<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security, Privacy and the Law</title>
	<atom:link href="http://www.securityprivacyandthelaw.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.securityprivacyandthelaw.com</link>
	<description>Foley Hoag LLP</description>
	<lastBuildDate>Wed, 13 Mar 2024 17:43:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.3</generator>
	<item>
		<title>Change Healthcare Cyberattack: Actionable Next Steps for Impacted Entities</title>
		<link>http://www.securityprivacyandthelaw.com/2024/03/change-healthcare-cyberattack-actionable-next-steps-for-impacted-entities/</link>
					<comments>http://www.securityprivacyandthelaw.com/2024/03/change-healthcare-cyberattack-actionable-next-steps-for-impacted-entities/#respond</comments>
		
		<dc:creator><![CDATA[Colin Zick]]></dc:creator>
		<pubDate>Wed, 13 Mar 2024 17:43:12 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[ransomeware]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[HHS]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[CMS]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2577</guid>

					<description><![CDATA[<p>Key Takeaways:</p>
<ul>
<li>Change Healthcare, a healthcare technology company owned by UnitedHealth Group, has been impacted by a ransomware attack, so its services have been shut down.</li>
<li>Patients and providers have been most severely impacted by this incident—some patients are being forced to pay out of pocket for medications, and many providers have not been able to submit claims.</li>
<li>Entities that have been impacted by this ransomware attack can take actionable steps outlined below to avoid further disruptions.&#8230;</li>
<p> <a class="read-more" href="http://www.securityprivacyandthelaw.com/2024/03/change-healthcare-cyberattack-actionable-next-steps-for-impacted-entities/">More</a></ul>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2024/03/change-healthcare-cyberattack-actionable-next-steps-for-impacted-entities/">Change Healthcare Cyberattack: Actionable Next Steps for Impacted Entities</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>Key Takeaways:</strong></p>
<ul>
<li>Change Healthcare, a healthcare technology company owned by UnitedHealth Group, has been impacted by a ransomware attack, so its services have been shut down.</li>
<li>Patients and providers have been most severely impacted by this incident—some patients are being forced to pay out of pocket for medications, and many providers have not been able to submit claims.</li>
<li>Entities that have been impacted by this ransomware attack can take actionable steps outlined below to avoid further disruptions.</li>
</ul>
<p>___________________________________________________</p>
<p><u><strong>Change Healthcare Cyberattack</strong></u></p>
<p>On February 21, 2024, Change Healthcare—a healthcare technology company owned by UnitedHealth Group—issued a <a href="https://www.unitedhealthgroup.com/ns/changehealthcare.html" target="_blank" rel="noopener" data-cke-saved-href="https://www.unitedhealthgroup.com/ns/changehealthcare.html">statement</a> that it had been impacted by a ransomware attack. According to Change Healthcare, a “threat actor” gained access to its system. As a result of this cyberattack, Change Healthcare’s services have been shut down.<a href="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2024/03/Cybersecurity_689x388.png"><img decoding="async" class="alignright size-medium wp-image-2579" src="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2024/03/Cybersecurity_689x388-300x169.png" alt="" width="300" height="169" srcset="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2024/03/Cybersecurity_689x388-300x169.png 300w, https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2024/03/Cybersecurity_689x388.png 689w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>To provide perspective on the magnitude of this attack and its impact, Change Healthcare serves as the largest healthcare payment system in the U.S. Change Healthcare reportedly manages approximately 15 billion clinical, financial, and operational transactions per year. Specifically, it manages healthcare technology pipelines that process insurance claims and billing. For those reasons, <a href="https://www.aha.org/press-releases/2024-03-05-aha-statement-hhs-response-change-healthcare-cyberattack" target="_blank" rel="noopener" data-cke-saved-href="https://www.aha.org/press-releases/2024-03-05-aha-statement-hhs-response-change-healthcare-cyberattack">American Hospital Association</a> (AHA) has characterized this attack as “the most significant and consequential incident of its kind against the U.S. healthcare system in history.&#8221;</p>
<p>Healthcare professionals depend on this system to verify insurance coverage and file claims for reimbursement.  Accordingly, the effects of this cyberattack are far-reaching. Providers and patients have been most severely impacted by this incident. Some patients are being forced to pay out of pocket for medications. Further, many providers have not been able to submit claims, so a critical portion of revenue cycle processes have come to a halt.</p>
<p>While a specific timeline to restore the services was not provided during the initial stages of the attack, Change Healthcare has since publicly <a href="https://www.unitedhealthgroup.com/newsroom/2024/2024-03-07-uhg-update-change-healthcare-cyberattack.html" target="_blank" rel="noopener" data-cke-saved-href="https://www.unitedhealthgroup.com/newsroom/2024/2024-03-07-uhg-update-change-healthcare-cyberattack.html">stated</a> that electronic prescribing is now fully functional along with claim submission and payment transmission. Change Healthcare has also <a href="https://www.unitedhealthgroup.com/newsroom/2024/2024-03-07-uhg-update-change-healthcare-cyberattack.html" target="_blank" rel="noopener" data-cke-saved-href="https://www.unitedhealthgroup.com/newsroom/2024/2024-03-07-uhg-update-change-healthcare-cyberattack.html">stated</a> electronic payment functionality will become available on March 15, 2024. Lastly, with respect to medical claims, Change Healthcare expects to reestablish connectivity to its claim network and software on March 18, 2024.</p>
<p>Currently, the U.S. Department of Health and Human Services (<a href="https://www.hhs.gov/about/news/2024/03/05/hhs-statement-regarding-the-cyberattack-on-change-healthcare.html" target="_blank" rel="noopener" data-cke-saved-href="https://www.hhs.gov/about/news/2024/03/05/hhs-statement-regarding-the-cyberattack-on-change-healthcare.html">HHS</a>) and other entities are monitoring and assessing the impact of this cyberattack on providers and suppliers. Recently, the Centers for Medicare &amp; Medicaid Services (<a href="https://www.cms.gov/newsroom/fact-sheets/change-healthcare/optum-payment-disruption-chopd-accelerated-payments-part-providers-and-advance" target="_blank" rel="noopener" data-cke-saved-href="https://www.cms.gov/newsroom/fact-sheets/change-healthcare/optum-payment-disruption-chopd-accelerated-payments-part-providers-and-advance">CMS</a>) announced that it will accelerate payments for Medicare Part A providers and Part B suppliers. Further, <a href="https://www.cms.gov/newsroom/press-releases/cms-statement-continued-action-respond-cyberattack-change-healthcare" target="_blank" rel="noopener" data-cke-saved-href="https://www.cms.gov/newsroom/press-releases/cms-statement-continued-action-respond-cyberattack-change-healthcare">CMS</a> has directed Medicare Administrative Contractors (MACs) to expedite actions needed for providers and suppliers to change the clearinghouse they use and accept paper claims. MACs have issued information to the public on how to submit a request for a Medicare accelerated advance payment.</p>
<p>This incident has exposed the fragility of the U.S. healthcare ecosystem and, more importantly, the need to strengthen the cybersecurity infrastructure of healthcare organizations.</p>
<p><u><strong>Entities That May Be Impacted</strong></u></p>
<p>Hospitals, physicians, pharmacists, and other healthcare providers may be impacted by this ransomware attack. Providers, such as physicians and hospitals, may not be able to submit or process insurance claims and, thereby, risk facing significant cash flow problems. Pharmacies may not be able to obtain pertinent information necessary to fill prescriptions. And patients may not be able to submit claims and fill prescriptions.</p>
<p>If you use the Change Healthcare platform, your organization may have been impacted either directly or indirectly. Identifying whether your organization has been impacted is the first step in taking action to avoid further disruptions.</p>
<p><u><strong>Actionable Next Steps </strong></u></p>
<p>Entities that have been impacted by this ransomware attack can take the following steps:</p>
<ul>
<li>Monitor <a href="https://www.hhs.gov/about/news/index.html" target="_blank" rel="noopener" data-cke-saved-href="https://www.hhs.gov/about/news/index.html">HHS</a>, <a href="https://www.cms.gov/about-cms/contact/newsroom" target="_blank" rel="noopener" data-cke-saved-href="https://www.cms.gov/about-cms/contact/newsroom">CMS</a>, and <a href="https://www.aha.org/press-release" target="_blank" rel="noopener" data-cke-saved-href="https://www.aha.org/press-release">AHA</a> advisories for pertinent updates.</li>
<li>Communicate with payors to determine how to best circumvent compromised Change Healthcare applications.</li>
<li>Review HIPAA compliance programs and take other steps to prepare for a potential breach or regulatory investigation (such as conducting internal audits and running tabletop exercises to simulate the impact of a breach).</li>
</ul>
<p>Foley Hoag’s Healthcare and Privacy &amp; Data Security practices can assist you with payment challenges and security compliance or incident response matters, to allow you to navigate concerns surrounding the Change Healthcare security incident.</p><p>The post <a href="http://www.securityprivacyandthelaw.com/2024/03/change-healthcare-cyberattack-actionable-next-steps-for-impacted-entities/">Change Healthcare Cyberattack: Actionable Next Steps for Impacted Entities</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2024/03/change-healthcare-cyberattack-actionable-next-steps-for-impacted-entities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>U.S. Department of Energy Releases Cybersecurity Baselines for Utilities and DERs</title>
		<link>http://www.securityprivacyandthelaw.com/2024/03/u-s-department-of-energy-releases-cybersecurity-baselines-for-utilities-and-ders/</link>
					<comments>http://www.securityprivacyandthelaw.com/2024/03/u-s-department-of-energy-releases-cybersecurity-baselines-for-utilities-and-ders/#respond</comments>
		
