Lance's Corner

OCR Issues HIPAA Cybersecurity Newsletter

Aug 22, 2024

The United States Office for Civil Rights (OCR) has issued its cybersecurity newsletter on the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its requirements for physical security of patient information.

August 2024 OCR Cybersecurity Newsletter

HIPAA Security Rule Facility Access Controls – What are they and how do you implement them?

Available online at: https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity-newsletter-august-2024/index.html.

In today’s environment of increased cyber-attacks and breaches of electronic protected health information (ePHI)1 caused by hacking, malware, or ransomware, HIPAA covered entities2 and business associates3 (collectively, “regulated entities”) may overlook the need for vigilance with regard to the physical security of their ePHI.  When it comes to ensuring the confidentiality, integrity, and availability of ePHI, regulated entities must ensure that the physical security of their facilities is not neglected.  Recent data security research suggests that only 7% of data security decision makers are concerned with breaches due to lost or stolen equipment, even though these account for 17% of breaches.4  From 2020 through 2023, the Office for Civil Rights (OCR) received over 50 large breach reports (i.e., breaches of unsecured protected health information (PHI) involving 500 or more individuals) affecting over 1,000,000 individuals attributable to stolen equipment and devices containing ePHI.  Such equipment and devices were frequently described as being stolen during a burglary and included workstations, servers, laptops, external hard drives, backup devices, flash drives, smart phones, and medical devices.  Regulated entities should ensure that they have proper physical safeguards, including Facility Access Controls, in place to deter and prevent unauthorized access.

A breach in the confidentiality of PHI due to stolen devices is not the only concern for protecting access to one’s physical facilities.  Loss of certain devices, such as servers that maintain patients’ electronic medical records or medical devices that provide diagnostic or treatment services, could delay or impede delivery of health care.  In their haste to flee with stolen equipment, criminals could also destroy physical structures or electronic components required for power or cooling for devices, or damage infrastructure required for network connectivity – all of which can introduce additional delays and costs to fully recover.

Implementing Facility Access Controls is analogous to securing your home.  Prior to locking your home’s entrances, you have not effectively secured your home; similarly, absent appropriate Facility Access Controls, you have not fully secured your ePHI.  This newsletter provides an overview of important considerations for regulated entities when implementing the Facility Access Controls requirement of the HIPAA Security Rule.5

The Facility Access Controls standard of the HIPAA Security Rule requires that regulated entities “[i]mplement policies and procedures to limit physical access to [their] electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed.”6

This standard consists of four addressable implementation specifications:7 (1) contingency operations, (2) facility security plan, (3) access control and validation procedures, and (4) maintenance records.  Each of these specifications are explained in more detail below.  Addressable implementation specifications require HIPAA regulated entities to assess whether an implementation specification is a reasonable and appropriate safeguard in its environment, and if so to implement it.8  If a particular implementation specification is not reasonable and appropriate, regulated entities must document why, and implement an equivalent alternative measure if reasonable and appropriate.9

Securing facilities against potential opportunities for theft is only one aspect, albeit an important one, for regulated entities to consider when implementing Facility Access Controls.  Another is providing physical access to systems and facilities in a secure manner during a disaster or emergency.  Since 2018, HHS has issued waivers or modifications of certain HIPAA requirements under Section 1135 of the Social Security Act10 31 times.11  Except for a waiver due to the COVID-19 public health emergency, all were issued because of natural disasters (e.g., hurricanes, tornadoes, winter storms, wildfires) across the United States and its territories.  Regulated entities may want to consider how increased risks of natural disasters and other emergencies could affect physical access to systems and facilities.

A.  Contingency Operations

The Security Rule’s administrative safeguards require a regulated entity to establish a contingency plan to respond to an emergency or other occurrence that damages systems containing ePHI.12  Emergencies can include natural disasters such as floods or fires as well as human actions (e.g., malicious actions such as hacking and malware attacks as well as non-malicious actions such as an inexperienced system administrator accidentally disabling critical systems or deleting sensitive data).  As OCR stated in previous rulemaking, “[a] contingency plan is the only way to protect the availability, integrity, and security of data during unexpected negative events.  Data are often most exposed in these events, since the usual security measures may be disabled, ignored, or not observed.”13  Thus, contingency plans are critical to protecting the confidentiality, integrity, and availability of ePHI during unexpected adverse events.  And by extension, contingency operations are critical to ensure access to facilities to support the execution of contingency plans.

