MANITOBA OMBUDSMAN PRACTICE NOTE

Similar documents
Responding to Privacy Breaches

Best Practice: Responding to a Privacy Breach

Personal Information Protection Act Breach Reporting Guide

Privacy & Data Protection Procedure-Box Hill Institute Group

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below.

INVESTIGATION REPORT F08-02 MINISTRY OF HEALTH

PRIVACY BREACH GUIDELINES

Breach Reporting and Record Keeping under PHIPA

UCLA Policy 420: Breaches of Computerized Personal Information

March 1. HIPAA Privacy Policy

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4

HIPAA & The Medical Practice

H 7789 S T A T E O F R H O D E I S L A N D

Interim Date: July 21, 2015 Revised: July 1, 2015

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

Policies, Procedures and Guidelines

EQUAL ACCESS FUNDING PTY LTD PRIVACY POLICY

1.5 This policy meets the guidance provided by the ICO on data security breach management.

Data Protection Policy. Newbury Academy Trust

HIPAA Privacy & Security Plan October 2016

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure

CBSA PRIVACY POLICY. Canadian Business Strategy Association Page 1

Title CIHI Submission: 2014 Prescribed Entity Review

Privacy Breach Planning and Management: A Municipal Perspective. Manitoba Ombudsman

Manitoba Ombudsman. Jurisdiction and Practice. Once Elected..What s Expected? Elected Municipal Officials Training Seminar 2019

Principles. Bison Transport will implement policies and procedures to give effect to this policy, including:

H E A L T H C A R E L A W U P D A T E

2016 Business Associate Workforce Member HIPAA Training Handbook

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

HIPAA / HITECH. Ed Massey Affiliated Marketing Group

BREACH NOTIFICATION POLICY

DATA SERVICES CONTRACTS

PRIVACY AND ANTI-SPAM CODE FOR OUR DENTAL OFFICE Please refer to Appendix A for a glossary of defined terms.

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

SBI Canada Bank Privacy Policy

ARE YOU HIP WITH HIPAA?

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule

Category: BOARD POLICY ADMINISTRATIVE PARAMETERS

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

The Personal Health Information Act:

Medical Identity Theft Prevention Policy

South Carolina General Assembly 122nd Session,

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

Effective Date: 4/3/17

Public Act No

Association of Service Providers for Employability and Career Training ( ASPECT ) PRIVACY CODE

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

SECURITY SAFEGUARD BREACH GUIDE

Attachment to Identity Theft Prevention Service Provider Attestation

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

Business Associate Risk

INFORMATION AND CYBER SECURITY POLICY V1.1

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations

Identity thieves use a variety of ways to gain access to your personal information:

HIPAA STUDENT ASSOCIATE AGREEMENT

MONTCLAIR STATE UNIVERSITY HIPAA PRIVACY POLICY. Approved by the Montclair State University Board of Trustees on April 3, 2014

Protection of Privacy Policy

March 1. HIPAA Privacy Policy. This document includes: HIPAA Privacy Policy Statement, HIPAA Manual and HIPAA Forms

HIPAA Privacy, Breach, & Security Rules

Banks Sheridan Limited Data Protection Privacy Policy 19 May 2018

* Unless otherwise indicated, this policy will still apply beyond the review date.

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

Privacy in Canada Federal Legislation: Personal Information Protection and Electronic Documents Act

Data Processing Appendix

Prairie Centre Credit Union

HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY

OMNIBUS COMPLIANT BUSINESS ASSOCIATE AGREEMENT RECITALS

Model Code for the Protection of Personal Information, CAN/CSA-Q830-96

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

DATA COMPROMISE COVERAGE FORM

Privacy Rule - Complaint Investigations

CREDIT REPORTING POLICY

HIPAA PRIVACY AND SECURITY RULES APPLY TO YOU! ARE YOU COMPLYING? RHODE ISLAND INTERLOCAL TRUST LINN F. FREEDMAN, ESQ. JANUARY 29, 2015.

