Q: Is it true that at some point the Health Insurance Portability and Accountability Act (HIPAA) will disallow the use of Social Security numbers to identify individuals?A: The use of Social Security numbers, in general from a security perspective, is bad karma. Too many identity theft criminals use that data as a jumping-off point to steal your personal information, ruin your credit and illegally acquire goods, services and products.The identification numbering system proposed by HIPAA regulations is an effort to reach a more robust level of patient, provider, payer identification as well as streamline reporting of such information across disparate private, state and federal reporting systems and networks.I highly recommend that if your organization is using Social Security numbers, you should discontinue that as soon as possible.Q: How are health-care organizations addressing the overlap between the final privacy regulations and the proposed security regulations? A: There are many crossover points between the privacy and security regulations under HIPAA. Many of the administrative and policy stipulations under privacy require a technological component to enhance the compliance requirement. The fact that the security regulations’ final implementation by Health and Human Services has been delayed numerous times since 2000, and will most likely be delayed again, doesn’t change the fact that privacy regulations must be complied with.A close coordinated effort needs to be accomplished between security and privacy groups within health-care organizations so that security efforts don’t waste money or result in stovepiped duplicate efforts. Q: In an environment that manages medical records, can we maintain HIPAA compliance when we are forced to grant rights to an untrusted third party by giving it access to our system?A: No, you will be in noncompliance. However, by employing administrative and technological procedures, you can sequester such information from third parties that don’t need to know versus those that provide an application service provider service (like electronic medical records). Contractual and service level agreements can be created to protect your institution by obligating the third party to abide by patient health-care information protection requirements.If the third party is untrusted, I question why you would give it information in the first place, but many legacy holes of this type exist. I have often heard health-care admins or nontechnical folks blindly accept a vendor statement like, “You have to do it our way.” That can’t be further from the truth. The organization I work at has compiled an extensive set of security requirements that we provide to prospective and current vendors. If a senior executive or physician has a personal stake in a third-party relationship, there can be incredible pressures to cave in to a less secure solution. I have found that talking with the parties, educating them on how the same business can be transacted in a more secure fashion and providing such solutions is a win-win situation.If your bosses still want to have an insecure relationship with a third party, obtain a letter signed by them saying they accept the risks and acknowledge that they are not complying with HIPAA.Q: One of the provisions of the privacy portion states that protected health information (PHI) cannot be disclosed to anyone other than the individual to whom it pertains without specific authorization. Are health plans following this interpretation and getting authorization for spouses and family members? Do you expect any additional changes to the privacy regulations that will clarify or simplify this issue?A: Many health-care organizations are interpreting such privacy requirements to extend to family members, including spouses. Even to the point of not leaving detailed information on the patient’s home phone messaging service. Unless the patient specifically authorizes spouses or family members to be kept informed or to have access to such PHI, they should be excluded. A significant revision to the privacy rules has been published this year. It states that within your institution, access to PHI can be granted to all institutional clinicians, staff and so on without the patient’s consent in order to ensure quality medical care for that patient. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe