Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals for Purposes of the Breach Notification Requirements Under Section 13402 of Title XIII (Health Information Technology for Economic and Clinical Health Act) of the American Recovery and Reinvestment Act of 2009; Request for Information, 19006-19010 [E9-9512]
Download as PDF
19006
Federal Register / Vol. 74, No. 79 / Monday, April 27, 2009 / Rules and Regulations
treatment, and/or disposal. These
volumes correspond to the sum of
amounts reportable for data elements on
EPA Form R (EPA Form 9350–1; Rev.
12/4/93) as Part II column B or sections
8.1 (quantity released), 8.2 (quantity
used for energy recovery on-site), 8.3
(quantity used for energy recovery offsite), 8.4 (quantity recycled on-site), 8.5
(quantity recycled off-site), 8.6 (quantity
treated on-site), and 8.7 (quantity
treated off-site).
(b) If an owner or operator of a facility
determines that the owner or operator
may apply the alternate reporting
threshold specified in paragraph (a) of
this section for a specific toxic
chemical, the owner or operator is not
required to submit a report for that
chemical under § 372.30, but must
submit a certification statement that
contains the information required in
§ 372.95. The owner or operator of the
facility must also keep records as
specified in § 372.10(d).
*
*
*
*
*
(e) The provisions of this section do
not apply to any chemicals listed in
§ 372.28.
Subpart E—[Amended]
4. Section 372.95 is amended as
follows:
■ a. Revise section heading.
■ b. Revise paragraph (b) introductory
text.
■ c. Revise paragraph (b)(4).
■
§ 372.95 Alternate threshold certification
and instructions.
dwashington3 on PROD1PC60 with RULES
*
*
*
*
*
(b) Alternate threshold certification
statement elements. The following
information must be reported on an
alternate threshold certification
statement pursuant to § 372.27(b):
*
*
*
*
*
(4) Signature of a senior management
official certifying the following:
pursuant to 40 CFR 372.27, ‘‘I hereby
certify that to the best of my knowledge
and belief for the toxic chemical listed
in this statement, the annual reportable
amount, as defined in 40 CFR 372.27(a),
did not exceed 500 pounds for this
reporting year and that the chemical
was manufactured, or processed, or
otherwise used in an amount not
exceeding 1 million pounds during this
reporting year.’’
*
*
*
*
*
[FR Doc. E9–9530 Filed 4–24–09; 8:45 am]
BILLING CODE 6560–50–P
VerDate Nov<24>2008
14:31 Apr 24, 2009
Jkt 217001
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
45 CFR Parts 160 and 164
Guidance Specifying the Technologies
and Methodologies That Render
Protected Health Information
Unusable, Unreadable, or
Indecipherable to Unauthorized
Individuals for Purposes of the Breach
Notification Requirements Under
Section 13402 of Title XIII (Health
Information Technology for Economic
and Clinical Health Act) of the
American Recovery and Reinvestment
Act of 2009; Request for Information
AGENCY: Office of the Secretary,
Department of Health and Human
Services.
ACTION: Guidance and Request for
Information.
SUMMARY: This document is guidance
and a request for comments under
section 13402 of the Health Information
Technology for Economic and Clinical
Health (HITECH) Act, Title XIII of
Division A and Title IV of Division B of
the American Recovery and
Reinvestment Act of 2009 (ARRA) (Pub.
L. 111–5). ARRA was enacted on
February 17, 2009. The HITECH Act (the
Act) at section 13402 requires the
Department of Health and Human
Services (HHS) to issue interim final
regulations within 180 days of
enactment to require covered entities
under the Health Insurance Portability
and Accountability Act of 1996 (HIPAA)
and their business associates to provide
for notification in the case of breaches
of unsecured protected health
information. For purposes of these
requirements, section 13402(h) of the
Act defines ‘‘unsecured protected health
information’’ to mean protected health
information that is not secured through
the use of a technology or methodology
specified by the Secretary in guidance,
and requires the Secretary to issue such
guidance no later than 60 days after
enactment and to specify within the
technologies and methodologies that
render protected health information
unusable, unreadable, or indecipherable
to unauthorized individuals. Through
this document, HHS is issuing the
required guidance and seeking public
comment both on the guidance as well
as the breach notification provisions of
the Act generally to inform the future
rulemaking and updates to the
guidance.
DATES: Comments must be submitted on
or before May 21, 2009. The guidance is
applicable upon issuance, which
occurred on April 17, 2009, through
PO 00000
Frm 00030
Fmt 4700
Sfmt 4700
posting on the HHS Web site at https://
www.hhs.gov/ocr/privacy. However, the
guidance will apply to breaches 30 days
after publication of the forthcoming
interim final regulations. If we
determine that the guidance should be
modified based on public comments, we
will issue updated guidance prior to or
concurrently with the regulations.
ADDRESSES: Written comments may be
submitted through any of the methods
specified below. Please do not submit
duplicate comments.
• Federal eRulemaking Portal: You
may submit electronic comments at
https://www.regulations.gov. Follow the
instructions for submitting electronic
comments. Attachments should be in
Microsoft Word, WordPerfect, or Excel;
however, we prefer Microsoft Word.
• Regular, Express, or Overnight Mail:
You may mail written comments (one
original and two copies) to the following
address only: U.S. Department of Health
and Human Services, Office for Civil
Rights, Attention: HITECH Breach
Notification, Hubert H. Humphrey
Building, Room 509F, 200
Independence Avenue, SW.,
Washington, DC 20201.