Clinic Business Continuity Plan Guidelines

Record Management & Retention Policy

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

SUBCONTRACTOR BUSINESS ASSOCIATE AGREEMENT

NOTICE OF PRIVACY PRACTICES

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

DATA PROTECTION ADDENDUM

Taking care of what s important to you

AFTER THE OMNIBUS RULE

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

To: Our Clients and Friends January 25, 2013

A PDF version of this policy is also published on the Ballarat Clarendon College website.

SAFE DESTRUCTION OF DOCUMENTS

All Sorts UK Limited Data Protection Policy 17 th May 2018

AS PASSED BY HOUSE AND SENATE H Page 1 of 37 H.764. An act relating to data brokers and consumer protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

OCR Phase II Audit Protocol Breach Notification. HIPAA COW Spring Conference 2017 Page 1 Boerner Consulting, LLC

HIPAA The Health Insurance Portability and Accountability Act of 1996

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

PAYMENT CARD INDUSTRY

MNsure Certified Application Counselor Services Agreement with Tribal Nation Attachment A State of Minnesota

NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit

Transcription:

MANITOBA OMBUDSMAN PRACTICE NOTE Practice notes are prepared by Manitoba Ombudsman to assist persons using the legislation. They are intended as advice only and are not a substitute for the legislation. Manitoba Ombudsman 750 500 Portage Avenue Winnipeg, Manitoba R3C 3X1 Phone: 204-982-9130 or 1-800-665-0531 Fax: 204-942-7803 Website: www.ombudsman.mb.ca KEY STEPS IN RESPONDING TO PRIVACY BREACHES UNDER THE FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY ACT (FIPPA) AND THE PERSONAL HEALTH INFORMATION ACT (PHIA) Purpose The purpose of this document is to provide guidance to public bodies and trustees when a privacy breach occurs. 1 Public bodies and trustees that are developing a privacy breach policy or procedure may find it helpful to incorporate some of this information. What is a privacy breach? A privacy breach occurs when there is unauthorized collection, use, disclosure or destruction of personal or personal health information. Such activity is unauthorized if it is not permitted by FIPPA or PHIA. The most common privacy breaches happen when personal information about clients, patients, students or employees is stolen, lost or mistakenly disclosed. Examples include when a laptop containing personal or personal health information is stolen or information is mistakenly faxed or emailed to the wrong person. Reporting privacy breaches Manitoba Ombudsman has created a Privacy Breach Reporting Form that allows public bodies and trustees to complete an analysis of the privacy breach using the four key steps described below. This form is contained in our practice note Reporting a Privacy Breach to Manitoba Ombudsman, and is available on our website. 1 This document was adapted with permission from Privacy Breaches: Tools and Resources, developed by the Office of the Information and Privacy Commissioner (OIPC) of British Columbia, March 2012, Breach Notification Assessment Tool, jointly produced by the OIPC of BC and the OIPC of Ontario, December 2006, Key Steps in Responding to Privacy Breaches and Privacy Breach Report form developed by the OIPC of Alberta, July 2012 and Keys Steps to Responding to Privacy Breaches developed by the OIPC of Nova Scotia, March 2015.

2 Four key steps in responding to a privacy breach There are four key steps to consider when responding to a suspected or actual privacy breach. The steps are as follows: 1. Contain the breach 2. Evaluate the risks associated with the breach 3. Notify affected individuals and others 4. Prevent further breaches The most important step you can take is to respond immediately to the breach. You should undertake steps 1, 2 and 3 outlined below immediately following the breach and do so simultaneously or in quick succession. Step 4 provides recommendations for longer-term solutions and prevention strategies. STEP 1: CONTAIN THE BREACH Take immediate common sense steps to limit the breach. These steps include: Immediately contain the breach by, for example, stopping the unauthorized practice, recovering the records, shutting down the system that was breached, revoking access or correcting weaknesses in physical security. Immediately contact your privacy officer, access and privacy coordinator, access and privacy officer, senior management and/or the person responsible for security in your organization. Notify the police if the breach involves suspected theft or other criminal activity. Be careful not to destroy information related to the privacy breach that may be valuable in determining the cause or that will allow you to take appropriate corrective action. STEP 2: EVALUATE THE RISKS ASSOCIATED WITH THE BREACH To determine what other steps are immediately necessary, you should assess the risks associated with the breach. Consider the following: Personal or personal health information involved What personal and/or personal health information have been breached? Generally, the more sensitive the information, the higher the risk. Health information, Social Insurance Numbers (SIN) and financial information that could be used for identity theft are examples of sensitive information. What possible use is there for the information? Can the information be used for fraudulent or otherwise harmful purposes? Cause and extent of the breach What is the cause of the breach? Is there a risk of ongoing or further exposure of the information? What was the extent of the unauthorized collection, use or disclosure, including the number of likely recipients of the information and the risk of further access, use or disclosure of information, including in media or online? Has the information been recovered? Is the information encrypted or otherwise not readily accessible? What steps have you already taken to minimize the harm?

