Risk
10/4/2011
08:48 AM
50%
50%

Military Health Plan Data Breach Threatens 4.9 Million

Tricare says lost backup tapes fall under FTC jurisdiction, not HIPAA, so only offers 90 days of fraud protection.

12 Advances In Medical Robotics
(click image for larger view)
Slideshow: 12 Advances In Medical Robotics
A data breach involving nearly 5 million people treated at military healthcare facilities over a 19-year period is raising questions about whether U.S. Federal Trade Commission (FTC) rules supersede Health Insurance Portability and Accountability Act (HIPAA) regulations.

Last week, Tricare, the managed care arm of the U.S. government's Military Health System, disclosed that contractor Science Applications International Corp. (SAIC) had lost backup tapes containing personally identifiable information--including some health data--of about 4.9 million people. The tapes contained data from electronic health records (EHRs) used at military hospitals, clinics, and pharmacies in the San Antonio area from 1992 until Sept. 7, 2011.

According to a statement from Tricare, the records may include Social Security numbers, addresses, and phone numbers, as well as clinical notes, prescription information, and some lab data. Tricare said that the tapes did not hold any financial information.

"The risk of harm to patients is judged to be low despite the data elements involved since retrieving the data on the tapes would require knowledge of and access to specific hardware and software and knowledge of the system and data structure," according to the Tricare statement. "Since we do not believe the tapes were taken with malicious intent, we believe the risk to beneficiaries is low."

[ Are you prepared if your organization suffers a data breach? See Data Breach Response Plans: Yours Ready?]

Tricare said that SAIC reported the breach on Sept. 14. Citing a police report, the San Antonio Express-News reported that the tapes were stolen from an SAIC employee's car during a burglary the night before.

The Tricare statement said that the U.S. Department of Defense and SAIC are working to identify all individuals whose data were compromised and that Tricare will sent notifications by mail. The process is expected to take 4-6 weeks.

People affected will not be provided with any private credit monitoring services. "The risk of harm to patients is judged to be low despite the data elements involved," the Tricare notice said. Tricare is directing enrollees to a FTC site where individuals can place a free, 90-day fraud alert on their personal credit ratings.

"It's clear that Tricare is trying to position this under Federal Trade Commission regulations, not under HIPAA regulations," Ruby Raley, director of healthcare solutions at IT integration and security company Axway, Scottsdale, Ariz., told InformationWeek Healthcare.

Unlike HIPAA, FTC regulations don't require entities to sign agreements with "business associates" that hold third parties to the same standards when handling sensitive data. Also, HIPAA regulations require organizations to provide a year of credit monitoring to anyone who may have been affected by a breach. "They're only [offering] fraud protection for 90 days," Raley said of Tricare.

As of Monday, the incident had not been posted on the Department of Health and Human Services' list of breaches affecting at least 500 people, commonly called the "wall of shame." The 2009 American Recovery and Reinvestment Act calls for covered entities to report major HIPAA breaches to the HHS Office for Civil Rights if the data was not encrypted.

Tricare did not indicate whether SAIC encrypted the information on the stolen tapes, but Raley said, "It's very hard to encrypt a backup tape." Tricare did not respond to a request for comment on the HIPAA issues.

SAIC has not offered a public statement on the incident, but the company's home page references an "Incident Response Call Center."

Anyone concerned that they may have been affected by the theft can call (855) 366-0140 from within the United States or (952) 556-8312 from abroad. This same information is included in Tricare's statement.

Not every application is ready for the cloud, but two case studies featured in the new, all-digital issue of InformationWeek Healthcare offer some insights into what does work. Also in this issue: Keeping patient data secure isn't all that hard. But proposed new regulations could make it a lot harder. Download it now. (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
OTECH000
50%
50%
OTECH000,
User Rank: Apprentice
10/7/2011 | 2:24:19 PM
re: Military Health Plan Data Breach Threatens 4.9 Million
I think it might be TRICARE all caps, but not sure what it stands for.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.