• Hand Delivery or Courier: If you
prefer, you may deliver (by hand or
courier) your written comments (one
original and two copies) to the following
address only: Office for Civil Rights,
Attention: HITECH Breach Notification,
Hubert H. Humphrey Building, Room
509F, 200 Independence Avenue, SW.,
Washington, DC 20201. (Because access
to the interior of the Hubert H.
Humphrey Building is not readily
available to persons without federal
government identification, commenters
are encouraged to leave their comments
in the mail drop slots located in the
main lobby of the building.)
Inspection of Public Comments: All
comments received before the close of
the comment period will be available for
public inspection, including any
personally identifiable or confidential
business information that is included in
a comment. We will post all comments
received before the close of the
comment period at https://
www.regulations.gov.
FOR FURTHER INFORMATION CONTACT:
Andra Wicks, 202–205–2292.
SUPPLEMENTARY INFORMATION:
I. Background
The Health Information Technology
for Economic and Clinical Health
(HITECH) Act was enacted on February
17, 2009, as Title XIII of Division A and
Title IV of Division B of the American
Recovery and Reinvestment Act of 2009
(ARRA) (Pub. L. 111–5). Subtitle D of
E:\FR\FM\27APR1.SGM
27APR1
Federal Register / Vol. 74, No. 79 / Monday, April 27, 2009 / Rules and Regulations
dwashington3 on PROD1PC60 with RULES
the HITECH Act (the Act), entitled
‘‘Privacy,’’ among other provisions,
requires HHS to issue interim final
regulations for breach notification by
entities subject to the Health Insurance
Portability and Accountability Act of
1996 (HIPAA) and their business
associates. In particular, section 13402
of the Act requires HIPAA covered
entities to notify affected individuals,
and requires business associates to
notify covered entities, following the
discovery of a breach of unsecured
protected health information (PHI).1
The Act at section 13402(h) defines
‘‘unsecured protected health
information’’ to mean PHI that is not
secured through the use of a technology
or methodology specified by the
Secretary in guidance. Further, the Act
provides that no later than 60 days after
enactment, the Secretary shall, after
consultation with stakeholders, issue
(and annually update) guidance
specifying the technologies and
methodologies that render PHI
unusable, unreadable, or indecipherable
to unauthorized individuals.2 The Act
also provides that in the case the
Secretary does not issue timely
guidance, the term ‘‘unsecured
protected health information’’ shall
mean ‘‘protected health information that
is not secured by a technology standard
that renders protected health
information unusable, unreadable, or
indecipherable to unauthorized
individuals and is developed or
endorsed by a standards developing
organization that is accredited by the
American National Standards Institute
(ANSI).’’ 3
If PHI is rendered unusable,
unreadable, or indecipherable to
unauthorized individuals by one or
more of the methods identified in this
guidance, then such information is not
1 Protected health information (PHI) is
individually identifiable health information
transmitted or maintained by a covered entity or its
business associate in any form or medium. 45 CFR
160.103.
2 The Act provides that the technologies and
methodologies specified in the guidance also are to
address the use of standards developed under
section 3002(b)(2)(B)(vi) of the Public Health
Service Act, as added by section 13101 of the Act.
Section 3002(b)(2)(B)(vi) of the Public Health
Service Act requires the HIT Policy Committee
established in section 3002 to issue
recommendations on the development of
technologies that allow individually identifiable
health information to be rendered unusable,
unreadable, or indecipherable to unauthorized
individuals when such information is transmitted
in the nationwide health information network or
physically transported outside of the secured
physical perimeter of a health care provider, health
plan, or health care clearinghouse. The Department
intends to address such standards as they are
developed in future iterations of this guidance.
3 This provision becomes moot with the issuance
of this guidance.
VerDate Nov<24>2008
14:31 Apr 24, 2009
Jkt 217001
‘‘unsecured’’ PHI. Thus, because the
breach notification requirements apply
only to breaches of unsecured PHI, this
guidance provides the means by which
covered entities and their business
associates are to determine whether a
breach has occurred to which the
notification obligations under the Act
and its implementing regulations apply.
Further, section 13407 of the Act
defines ‘‘unsecured PHR identifiable
information’’ as personal health record
(PHR) identifiable health information
that is not protected through the use of
a technology or methodology specified
in the Secretary’s guidance. Thus, this
guidance also is to be used to specify
the technologies and methodologies that
render PHR identifiable health
information unusable, unreadable, or
indecipherable to unauthorized
individuals for purposes of the
temporary breach notification
requirements that apply to vendors of
PHRs and certain other entities (that are
not otherwise HIPAA covered entities)
under section 13407 of the Act. Section
13407 is to be administered by the
Federal Trade Commission (FTC) and
requires the FTC to promulgate
regulations within 180 days of
enactment.
The breach notification provisions of
section 13402 apply to HIPAA covered
entities and their business associates
that access, maintain, retain, modify,
record, store, destroy, or otherwise hold,
use, or disclose unsecured PHI (sections
13402(a) and (b)). For purposes of these
provisions, ‘‘breach’’ is defined in the
Act as ‘‘the unauthorized acquisition,
access, use, or disclosure of protected
health information which compromises
the security or privacy of such
information, except where an
unauthorized person to whom such
information is disclosed would not
reasonably have been able to retain such
information.’’ The Act includes
exceptions to this definition for cases in
which: (1) The unauthorized
acquisition, access, or use of PHI is
unintentional and made by an employee
or individual acting under authority of
a covered entity or business associate if
such acquisition, access, or use was
made in good faith and within the
course and scope of the employment or
other professional relationship with the
covered entity or business associate, and
such information is not further
acquired, accessed, used, or disclosed;
or (2) where an inadvertent disclosure
occurs by an individual who is
authorized to access PHI at a facility
operated by a covered entity or business
associate to another similarly situated
individual at the same facility, as long
PO 00000
Frm 00031
Fmt 4700
Sfmt 4700
19007
as the PHI is not further acquired,
accessed, used, or disclosed without
authorization (section 13400, definition
of ‘‘breach’’).