3 Individuals affected by the breach How many individuals are affected by the breach? Who was affected by the breach: clients, patients, students, employees, contractors, service providers, other organizations? Foreseeable harm from the breach Is there any relationship between the affected individuals and the unauthorized recipients? Could the affected individuals be considered to be vulnerable? For example, youth or seniors. What harm to the affected individuals could result from the breach? Harm may include: o security risk (ex. physical safety) o identity theft or fraud o loss of business or employment opportunities o hurt, embarrassment, damage to reputation or relationships o potential discriminatory action taken against individual What harm could result to the public body or trustee as a result of the breach? For example: o loss of trust in the public body or trustee o loss of assets o financial exposure What harm could result to the public as a result of the breach? For example: o risk to public health o risk to public safety Once you have assessed all the risks described above you will be able to determine whether or not notifying an affected individual(s) is appropriate. The table on the next page summarizes the risk factors and suggests possible risk rating for each risk factor. The table provides examples of the risk factors and how they may be assessed; however, each public body and trustee must make their own assessment of the risks given the unique circumstances of the situation. The table is intended to provide some general guidance to ratings, but is not an exhaustive list.

4 Risk Rating Overview Risk Factor Low Medium High Nature of personal and/or personal health information Publicly available personal information not associated with any other information Relationships Cause of the breach Scope of the breach Containment efforts Foreseeable harm from the breach Accidental disclosure to another professional who reported the breach and confirmed destruction or return of the information Technical error that has been resolved Very few affected individuals Data was adequately encrypted Portable storage device was remotely wiped and there is evidence that the device was not accessed prior to wiping Hard copy files or device were recovered almost immediately and all files appear intact and/or unread No foreseeable harm from the breach Personal information unique to the organization that is not medical or financial information Accidental disclosure to a stranger who reported the breach and confirmed the destruction or return of the information Accidental loss or disclosure Identified and limited group of affected individuals Portable storage device was remotely wiped within hours of loss but there is no evidence to confirm that the device was not accessed prior to wiping Hard copy files or device were recovered but sufficient time passed between the loss and recovery that the data could have been accessed Loss of business or employment opportunities Hurt, embarrassment, damage to reputation or relationships Social/relational harm Loss of trust in the public body/trustee Loss of public body/trustee assets Loss of public body/trustee contracts or business Financial or legal exposure to public body/trustee Medical, psychological, counselling, or financial information or unique government identification number Information relates to a vulnerable individual (ex. youth or seniors) Disclosure to an individual with some relationship to or knowledge of the affected individual(s), particularly disclosures to ex-partners, family members, neighbours or co-workers Theft by a stranger Intentional breach Cause unknown Technical error (if not resolved) Large group or entire scope of group not identified Data was not encrypted Data files, or device have not been recovered Data at risk of further disclosure particularly through media or online Security risk (ex. physical safety) Identify theft or fraud risk Hurt, embarrassment, damage to reputation may also be high risk depending on the circumstances Risk to public health or safety

