HHS issues ransomware guidance

Cyberattack, financial services 


Hospital systems, medical practices and others that deal with sensitive health information are required to protect that information under health privacy law. Typically in the event of a cyber breach, health providers are required to notify patients that their information has been potentially compromised. But ransomware attacks are different from other kinds of breaches, and the notification rules have not been clear.

The Office of Civil Rights at the Department of Health and Human Services is attempting to clarify things with long-anticipated guidance released July 11.

HHS is telling providers that under the Health Insurance Portability and Accountability Act, responses to ransomware attacks should include processes to detect and contain the impact of a ransomware attack, to recover lost data, revive operations and conduct post-incident analysis to determine whether any of the regulatory triggers to report to patients have been tripped.

Unless providers can demonstrate that there is "a low probability" that protected health information has been compromised, they must comply with HIPAA requirements to notify affected individual and the HHS secretary "without unreasonable delay." In instances of breaches affecting more than 500 individuals, the media must be notified as well.

To demonstrate a low probability of compromise, a provider can identify and mitigate the damage from the attack, by showing a "robust" disaster recovery plan that includes frequent data backups, and by showing that data has not been stolen from the victimized system.

The guidance also suggests that best way to protect data on such systems is to keep it encrypted in transit and at rest. The "unsecured protected health information" guidelines under HIPAA do not apply to encrypted data.

In advance of the guidance, two Capitol Hill IT leaders, Rep. Will Hurd (R-Texas) and Rep. Ted Lieu (D-Calif.), urged HHS leaders to think of ransomware as different from other types of cyberattacks.

Hurd and Lieu told Deven McGraw, deputy director for health information privacy at HHS, in a June letter that ransomware isn't typically a threat to data privacy, and urged notification if a ransomware attack results in denial of access to an electronic medical record or a loss of functionality to deliver medical services.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at [email protected] or follow him on Twitter at @MRockwell4.


  • Management
    shutterstock image By enzozo; photo ID: 319763930

    Where does the TMF Board go from here?

    With a $1 billion cash infusion, relaxed repayment guidelines and a surge in proposals from federal agencies, questions have been raised about whether the board overseeing the Technology Modernization Fund has been scaled to cope with its newfound popularity.

  • IT Modernization
    shutterstock image By enzozo; photo ID: 319763930

    OMB provides key guidance for TMF proposals amid surge in submissions

    Deputy Federal CIO Maria Roat details what makes for a winning Technology Modernization Fund proposal as agencies continue to submit major IT projects for potential funding.

Stay Connected