		<dc:creator><![CDATA[Carol Holahan]]></dc:creator>
		<pubDate>Wed, 06 Mar 2024 17:24:39 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Cybercrime]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[Security Programs & Policies]]></category>
		<category><![CDATA[Security & Privacy Alerts]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2573</guid>

					<description><![CDATA[<p>As part of the Biden Administration’s efforts to align energy cybersecurity efforts across the country, the U.S. Department of Energy (“DOE”) has funded the release of a set of energy distribution cybersecurity baselines for entities participating in the nationwide grid transition.</p>
<p>On February 22, 2024, the DOE <a href="https://www.energy.gov/ceser/articles/new-doe-funded-initiative-outlines-proposed-cybersecurity-baselines-electric" target="_blank" rel="noopener">announced</a> its support for the release of <a href="https://pubs.naruc.org/pub/35247A70-0C45-9652-C6D9-99A77C87200F?_gl=1*1ansiha*_ga*MTA0NTg5OTk5MS4xNzA5MTQ3MjQx*_ga_QLH1N3Q1NF*MTcwOTE0NzI0MS4xLjAuMTcwOTE0NzI0MS4wLjAuMA.." target="_blank" rel="noopener">cybersecurity baselines</a> for electric distribution systems and distributed energy resources (“DERs”).&#8230; <a class="read-more" href="http://www.securityprivacyandthelaw.com/2024/03/u-s-department-of-energy-releases-cybersecurity-baselines-for-utilities-and-ders/">More</a></p>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2024/03/u-s-department-of-energy-releases-cybersecurity-baselines-for-utilities-and-ders/">U.S. Department of Energy Releases Cybersecurity Baselines for Utilities and DERs</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>As part of the Biden Administration’s efforts to align energy cybersecurity efforts across the country, the U.S. Department of Energy (“DOE”) has funded the release of a set of energy distribution cybersecurity baselines for entities participating in the nationwide grid transition.</p>
<p>On February 22, 2024, the DOE <a href="https://www.energy.gov/ceser/articles/new-doe-funded-initiative-outlines-proposed-cybersecurity-baselines-electric" target="_blank" rel="noopener">announced</a> its support for the release of <a href="https://pubs.naruc.org/pub/35247A70-0C45-9652-C6D9-99A77C87200F?_gl=1*1ansiha*_ga*MTA0NTg5OTk5MS4xNzA5MTQ3MjQx*_ga_QLH1N3Q1NF*MTcwOTE0NzI0MS4xLjAuMTcwOTE0NzI0MS4wLjAuMA.." target="_blank" rel="noopener">cybersecurity baselines</a> for electric distribution systems and distributed energy resources (“DERs”). The initiative was funded by the DOE’s Office of Cybersecurity, Energy Security, and Emergency Response (“CESER”) in partnership with the National Association of Regulatory Utility Commissioners (“NARUC”). The baselines name minimum voluntary standards that DER operators, utilities, and other electric distribution systems should meet to help mitigate cybersecurity risk and enhance grid security. The announced baselines conclude “Phase 1” of a two-phase initiative, with “Phase 2” set to advise entities of strategies for implementing and adopting the baselines over the next year.</p>
<p>The <a href="https://www.securityprivacyandthelaw.com/2023/07/biden-administration-publishes-the-national-cybersecurity-strategy-implementation-plan/" target="_blank" rel="noopener">National Cybersecurity Strategy</a>, issued in 2023, identified energy cybersecurity as an area for the DOE’s attention as the grid becomes increasingly <a href="https://foleyhoag.com/news-and-insights/media-center/2023/july/cloe-pippin-quoted-on-energy-sectors-cybersecurity-vulnerabilities/" target="_blank" rel="noopener">distributed</a> and <a href="https://www.securityprivacyandthelaw.com/2023/06/cyberattacks-on-the-energy-sector-continue-to-rise/" target="_blank" rel="noopener">vulnerable</a> to both <a href="https://www.securityprivacyandthelaw.com/2023/05/physical-and-cyber-attacks-on-energy-infrastructure-expected-to-continue/" target="_blank" rel="noopener">physical and cyber-attacks</a>. The current regulatory approach, which entails state-level oversight of energy cybersecurity for DER operators and utilities, puts the grid at risk due to a lack of alignment across states. Phase 1 of this initiative provides states with uniform nationwide cybersecurity baselines that they may meet to become aligned with the <a href="https://www.securityprivacyandthelaw.com/2021/07/biden-issues-memorandum-aimed-at-improving-cybersecurity/" target="_blank" rel="noopener">U.S.’ energy cybersecurity approach</a>, rather than relying on the <a href="https://foleyhoag.com/news-and-insights/media-center/2023/april/chris-hart-discusses-the-us-national-cybersecurity-strategy-with-securityweek/">existing patchwork regulatory framework</a>.</p>
<p>Phase 1 of this initiative is merely a singular step in what should be a nationwide effort to secure the grid as it becomes integrated with DERs, including wind and solar energy. The National Cybersecurity Strategy is expected to produce additional federal initiatives around energy cybersecurity in light of <a href="https://www.securityprivacyandthelaw.com/2022/04/cisa-fbi-and-doe-release-joint-cybersecurity-advisory-in-light-of-increased-threats-to-energy-sectors-cybersecurity/" target="_blank" rel="noopener">increased threats to the energy sector</a>.</p>
<p>Takeaways:</p>
<ul>
<li>Though the baselines are voluntary, states that adopt them will be in greater alignment with nationwide efforts to secure the electric grid and better positioned to collaborate across the public and private sectors.</li>
<li>The baselines are also best practices for entities’ individual cybersecurity efforts, including securing the supply chain, implementing strong IT practices, detecting threats, and detecting and reporting incidents.</li>
<li>In the near term, utilities and DER providers should review their current compliance with the announced baselines and prepare initial strategies to meet them ahead of the Phase 2 announcement in the coming year.</li>
<li>In the long term, such entities should focus on meeting or exceeding the baselines, bearing in mind that future DOE initiatives may enforce stronger mandates than those currently in effect.</li>
</ul><p>The post <a href="http://www.securityprivacyandthelaw.com/2024/03/u-s-department-of-energy-releases-cybersecurity-baselines-for-utilities-and-ders/">U.S. Department of Energy Releases Cybersecurity Baselines for Utilities and DERs</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2024/03/u-s-department-of-energy-releases-cybersecurity-baselines-for-utilities-and-ders/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Federal Communications Commission Updates Its Data Breach Rules</title>
		<link>http://www.securityprivacyandthelaw.com/2023/12/the-federal-communications-commission-updates-its-data-breach-rules/</link>
					<comments>http://www.securityprivacyandthelaw.com/2023/12/the-federal-communications-commission-updates-its-data-breach-rules/#respond</comments>
		