Following the discovery of a breach of
unsecured PHI, a covered entity must
notify each individual whose unsecured
PHI has been, or is reasonably believed
to have been, inappropriately accessed,
acquired, or disclosed in the breach
(section 13402(a)). Additionally,
following the discovery of a breach by
a business associate, the business
associate must notify the covered entity
of the breach and identify for the
covered entity the individuals whose
unsecured PHI has been, or is
reasonably believed to have been,
breached (section 13402(b)). The Act
requires the notifications to be made
without unreasonable delay but in no
case later than 60 calendar days after
discovery of the breach, except that
section 13402(g) requires a delay of
notification where a law enforcement
official determines that a notification
would impede a criminal investigation
or cause damage to national security.
The Act specifies the following
methods of notice in section 13402(e):
• Written notice to the individual (or
next of kin if the individual is deceased)
at the last known address of the
individual (or next of kin) by first-class
mail (or by electronic mail if specified
by the individual).
• In the case in which there is
insufficient or out-of-date contact
information, substitute notice,
including, in the case of 10 or more
individuals for which there is
insufficient contact information,
conspicuous posting (for a period
determined by the Secretary) on the
home page of the Web site of the
covered entity or notice in major print
or broadcast media.
• In cases that the entity deems
urgent based on the possibility of
imminent misuse of the unsecured PHI,
notice by telephone or other method is
permitted in addition to the above
methods.
• Notice to prominent media outlets
within the State or jurisdiction if a
breach of unsecured PHI affects or is
reasonably believed to affect more than
500 residents of that State or
jurisdiction.
• Notice to the Secretary by covered
entities immediately for breaches
involving more than 500 individuals
and annually for all other breaches.
• Posting by the Secretary on an HHS
Web site of a list that identifies each
covered entity involved in a breach in
which the unsecured PHI of more than
500 individuals is acquired or disclosed.
E:\FR\FM\27APR1.SGM
27APR1
19008
Federal Register / Vol. 74, No. 79 / Monday, April 27, 2009 / Rules and Regulations
Section 13402(f) of the Act requires
the notification of a breach to include
(1) a brief description of what
happened, including the date of the
breach and the date of the discovery of
the breach, if known; (2) a description
of the types of unsecured PHI that were
involved in the breach (such as full
name, Social Security number, date of
birth, home address, account number, or
disability code); (3) the steps
individuals should take to protect
themselves from potential harm
resulting from the breach; (4) a brief
description of what the covered entity
involved is doing to investigate the
breach, to mitigate losses, and to protect
against any further breaches; and (5)
contact procedures for individuals to
ask questions or learn additional
information, which shall include a tollfree telephone number, an e-mail
address, Web site, or postal address.
Finally, section 13402(i) requires the
Secretary to annually prepare and
submit to Congress a report regarding
the breaches for which the Secretary
was notified.
The Department’s interim final
regulations will become effective 30
days after publication and will apply to
breaches of unsecured PHI thereafter.
II. Guidance Specifying the
Technologies and Methodologies That
Render Protected Health Information
Unusable, Unreadable, or
Indecipherable to Unauthorized
Individuals
dwashington3 on PROD1PC60 with RULES
Please note that this guidance does
not address the use of de-identified
information as a method to render
protected health information (PHI)
unusable, unreadable, or indecipherable
to unauthorized individuals because
once PHI has been de-identified in
accordance with the HIPAA Privacy
Rule,4 it is no longer PHI and, therefore,
no longer subject to the HIPAA Privacy
and Security Rules.5 However, nothing
in this guidance should be construed as
discouraging covered entities and
business associates from using deidentified information to the maximum
extent practicable.
4 De-identified health information neither
identifies nor provides a reasonable basis to identify
an individual. The HIPAA Privacy Rule provides
two ways to de-identify information: (1) A formal
determination by a qualified statistician; or (2) the
removal of 18 specified identifiers of the individual
and of the individual’s relatives, household
members, and employers, and the covered entity
has no actual knowledge that the remaining
information could be used to identify the
individual. 45 CFR 164.514(b).
5 45 CFR Parts 160 and Subparts A, C, and E of
Part 164.
VerDate Nov<24>2008
14:31 Apr 24, 2009
Jkt 217001
A. Background
This guidance identifies the
technologies and methodologies that
can be used to render PHI (as defined in
45 CFR 160.103) unusable, unreadable,
or indecipherable to unauthorized
individuals. It should be used by
covered entities and their business
associates to determine whether
‘‘unsecured protected health
information’’ has been breached,
thereby triggering the notification
requirements specified in section 13402
of the Act and its forthcoming
implementing regulations.