5 Risk Evaluation Summary Foreseeable harm from the privacy breach is often the key factor used in deciding whether or not to notify affected individuals. In general, a medium or high risk rating should result in notification to the affected individuals. A low risk rating may also result in notification depending on the unique circumstances of each case. For each of the factors reviewed above, determine the risk rating. Risk Factor Low Medium High Nature of personal and/or personal health information Relationships Cause of the breach Scope of the breach Containment efforts Foreseeable harm from the breach Other factors Overall risk rating STEP 3: NOTIFY AFFECTED INDIVIDUALS AND OTHERS Notification can be an important mitigation strategy in the appropriate circumstances. A key consideration in deciding whether to notify should be whether notification is necessary in order to avoid or mitigate harm to an individual whose personal or personal health information has been inappropriately collected, used or disclosed. Review your risk assessment in step 2 to determine whether or not to proceed with notification. If the privacy breach occurs with a third-party entity that has been contracted to maintain or process personal or personal health information, the breach should be reported to the originating public body or trustee. When notification is being provided, it is the responsibility of public bodies or trustees to notify the affected individuals when a privacy breach occurs. Notifying Affected Individuals As noted above, notification of affected individuals should occur if it is necessary to avoid or mitigate harm to them. Some considerations in determining whether to notify individuals affected by the breach include: Legislation requires notification: Is the public body or trustee covered by legislation that requires notification of the affected individual? Note that FIPPA and PHIA do not require notification. Contractual obligations require notification: Does the public body or trustee have a contractual obligation to notify affected individuals in the event of a privacy breach? Risk of identity theft or fraud: Identity theft or fraud is a concern if the breach includes information such as names in conjunction with SIN, credit card number, driver s licence number, Personal Health Identification Number (PHIN), or any other information that can be used for fraud by third parties (ex. financial). Risk of physical harm: Does the privacy breach place any individual at risk of physical harm, stalking or harassment?

6 Risk of hurt, embarrassment or damage to one s reputation: Could the privacy breach lead to hurt, embarrassment or damage to an individual s reputation? This type of harm can occur with the loss of information such as medical records or disciplinary records. Risk of loss of business or employment opportunities: Could the privacy breach result in damage to the reputation of an individual, affecting business or employment opportunities? Intentional breach: In the case of an intentional breach, the affected individual may be in the best position to assess risks and take steps to mitigate them. The perpetrator of the breach may not fully disclose their motivation or their relationship to the individual (ex. ex-partner, family member, neighbour). When and How to Notify When? When notification is being provided to individuals affected by the breach, this should occur as soon as possible following the breach. However, if you have contacted law enforcement authorities, you should determine from those authorities whether notification should be delayed in order not to impede a criminal investigation. How? The method of notification will depend on the circumstances. Using multiple methods of notification in certain cases may be the most effective approach. On very rare occasions medical evidence may indicate that notification could reasonably be expected to result in immediate and grave harm to the individual s mental or physical health. In those circumstances, consider alternative approaches, such as having the physician give the notice in person or waiting until the immediate danger has passed. The following sets out factors to consider in deciding how to notify the affected individuals. Direct Notification The preferred method of notification is direct by telephone, letter or in person to affected individuals. This method is preferred where: the identities of individuals are known current contact information for the affected individuals is available individuals affected by the breach require detailed information in order to properly protect themselves from the harm arising from the breach individuals affected by the breach may have difficulty understanding an indirect notification (due to mental capacity, age, language, etc.) Indirect Notification Providing indirect notification posted notices, website information or media may be appropriate in some circumstances. This should generally occur only where: direct notification could cause further harm, is prohibitive in cost or contact information is lacking a very large number of individuals are affected by the breach such that direct notification could be impractical