If an entity needs to execute its contingency plans in response to a disaster or emergency affecting its physical facilities, it may also need to activate its contingency operations procedures.  Contingency operations is an addressable implementation specification of the Facility Access Controls standard of the Security Rule.14  Contingency operations are procedures established by regulated entities that provide for physical access to facilities to support execution of contingency plans and restoration efforts in the event of an emergency.15

The primary purpose of contingency operations is to maintain physical security and appropriate access to ePHI in support of data restoration activities.  When developing contingency operations procedures, regulated entities could consider the following:

  • Who requires access to facilities and ePHI during a disaster or emergency?
  • Is there a process to provide expedited or temporary access to facilities and ePHI if needed?
  • Are there alternate means to access facilities and ePHI?
  • Is there a plan to monitor facilities (e.g., assign workforce members, security guards) if safe to do so, or otherwise secure facility access points that may no longer be secure due to a disaster or emergency (e.g., power outage, physical damage)?
  • Who is responsible for the organization’s contingency plans?
  • Who is responsible for implementing the contingency plan for accessing facilities and ePHI in each department, unit, etc.?
  • Are contingency plans established for various types of potential disasters and emergencies (e.g., wildfire, flood, hurricane, tornado, earthquake, power outage, civil unrest, cyber incidents)?
  • What activities, resources, and procedures are needed to carry out critical activities during prolonged interruptions to normal operations (e.g., contracting for additional help to relieve workforce, contracting for fuel deliveries for generators during extended power outages)?

B.  Facility Security Plan

The second addressable implementation specification of the Facility Access Controls standard is for regulated entities to establish a facility security plan.16  The facility security plan is the implementation of policies and procedures of the regulated entity to protect its facilities and equipment from unauthorized physical access, tampering, and theft.17  Each regulated entity has its own unique set of circumstances that will guide the development and implementation of its facility security plan.  Within an entity, there may even be different facility security plans for different departments depending on each individual department’s needs.  When implementing its facility security plan, a regulated entity may consider reviewing its risk analysis to help guide it in determining the appropriate policies and procedures to include in the plan.  Regulated entities that do not control the buildings they occupy or that share space with other organizations remain responsible for their own facility security plans.  Further, it is important for a regulated entity to consider the facility security measures implemented by third parties in the regulated entity’s facility security plan, since they impact the regulated entity’s own facility security plan.18

When creating a facility security plan, regulated entities might consider how the following are integrated into such a plan: surveillance cameras; alarm systems; property control/inventory tags; employee/contractor ID badges and visitor badges; private security guards/patrols; facility escorts for visitors/contractors; and biometric, electronic, and/or mechanical security systems.

In addition, when creating a facility security plan, regulated entities could consider:

  • training its workforce members on the facility security plan;
  • conducting an annual review and update, as needed, of the facility security plan;
  • designating a person to develop and implement the facility security plan; and
  • testing the facility security plan to ensure it remains effective.

C.  Access Control and Validation Procedures

The third addressable implementation specification of the Facility Access Controls safeguard is access control and validation procedures, which is the implementation of procedures to control and validate access to facilities based on an individual’s role or function, including visitor control and access to software for testing and revisions.19  In other words, this implementation specification leads regulated entities to control who has physical access to facilities.  Such procedures may vary among regulated entities depending on the nature of their facilities and operations.  For example, some regulated entities may control contractor access by requiring sign-in and sign-out along with a workforce member escort.  Others, following appropriate vetting, may permit contractor access through the use of electronic key cards to limit access only to areas to which the contractor is permitted.

Considerations when developing access controls and validation procedures can include:

  • ensuring policies and procedures for controlling access account for various roles and groups including, for example, staff, contractors, visitors, volunteers, interns, non-staff providers, and probationary employees;
  • determining and documenting access points in each facility;
  • creating an inventory of information technology assets; and
  • developing a plan to ensure equipment is monitored as necessary.20

D.  Maintenance Records

The final addressable implementation specification of the Facility Access Controls safeguard is documenting and retaining maintenance records, which is the implementation of policies and procedures to document information about repairs and modifications made to the physical components of a facility related to security (e.g., hardware, walls, doors, locks).21  Implementing such procedures and retaining documentation can assist regulated entities in ensuring accountability and in maintaining an effective facility security plan.