		<dc:creator><![CDATA[Colin Zick]]></dc:creator>
		<pubDate>Tue, 26 Dec 2023 17:59:37 +0000</pubDate>
				<category><![CDATA[Government Enforcement]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Cybersecurity & Cybercrime]]></category>
		<category><![CDATA[Legislation & Regulation]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Federal Communications Commission]]></category>
		<category><![CDATA[rules]]></category>
		<category><![CDATA[incident]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[reporting]]></category>
		<category><![CDATA[harm]]></category>
		<category><![CDATA[FCC]]></category>
		<category><![CDATA[breach]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2569</guid>

					<description><![CDATA[<p>On <a href="https://www.fcc.gov/document/fcc-adopts-updated-data-breach-notification-rules-protect-consumers-0">December 21</a>, 2023, the Federal Communications Commission released an order updating its data breach rules.  These updated rules require telecommunications providers to report breaches of customer proprietary network information, such as numbers that have been dialed and when they have been dialed, but also require reporting of personally-identifiable information (PII), such as driver&#8217;s license numbers, Social Security numbers, and credit card numbers.  The new FCC rules also require companies to report accidental breaches,&#8230; <a class="read-more" href="http://www.securityprivacyandthelaw.com/2023/12/the-federal-communications-commission-updates-its-data-breach-rules/">More</a></p>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2023/12/the-federal-communications-commission-updates-its-data-breach-rules/">The Federal Communications Commission Updates Its Data Breach Rules</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>On <a href="https://www.fcc.gov/document/fcc-adopts-updated-data-breach-notification-rules-protect-consumers-0">December 21</a>, 2023, the Federal Communications Commission released an order updating its data breach rules.  These updated rules require telecommunications providers to report breaches of customer proprietary network information, such as numbers that have been dialed and when they have been dialed, but also require reporting of personally-identifiable information (PII), such as driver&#8217;s license numbers, Social Security numbers, and credit card numbers.  The new FCC rules also require companies to report accidental breaches, a significant change from the prior rules, which only required notification for intentional disclosures, such as when , when a company was tricked or bribed by a bad actor into revealing consumer information.</p>
<p>The FCC&#8217;s order also treats breaches as presumptively causing harm—including emotional harm and other harms not directly related to identity theft or financial fraud.  This presumption can be overcome, however, if a data custodian can show there was no harm; by making such a showing, a custodian can avoid notifying consumers.  Providers who are required to notify affected consumers must do so “without unreasonable delay” and to provide such notice within 30 days after reasonable determination of the occurrence of a breach.</p>
<p>The FCC&#8217;s new rules also contain a safe harbor for data breach reporting:  no reporting is required if the breached data has been encrypted and there is definitive evidence that the encryption key was not also compromised (in other words, there is no harm that can come to consumers).</p>
<p class="para">The FCC is just the latest federal agency to move forward with new breach reporting obligations, despite the Biden Administration’s attempts to harmonize such requirements. The FCC&#8217;s action follows on the heels of the Securities and Exchange Commission <a class="link" href="https://www.bloomberglaw.com/product/blaw//citation/BNA%200000018abe1fdc10a59afeff2c270000">final rule</a> requiring businesses to report cyberattacks to the agency within four days of determining the scope of compromise and the Federal Trade Commission&#8217;s recent updates to its breach reporting rules.  The FCC acknowledged that it declined to take action to harmonize with the Cyber Incident Reporting for Critical Infrastructure Act of 2022, or CIRCIA, which requires the Cybersecurity and Infrastructure Security Agency to publish a proposed rule by March 2024; as such, the burden of making sense of the regulatory maze continues to fall on those companies subject to these regulations.</p><p>The post <a href="http://www.securityprivacyandthelaw.com/2023/12/the-federal-communications-commission-updates-its-data-breach-rules/">The Federal Communications Commission Updates Its Data Breach Rules</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2023/12/the-federal-communications-commission-updates-its-data-breach-rules/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FBI and CISA Issue Advisory on Scattered Spider Ransomware Attacks</title>
		<link>http://www.securityprivacyandthelaw.com/2023/11/fbi-and-cisa-issue-advisory-on-scattered-spider-ransomware-attacks/</link>
					<comments>http://www.securityprivacyandthelaw.com/2023/11/fbi-and-cisa-issue-advisory-on-scattered-spider-ransomware-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Colin Zick]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 21:05:53 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2563</guid>

