08:48 AM

Military Health Plan Data Breach Threatens 4.9 Million

Tricare says lost backup tapes fall under FTC jurisdiction, not HIPAA, so only offers 90 days of fraud protection.

12 Advances In Medical Robotics
(click image for larger view)
Slideshow: 12 Advances In Medical Robotics
A data breach involving nearly 5 million people treated at military healthcare facilities over a 19-year period is raising questions about whether U.S. Federal Trade Commission (FTC) rules supersede Health Insurance Portability and Accountability Act (HIPAA) regulations.

Last week, Tricare, the managed care arm of the U.S. government's Military Health System, disclosed that contractor Science Applications International Corp. (SAIC) had lost backup tapes containing personally identifiable information--including some health data--of about 4.9 million people. The tapes contained data from electronic health records (EHRs) used at military hospitals, clinics, and pharmacies in the San Antonio area from 1992 until Sept. 7, 2011.

According to a statement from Tricare, the records may include Social Security numbers, addresses, and phone numbers, as well as clinical notes, prescription information, and some lab data. Tricare said that the tapes did not hold any financial information.

"The risk of harm to patients is judged to be low despite the data elements involved since retrieving the data on the tapes would require knowledge of and access to specific hardware and software and knowledge of the system and data structure," according to the Tricare statement. "Since we do not believe the tapes were taken with malicious intent, we believe the risk to beneficiaries is low."

[ Are you prepared if your organization suffers a data breach? See Data Breach Response Plans: Yours Ready?]

Tricare said that SAIC reported the breach on Sept. 14. Citing a police report, the San Antonio Express-News reported that the tapes were stolen from an SAIC employee's car during a burglary the night before.

The Tricare statement said that the U.S. Department of Defense and SAIC are working to identify all individuals whose data were compromised and that Tricare will sent notifications by mail. The process is expected to take 4-6 weeks.

People affected will not be provided with any private credit monitoring services. "The risk of harm to patients is judged to be low despite the data elements involved," the Tricare notice said. Tricare is directing enrollees to a FTC site where individuals can place a free, 90-day fraud alert on their personal credit ratings.

"It's clear that Tricare is trying to position this under Federal Trade Commission regulations, not under HIPAA regulations," Ruby Raley, director of healthcare solutions at IT integration and security company Axway, Scottsdale, Ariz., told InformationWeek Healthcare.

Unlike HIPAA, FTC regulations don't require entities to sign agreements with "business associates" that hold third parties to the same standards when handling sensitive data. Also, HIPAA regulations require organizations to provide a year of credit monitoring to anyone who may have been affected by a breach. "They're only [offering] fraud protection for 90 days," Raley said of Tricare.

As of Monday, the incident had not been posted on the Department of Health and Human Services' list of breaches affecting at least 500 people, commonly called the "wall of shame." The 2009 American Recovery and Reinvestment Act calls for covered entities to report major HIPAA breaches to the HHS Office for Civil Rights if the data was not encrypted.

Tricare did not indicate whether SAIC encrypted the information on the stolen tapes, but Raley said, "It's very hard to encrypt a backup tape." Tricare did not respond to a request for comment on the HIPAA issues.

SAIC has not offered a public statement on the incident, but the company's home page references an "Incident Response Call Center."

Anyone concerned that they may have been affected by the theft can call (855) 366-0140 from within the United States or (952) 556-8312 from abroad. This same information is included in Tricare's statement.

Not every application is ready for the cloud, but two case studies featured in the new, all-digital issue of InformationWeek Healthcare offer some insights into what does work. Also in this issue: Keeping patient data secure isn't all that hard. But proposed new regulations could make it a lot harder. Download it now. (Free with registration.)

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
User Rank: Apprentice
10/7/2011 | 2:24:19 PM
re: Military Health Plan Data Breach Threatens 4.9 Million
I think it might be TRICARE all caps, but not sure what it stands for.
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-09
Simple Streams (simplestreams) does not properly verify the GPG signatures of disk image files, which allows remote mirror servers to spoof disk images and have unspecified other impact via a 403 (aka Forbidden) response.

Published: 2015-10-09
The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.

Published: 2015-10-09
The Safari Extensions implementation in Apple Safari before 9 does not require user confirmation before replacing an installed extension, which has unspecified impact and attack vectors.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.