Module 4 Cybersecurity and Privacy Concerns Flashcards
How are employee benefit plans vulnerable to cyberattacks?
broad range of personal, identifiable information involved in plan administration and its potential market value
What challenges do plan sponsors and fiduciaries confront in dealing with cyberattacks and other data breaches?
limited resources, insufficient technical expertise, and lack of clear standards
What is the definition of personally identifiable information (PII)?
information that can be used to distinguish or trace an individual’s identity such as their name, social, biometric records, date of birth, place of birth, mother’s maiden name, etc.
What is the definition of protected health information (PHI)?
information that is a subset of health information, including demographic information collected from an individual and is created/received by a health care provider, health plan, employer, or health care clearinghouse and related to the past, present, or future physical or mental health or condition of an individual that identifies the individual
When is there an increase in privacy risks when administering benefit plans?
when providing sensitive personal data of participants to service providers for plan administration
What are the non-HIPAA compliance issues associated with the information accumulated by medical plans and their service providers?
hiring a service provider to provide services to an ERISA-covered employee benefit plan is itself a fiduciary act, because it requires discretionary control or authority over plan administration
What are some examples of common cyberthreats in the environment where benefit plans operate?
1) ransomware
2) phishing
3) wire transfer email fraud
4) malware via external devices
What data breaches have occurred with retirement plans?
1) failure to install security system updates
2) email hoax (phishing attack)
3) downloads of plan information to a home computer
4) social security numbers mailed to wrong addresses
5) using the same password for multiple clients
What data breaches have occurred with medical plans?
1) unencrypted information on laptops
2) failure to implement physical safeguards at workstations
3) return of photocopiers without erasing data contained on hard drives
4) lost documents with PHI
5) disposal of prescriptions in trash containers accessible to the public
What does ‘you can outsource the work, but you cannot outsource the responsibility’ mean?
be prudent in selecting service providers capable of protecting sensitive participant and beneficiary information and to obligate the providers, by written contract, to protect the information
What are key governing laws, enforcement actions and industry standards requirement service provider management of regulated personal information?
1) HIPAA and its business associate requirements
2) Federal Trade Commission (FTC) data security enforcement actions against company failures to oversee service providers with access to personal information
3) state information security laws requiring oversight of data-related service providers
4) the Gramm-Leach-Bliley Act controlling the ways financial institutions deal with private information of individuals
5) Payment Card Industry Data Security Standards
How does HIPAA provide oversight?
HIPAA requires health plan sponsors to manage their plans in accordance with its data privacy and security rules
How have FTC enforcement actions demonstrated what is expected from an employer that shares personal data with external service providers?
The FTC is now requiring companies to:
1) exercise due diligence before hiring data-related service providers
2) have appropriate protections of personal information in their contracts with data related service providers
3) take steps to verify and monitor that the data-related service providers are adequately protecting the information
What are the issues in the FTC service provider case against the provider of medical transcription services GMR Transcription Service, Inc.?
GMR failed to adequately verify that its data service provider implemented reasonable and appropriate security measures to protect the personal information stored on the provider’s network and computers
GMR failed to
1) require the provider by contract to adopt and implement appropriate security measures to protect personal information
2) take adequate measures to monitor and assess whether the provider employed measures to appropriately protect personal information under the circumstances
What were the terms of the GMR settlement with FTC?
1) GMR and its owners are prohibited from misrepresenting the extent to which they maintain the privacy and security of consumers’ personal information
2) they must establish a comprehensive information security program that will protect consumers’ sensitive personal information, including information the company provided to independent service providers
3) the company must have the program evaluated both initially and every two years by a certified third party
4) the settlement will remain in force for the next 20 years