No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights

How the OCR’s New Guidance Rule Re-Examines Ransomware

by Christian Auty
August 29, 2016
in Uncategorized
Increased risk of ransomware attacks coupled with confusing guidance from regulators

According to new guidance from the Department of Health and Human Service’s Office for Civil Rights (OCR), released on July 11, 2016, there have been, on average, 4,000 ransomware attacks per day since early 2016. This represents a nearly 300 percent increase over the same period in 2015. Simply put, ransomware has become the go-to threat vector because it eliminates the middle-man and monetizes instantly. It is easier to get paid directly by the victim, in untraceable bitcoin, than to exfiltrate data and attempt to sell it on the dark web.

These statistics will not surprise most health care organizations.  What is surprising and perhaps concerning, is that the OCR’s guidance also claims ransomware attacks constitute not only a “security incident,” but also a “breach.” “[W]hen electronic protected health information (ePHI) is encrypted as a result of a ransomware attack, a breach has occurred because the ePHI encrypted by the ransomware was acquired (i.e., unauthorized individuals have taken possession or control of the information), and thus is a “disclosure” not permitted under the HIPAA Privacy Rule.

Breach Reimagined

Ransomware, traditionally, does not exfiltrate data.  Rather, it encrypts data on the system with credentials known only by the attacker.  The victim is contacted, the ransom is paid and the attacker provides the key, allowing the victim to decrypt and access his data.  Generally, the data is never moved, it is simply rendered inaccessible.  Under HIPAA, a “breach” is defined as “the acquisition, access, use or disclosure of PHI in a manner not permitted under the HIPAA Privacy Rule.” Notably, the OCR’s guidance claims that a ransomware attack may constitute a “breach” (not just a security incident) because the attack “acquires” ePHI, resulting in an impermissible disclosure under the HIPAA Privacy Rule. This is critical because a breach that affects more than 500 individuals must be reported to the OCR, significantly increasing the possibility of regulatory inquiries.

This position undoubtedly expands the frontiers of a reportable breach under HIPAA, but the reasoning underlying the guidance may be questionable.

First, “breach” commonly understood should be restricted to actual disclosure to, or access by, a person to readable data. HIPAA is, after all, a privacy statute at its core. This is why, for example, encrypted data is a safe harbor under HIPAA. If the attacker cannot read the data, there is no real privacy harm. In a ransomware attack, generally speaking, no one is reading the data besides the malicious code and even in this case, documents containing ePHI may never be opened because they are encrypted at a file level. In fact, a ransomware attack is in some ways the opposite of a traditional breach—instead of rendering the PHI more public and less secure, ransomware causes the data to be too secure, secure even from its authors and users.

Second, in order for a “breach” to be considered a breach, the security and privacy of the PHI must be comprised. The OCR’s guidance expands the probability of compromise analysis to ransomware attacks, requiring a victim to evaluate:

  • The nature and extent of the PHI involved;
  • The unauthorized person who used the PHI or to whom the disclosure was made;
  • Whether the PHI was actually acquired or viewed;
  • The extent to which the risk to the PHI was been mitigated.

But this analysis is awkward as applied to ransomware. Presumably the unauthorized person in question is the attacker, but the ability to encrypt data does not necessarily confer on the attacker the ability to read data. There is no need to read the data since denying the victim access to his data is enough to elicit payment. Moreover, ransomware attacks typically can be mitigated with timely backups, yet the guidance makes no mention of this possibility.

In addition, the OCR guidance appears to require advanced forensic analysis to determine whether a reportable breach has occurred.  The guidance states:

“A thorough and accurate evaluation of the evidence acquired and analyzed as a result of security incident response activities could help entities with the risk assessment process above by revealing … the exact type and variant of malware discovered; the algorithmic steps undertaken by the malware; communications, including exfiltration attempts between the malware and attacker’s command and control servers; and whether or not the malware propagated to other systems …”

This specific recommendation is likely to impose significant costs on victims. Forensic analysis should be performed in most cases, but in many instances analysis does not result in definitive conclusions regarding the type of malware utilized or communications with command and control servers given the ability of many high-level hackers who write ransomware to “hide their tracks” using various techniques.

“Breach” or not, it is clear that ransomware attacks will be subjected to expanded regulatory scrutiny in the health care sector given their extraordinary prevalence. As the expansion of regulatory scrutiny to this and other new attack methods continues to evolve with the methods themselves, organizations must continually adapt, with the goal of minimizing exposure and maximizing compliance in a cost-efficient manner.  Moreover, in light of this guidance, it is all the more critical to thoroughly document the investigatory findings and conclusions supporting a determination of whether a reportable breach has occurred.


Tags: Communications Management
Previous Post

“Thought Crimes” and “Favorable Dispositions”

Next Post

3 Ways the Panama Papers Could Affect the Maritime Industry

Christian Auty

Christian Auty

Christian Auty is a Principal at law firm Much Shelist. An experienced litigator, Christian has an established reputation as a strong client advocate and is well-versed in issues on the intersection of law and technology, including data privacy and data breach response, electronic discovery, data storage and retention practices and information governance. .

Related Posts

cubist style art of robot holding a pencil

Want to Be Part of the Generative AI Revolution? Start With Treating It Like an Assistant.

by Dave Cumberland
October 31, 2023

Integrating AI into internal communications can streamline how teams talk to each other

stack of newspapers on laptop

The Social Construction of a Scandal

by Michael Toebe
December 9, 2019

Do corporate execs and legal counsel truly understand the role news media plays in establishing the narrative about fault and...

woman holding smartphone with many "like" and "heart" reactions

Engaging Social Media is More Effective Risk Management

by Michael Toebe
October 25, 2019

Social media communication is a rarely implemented risk management tool, but it should get more play. Michael Toebe makes the...

black and white illustration of shark jumping out of water

The Shark in the Wave: Revealing the Lurking Danger of Slack Data

by James Murphy
June 17, 2019

Hanzo’s Jim Murphy explores the danger of Slack data; voluminous, informal, unstructured and context-dependent, it’s a threat hiding in plain...

Next Post
Managing corruption risk in the maritime industry

3 Ways the Panama Papers Could Affect the Maritime Industry

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights