DEBRIEFING THE PHI REPORT: DETERMINING THE TRUE COST OF A DATA BREACH

By Jenny Laurello

This week I had the chance to listen to a webinar highlighting the recently released report on The Financial Impact of Breached Protected Health Information. Released on March 5, the “PHI Report” has already been downloaded by more than 1,700 users, with its goal being to help health care organizations both assess security risks, as well as build a business case for protected health information (PHI) security processes, procedures, technologies and executive buy-in.

Created through the PHI Project, a collaboration on behalf of the American National Standards Institute (ANSI), in partnership with Shared Assessments and ISA, the publication takes an extensive look at why organizations are breaching PHI information – and, interestingly enough, at three times the rate of other industries, such as banking and finance. It also includes step by step guidance for organizations to calculate the true cost of a data breach using the “PHIve,” or PHI value estimator, an approach based on the success of prior, similar initiatives, such as ASNI’s 2008 Financial Impact of Cyber Risk report.

To view the original article please click here.

For this project, the group honed in specifically on health care, bringing together over 100 CIOs, CFOs, chief compliance officers, chief security officers and general counsel from various health organizations to ask and discuss 50 key questions on what must be done to ensure the security of PHI data. What they discovered was chief privacy and compliance officers were quick to bring up the changes in liabilities and initiatives that they felt needed to be done based on their work so far and to ensure compliance at the federal level. Unfortunately though, without the proper financial language and hard figures to support it –  i.e. in the absence of CFO speak — it can be nearly impossible to communicate the value of these projects and create a business case for investment.

To rectify this enterprise language barrier and help IT and security leaders build a case for resource allocation, the project’s subcommittees began working with a team of professionals to define the PHI ecosystem (i.e., anyone who generates, stores, recovers, distributes or in any way handles an electronic record). They also worked to identify the main elements threatening PHI security; in this instance as garnered through the case studies of 40 recent health care data breaches. From this, they determined the top four areas threatening the privacy and security of PHI data are:

With the number of threats and vulnerabilities that exist in the ecosystem, coupled with the hard and fast proof via the growing list of data breach poster children on the OCR’s site, it was clear to the group that they needed to develop a series of standards, safeguards and controls for organizations to implement and follow. And while each organization’s compliance program will vary depending on specific security requirements, the report identifies three universal aspects that anyone can use:

After an organization establishes its security policy, determines an agreed upon set of actionable procedures and has implemented the proper technical controls and safeguards, the next step is packaging this information and using it to enhance their business case for resources.

As detailed in the report, the PHIve Method details the steps necessary to calculate the true cost of a data breach:

In the age of EHRs and electronic data exchange, organizations must make investing in their IT security and data protection initiatives a top priority. With the growing market attractiveness of patient medical information — with one medical record being worth $50 as compared to just $1 per social security number  – and the growing number of vulnerabilities in the ecosystem, a solid risk assessment is simply a small component of the larger framework that makes up health IT security preparedness.

Is your team prepared?

Tagged

Leave a Reply