Title: Privacy
1Privacy Security at Kaiser Permanente
Real Life Experiences with Data Theft March 30,
2007 Roger A. Skinner, MHSA, CHC Kaiser
Permanente Northern California Privacy and
Security Compliance Officer
2What is Kaiser Permanente?
- Kaiser Permanente is a large nation-wide
organization.
- 8 regions in 9 states and Washington DC
- 8.5 million health plan members
- 37 medical centers and 431 medical office
buildings - 150,000 employees and 12,900 physicians
- Each region has a health plan and medical group
- Four regions also have a hospital organization
3What is Kaiser Permanente?
- Kaiser Permanente is a large nation-wide
organization.
4Breach Management Process
Initiation of the formalized Breach Management
Process
- January, 2005 Phone call stating Kaiser
Permanente Protected Health Information (PHI) was
available on the internet - Discovery of the incident reported to a
regulatory agency - Resulting lessons learned and the processes
created have been actively applied on going
forward basis - The formation of the breach management process
within Kaiser Permanente
5Breach Management Process
Policy Creation Adoption
- Experiences within Kaiser Permanente coupled with
leadership vision - Evolving breach management processes and
practices over time formalized into program wide
policy - Notification of privacy incidents to the
member/patient is the right thing to do - Meets the requirements of state law
6Breach Management Process
Assessment of Data Breaches
- Factors gathered in the assessment process
- Circumstances about the disclosure itself (Who,
What, When, Where, Why) - Number of members/patients PHI involved
- Listing data points for each member
- Assessment of impact or potential impact on
members/patients - Other attributes unique to the situation itself
7Breach Management Process
Notification Audiences
- Member/Patient
- Typically a blend of telephone calls and letters
- Purchaser Groups
- Contractual obligations to notify purchasers
- Notification for relationship purposes
- Regulatory Agencies
- Federal - Center for Medicare Medicaid Services
- State - Department of Health Services
- State - Department of Managed Health Care
8Breach Management Process
Corrective Action Plans
- For each incident, corrective action plans are
created - Plans are created to address the incident
specific issues as well as the root cause - Ongoing monitoring of the corrective action plan
is conducted until all action items are fully
accomplished - Documentation is required to substantiate the
completion of each items
9Breach Management Process
Long Term Implications
- Reputation risks with members/patients,
purchasers, regulators - Adjustments to organizational strategy
- Increased scrutiny
- Direct and indirect financial costs
10Breach Management Process
Case Studies PHI on Internet
- Allegation that PHI was available on the internet
- Discovery of the incident reported to a
regulatory agency - Blended notification approach of telephone calls
and letters - Regulatory investigation resulted in financial
penalty from state regulator - Negative Media
- Television media story
- Newspaper
- Magazine
- On-line news coverage
11Breach Management Process
Case Studies Laptop Theft
- Laptop containing PHI in a database stolen from a
medical center - Blended notification approach of telephone calls
and letters - Negative Media
- Television media story
12Breach Management Process
Case Studies Laptop Theft
- Laptop stolen that contained elements of PHI
within two files stored on the hard drive - Letters to impacted members/patients sent
- Inbound telephone calls from affected members to
clarify questions - Negative media
- Local newspapers
- Two stories in television news media
- Trade publications
13Breach Management Process
Case Studies Public Presentations
- Various presentations over time have included
screenshots of various data systems - Some screenshots have included what would appear
to be live patient data - In reality, the data has been fictitious
- New guidance has been communicated to add
disclaimer language, so that there clarity that
the data is not live patient data
14Breach Management Process
Case Studies - Other
- Additional examples
- Questions answers
15Questions or follow-up?
Roger A. Skinner, MHSA, CHC roger.skinner_at_kp.org (
510) 625-2413