The days of sticking one’s head in the sand should be long gone.
The cybersecurity landscape continues not to disappoint as enforcement options are dusted off and put to use.
On February 1, 2023, the Federal Trade Commission (FTC) announced its first settlement under its Health Breach Notification Rule (“Rule”)– a rule that was derived from Section 13407 of the HITECH Act (Pub. L. 111-5 (2009), published in the Federal Register on August 25, 2009 (74 Fed. Reg. 42980), and preempts state law (HITECH Act § 13421). The Rule has been effective since 2009. Before we delve into the FTC’s settlement against GoodRx, here are some of the important terms to appreciate in 16 CFR § 318, et seq.:
The FTC and HIPAA have two categories of breach notification requirements (those affecting under 500 individuals and those affecting more than 500 individuals). The FTC requires that the individual is notified “in no case later than 60 calendar days” and the FTC “later than ten business days following the date of discovery of the breach” (§§318.3, 4(a), 5(c). Interestingly, although HIPAA’s Breach Notification Rule and the FTC’s Rule is laid out differently, both require notification to the media for breaches involving more than 500 individuals.
An interesting question is why did it take well over a decade for a settlement under the FTC Rule to occur? Regardless of the length of time, when persons are evaluating cybersecurity risk across an organization (large or small), these key items from the Government’s Complaint, which resulted in a $1.5 million GoodRx settlement should be considered:
As a paradigm shift occurs from managing cybersecurity to managing cybersecurity risk, persons should consider the following: (1) outward facing statements that contradict the actions that the company is taking; (2) the number of federal and state agencies that have enforcement jurisdiction because GoodRx, for example, could also be subject to U.S. Securities and Exchange Commission violations for material misstatements to the market and cybersecurity related violations; and (3) ensuring that annual training is in place, policies and procedures are current and reviewed annually, that a third-party risk assessment is conducted by a qualified third-party, and that data is encrypted both at rest and in transit. The days of sticking one’s head in the sand should be long gone. For those who don’t have a business associate agreement or similar contract in place that addresses the parties’ implementation of technical, administrative, and physical safeguards, breach notification, and data return/destruction, this is an area to look at closely because this requirement has been around for a while.
Rachel V. Rose, JD, MBA, advises clients on compliance, transactions, government administrative actions, and litigation involving healthcare, cybersecurity, corporate and securities law, as well as False Claims Act and Dodd-Frank whistleblower cases.
Cybersecurity breach reports low during the pandemic
September 7th 2020A new report from CI Security suggests cybersecurity breaches were lower during healthcare's rapid transition to virtual care throughout the pandemic. In this episode of Perspectives, we look at why this might be and other aspects of their report with CI Security's Healthcare Executive Strategist, Drex DeFord.