					<description><![CDATA[<p>Key Takeaways:</p>
<ul>
<li>The Federal Bureau of Investigation (FBI) and Cybersecurity &#38; Infrastructure Security Agency (CISA) have jointly issued a cybersecurity advisory in response to recent activity by the threat actor group known as Scattered Spider.</li>
<li>Scattered Spider is known to target large companies holding sensitive data – including financial services, telecommunications, business process outsourcing, hospitality, and cryptocurrency firms – for ransomware attacks.</li>
<li>Scattered Spider largely relies upon impersonating IT support professionals and manipulating target company employees into sharing passwords or running malicious executables through remote access software.&#8230;</li>
<p> <a class="read-more" href="http://www.securityprivacyandthelaw.com/2023/11/fbi-and-cisa-issue-advisory-on-scattered-spider-ransomware-attacks/">More</a></ul>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2023/11/fbi-and-cisa-issue-advisory-on-scattered-spider-ransomware-attacks/">FBI and CISA Issue Advisory on Scattered Spider Ransomware Attacks</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>Key Takeaways:</strong></p>
<ul>
<li>The Federal Bureau of Investigation (FBI) and Cybersecurity &amp; Infrastructure Security Agency (CISA) have jointly issued a cybersecurity advisory in response to recent activity by the threat actor group known as Scattered Spider.</li>
<li>Scattered Spider is known to target large companies holding sensitive data – including financial services, telecommunications, business process outsourcing, hospitality, and cryptocurrency firms – for ransomware attacks.</li>
<li>Scattered Spider largely relies upon impersonating IT support professionals and manipulating target company employees into sharing passwords or running malicious executables through remote access software.</li>
</ul>
<p>____________________________________________________________________</p>
<p>Large companies holding sensitive data – including financial services, telecommunications, business process outsourcing, hospitality, and<a href="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/11/Privacy_689x388.jpeg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-2564" src="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/11/Privacy_689x388-300x169.jpeg" alt="" width="300" height="169" srcset="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/11/Privacy_689x388-300x169.jpeg 300w, https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/11/Privacy_689x388.jpeg 689w" sizes="(max-width: 300px) 100vw, 300px" /></a> cryptocurrency firms – as well as their IT helpdesks, are increasingly being targeted by ransomware attacks. The Federal Bureau of Investigation (FBI) and Cybersecurity &amp; Infrastructure Security Agency (CISA) have jointly released a cybersecurity <a href="https://www.cisa.gov/sites/default/files/2023-11/aa23-320a_scattered_spider_0.pdf" target="_blank" rel="noopener" data-cke-saved-href="https://www.cisa.gov/sites/default/files/2023-11/aa23-320a_scattered_spider_0.pdf">advisory</a> in response to recent activity by the threat actor group known as Scattered Spider. Scattered Spider received significant attention in September 2023 when it launched a ransomware attack against multiple casino operators, the details of which became known in securities filings following the SEC’s adoption of <a href="https://www.sec.gov/news/press-release/2023-139" target="_blank" rel="noopener" data-cke-saved-href="https://www.sec.gov/news/press-release/2023-139">data breach reporting rules</a> for public companies in July 2023. Scattered Spider has re-emerged in recent days launching ransomware attacks against multiple targets in a short span of time. The main details of the advisory are summarized below, though clients should direct their IT professionals to consult the full advisory.</p>
<p><em>What techniques are Scattered Spider employing?</em></p>
<p>Scattered Spider operatives have been reported to be posing as company IT or helpdesk staff in order to obtain credentials from employees, or to direct employees to run remote access tools that permit Scattered Spider to access a company network. Because IT support is also frequently offered through the use of remote access tools, Scattered Spider has been able to successfully impersonate IT professionals on a number of occasions. Similarly, Scattered Spider has been making use of multi-factor authentication tools (again utilizing tools that are familiar to employees who frequently utilize tech support) to prompt employees to share passwords and/or run remote access tools.</p>
<p><em>What can be done to mitigate the threat?</em></p>
<p>The FBI and CISA recommend the use of the following measures:</p>
<ul>
<li>Address the threat of remote access tools:
<ul>
<li>This includes auditing remote access tools on a company network, reviewing logs for execution of remote access software, and requiring only authorized remote access solutions to be used only from within a company network.</li>
</ul>
</li>
<li>Implementing application controls that manage and control execution of software. The use of “allow-listing” (that is, only allowing pre-defined software to be executed) can block un-listed application execution, including execution of malicious files that are compressed, encrypted, or otherwise obfuscated.</li>
<li>Implementing multi-factor authentication based on public key infrastructure, which is known to resist the tactics utilized by Scattered Spider.</li>
<li>Strictly limiting the use of remote desktop protocols and, when using, taking extra precautions such as locking out accounts after a specified number of attempts and logging in remote desktop logins.</li>
</ul>
<p>In addition, the FBI and CISA reinforce the continued importance of basic cybersecurity best practices:</p>
<ul>
<li>Implementing recovery plans and retaining multiple copies of sensitive data that could be targeted in a ransomware attack, including maintaining offline backups.</li>
<li>Requiring all accounts with passwords to comply with NIST password <a href="https://pages.nist.gov/800-63-3/" target="_blank" rel="noopener" data-cke-saved-href="https://pages.nist.gov/800-63-3/">standards</a>.</li>
<li>Requiring phishing-resistant multi-factor authentication for all services to the extent possible.</li>
<li>Keeping operating systems, software, and firmware up to date.</li>
<li>Segmenting networks to prevent the spread of ransomware.</li>
<li>Monitoring networks for abnormal activity.</li>
<li>Installing and regularly updating antivirus software.</li>
<li>Disabling unused ports and protocols.</li>
<li>Ensuring that backup data is encrypted, that it cannot be altered, and that it covers the entire organization’s infrastructure.</li>
</ul>
<p>Additionally, the FBI and CISA are actively soliciting reporting on the Scattered Spider group actors, and urge individuals or entities suffering from ransomware attacks or that obtain information about Scattered Spider to contact a local FBI field office or CISA operations center.</p><p>The post <a href="http://www.securityprivacyandthelaw.com/2023/11/fbi-and-cisa-issue-advisory-on-scattered-spider-ransomware-attacks/">FBI and CISA Issue Advisory on Scattered Spider Ransomware Attacks</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2023/11/fbi-and-cisa-issue-advisory-on-scattered-spider-ransomware-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Publishes Mitigation Guide to Combat Cyber Threats in the Healthcare and Public Health Sectors</title>
		<link>http://www.securityprivacyandthelaw.com/2023/11/cisa-publishes-mitigation-guide-to-combat-cyber-threats-in-the-healthcare-and-public-health-sectors/</link>
					<comments>http://www.securityprivacyandthelaw.com/2023/11/cisa-publishes-mitigation-guide-to-combat-cyber-threats-in-the-healthcare-and-public-health-sectors/#respond</comments>
		
		<dc:creator><![CDATA[Colin Zick]]></dc:creator>
		<pubDate>Fri, 24 Nov 2023 15:49:08 +0000</pubDate>
				<category><![CDATA[Healthcare Industry Spotlight]]></category>
		<category><![CDATA[Cybersecurity & Cybercrime]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[mitigation]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[breach]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2561</guid>

					<description><![CDATA[<p>If you need a little intellectual stimulation after hours of Thanksgiving turkey and football, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has just the thing &#8212; the new CISA <a href="https://www.cisa.gov/resources-tools/resources/mitigation-guide-healthcare-and-public-health-hph-sector">Mitigation Guide for the Healthcare and Public Health Sectors</a>.  This somewhat technical guide is a little dry, but it offers solid recommendations and sugested best practices to combat the pervasive cyber threats affecting the Healthcare and Public Health (HPH) Sectors.&#8230; <a class="read-more" href="http://www.securityprivacyandthelaw.com/2023/11/cisa-publishes-mitigation-guide-to-combat-cyber-threats-in-the-healthcare-and-public-health-sectors/">More</a></p>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2023/11/cisa-publishes-mitigation-guide-to-combat-cyber-threats-in-the-healthcare-and-public-health-sectors/">CISA Publishes Mitigation Guide to Combat Cyber Threats in the Healthcare and Public Health Sectors</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>If you need a little intellectual stimulation after hours of Thanksgiving turkey and football, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has just the thing &#8212; the new CISA <a href="https://www.cisa.gov/resources-tools/resources/mitigation-guide-healthcare-and-public-health-hph-sector">Mitigation Guide for the Healthcare and Public Health Sectors</a>.  This somewhat technical guide is a little dry, but it offers solid recommendations and sugested best practices to combat the pervasive cyber threats affecting the Healthcare and Public Health (HPH) Sectors.</p>
<p>CISA identified and its guide addresses common vulnerabilities and insecure configurations across the HPH Sector, such as:</p>
<p style="padding-left: 80px">• Web application vulnerabilities<br />
• Encryption weaknesses<br />
• Unsupported software<br />
• Unsupported Windows operating systems (OS)<br />
• Known exploited vulnerabilities (KEVs)<br />
• Vulnerable services</p>
<p>Exposure of these and other vulnerabilities can result in ransomware, data breaches, or denial-of-service, and can compromise the availability, confidentiality, and integrity of criticial HPH systems, functions, and data.  So skip the holiday shopping crowds and spend a little time with CISA&#8217;s Mitigation Guide this weekend.</p><p>The post <a href="http://www.securityprivacyandthelaw.com/2023/11/cisa-publishes-mitigation-guide-to-combat-cyber-threats-in-the-healthcare-and-public-health-sectors/">CISA Publishes Mitigation Guide to Combat Cyber Threats in the Healthcare and Public Health Sectors</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2023/11/cisa-publishes-mitigation-guide-to-combat-cyber-threats-in-the-healthcare-and-public-health-sectors/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Your Password Can&#8217;t Possibly Be This Bad, Can It?</title>
		<link>http://www.securityprivacyandthelaw.com/2023/11/your-password-cant-possibly-be-this-bad-can-it/</link>
					<comments>http://www.securityprivacyandthelaw.com/2023/11/your-password-cant-possibly-be-this-bad-can-it/#respond</comments>
		