Maintenance record policies and procedures may vary with the size and type of regulated entity.  For example, a small health care provider’s office with a single location may document maintenance records in a logbook whereas a larger multi-location health care provider may record its maintenance activities electronically in a database.

A regulated entity’s maintenance records could document:

  • date and time of repair/modification;
  • description of repair/modification;
  • location of repair/modification;
  • reasons for repair/modification, including any related to a security incident;
  • name of individual(s) responsible for performing the repair/modification;
  • name of individual(s) that authorize the repair/modification;
  • any follow-up or additional repair/modification required; and
  • name of individual(s) responsible for overseeing the repair/modification (e.g., security officer, maintenance supervisor).

OCR Enforcement

Failure to implement Facility Access Controls can lead to a breach of PHI and potential enforcement actions by OCR for such failures.  As an example, OCR investigated Fresenius Medical Care Holdings, Inc. (FMC) for potential violations of the HIPAA Rules stemming from five separate breach incidents.22  Three of those incidents, which affected the PHI of 366 individuals, involved equipment stolen from FMC’s facilities.  The ePHI involved included names, admission dates, days and times of treatments, dates of birth, Social Security numbers, telephone numbers, and addresses.

OCR’s investigation found potential violations of the HIPAA Rules, including failure to conduct an accurate and thorough risk analysis; failure to implement a mechanism to encrypt and decrypt ePHI; failure to implement policies and procedures that govern the receipt and removal of hardware and electronic media; failure to implement policies and procedures to address security incidents; impermissible disclosure of ePHI; and failure to implement policies and procedures to safeguard their facilities and equipment therein from unauthorized access, tampering, and theft.

OCR resolved this investigation with a monetary settlement of $3.5 million, a resolution agreement, and corrective action plan that identified steps for FMC to take to resolve potential violations of the HIPAA Privacy and Security Rules and to protect ePHI.

Conclusion

In the face of ongoing, remote cyber-attacks, regulated entities should not overlook Facility Access Controls or relegate them to a “check the box” exercise.  Also, as the United States continues to experience the effects of extreme weather and natural disasters,23 regulated entities may want to consider whether their facilities are under increased environmental risks and, if so, review and update their Facility Access Controls to reflect these increased risks.24  Facility security is a vital part of a regulated entity’s overall security plan to protect PHI and should be considered holistically with an entity’s overall cybersecurity plan and HIPAA compliance program.  Effective Facility Access Controls not only provide for securing sensitive areas from unauthorized access but can also be a vital part of an entity’s recovery efforts when used in conjunction with an entity’s overall contingency planning process.

Additional Resources:

HIPAA Security Series on Physical Safeguards:

FTC Physical Security:

Interagency Security Committee Guide to Creating a Security Access Plan:

NIST SP 800-66 Guide to Implementing the HIPAA Security Rule:

CISA Cybersecurity and Physical Security Convergence:

* This document is not a final agency action, does not legally bind persons or entities outside the Federal government, and may be rescinded or modified in the Department’s discretion.

Endnotes

1 EPHI is individually identifiable health information transmitted by or maintained in electronic media that identifies an individual or there is a reasonable basis to believe that the information can be used to identify an individual, that is created or received by a covered entity that relates to the past, present, or future physical or mental condition of an individual, the provision of health care to an individual, or the past, present, or future payment for the provision of health care to an individual.  See 45 CFR 160.103 (definitions of “electronic protected health information” and “individually identifiable health information”).

2 See 45 CFR 160.103  (definition of “Covered entity”).

3 See 45 CFR 160.103 (definition of “Business associate”).  See also Office for Civil Rights, HHS, “Fact Sheet on Direct Liability of Business Associates,” (May 2019), https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/business-associates/factsheet/index.html

4 Security Week.  Lost and Stolen Devices: A Gateway to Data Breaches and Leaks.  (October 2023).  Available at: https://www.securityweek.com/lost-and-stolen-devices-a-gateway-to-data-breaches-and-leaks/.