This guidance is not intended to
instruct covered entities and business
associates on how to prevent breaches of
PHI. The HIPAA Privacy and Security
Rules, which are much broader in scope
and different in purpose than this
guidance, are intended, in part, to
prevent or reduce the likelihood of
breaches of PHI. Covered entities must
comply with the requirements of the
HIPAA Privacy and Security Rules by
conducting risk analyses and
implementing physical, administrative,
and technical safeguards that each
covered entity determines are
reasonable and appropriate. Covered
entities and business associates seeking
additional information also may want to
refer to the National Institute of
Standards and Technology (NIST)
Special Publication 800–66–Revision 1,
‘‘An Introductory Resource Guide for
Implementing the HIPAA Security
Rule.’’ 6
This guidance is intended to describe
the technologies and methodologies that
can be used to render PHI unusable,
unreadable, or indecipherable to
unauthorized individuals. While
covered entities and business associates
are not required to follow the guidance,
the specified technologies and
methodologies, if used, create the
functional equivalent of a safe harbor,
and thus, result in covered entities and
business associates not being required to
provide the notification otherwise
required by section 13402 in the event
of a breach. However, while adherence
to this guidance may result in covered
entities and business associates not
being required to provide the
notifications in the event of a breach,
covered entities and business associates
still must comply with all other federal
and state statutory and regulatory
obligations that may apply following a
breach of PHI, such as state breach
notification requirements, if applicable,
as well as the obligation on covered
entities at 45 CFR 164.530(f) of the
6 Available
PO 00000
at https://www.csrc.nist.gov/.
Frm 00032
Fmt 4700
Sfmt 4700
HIPAA Privacy Rule to mitigate, to the
extent practicable, any harmful effect
that is known to the covered entity as
a result of a breach of PHI by the
covered entity or business associate.
In accordance with the requirements
of this Act, we are issuing this guidance
after consultation with stakeholders.
Specifically, we consulted with external
experts in health informatics and
security, including representatives from
several Federal agencies. In issuing this
guidance, HHS is soliciting additional
public input on the guidance, including
whether there are other specific types of
technologies and methodologies that
should be included in future updates to
the guidance if appropriate. This
guidance may be modified based on
public feedback and updated guidance
may be issued prior to or concurrently
with the interim final regulations.
The term ‘‘unsecured protected health
information’’ includes PHI in any form
that is not secured through the use of a
technology or methodology specified in
this guidance. This guidance, however,
addresses methods for rendering PHI in
paper or electronic form unusable,
unreadable, or indecipherable to
unauthorized individuals.
Data comprising PHI can be
vulnerable to a breach in any of the
commonly recognized data states: ‘‘data
in motion’’ (i.e., data that is moving
through a network, including wireless
transmission 7); ‘‘data at rest’’ (i.e., data
that resides in databases, file systems,
and other structured storage methods 8);
‘‘data in use’’ (i.e., data in the process
of being created, retrieved, updated, or
deleted 9); or ‘‘data disposed’’ (e.g.,
discarded paper records or recycled
electronic media). PHI in each of these
data states (with the possible exception
of ‘‘data in use’’ 10) may be secured
using one or more methods. In
consultation with information security
experts at NIST, we have identified two
methods for rendering PHI unusable,
unreadable, or indecipherable to
unauthorized individuals: encryption
and destruction. Both of these methods
are discussed below.
Encryption is one method of
rendering electronic PHI unusable,
unreadable, or indecipherable to
unauthorized persons. The successful
use of encryption depends upon two
7 Preventing Data Leakage Safeguards Technical
Assistance, Internal Revenue Service, https://
www.irs.gov/businesses/small/article/
0,,id=201295,00.html.
8 Kanagasingham, P. Data Loss Prevention, SANS
Institute, 2008.
9 Sometimes referred to as ‘‘data at the
endpoints.’’
10 We solicit comments on methods to protect
data in use. See Section III.A.1.
E:\FR\FM\27APR1.SGM
27APR1
Federal Register / Vol. 74, No. 79 / Monday, April 27, 2009 / Rules and Regulations
dwashington3 on PROD1PC60 with RULES
main features: The strength of the
encryption algorithm and the security of
the decryption key or process. The
specification of encryption methods in
this guidance includes the condition
that the processes or keys that might
enable decryption have not been
breached.
This guidance also addresses the
destruction of PHI both in paper and
electronic form as a method for
rendering such information unusable,
unreadable, or indecipherable to
unauthorized individuals. If PHI is
destroyed prior to disposal in
accordance with this guidance, no
breach notification is required following
access to the disposed hard copy or
electronic media by unauthorized
persons.
Note that the technologies and
methodologies referenced below in
Section B are intended to be exhaustive
and not merely illustrative.
Solicitation of Public Comment on
Additional Technologies and
Methodologies
Because we intend this guidance to be
an exhaustive list of the technologies
and methodologies that can be used to
render PHI unusable, unreadable, or
indecipherable to unauthorized
individuals, we are soliciting public
comment on whether there are
additional technologies and
methodologies the Department should
consider adding to this exclusive list in
future iterations of this guidance.11
In particular, in the development of
this guidance, the Department
considered whether PHI in limited data
set form should be treated as unusable,
unreadable, or indecipherable to
unauthorized individuals for purposes
of breach notification, and thus,
included in this guidance. A limited
data set is PHI from which the 16 direct
identifiers listed at 45 CFR 164.514(e)(2)
of the HIPAA Privacy Rule, including an
individual’s name, address, Social
Security number, and account number,
have been removed. Although a limited
data set requires the removal of direct
identifiers, the information is not
completely de-identified pursuant to 45
CFR 164.514(b) of the HIPAA Privacy
Rule. Due to the risk of re-identification
of a limited data set, the HIPAA Privacy
Rule treats information in a limited data
set as PHI, which must be protected and
only used or disclosed as permitted by
the HIPAA Privacy Rule. However,
although the HIPAA Privacy Rule treats
information in a limited data set as PHI,
the Rule does make distinctions in
terms of its requirements between PHI
11 See
Section III.A.3.