		<dc:creator><![CDATA[Colin Zick]]></dc:creator>
		<pubDate>Sun, 19 Nov 2023 21:12:36 +0000</pubDate>
				<category><![CDATA[Healthcare Industry Spotlight]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Cybersecurity & Cybercrime]]></category>
		<category><![CDATA[Aaron431]]></category>
		<category><![CDATA[NordPass]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Change:]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2559</guid>

					<description><![CDATA[<p>NordPass (the purveyor of a password manager) has <a href="https://nordpass.com/poor-company-passwords/" target="_blank" rel="noopener">assembled </a>a list of the top 20 passwords in healthcare, based on usage by the world&#8217;s largest companies.  According to NordPass&#8217;s analysis, the &#8220;top&#8221; 20 passwords are:</p>
<ol>
<li style="list-style-type: none">
<ol>
<li style="list-style-type: none">
<ol>
<li style="list-style-type: none">
<ol>
<li style="list-style-type: none">
<ol class="leading-loose mt-3 mb-6 list--ol Fortune500__passwords-list font-bold font-roboto-mono">
<li class="my-2 relative text-small">123456</li>
<li class="my-2 relative text-small">password</li>
<li class="my-2 relative text-small">part of the company&#8217;s name*</li>
<li class="my-2 relative text-small">12345</li>
<li class="my-2 relative text-small">aaron431</li>
<li class="my-2 relative text-small">part of the company&#8217;s name2012*</li>
<li class="my-2 relative text-small">Part of the company&#8217;s name*</li>
<li class="my-2 relative text-small">PART OF THE COMPANY&#8217;S NAME443*</li>
<li class="my-2 relative text-small">company name2014*</li>
<li class="my-2 relative text-small">linkedin</li>
<li class="my-2 relative text-small">pass1</li>
<li class="my-2 relative text-small">company name*</li>
<li class="my-2 relative text-small">COMPANY NAME&#8217;S ABBREVIATION1*</li>
<li class="my-2 relative text-small">company name*</li>
<li class="my-2 relative text-small">00000</li>
<li class="my-2 relative text-small">1111</li>
<li class="my-2 relative text-small">company name*</li>
<li class="my-2 relative text-small">1234</li>
<li class="my-2 relative text-small">Med</li>
<li class="my-2 relative text-small">company name*</li>
</ol>
</li>
</ol>
</li>
</ol>
</li>
</ol>
</li>
</ol>
<p>Obviously,&#8230; <a class="read-more" href="http://www.securityprivacyandthelaw.com/2023/11/your-password-cant-possibly-be-this-bad-can-it/">More</a></p>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2023/11/your-password-cant-possibly-be-this-bad-can-it/">Your Password Can’t Possibly Be This Bad, Can It?</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>NordPass (the purveyor of a password manager) has <a href="https://nordpass.com/poor-company-passwords/" target="_blank" rel="noopener">assembled </a>a list of the top 20 passwords in healthcare, based on usage by the world&#8217;s largest companies.  According to NordPass&#8217;s analysis, the &#8220;top&#8221; 20 passwords are:</p>
<ol>
<li style="list-style-type: none">
<ol>
<li style="list-style-type: none">
<ol>
<li style="list-style-type: none">
<ol>
<li style="list-style-type: none">
<ol class="leading-loose mt-3 mb-6 list--ol Fortune500__passwords-list font-bold font-roboto-mono">
<li class="my-2 relative text-small"><span class="inline-block">123456</span></li>
<li class="my-2 relative text-small"><span class="inline-block">password</span></li>
<li class="my-2 relative text-small"><span class="inline-block">part of the company&#8217;s name*</span></li>
<li class="my-2 relative text-small"><span class="inline-block">12345</span></li>
<li class="my-2 relative text-small"><span class="inline-block">aaron431</span></li>
<li class="my-2 relative text-small"><span class="inline-block">part of the company&#8217;s name2012*</span></li>
<li class="my-2 relative text-small"><span class="inline-block">Part of the company&#8217;s name*</span></li>
<li class="my-2 relative text-small"><span class="inline-block">PART OF THE COMPANY&#8217;S NAME443*</span></li>
<li class="my-2 relative text-small"><span class="inline-block">company name2014*</span></li>
<li class="my-2 relative text-small"><span class="inline-block">linkedin</span></li>
<li class="my-2 relative text-small"><span class="inline-block">pass1</span></li>
<li class="my-2 relative text-small"><span class="inline-block">company name*</span></li>
<li class="my-2 relative text-small"><span class="inline-block">COMPANY NAME&#8217;S ABBREVIATION1*</span></li>
<li class="my-2 relative text-small"><span class="inline-block">company name*</span></li>
<li class="my-2 relative text-small"><span class="inline-block">00000</span></li>
<li class="my-2 relative text-small"><span class="inline-block">1111</span></li>
<li class="my-2 relative text-small"><span class="inline-block">company name*</span></li>
<li class="my-2 relative text-small"><span class="inline-block">1234</span></li>
<li class="my-2 relative text-small"><span class="inline-block">Med</span></li>
<li class="my-2 relative text-small"><span class="inline-block">company name*</span></li>
</ol>
</li>
</ol>
</li>
</ol>
</li>
</ol>
</li>
</ol>
<p>Obviously, none of these are optimal, particularly in situation where HIPAA Protected Health Information may be involved.</p>
<p>(One of these, Aaron431, is a bit of a mystery.  It may be that it is a default password on a common application.)  The point of noting these passwords is, of course, to prompt you to reviecw/change your passwords.  Or better yet, adopt a password manager, so you can utlize more complete passwords and change the more easily.</p><p>The post <a href="http://www.securityprivacyandthelaw.com/2023/11/your-password-cant-possibly-be-this-bad-can-it/">Your Password Can’t Possibly Be This Bad, Can It?</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2023/11/your-password-cant-possibly-be-this-bad-can-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Massachusetts Extends Protections for Counseling Records of Survivors of Sexual Assault</title>
		<link>http://www.securityprivacyandthelaw.com/2023/11/massachusetts-extends-protections-for-counseling-records-of-survivors-of-sexual-assault/</link>
					<comments>http://www.securityprivacyandthelaw.com/2023/11/massachusetts-extends-protections-for-counseling-records-of-survivors-of-sexual-assault/#respond</comments>
		
		<dc:creator><![CDATA[Colin Zick]]></dc:creator>
		<pubDate>Sun, 05 Nov 2023 17:13:54 +0000</pubDate>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Healthcare Industry Spotlight]]></category>
		<category><![CDATA[Government Enforcement]]></category>
		<category><![CDATA[motion]]></category>
		<category><![CDATA[Jane Doe]]></category>
		<category><![CDATA[Victim Rights Law Center]]></category>
		<category><![CDATA[Lampron]]></category>
		<category><![CDATA[Dwyer]]></category>
		<category><![CDATA[13336]]></category>
		<category><![CDATA[compel]]></category>
		<category><![CDATA[SJC]]></category>
		<category><![CDATA[sexual assault]]></category>
		<category><![CDATA[counseling]]></category>
		<category><![CDATA[Supreme Judicial Court]]></category>
		<category><![CDATA[records]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2556</guid>