7 Manitoba Ombudsman has created a Privacy Breach Notification Letter: Content Checklist that outlines what information to include in a notification letter to an affected individual. The checklist can be found in the appendix. Others to Contact Regardless of what you determine your obligations to be with respect to notifying individuals, you should consider whether the following authorities or organizations should also be informed: Police: If theft or other crime is suspected Insurers or others: If required by contractual obligations Professional or other regulatory bodies: If professional or regulatory standards require notification of these bodies Technology suppliers: If the breach was due to a technical failure and a recall or technical fix is required Manitoba Ombudsman: Reporting a privacy breach to Manitoba Ombudsman is not mandatory under FIPPA and PHIA. The following factors are relevant in deciding whether to report a breach to the ombudsman: o the sensitivity of the personal or health information o whether the disclosed information could be used to commit identity theft o whether there is a reasonable chance of harm from the disclosure including nonfinancial losses o the number of people affected by the breach o whether the information was fully recovered without further disclosure Reporting a privacy breach to Manitoba Ombudsman can be viewed as a positive action. It demonstrates that the public body or trustee views the protection of personal and personal health information as an important and serious matter. Manitoba Ombudsman may be able to assist you in developing a procedure for responding to the privacy breach and ensuring steps are taken to prevent breaches from occurring in the future. It will also assist us in responding to inquiries made by the public and managing any complaints that are received as a result of the breach. To notify the ombudsman, you may use the Privacy Breach Reporting Form contained in our practice note Reporting a Privacy Breach to Manitoba Ombudsman, located on our website. STEP 4: PREVENT FURTHER BREACHES Once the immediate steps are taken to mitigate the risks associated with the breach, you need to take the time to thoroughly investigate the cause of the breach. This could require a security audit of physical (ex. locked cabinets or doors, alarms, visitor access controls), technical (ex. encryption, passwords, user access), administrative (ex. review of policies) and personnel (ex. privacy training) privacy controls. As a result of this evaluation, you should develop or improve as necessary adequate long-term safeguards against further breaches. Policies should be reviewed and updated to reflect the lessons learned from the investigation and regularly after that. Your resulting plan should also include a requirement for an audit at the end of the process to ensure that the prevention plan has been fully implemented. Staff should be trained to know about their responsibilities under FIPPA and PHIA.

8 Appendix Privacy Breach Notification Letter: Content Checklist Notifying an individual whose personal or personal health information has been involved in a privacy breach can be an important risk mitigation strategy. Providing notice by letter is only one of the many ways privacy breach notification can be accomplished. While the preferred method of notification is direct (ex. telephone, letter or in person) there may be situations where indirect notification (ex. posting notices, web site information or media) would be more appropriate. Using multiple methods of notification in certain cases may be the most effective approach. This document outlines what information to include in a privacy breach notification letter. The content should be customized, as necessary, to meet your specific needs and circumstances. It is recommended that you review our practice note Keys Steps in Responding to Privacy Breaches along with this document. Describe what happened Provide the date of the incident and date of discovery. Describe the incident. For example, how the privacy breach was discovered, details of what occurred and if known, include whether the privacy breach was accidental or intentional, etc. Describe the information involved in the privacy breach Be specific when describing the type of personal and/or personal health information involved. For example, a patient or client file that included the individual s diagnosis, list of medications, emergency contact information, personal health identification number (PHIN), etc. Each type of personal and personal health information may have varying degrees of impact on the individual. Explain what the individual can do to lessen the impact Describe any steps the individual can take to further mitigate the risk of harm. For example, provide contact information for credit monitoring agencies where there is a risk of identity theft, or provide information on how to change a PHIN or driver s licence number, etc. Be accountable Acknowledge that the privacy breach may have caused the individual distress and apologize on behalf of the public body/trustee. This letter should be signed by someone with authority in the organization, such as the access/privacy officer or senior manager. Describe any corrective measures Describe what your public body/trustee is doing to prevent any future privacy breaches. For example: enhancing security measures (ex. encryption software) implementing new policies or procedures changing locks on doors and filing cabinets implementing new auditing practices

9 Right of complaint Under the Freedom of Information and Protection of Privacy Act and the Personal Health Information Act, an individual has the right to make a complaint to Manitoba Ombudsman if their personal and/or personal health information has been compromised. Inform the individual of their right of complaint and provide Manitoba Ombudsman s contact information: Manitoba Ombudsman 750-500 Portage Avenue Winnipeg MB R3C 3X1 Phone: 204-982-9130 Toll Free in Manitoba: 1-800-665-0531 www.ombudsman.mb.ca Provide contact information Provide contact information for someone within the public body/trustee who can answer questions and/or provide further information regarding the privacy breach. Revised February 2017