VerDate Nov<24>2008
14:31 Apr 24, 2009
Jkt 217001
in a limited data set and PHI that
contains direct identifiers. First, the
HIPAA Privacy Rule permits covered
entities to use or disclose PHI in a
limited data set in certain circumstances
where fully-identifiable PHI is not
permitted, such as for research purposes
where no individual authorization or an
Institutional Review Board waiver of
authorization is obtained. See 45 CFR
164.502(a)(1)(vi) and 164.514(e). In
these situations, to attempt to control
the risk of re-identification of PHI in a
limited data set, the HIPAA Privacy
Rule requires a data use agreement to be
in place between the covered entity and
the recipient of the limited data set
obligating the recipient to not reidentify the information or contact the
individuals (45 CFR 164.514(e)(4)).
Second, the HIPAA Privacy Rule further
distinguishes between PHI in a limited
data set and fully-identifiable PHI by
excluding disclosures of PHI in limited
data set form from the accounting of
disclosures requirement at 45 CFR
164.528(a)(1)(viii).
In determining whether PHI in
limited data set form should be treated
as unusable, unreadable, or
indecipherable to unauthorized
individuals for purposes of breach
notification, we considered the
following in support of including the
creation of a limited data set in this
guidance: (1) Doing so would better
align this guidance and the forthcoming
federal regulations with state breach
notification laws, which, as a general
matter, only address the compromise of
direct identifiers; and (2) there may be
administrative and legal difficulties
covered entities face in notifying
individuals of a breach of a limited data
set in light of limited contact
information and requirements in data
use agreements.
On the other hand, because PHI in
limited data set form is not completely
de-identified, the risk of reidentification is a consideration in
determining whether it should be
treated as unusable, unreadable, or
indecipherable to unauthorized
individuals for purposes of breach
notification, and thus, included in this
guidance as an acceptable methodology.
Therefore, the Department is interested
in receiving public comments on
whether the risk of re-identification of a
limited data set warrants its exclusion
from the list of technologies and
methodologies that render PHI
unusable, unreadable, or indecipherable
to unauthorized individuals.
For those that believe the risk of reidentification of a limited data set
warrants exclusion, we also request
comment on whether concerns would
PO 00000
Frm 00033
Fmt 4700
Sfmt 4700
19009
be alleviated if we required, for
purposes of inclusion in the guidance,
the removal of certain of the remaining
indirect identifiers in the limited data
set. For example, some research suggests
that a significant percentage of the U.S.
population can be identified with just
three key pieces of information, along
with other publicly available data:
gender, birth date (month/day/year),
and 5-digit zip code.12 Would the
removal of one further piece of
information from the limited data set—
either the month and day of birth (but
not the year of birth) or the last 3 digits
of a 5-digit zip code (in addition to the
elements listed in the HIPAA Privacy
Rule at 45 CFR 164.514(e)(2) for creation
of limited data sets)—sufficiently reduce
the risk of re-identification such that
this modified data set could be added to
this guidance? 13 Research suggests that
doing so could significantly reduce the
risk of re-identification.14
B. Guidance Specifying the
Technologies and Methodologies That
Render Protected Health Information
Unusable, Unreadable, or
Indecipherable to Unauthorized
Individuals
Protected health information (PHI) is
rendered unusable, unreadable, or
indecipherable to unauthorized
individuals only if one or more of the
following applies:
(a) Electronic PHI has been encrypted
as specified in the HIPAA Security Rule
by ‘‘the use of an algorithmic process to
transform data into a form in which
there is a low probability of assigning
meaning without use of a confidential
process or key’’ 15 and such confidential
process or key that might enable
decryption has not been breached.
Encryption processes identified below
have been tested by the National
Institute of Standards and Technology
(NIST) and judged to meet this
standard.16
(i) Valid encryption processes for data
at rest are consistent with NIST Special
12 Golle P. (2006). Revisiting the Uniqueness of
Simple Demographics in the US Population.
Available at https://crypto.stanford.edu/pgolle/
papers/census.pdf.
13 See Section III.A.5.
14 Golle P. (2006). Revisiting the Uniqueness of
Simple Demographics in the US Population.
Available at https://crypto.stanford.edu/pgolle/
papers/census.pdf.
15 45 CFR 164.304, definition of ‘‘encryption.’’
16 The NIST Computer Security Division’s
mission is to provide standards and technology to
protect information systems against threats to the
confidentiality of information, integrity of
information and processes, and availability of
information and services in order to build trust and
confidence in Information Technology (IT) systems.
The NIST standards are the standards the Federal
government uses to protect its information systems.
E:\FR\FM\27APR1.SGM
27APR1
19010
Federal Register / Vol. 74, No. 79 / Monday, April 27, 2009 / Rules and Regulations
Publication 800–111, Guide to Storage
Encryption Technologies for End User
Devices.17
(ii) Valid encryption processes for
data in motion are those that comply
with the requirements of Federal
Information Processing Standards (FIPS)
140–2. These include, as appropriate,
standards described in NIST Special
Publications 800–52, Guidelines for the
Selection and Use of Transport Layer
Security (TLS) Implementations; 800–
77, Guide to IPsec VPNs; or 800–113,
Guide to SSL VPNs, and may include
others which are FIPS 140–2
validated.18
(b) The media on which the PHI is
stored or recorded has been destroyed in
one of the following ways:
(i) Paper, film, or other hard copy
media have been shredded or destroyed
such that the PHI cannot be read or
otherwise cannot be reconstructed.