					<description><![CDATA[<p><em>Massachusetts Extends Protections for Counseling Records of Survivors of Sexual Assault</em></p>
<p>The Massachusetts Supreme Judicial Court has ruled in <a href="https://casetext.com/case/in-re-a-motion-to-compel"><em>In the Matter of a Motion to Compel</em>, SJC-13336</a> that the Superior Court could not order a Massachusetts counseling center to turn over, at the behest of a Rhode Island court, counseling records of the alleged minor victim of a sexual assault that occurred in Rhode Island,&#8230; <a class="read-more" href="http://www.securityprivacyandthelaw.com/2023/11/massachusetts-extends-protections-for-counseling-records-of-survivors-of-sexual-assault/">More</a></p>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2023/11/massachusetts-extends-protections-for-counseling-records-of-survivors-of-sexual-assault/">Massachusetts Extends Protections for Counseling Records of Survivors of Sexual Assault</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong><em>Massachusetts Extends Protections for Counseling Records of Survivors of Sexual Assault</em></strong></p>
<p>The Massachusetts Supreme Judicial Court has ruled in <a href="https://casetext.com/case/in-re-a-motion-to-compel"><em>In the Matter of a Motion to Compel</em>, SJC-13336</a> that the Superior Court could not order a Massachusetts counseling center to turn over, at the behest of a Rhode Island court, counseling records of the alleged minor victim of a sexual assault that occurred in Rhode Island, without the court first following to the so-called <em>Lampron-Dwyer</em> protocol.</p>
<p>The <em>Lampron-Dwyer</em> protocol, first set out in <em><a href="http://masscases.com/cases/sjc/448/448mass122.html">Commonwealth v. Dwyer, 448 Mass. 122 (2006)</a></em> and<em> <a href="http://masscases.com/cases/sjc/441/441mass265.html">Commonwealth v. Lampron, 441 Mass. 265, 269-270 (2004)</a></em>, provides a <a href="https://www.mass.gov/lists/dwyer-court-forms">step-by-step process</a> Massachusetts courts must follow when defense counsel in a sexual assault case request access to a victim’s counseling records.  The <em>Lampron-Dwyer </em>protocol adheres as much as possible to M.G.L. c. 233, §20J, the statutory privilege shielding such records from disclosure, while protecting a defendant’s due process rights.</p>
<p>In this case, Foley Hoag LLP submitted an amicus brief on behalf of long-time pro bono clients the <a href="https://victimrights.org/">Victim Rights Law Center</a> (VRLC) and <a href="https://www.janedoe.org/">Jane Doe, Inc.</a> (JDI). The case addressed whether survivors of sexual assault who are resident in Massachusetts and receive mental health counseling related to the assault retain the privacy rights in those counseling records granted to them under Massachusetts law if the assault occurred outside of Massachusetts (in this case, Rhode Island).  As amici, VRLC and JDI argued that survivors should not be stripped of certain existing privacy protections simply because the assault occurred in another state.  The SJC ultimately agreed, ruling that the well-established <em>Lampron-Dwyer</em> protocol must be followed prior to the disclosure of otherwise-protected counseling records of sexual assault survivors.  Practitioners and advocates hailed the decision as a victory for sexual assault survivors who rely on the privacy protections provided in Massachusetts when seeking much needed counseling services.</p>
<p><strong><u>The Underlying Criminal Case</u></strong></p>
<p>The appeal arose out of a criminal case in Rhode Island against an alleged perpetrator of sexual assault against a minor.  The minor survivor was resident in Massachusetts, but the assault occurred in Rhode Island.  The minor sought counseling following the assault from Wayside Youth &amp; Family Support Network, a Massachusetts-based counseling center that provides sexual assault counseling to youths.  The defendant sought the survivor’s counseling records from Wayside, claiming that he believed the records would support his alibi. He obtained an order from a Rhode Island court under the Uniform Law to Secure the Attendance of Witnesses from Without the State in Criminal Proceedings, <a href="malegislature">M.G.L.c. 233</a>, §§ 13A-13D (the Uniform Law), which demanded that Wayside turn over the victim’s records.</p>
<p>Under Massachusetts law, counseling records like those sought in this case are generally privileged, under the sexual assault counselor’s privilege provided in M.G.L. c. 233, § 20J.  The SJC also established stringent non-disclosure protections for such records in the <em>Lampron-Dwyer </em>protocol and related cases.. The <em>Lampron-Dwyer</em> balancing test the SJC developed allows courts to determine when an exception might be made to the general bar for disclosing these confidential records.</p>
<p>The Massachusetts Superior Court judge in this case initially denied the defendant’s request for counseling records in light of the §20J privilege, but ultimately issued an order compelling production of the records, citing the SJC’s 1993 <em><a href="https://casetext.com/case/in-the-matter-of-a-rhode-island-grand-jury-subpoena">Matter of a R.I. Grand Jury Subpoena</a></em> decision, which stated that, under the Uniform Law, the requesting state must make any privilege determinations. The judge also stayed the order and reported the case for appellate guidance.</p>
<p><strong><u>The Impact for Survivors and their Advocates</u></strong></p>
<p>The SJC’s decision ruling that the Massachusetts judge committed reversible error when he issued the order compelling the production of the survivor’s sexual assault counseling records without first considering the § 20J privilege or applying the long-standing <em>Lampron-Dwyer</em> balancing test reinforces the view of the Commonwealth, VRLC, and JDI that sexual assault counseling records are entitled to special privacy protections that few other records are entitled to under Massachusetts law.</p>
<p>Through the protections in § 20J, the <em>Lampron-Dwyer </em>protocol, and related cases, Massachusetts has identified the sexual assault counselor and survivor relationship as one of the few societal relationships entitled to a privilege that should only be pierced in rare and necessary circumstances.  The list of relationships entitled to such privileges is small—the priest-penitent privilege is one of the few comparable statutorily established privileges—emphasizing the conscious decision made by the legislature to protect this beneficial relationship.  This SJC decision upholds those protections and provides the consistency in application of the law that both survivors and their advocates can rely upon.</p>
<p>The Foley Hoag team representing VRLC, Jane Doe, Inc. and the other amici consisted of <a href="https://foleyhoag.com/people/mirenda-anthony/">Anthony Mirenda</a>, <a href="https://foleyhoag.com/people/gradel-laura/">Laura Gradel</a>, and Foley alum <a href="https://www.sheeheyvt.com/our_team/adam-c-aguirre/">Adam Aguirre</a>.</p>
<p>&nbsp;</p><p>The post <a href="http://www.securityprivacyandthelaw.com/2023/11/massachusetts-extends-protections-for-counseling-records-of-survivors-of-sexual-assault/">Massachusetts Extends Protections for Counseling Records of Survivors of Sexual Assault</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2023/11/massachusetts-extends-protections-for-counseling-records-of-survivors-of-sexual-assault/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>President Biden Issues Executive Order on Use of Artificial Intelligence in Healthcare Settings</title>
		<link>http://www.securityprivacyandthelaw.com/2023/10/president-biden-issues-executive-order-on-use-of-artificial-intelligence-in-healthcare-settings/</link>
					<comments>http://www.securityprivacyandthelaw.com/2023/10/president-biden-issues-executive-order-on-use-of-artificial-intelligence-in-healthcare-settings/#respond</comments>
		
		<dc:creator><![CDATA[Bryant Godfrey]]></dc:creator>
		<pubDate>Tue, 31 Oct 2023 19:51:27 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Healthcare Industry Spotlight]]></category>
		<category><![CDATA[Executive Order]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[health care]]></category>
		<category><![CDATA[President Biden]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2551</guid>

