David O’Neal and Travis Williams Examine the DOJ’s Civil Cyber-Fraud Initiative and the Impact of the Recent Lawsuit Against Georgia Tech on the Health Care Industry
Nov 01, 2024
INSIGHTS
On January 6, 2025, the Department of Health and Human Services’ (Department) Office for Civil Rights (OCR) published a Proposed Rule that, if finalized, would substantially revise the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule for the first time in more than a decade. See 90 Fed. Reg. 898 (Jan. 6 2025).
The Proposed Rule, which spans 125 pages, seeks to address the significant changes to the environment in which “health care is provided and in which regulated entities operate … including transformative changes in how regulated entities [which include both covered entities and their business associates], create, receive, maintain, and transmit [electronic protected health information (ePHI)].” These changes would make the Security Rule significantly more prescriptive and require more proactive measures from covered entities—health care providers, health plans, and health care clearinghouses—and their business associates.
The Department will receive comments through March 7, 2025. Both the full text of the Proposed Rule and a digital form for submitting public comments online are available here.
Below, we provide a summary of some of the Proposed Rule’s key changes.
Removing Distinction Between “Required” and “Addressable” Implementation Specifications to Make All Implementation Specifications Required
Since it was first issued in 2003, the Security Rule has distinguished between “addressable” and “required” implementation specifications. “Addressable” implementation specifications include, for example, procedures for protecting against malicious software, password management, log-in monitoring, automatic logoff, backup of ePHI before moving equipment, and encryption of ePHI. “While none of the implementation specifications were optional,” preamble commentary to the Proposed Rule notes that “designating some of the implementation specifications as addressable provided each covered entity with the ability to determine whether certain implementation specifications were reasonable and appropriate safeguards for that entity.” The Proposed Rule would do away with that distinction and make all implementation specifications “required.”
Technology Asset Inventory and Network Map
The Proposed Rule would also require regulated entities to conduct and maintain an accurate and thorough written technology asset inventory, as well as a network map of its electronic information systems and all technology assets that may affect the confidentiality, integrity, or availability of ePHI. This would require regulated entities to identify their information systems that create, receive, maintain, or transmit ePHI and all technology assets, including hardware, software, electronic media, information, and data, that may affect ePHI. Moreover, the Proposed Rule would require that regulated entities determine the movement of ePHI through, into, and out its information systems and describe such movement in a network map.
If finalized, regulated entities would be required to review and update the written inventory of technology assets and network map at least annually and when there is a change in the regulated entity’s environment or operations that may affect ePHI.
Risk Analysis
While covered entities and business associates are required to, among other things, conduct an accurate and thorough assessment of potential risks and vulnerabilities, the current regulations do not provide any specificity as to what would constitute such an accurate and thorough assessment. The Proposed Rule, in addition to “elevating” this existing requirement from an implementation specification to a standard, would require regulated entities to “conduct an accurate and comprehensive written assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of all ePHI created, received, maintained, or transmitted by the regulated entity.”
More particularly, the Department proposes “eight implementation specifications” for regulated entities to perform and document as part of this risk analysis:
Regulated entities would also be required to review, verify, and update the written assessment annually.
Patch Management
In recognition of hackers ongoing attempts “to target the health care industry in search of ways to access valuable ePHI,” the Proposed Rule would create a three-tiered hierarchy of patches based on the level of risk, with accelerated deadlines for installing higher risk patches:
Complying with these proposed timelines will require regulated entities to consult and engage with their IT departments on an ongoing basis.
Requiring Certain Verifications from Business Associates on an Annual Basis
The Proposed Rule would also require covered entities to obtain annually from their business associates written verification that the business associate has deployed technical safeguards required under the Security Rule.
Notably, because business associates’ subcontractors are themselves business associates, the Proposed Rule would require the same annual written verification from subcontractors. Additionally, the Proposed Rule would require this written verification to be accompanied by a written analysis of the business associate’s relevant electronic information systems, which “would be required to be performed by a person with appropriate knowledge of and experience with generally accepted cybersecurity principles and methods for ensuring the confidentiality, integrity, and availability of ePHI.” Currently, the Proposed Rule does not require that the written analysis be performed by an independent expert; in other words, if finalized as proposed, the written analysis could be performed by a member of a regulated entity’s IT department possessing sufficient expertise.
Additional Security Measures
In addition to the changes summarized above, the Proposed Rule would require regulated entities to:
Potential False Claims Act Risk
Since HIPAA’s inception more than 2 decades ago, the Department has maintained that the Security Rule provides regulated entities with the “flexibility to choose appropriate security measures considering their size, capabilities, the costs of the specific security measures, and the operational impact, enabling them to reasonably implement the standards of the Security Rule.” However, the significant changes and enhanced specificity proposed by the Department in the Proposed Rule could, in addition to increasing the risk of direct liability under HIPAA, increase regulated entities’ liability under other statutes such as the federal False Claims Act.
In October 2021, Deputy Attorney General Lisa O. Monaco of the United States Department of Justice (DOJ) announced the Civil Cyber-Fraud Initiative (the “Initiative”) to “utilize the False Claims Act to pursue cybersecurity related fraud by government contractors and grant recipients.” To date, most of the cases made public under the Initiative have been premised on an entity’s failure to implement a specific set of contractual cybersecurity requirements to which the entity agreed to adhere, as opposed to a theory that a regulated entity failed to comply with HIPAA and submitted false claims to a government health care program.
This could be due in large part to the existing Security Rule’s flexibility. Indeed, it can be difficult to show that a regulated entity violated the Security Rule, let alone that such a violation, if known to the government, would have been material to its decision to pay a claim, thereby implicating the False Claims Act. The Proposed Rule’s additional requirements and specificity, if finalized, could serve to create additional avenues through which the government or relators could bring lawsuits against regulated entities under the False Claims Act.
Please note that the information provided in this release is general in nature and not intended as legal advice. Specific circumstances may vary, and we encourage clients to contact us directly for personalized assistance and further information.
Parker Hudson’s Client Alerts are published solely for the interests of friends and clients of Parker, Hudson, Rainer & Dobbs LLP and should in no way be relied upon or construed as legal advice. For specific information on recent developments or particular factual situations, the opinion of legal counsel should be sought. These materials may be considered ATTORNEY ADVERTISING in some jurisdictions.