(ii) Electronic media have been
cleared, purged, or destroyed consistent
with NIST Special Publication 800–88,
Guidelines for Media Sanitization,19
such that the PHI cannot be retrieved.
dwashington3 on PROD1PC60 with RULES
III. Solicitation of Comments
A. Guidance Specifying the
Technologies and Methodologies That
Render Protected Health Information
Unusable, Unreadable, or
Indecipherable to Unauthorized
Individuals
The Department is seeking comments
on its guidance regarding the
technologies and methodologies that
render PHI unusable, unreadable, or
indecipherable to unauthorized
individuals for purposes of section
13402(h)(2) of the Act. In particular, the
Department is interested in receiving
comments on the following:
1. Are there particular electronic
media configurations that may render
PHI unusable, unreadable, or
indecipherable to unauthorized
individuals, such as a fingerprint
protected Universal Serial Bus (USB)
drive, which are not sufficiently covered
by the above and to which guidance
should be specifically addressed?
2. With respect to paper PHI, are there
additional methods the Department
should consider for rendering the
information unusable, unreadable, or
indecipherable to unauthorized
individuals?
3. Are there other methods generally
the Department should consider for
rendering PHI unusable, unreadable, or
indecipherable to unauthorized
individuals?
17 Available
at https://www.csrc.nist.gov/.
at https://www.csrc.nist.gov/.
19 Available at https://www.csrc.nist.gov/.
18 Available
VerDate Nov<24>2008
14:31 Apr 24, 2009
Jkt 217001
4. Are there circumstances under
which the methods discussed above
would fail to render information
unusable, unreadable, or indecipherable
to unauthorized individuals?
5. Does the risk of re-identification of
a limited data set warrant its exclusion
from the list of technologies and
methodologies that render PHI
unusable, unreadable, or indecipherable
to unauthorized individuals? Can risk of
re-identification be alleviated such that
the creation of a limited data set could
be added to this guidance?
6. In the event of a breach of protected
health information in limited data set
form, are there any administrative or
legal concerns about the ability to
comply with the breach notification
requirements?
7. Should future guidance specify
which off-the-shelf products, if any,
meet the encryption standards
identified in this guidance?
B. Breach Notification Provisions
Generally
In addition to public comment on the
guidance, the Department also requests
comments concerning any other areas or
issues pertinent to the development of
its interim final regulations for breach
notification. In particular, the
Department is interested in comment in
the following areas:
1. Based on experience in complying
with state breach notification laws, are
there any potential areas of conflict or
other issues the Department should
consider in promulgating the federal
breach notification requirements?
2. Given current obligations under
state breach notification laws, do
covered entities or business associates
anticipate having to send multiple
notices to an individual upon discovery
of a single breach? Are there
circumstances in which the required
federal notice would not also satisfy any
notice obligations under the state law?
3. Considering the methodologies
discussed in the guidance, are there any
circumstances in which a covered entity
or business associate would still be
required to notify individuals under
state laws of a breach of information
that has been rendered secured based on
federal requirements?
4. The Act’s definition of ‘‘breach’’
provides for a variety of exceptions. To
what particular types of circumstances
do entities anticipate these exceptions
applying?
Dated: April 22, 2009.
Charles E. Johnson,
Acting Secretary.
[FR Doc. E9–9512 Filed 4–22–09; 4:15 pm]
BILLING CODE 4150–03–P
PO 00000
Frm 00034
Fmt 4700
Sfmt 4700
FEDERAL COMMUNICATIONS
COMMISSION
47 CFR Part 27
[WT Docket Nos. 03–66; 03–67; 02–68; IB
Docket No. 02–364; ET Docket No. 00–258]
Small Business Size Standards for the
Broadband Radio Service in the 2495–
2690 MHz Band
AGENCY: Federal Communications
Commission.
ACTION: Final rule; notification of Small
Business Administration approval.
SUMMARY: This document announces
that the U.S. Small Business
Administration (SBA) has approved the
small business size standards adopted
by the Commission for the Broadband
Radio Service (BRS) in the 2495–2690
MHz band.
DATES: This announcement is made as
of April 27, 2009.
FOR FURTHER INFORMATION CONTACT: Gary
D. Michaels, Auctions and Spectrum
Access Division, Wireless
Telecommunications Bureau, (202) 418–
0660.
SUPPLEMENTARY INFORMATION:
1. Pursuant to SBA regulations, the
Commission consulted with the SBA on
March 7, 2003, and June 29, 2004,
regarding small business size standards
under which certain small businesses
would be eligible for bidding credits in
any auction of BRS licenses in the
2495–2650 MHz band and Educational
Broadband Service (EBS) licenses in the
2500–2690 MHz band. Both the March
7, 2003, and June 29, 2004 consultation
letters proposed the following small
business definitions: ‘‘Small
business’’—an entity with average
annual gross revenues for the preceding
three years not exceeding $40 million;
‘‘Very small business’’—an entity with
average annual gross revenues for the
preceding three years not exceeding $15
million; and ‘‘Entrepreneur’’—an entity
with average gross revenues not
exceeding $3 million for the preceding
three years. The SBA responded to the
Commission on July 22, 2004, replying
to both of the Commission’s requests
and stating that the contemplated BRS
and EBS size standards appeared
reasonable. The Commission
subsequently proposed those same
small business size standards for BRS
and EBS in the BRS/EBS Further Notice
of Proposed Rulemaking, FCC 04–135,
released on July 29, 2004, 69 FR 72048,
December 10, 2004. The Commission
received no comments from the public
regarding the proposed size standards.
