Risk
10/4/2011
08:48 AM
50%
50%

Military Health Plan Data Breach Threatens 4.9 Million

Tricare says lost backup tapes fall under FTC jurisdiction, not HIPAA, so only offers 90 days of fraud protection.

12 Advances In Medical Robotics
(click image for larger view)
Slideshow: 12 Advances In Medical Robotics
A data breach involving nearly 5 million people treated at military healthcare facilities over a 19-year period is raising questions about whether U.S. Federal Trade Commission (FTC) rules supersede Health Insurance Portability and Accountability Act (HIPAA) regulations.

Last week, Tricare, the managed care arm of the U.S. government's Military Health System, disclosed that contractor Science Applications International Corp. (SAIC) had lost backup tapes containing personally identifiable information--including some health data--of about 4.9 million people. The tapes contained data from electronic health records (EHRs) used at military hospitals, clinics, and pharmacies in the San Antonio area from 1992 until Sept. 7, 2011.

According to a statement from Tricare, the records may include Social Security numbers, addresses, and phone numbers, as well as clinical notes, prescription information, and some lab data. Tricare said that the tapes did not hold any financial information.

"The risk of harm to patients is judged to be low despite the data elements involved since retrieving the data on the tapes would require knowledge of and access to specific hardware and software and knowledge of the system and data structure," according to the Tricare statement. "Since we do not believe the tapes were taken with malicious intent, we believe the risk to beneficiaries is low."

[ Are you prepared if your organization suffers a data breach? See Data Breach Response Plans: Yours Ready?]

Tricare said that SAIC reported the breach on Sept. 14. Citing a police report, the San Antonio Express-News reported that the tapes were stolen from an SAIC employee's car during a burglary the night before.

The Tricare statement said that the U.S. Department of Defense and SAIC are working to identify all individuals whose data were compromised and that Tricare will sent notifications by mail. The process is expected to take 4-6 weeks.

People affected will not be provided with any private credit monitoring services. "The risk of harm to patients is judged to be low despite the data elements involved," the Tricare notice said. Tricare is directing enrollees to a FTC site where individuals can place a free, 90-day fraud alert on their personal credit ratings.

"It's clear that Tricare is trying to position this under Federal Trade Commission regulations, not under HIPAA regulations," Ruby Raley, director of healthcare solutions at IT integration and security company Axway, Scottsdale, Ariz., told InformationWeek Healthcare.

Unlike HIPAA, FTC regulations don't require entities to sign agreements with "business associates" that hold third parties to the same standards when handling sensitive data. Also, HIPAA regulations require organizations to provide a year of credit monitoring to anyone who may have been affected by a breach. "They're only [offering] fraud protection for 90 days," Raley said of Tricare.

As of Monday, the incident had not been posted on the Department of Health and Human Services' list of breaches affecting at least 500 people, commonly called the "wall of shame." The 2009 American Recovery and Reinvestment Act calls for covered entities to report major HIPAA breaches to the HHS Office for Civil Rights if the data was not encrypted.

Tricare did not indicate whether SAIC encrypted the information on the stolen tapes, but Raley said, "It's very hard to encrypt a backup tape." Tricare did not respond to a request for comment on the HIPAA issues.

SAIC has not offered a public statement on the incident, but the company's home page references an "Incident Response Call Center."

Anyone concerned that they may have been affected by the theft can call (855) 366-0140 from within the United States or (952) 556-8312 from abroad. This same information is included in Tricare's statement.

Not every application is ready for the cloud, but two case studies featured in the new, all-digital issue of InformationWeek Healthcare offer some insights into what does work. Also in this issue: Keeping patient data secure isn't all that hard. But proposed new regulations could make it a lot harder. Download it now. (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
OTECH000
50%
50%
OTECH000,
User Rank: Apprentice
10/7/2011 | 2:24:19 PM
re: Military Health Plan Data Breach Threatens 4.9 Million
I think it might be TRICARE all caps, but not sure what it stands for.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

CVE-2015-0885
Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.