ones or caregivers must be obtained from the patient before any PHI can be disclosed. In an emergency or crisis situation, such as during a drug overdose, healthcare providers are permitted to share limited PHI with a patient’s loved ones and caregivers without permission first having been obtained from the patient. During an opioid overdose, healthcare providers can share health information with the patient’s family members, close friends, and caregivers if: The healthcare...
932 Texas Children’s Health Plan Members’ PHI Emailed to Personal Account by Employee
The protected health information (PHI) of 932 members of the Texas Children’s Health Plan has been discovered to have been emailed to the personal email account of a former employee. The incident was discovered on September 21, 2017, although the former employee emailed the data late last year in November and December 2016. The emails were discovered during a routine review. Texas Children’s Health Plan responded to the breach promptly and has taken action to mitigate risk. The health insurance plan has also implemented additional safeguards to prevent similar incidents from occurring in the future and employees have been re-trained on hospital policies and HIPAA Rules. While the reason for the PHI being emailed to the personal email account has not been disclosed, the breach report uploaded to the insurance plan website explains no evidence has been uncovered to suggest any plan member information has been used inappropriately. However, the incident has been reported to law enforcement. As is required by the HIPAA Breach Notification Rule, the incident has been reported to the...
Phishing Attacks Using Malicious URLs Rose 600 Percent in Q3, 2017
As recent healthcare breach notices have shown, phishing poses a major threat to the confidentiality of protected health information (PHI). The past few weeks have seen several healthcare organizations announce email accounts containing the PHI of thousands of patients have been accessed by unauthorized individuals as a result of healthcare employees responding to phishing emails. Report Shows Massive Rise in Phishing Attacks Using Malicious URLs This week has seen the publication of a new report that confirms there has been a major increase in malicious email volume over the past few months. Proofpoint’s Quarterly Threat Report, published on October 26, shows malicious email volume soared in quarter 3, 2017. Compared to the volume of malicious emails recorded in quarter 2, there was an 85% rise in malicious emails in Q3. While attachments have long been used to deliver malware downloaders and other malicious code, Q3 saw a massive rise in phishing attacks using malicious URLs. Clicking those links directs end users to websites where malware is downloaded or login credentials are...
Data Breach Highlights Danger of Using USB Drives to Store PHI
The Man-Grandstaff VA Medical Center in Spokane, WA has discovered two USB drives containing the protected health information of almost 2,000 veterans have been stolen. The two devices were being used to store data from a standalone, non-networked server that was being decommissioned. One of the devices was the master drive used to move the medical center’s Anesthesia Record Keeper database to its virtual archive server. According to a statement issued by the medical center, that transfer had taken place in January. It is unclear why the database was still on the drive. The devices were stolen on July 18, 2017 from a contract employee while on a service call to a VA hospital in Oklahoma City. Man-Grandstaff VA Medical Center was not able to determine exactly what information was stored on the USB drives, although the database on the virtual archive server was checked and found to contain full names, addresses, phone numbers, surgical information, insurance information, and Social Security numbers. 1,915 individuals who have potentially been affected are being notified of the breach...
New Tool Helps Healthcare Organizations Find HIPAA Compliant Business Associates
Healthcare organizations are only permitted to use business associates that agree to comply with HIPAA Rules and sign a business associate agreement, but finding HIPAA compliant business associates can be a challenge. Searching for HIPAA compliant business associates is time consuming, although identifying vendors willing to follow HIPAA Rules is only part of the process. Business associate agreements must then be assessed, often incurring legal fees, and healthcare organizations must obtain assurances from new business associate that appropriate safeguards have been implemented to ensure the confidentiality, integrity, and availability of any PHI they provide. It is also challenging for vendors that wish to take advantage of the opportunities in the healthcare industry. They must be able to demonstrate they have implemented appropriate safeguards and need to provide reassurances that their products and services support HIPAA-compliance. A solution has now been developed that resolves the issues for both parties and streamlines the process of finding HIPAA compliant business...