2. On March 20, 2008, the
Commission released the Big LEO Third
E:\FR\FM\27APR1.SGM
27APR1
Agencies
[Federal Register Volume 74, Number 79 (Monday, April 27, 2009)]
[Rules and Regulations]
[Pages 19006-19010]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E9-9512]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF HEALTH AND HUMAN SERVICES
45 CFR Parts 160 and 164
Guidance Specifying the Technologies and Methodologies That
Render Protected Health Information Unusable, Unreadable, or
Indecipherable to Unauthorized Individuals for Purposes of the Breach
Notification Requirements Under Section 13402 of Title XIII (Health
Information Technology for Economic and Clinical Health Act) of the
American Recovery and Reinvestment Act of 2009; Request for Information
AGENCY: Office of the Secretary, Department of Health and Human
Services.
ACTION: Guidance and Request for Information.
-----------------------------------------------------------------------
SUMMARY: This document is guidance and a request for comments under
section 13402 of the Health Information Technology for Economic and
Clinical Health (HITECH) Act, Title XIII of Division A and Title IV of
Division B of the American Recovery and Reinvestment Act of 2009 (ARRA)
(Pub. L. 111-5). ARRA was enacted on February 17, 2009. The HITECH Act
(the Act) at section 13402 requires the Department of Health and Human
Services (HHS) to issue interim final regulations within 180 days of
enactment to require covered entities under the Health Insurance
Portability and Accountability Act of 1996 (HIPAA) and their business
associates to provide for notification in the case of breaches of
unsecured protected health information. For purposes of these
requirements, section 13402(h) of the Act defines ``unsecured protected
health information'' to mean protected health information that is not
secured through the use of a technology or methodology specified by the
Secretary in guidance, and requires the Secretary to issue such
guidance no later than 60 days after enactment and to specify within
the technologies and methodologies that render protected health
information unusable, unreadable, or indecipherable to unauthorized
individuals. Through this document, HHS is issuing the required
guidance and seeking public comment both on the guidance as well as the
breach notification provisions of the Act generally to inform the
future rulemaking and updates to the guidance.
DATES: Comments must be submitted on or before May 21, 2009. The
guidance is applicable upon issuance, which occurred on April 17, 2009,
through posting on the HHS Web site at https://www.hhs.gov/ocr/privacy.
However, the guidance will apply to breaches 30 days after publication
of the forthcoming interim final regulations. If we determine that the
guidance should be modified based on public comments, we will issue
updated guidance prior to or concurrently with the regulations.
ADDRESSES: Written comments may be submitted through any of the methods
specified below. Please do not submit duplicate comments.
Federal eRulemaking Portal: You may submit electronic
comments at https://www.regulations.gov. Follow the instructions for
submitting electronic comments. Attachments should be in Microsoft
Word, WordPerfect, or Excel; however, we prefer Microsoft Word.
Regular, Express, or Overnight Mail: You may mail written
comments (one original and two copies) to the following address only:
U.S. Department of Health and Human Services, Office for Civil Rights,
Attention: HITECH Breach Notification, Hubert H. Humphrey Building,
Room 509F, 200 Independence Avenue, SW., Washington, DC 20201.
Hand Delivery or Courier: If you prefer, you may deliver
(by hand or courier) your written comments (one original and two
copies) to the following address only: Office for Civil Rights,
Attention: HITECH Breach Notification, Hubert H. Humphrey Building,
Room 509F, 200 Independence Avenue, SW., Washington, DC 20201. (Because
access to the interior of the Hubert H. Humphrey Building is not
readily available to persons without federal government identification,
commenters are encouraged to leave their comments in the mail drop
slots located in the main lobby of the building.)
Inspection of Public Comments: All comments received before the
close of the comment period will be available for public inspection,
including any personally identifiable or confidential business
information that is included in a comment. We will post all comments
received before the close of the comment period at https://www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: Andra Wicks, 202-205-2292.
SUPPLEMENTARY INFORMATION:
I. Background
The Health Information Technology for Economic and Clinical Health
(HITECH) Act was enacted on February 17, 2009, as Title XIII of
Division A and Title IV of Division B of the American Recovery and
Reinvestment Act of 2009 (ARRA) (Pub. L. 111-5). Subtitle D of
[[Page 19007]]
the HITECH Act (the Act), entitled ``Privacy,'' among other provisions,
requires HHS to issue interim final regulations for breach notification
by entities subject to the Health Insurance Portability and
Accountability Act of 1996 (HIPAA) and their business associates. In
particular, section 13402 of the Act requires HIPAA covered entities to
notify affected individuals, and requires business associates to notify
covered entities, following the discovery of a breach of unsecured
protected health information (PHI).\1\
---------------------------------------------------------------------------
\1\ Protected health information (PHI) is individually
identifiable health information transmitted or maintained by a
covered entity or its business associate in any form or medium. 45
CFR 160.103.
---------------------------------------------------------------------------
The Act at section 13402(h) defines ``unsecured protected health
information'' to mean PHI that is not secured through the use of a
technology or methodology specified by the Secretary in guidance.