					<description><![CDATA[<p><a href="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/AI_Brain_689x388.jpg"><img loading="lazy" decoding="async" class="alignright wp-image-2552" src="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/AI_Brain_689x388.jpg" alt="" width="325" height="183" srcset="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/AI_Brain_689x388.jpg 689w, https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/AI_Brain_689x388-300x169.jpg 300w" sizes="(max-width: 325px) 100vw, 325px" /></a>Key Takeaways:</p>
<ul>
<li>This executive order (EO) directs federal agencies to review and develop policies to guide the use of artificial intelligence that touches every sector of the economy.</li>
<li>The EO directs the Department of Health and Human Services (HHS) to establish an HHS AI Task Force to develop a strategic plan on the responsible deployment of AI and AI-enabled technologies in healthcare settings.&#8230;</li>
<p> <a class="read-more" href="http://www.securityprivacyandthelaw.com/2023/10/president-biden-issues-executive-order-on-use-of-artificial-intelligence-in-healthcare-settings/">More</a></ul>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2023/10/president-biden-issues-executive-order-on-use-of-artificial-intelligence-in-healthcare-settings/">President Biden Issues Executive Order on Use of Artificial Intelligence in Healthcare Settings</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong><a href="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/AI_Brain_689x388.jpg"><img loading="lazy" decoding="async" class="alignright wp-image-2552" src="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/AI_Brain_689x388.jpg" alt="" width="325" height="183" srcset="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/AI_Brain_689x388.jpg 689w, https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/AI_Brain_689x388-300x169.jpg 300w" sizes="(max-width: 325px) 100vw, 325px" /></a>Key Takeaways:</strong></p>
<ul>
<li>This executive order (EO) directs federal agencies to review and develop policies to guide the use of artificial intelligence that touches every sector of the economy.</li>
<li>The EO directs the Department of Health and Human Services (HHS) to establish an HHS AI Task Force to develop a strategic plan on the responsible deployment of AI and AI-enabled technologies in healthcare settings.</li>
<li>The EO also directs HHS to develop a strategy for regulating the use of AI-enabled tools in the drug development process.</li>
<li>The Biden administration actions to direct government agencies on the development, use, and maintenance of AI will bring renewed focus and interest in the use of AI going forward.</li>
</ul>
<p>&#8212;</p>
<p>On October 30, 2023, President Biden issued an executive order (EO) to guide federal agencies on the development and use of artificial intelligence (AI). The administration views AI as holding numerous benefits but at the same time cautions it could exacerbate societal harms if not responsibly managed.</p>
<p>The Biden administration laid out eight principles to guide federal agencies in advancing, using, and overseeing AI. The first principle is that AI must be safe and secure, meaning there must be robust, reliable, and standardized evaluations of AI systems, as well as policies or other mechanisms, including institutions, to test, understand, and mitigate risks from these systems before they are in use. This is particularly relevant, as the EO notes, to the biotechnology and cybersecurity industries. In meeting this principle, the administration will develop labeling and content provenance mechanisms to help determine when content is generated using AI and when it is not.</p>
<p>The next set of principles focus on promoting responsible innovation, competition, and collaboration to allow the United States to lead in AI. This includes a commitment to supporting American workers and furthering health equity and civil rights. It also focuses on upholding consumer protection laws and Americans’ privacy and civil liberties.</p>
<p>The final set of principles seek to govern the Federal Government’s own use of AI and increase its internal capacity to regulate and govern the responsible use of AI. This includes developing a framework to manage AI’s risks, unlock AI’s potential for good, and promote common approaches with other nations.</p>
<p><strong>EO Healthcare Implications</strong><br />
To ensure safe and responsible use of AI in the healthcare industry, the EO directs the Department of Health and Human Services (HHS) to establish an HHS AI Task Force within one year. This task force shall develop a strategic plan that includes policies, and possibly regulatory action, on responsible deployment of AI and AI-enabled technologies in the healthcare sector, including research and discovery, drug and device safety, healthcare delivery and financing, and public health.</p>
<p>The EO directs HHS to identify appropriate guidance and resources to promote AI’s deployment and use in a variety of settings and situations. This includes:</p>
<ul>
<li>the development, maintenance, and use of predictive and generative AI-enabled technologies in healthcare delivery and financing, including quality measurement, performance improvement, program integrity, benefits administration, and patient experience, and considering appropriate human oversight of the AI-generated output;</li>
<li>identifying uses of AI that promote workplace efficiency and satisfaction, and the development and maintenance of documentation to help users determine appropriate and safe uses of AI in local healthcare settings;</li>
<li>monitoring long-term safety and performance of AI-enabled technologies, including clinically relevant or significant modifications and performance across population groups, and incorporating equity principles in AI-enabled technologies. This means using disaggregated data on affected populations and representative population data sets when developing new models, and monitoring algorithmic performance against discrimination and bias in existing models.</li>
</ul>
<p>To protect personally identifiable information, the EO calls for incorporating safety, privacy, and security standards into the software-development lifecycle, including measures to address AI-enhanced cybersecurity threats.</p>
<p>The EO also directs HHS to consider appropriate actions to advance compliance and understanding of federal nondiscrimination laws by health providers that receive federal financial assistance, and its relationship to AI. This may include providing technical assistance or issuing guidance to healthcare providers and payers about their obligations under nondiscrimination and privacy laws as they relate to AI.</p>
<p>Notably, the EO directs HHS to develop a strategy for regulating the use of AI or AI-enabled tools in drug development processes. This strategy shall define the objectives, goals, and high-level principles required for appropriate regulation throughout each phase of drug development, identify areas where future rulemaking, guidance, or additional statutory authority may be necessary, and identify existing budget, resources, and personnel for such regulatory systems.</p>
<p>Lastly, the EO directs HHS, in consultation with the Secretary of Defense and Veterans Affairs, to establish an AI safety program that establishes a common framework for approaches to identifying and capturing clinical errors resulting from AI deployed in healthcare settings, as well as specifications for a central tracking repository for associated incidents that cause harm to patients, caregivers, or other parties.</p>
<p><strong>Next Steps</strong><br />
While the EO provides up to one year for many of these actions to occur, it is possible the administration and these agencies will begin operationalizing and engaging industry to begin building AI frameworks and seeking necessary input to roll out AI systems and processes in key areas of the healthcare sector.</p><p>The post <a href="http://www.securityprivacyandthelaw.com/2023/10/president-biden-issues-executive-order-on-use-of-artificial-intelligence-in-healthcare-settings/">President Biden Issues Executive Order on Use of Artificial Intelligence in Healthcare Settings</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2023/10/president-biden-issues-executive-order-on-use-of-artificial-intelligence-in-healthcare-settings/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NY State Education Department Bans Facial Recognition Technology</title>
		<link>http://www.securityprivacyandthelaw.com/2023/10/ny-state-education-department-bans-facial-recognition-technology/</link>
					<comments>http://www.securityprivacyandthelaw.com/2023/10/ny-state-education-department-bans-facial-recognition-technology/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy Meisinger]]></dc:creator>
		<pubDate>Mon, 23 Oct 2023 14:30:04 +0000</pubDate>
				<category><![CDATA[State laws]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Biometrics]]></category>
		<category><![CDATA[biometric technology]]></category>
		<category><![CDATA[facial recognition technology]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[public schools]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[New York]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2548</guid>