5 OCR administers and enforces the HIPAA Privacy, Breach Notification, Security, and Enforcement Rules at 45 CFR Part 160 and Part 164 Subparts A, C, D and E.  The Security Rule establishes national standards to protect ePHI created, received, transmitted, or maintained by covered entities and their business associates.  The Security Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of ePHI.

6 45 CFR 164.310(a)(1).

7 See 45 CFR 164.306(d)(3).

8 45 CFR 164.306(d)(3)(i)-(ii)(A).

9 45 CFR 164.306(d)(3)(ii)(B).

10 See https://aspr.hhs.gov/legal/1135-Waivers/Pages/1135-Waivers.aspx.

11 See https://aspr.hhs.gov/legal/1135-Waivers/Pages/default.aspx.

12 45 CFR 164.308(a)(7).

13 68 Fed. Reg. 8334, 8351.

14 45 CFR 164.310(a)(2)(i).

15 See Id.

16 45 CFR 164.310 (a)(2)(ii).

17 See Id.

18 See “Health Insurance Reform: Security Standards; Final Rule”, 68 Fed. Reg. 8334, 8353 (February 20, 2003).

19 See 45 CFR 164.310(a)(2)(iii).

20 See Jeffrey A. Maron, Nat’l Inst. Of Standards and Tech., “Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule A Cybersecurity Resource Guide,” (Feb. 2024), https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-66r2.pdf - PDF .

21 See 45 CFR 164.310(a)(2)(iv).

22 See Office for Civil Rights, HHS, “Five breaches add up to millions in settlement costs for entity that failed to heed HIPAA’s risk analysis and risk management rules,” (2018), https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/fmcna/index.html.

23 See https://www.whitehouse.gov/ostp/news-updates/2023/11/09/fact-sheet-fifth-national-climate-assessment-details-impacts-of-climate-change-on-regions-across-the-united-states/.

24 See 45 CFR 164.316(b)(2)(iii) (The Update implementation specification of the Policies and Procedures standard requiring regulated entities to “[r]eview documentation periodically, and update as needed, in response to environmental or operational changes affecting the security of the [ePHI].”).

USDOL Issues Comprehensive Employer Guidance on Long COVID

The United States Department of Labor (USDOL) has issued a comprehensive set of resources that can be accessed below for employers on dealing with Long COVID.

Supporting Employees with Long COVID: A Guide for Employers

The “Supporting Employees with Long COVID” guide from the USDOL-funded Employer Assistance and Resource Network on Disability Inclusion (EARN) and Job Accommodation Network (JAN) addresses the basics of Long COVID, including its intersection with mental health, and common workplace supports for different symptoms.  It also explores employers’ responsibilities to provide reasonable accommodations and answers frequently asked questions about Long COVID and employment, including inquiries related to telework and leave.

Download the guide

Accommodation and Compliance: Long COVID

The Long COVID Accommodation and Compliance webpage from the USDOL-funded Job Accommodation Network (JAN) helps employers and employees understand strategies for supporting workers with Long COVID.  Topics include Long COVID in the context of disability under the Americans with Disabilities Act (ADA), specific accommodation ideas based on limitations or work-related functions, common situations and solutions, and questions to consider when identifying effective accommodations for employees with Long COVID.  Find this and other Long COVID resources from JAN, below:

Long COVID, Disability and Underserved Communities: Recommendations for Employers

The research-to-practice brief “Long COVID, Disability and Underserved Communities” synthesizes an extensive review of documents, literature and data sources, conducted by the USDOL-funded Employer Assistance and Resource Network on Disability Inclusion (EARN) on the impact of Long COVID on employment, with a focus on demographic differences.  It also outlines recommended actions organizations can take to create a supportive and inclusive workplace culture for people with Long COVID, especially those with disabilities who belong to other historically underserved groups.

Read the brief

Long COVID and Disability Accommodations in the Workplace

The policy brief “Long COVID and Disability Accommodations in the Workplace” explores Long COVID’s impact on the workforce and provides examples of policy actions different states are taking to help affected people remain at work or return when ready.  It was developed by the National Conference of State Legislatures (NCSL) as part of its involvement in USDOL’s State Exchange on Employment and Disability (SEED) initiative.