					<description><![CDATA[<p><a href="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/School.jpg"><img loading="lazy" decoding="async" class="alignright  wp-image-2549" src="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/School.jpg" alt="" width="373" height="276" srcset="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/School.jpg 600w, https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/School-300x222.jpg 300w" sizes="(max-width: 373px) 100vw, 373px" /></a>In late September, the NY State Education Department issued a two-page <a href="https://www.nysed.gov/sites/default/files/programs/data-privacy-security/biometric-determination-9-27-23.pdf">order</a> providing that NY public schools may not purchase or utilize facial recognition technology. The Department relied on a <a href="https://its.ny.gov/system/files/documents/2023/08/biometrics-report-final-2023.pdf">report</a> issued by the NY Office of Information Technology Services in August that was critical of the privacy implications of facial recognition technology, but left open the door for the use of other types of biometric technology in schools.&#8230; <a class="read-more" href="http://www.securityprivacyandthelaw.com/2023/10/ny-state-education-department-bans-facial-recognition-technology/">More</a></p>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2023/10/ny-state-education-department-bans-facial-recognition-technology/">NY State Education Department Bans Facial Recognition Technology</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/School.jpg"><img loading="lazy" decoding="async" class="alignright  wp-image-2549" src="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/School.jpg" alt="" width="373" height="276" srcset="https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/School.jpg 600w, https://www.securityprivacyandthelaw.com/wp-content/uploads/sites/8/2023/10/School-300x222.jpg 300w" sizes="(max-width: 373px) 100vw, 373px" /></a>In late September, the NY State Education Department issued a two-page <a href="https://www.nysed.gov/sites/default/files/programs/data-privacy-security/biometric-determination-9-27-23.pdf">order</a> providing that NY public schools may not purchase or utilize facial recognition technology. The Department relied on a <a href="https://its.ny.gov/system/files/documents/2023/08/biometrics-report-final-2023.pdf">report</a> issued by the NY Office of Information Technology Services in August that was critical of the privacy implications of facial recognition technology, but left open the door for the use of other types of biometric technology in schools.</p>
<p>The Department’s actions followed on litigation that began in 2020 after an upstate school district began implementing a facial recognition system intended to identify potentially threatening non-students on school premises. After the litigation began, the state legislature enacted a moratorium on facial recognition technology while the State Education Department and Office of Information Technology Services conducted further research and issued a final decision.</p>
<p>In its report, the Office of Information Technology Services focused heavily on potential impacts to student privacy as well as equity concerns, noting that research on facial recognition technology has noted the possibility of higher rates of incorrect identification on people of color, non-binary and transgender individuals, women, the elderly, and, importantly, children.  The report likewise expressed significant concerns over the possibility of breaches to biometric databases that would be needed to make the facial recognition technology work, noting that because biometric information generally cannot be changed, the disclosure of biometric data could potentially put users at permanent risk.</p>
<p>Ultimately, the report was less critical of non-facial recognition biometric technology, such as the use of digital fingerprinting.  The Department’s order potentially allows for the use of such technology, as it authorizes school districts to “determine whether to use biometric identifying technology other than facial recognition technology at the local level.”</p>
<p>Similar debates are taking place at the local level in other states, too.  <a href="https://www.mtpr.org/montana-news/2022-09-22/as-facial-recognition-arrives-in-schools-montana-enters-uncharted-territory">Montana</a>, for example, has recently begun to utilize facial recognition technology for security purposes in several small school districts.  Though there is no over-arching federal policy on the use of facial recognition technology in schools, the <a href="https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html">Federal Educational Rights and Privacy Act</a> (“FERPA”) does require certain protections for “biometric records” of students, which can include, among other things, “retina and iris patterns” and “facial characteristics.”  That said, FERPA does not have highly built-out requirements in relation to privacy and data security (in the way that, for example, HIPAA does in the health context), and the potential for data breaches to occur figured heavily in the Department’s analysis as well as other state-level debates about facial recognition.</p>
<p>We expect these debates will continue as schools continue to search for technologies that enhance security on campus, while attempting to balance the need for security with the various other issues presented by facial recognition technology.</p><p>The post <a href="http://www.securityprivacyandthelaw.com/2023/10/ny-state-education-department-bans-facial-recognition-technology/">NY State Education Department Bans Facial Recognition Technology</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2023/10/ny-state-education-department-bans-facial-recognition-technology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>HHS OCR/ONC Announce Latest Version of Security Risk Assessment Tool</title>
		<link>http://www.securityprivacyandthelaw.com/2023/09/hhs-ocr-onc-announce-latest-version-of-security-risk-assessment-tool/</link>
					<comments>http://www.securityprivacyandthelaw.com/2023/09/hhs-ocr-onc-announce-latest-version-of-security-risk-assessment-tool/#respond</comments>
		
		<dc:creator><![CDATA[Colin Zick]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 19:25:26 +0000</pubDate>
				<category><![CDATA[Healthcare Industry Spotlight]]></category>
		<category><![CDATA[Cybersecurity & Cybercrime]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[ONC]]></category>
		<category><![CDATA[OCR]]></category>
		<guid isPermaLink="false">https://www.securityprivacyandthelaw.com/?p=2544</guid>

					<description><![CDATA[<p>The U.S. Department of Health and Human Services Office for Civil Rights (OCR) and the Office of the National Coordinator for Health Information Technology (ONC) have released version 3.4 of their <a href="https://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment-tool">Security Risk Assessment (SRA) Tool</a>.</p>
<p>The SRA Tool is designed to help healthcare providers conduct a risk analysis as required by the HIPAA Security Rule. Identifying and assessing potential risks and vulnerabilities to electronic protected health information (ePHI) are foundational elements in the implementation of security measures that protect ePHI.&#8230; <a class="read-more" href="http://www.securityprivacyandthelaw.com/2023/09/hhs-ocr-onc-announce-latest-version-of-security-risk-assessment-tool/">More</a></p>
<p>The post <a href="http://www.securityprivacyandthelaw.com/2023/09/hhs-ocr-onc-announce-latest-version-of-security-risk-assessment-tool/">HHS OCR/ONC Announce Latest Version of Security Risk Assessment Tool</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The U.S. Department of Health and Human Services Office for Civil Rights (OCR) and the Office of the National Coordinator for Health Information Technology (ONC) have released version 3.4 of their <a href="https://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment-tool">Security Risk Assessment (SRA) Tool</a>.</p>
<p>The SRA Tool is designed to help healthcare providers conduct a risk analysis as required by the HIPAA Security Rule. Identifying and assessing potential risks and vulnerabilities to electronic protected health information (ePHI) are foundational elements in the implementation of security measures that protect ePHI. As hacking and ransomware attacks continue to increase within the health care sector, it is more important than ever for organizations to understand their risk exposure and use that understanding to improve their cybersecurity.</p>
<p>The downloadable SRA Tool is a desktop application that walks users through the security risk assessment process using multiple-choice questions, threat and vulnerability assessments, and asset and vendor management. References and additional guidance are given along the way. Reports are available to save and print after the assessment is completed.</p>
<p>The latest version contains a variety of feature enhancements based on user feedback and public input. New features include:</p>
<p>1) A Remediation Report to help track  responses within the tool<br />
2) A Glossary and “Tool Tips” help<br />
3) Updated references to Health Industry Cybersecurity Practices (HICP) for 2023 Edition<br />
4) Bug fixes and stability enhancements</p><p>The post <a href="http://www.securityprivacyandthelaw.com/2023/09/hhs-ocr-onc-announce-latest-version-of-security-risk-assessment-tool/">HHS OCR/ONC Announce Latest Version of Security Risk Assessment Tool</a> first appeared on <a href="http://www.securityprivacyandthelaw.com">Security, Privacy and the Law</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>http://www.securityprivacyandthelaw.com/2023/09/hhs-ocr-onc-announce-latest-version-of-security-risk-assessment-tool/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