Download the policy brief

Understanding and Addressing the Workplace Challenges Related to Long COVID

The report “Understanding and Addressing the Workplace Challenges Related to Long COVID” summarizes key themes and takeaways from an ePolicyWorks national online dialogue through which members of the public were invited to share their experiences and insights regarding workplace challenges posed by Long COVID.  The dialogue took place during summer 2022 and was hosted by USDOL and its agencies in collaboration with the Centers for Disease Control and Prevention and the U.S. Surgeon General.

Download the report

Working with Long COVID

The USDOL-published “Working with Long COVID” fact sheet shares strategies for supporting workers with Long COVID, including accommodations for common symptoms and resources for further guidance and assistance with specific situations.

Download the fact sheet

COVID-19: Long-Term Symptoms

This USDOL motion graphic informs workers with Long COVID that they may be entitled to temporary or long-term supports to help them stay on the job or return to work when ready, and shares where they can find related assistance.

Watch the motion graphic

A Personal Story of Long COVID and Disability Disclosure

In the podcast “A Personal Story of Long COVID and Disability Disclosure,” Pam Bingham, senior program manager for Intuit’s Diversity, Equity and Inclusion in Tech team, shares her personal experience of navigating Long COVID symptoms at work.  The segment was produced by the USDOL-funded Partnership on Employment and Accessible Technology (PEAT) as part of its ongoing “Future of Work” podcast series.

Listen to the podcast

HHS OIG Issues Annual Report on State MFCUs

Per the notice below, the Office of the Inspector General (OIG) of the United States Department of Health and Human Services (HHS) has issued its annual report on the performance of state Medicaid Fraud Control Units (MFCUs).

Medicaid Fraud Control Units Fiscal Year 2023 Annual Report (OEI-09-24-00200) 

Medicaid Fraud Control Units (MFCUs) investigate and prosecute Medicaid provider fraud and patient abuse or neglect. OIG is the Federal agency that oversees and annually approves federal funding for MFCUs through a recertification process. This new report analyzed the statistical data on annual case outcomes—such as convictions, civil settlements and judgments, and recoveries—that the 53 MFCUs submitted for Fiscal Year 2023.  New York data is as follows:

Outcomes

  • Investigations1 - 556
  • Indicted/Charged - 9
  • Convictions - 8
  • Civil Settlements/Judgments - 28
  • Recoveries2 - $73,204,518

Resources

  • MFCU Expenditures3 - $55,964,293
  • Staff on Board4 - 257

1Investigations are defined as the total number of open investigations at the end of the fiscal year.

2Recoveries are defined as the amount of money that defendants are required to pay as a result of a settlement, judgment, or prefiling settlement in criminal and civil cases and may not reflect actual collections.  Recoveries may involve cases that include participation by other Federal and State agencies.

3MFCU and Medicaid Expenditures include both State and Federal expenditures.

4Staff on Board is defined as the total number of staff employed by the Unit at the end of the fiscal year.

Read the Full Report

View the Statistical Chart

Engage with the Interactive Map

GAO Issues Report on Medicaid Managed Care Service Denials and Appeal Outcomes

The United States Government Accountability Office (GAO) has issued a report on federal use of state data on Medicaid managed care service denials and appeal outcomes.  GAO found that federal oversight is limited because it doesn't require states to report on Medicaid managed care service denials or appeal outcomes and there has not been much progress on plans to analyze and make the data publicly available.  To read the GAO report on federal use of state data on Medicaid managed care service denials and appeal outcomes, use the first link below.  To read GAO highlights of the report on federal use of state data on Medicaid managed care service denials and appeal outcomes, use the second link below.
https://www.gao.gov/assets/d24106627.pdf  (GAO report on federal use of state data on Medicaid managed care service denials and appeal outcomes)
https://www.gao.gov/assets/d24106627_high.pdf  (GAO highlights on federal use of state data on Medicaid managed care service denials and appeal outcomes)

CMS Issues Latest Medicare Regulatory Activities Update

The Centers for Medicare and Medicaid Services (CMS) has issued its latest update on its regulatory activities in the Medicare program.  While dentistry is only minimally connected to the Medicare program, Medicare drives the majority of health care policies and insurance reimbursement policies throughout the country.  Therefore, it always pays to keep a close eye on what CMS is doing in Medicare.  To read the latest CMS update on its regulatory activities in Medicare, use the link below.
https://www.cms.gov/training-education/medicare-learning-network/newsletter/2024-03-14-mlnc