Further, the Act provides that no later than 60 days after enactment,
the Secretary shall, after consultation with stakeholders, issue (and
annually update) guidance specifying the technologies and methodologies
that render PHI unusable, unreadable, or indecipherable to unauthorized
individuals.\2\ The Act also provides that in the case the Secretary
does not issue timely guidance, the term ``unsecured protected health
information'' shall mean ``protected health information that is not
secured by a technology standard that renders protected health
information unusable, unreadable, or indecipherable to unauthorized
individuals and is developed or endorsed by a standards developing
organization that is accredited by the American National Standards
Institute (ANSI).'' \3\
---------------------------------------------------------------------------
\2\ The Act provides that the technologies and methodologies
specified in the guidance also are to address the use of standards
developed under section 3002(b)(2)(B)(vi) of the Public Health
Service Act, as added by section 13101 of the Act. Section
3002(b)(2)(B)(vi) of the Public Health Service Act requires the HIT
Policy Committee established in section 3002 to issue
recommendations on the development of technologies that allow
individually identifiable health information to be rendered
unusable, unreadable, or indecipherable to unauthorized individuals
when such information is transmitted in the nationwide health
information network or physically transported outside of the secured
physical perimeter of a health care provider, health plan, or health
care clearinghouse. The Department intends to address such standards
as they are developed in future iterations of this guidance.
\3\ This provision becomes moot with the issuance of this
guidance.
---------------------------------------------------------------------------
If PHI is rendered unusable, unreadable, or indecipherable to
unauthorized individuals by one or more of the methods identified in
this guidance, then such information is not ``unsecured'' PHI. Thus,
because the breach notification requirements apply only to breaches of
unsecured PHI, this guidance provides the means by which covered
entities and their business associates are to determine whether a
breach has occurred to which the notification obligations under the Act
and its implementing regulations apply. Further, section 13407 of the
Act defines ``unsecured PHR identifiable information'' as personal
health record (PHR) identifiable health information that is not
protected through the use of a technology or methodology specified in
the Secretary's guidance. Thus, this guidance also is to be used to
specify the technologies and methodologies that render PHR identifiable
health information unusable, unreadable, or indecipherable to
unauthorized individuals for purposes of the temporary breach
notification requirements that apply to vendors of PHRs and certain
other entities (that are not otherwise HIPAA covered entities) under
section 13407 of the Act. Section 13407 is to be administered by the
Federal Trade Commission (FTC) and requires the FTC to promulgate
regulations within 180 days of enactment.
The breach notification provisions of section 13402 apply to HIPAA
covered entities and their business associates that access, maintain,
retain, modify, record, store, destroy, or otherwise hold, use, or
disclose unsecured PHI (sections 13402(a) and (b)). For purposes of
these provisions, ``breach'' is defined in the Act as ``the
unauthorized acquisition, access, use, or disclosure of protected
health information which compromises the security or privacy of such
information, except where an unauthorized person to whom such
information is disclosed would not reasonably have been able to retain
such information.'' The Act includes exceptions to this definition for
cases in which: (1) The unauthorized acquisition, access, or use of PHI
is unintentional and made by an employee or individual acting under
authority of a covered entity or business associate if such
acquisition, access, or use was made in good faith and within the
course and scope of the employment or other professional relationship
with the covered entity or business associate, and such information is
not further acquired, accessed, used, or disclosed; or (2) where an
inadvertent disclosure occurs by an individual who is authorized to
access PHI at a facility operated by a covered entity or business
associate to another similarly situated individual at the same
facility, as long as the PHI is not further acquired, accessed, used,
or disclosed without authorization (section 13400, definition of
``breach'').
Following the discovery of a breach of unsecured PHI, a covered
entity must notify each individual whose unsecured PHI has been, or is
reasonably believed to have been, inappropriately accessed, acquired,
or disclosed in the breach (section 13402(a)). Additionally, following
the discovery of a breach by a business associate, the business
associate must notify the covered entity of the breach and identify for
the covered entity the individuals whose unsecured PHI has been, or is
reasonably believed to have been, breached (section 13402(b)). The Act
requires the notifications to be made without unreasonable delay but in
no case later than 60 calendar days after discovery of the breach,
except that section 13402(g) requires a delay of notification where a
law enforcement official determines that a notification would impede a
criminal investigation or cause damage to national security.
The Act specifies the following methods of notice in section
13402(e):
Written notice to the individual (or next of kin if the
individual is deceased) at the last known address of the individual (or
next of kin) by first-class mail (or by electronic mail if specified by
the individual).
In the case in which there is insufficient or out-of-date
contact information, substitute notice, including, in the case of 10 or
more individuals for which there is insufficient contact information,
conspicuous posting (for a period determined by the Secretary) on the
home page of the Web site of the covered entity or notice in major
print or broadcast media.
In cases that the entity deems urgent based on the
possibility of imminent misuse of the unsecured PHI, notice by
telephone or other method is permitted in addition to the above
methods.
Notice to prominent media outlets within the State or
jurisdiction if a breach of unsecured PHI affects or is reasonably
believed to affect more than 500 residents of that State or
jurisdiction.
Notice to the Secretary by covered entities immediately
for breaches involving more than 500 individuals and annually for all
other breaches.
Posting by the Secretary on an HHS Web site of a list that
identifies each covered entity involved in a breach in which the
unsecured PHI of more than 500 individuals is acquired or disclosed.
[[Page 19008]]
Section 13402(f) of the Act requires the notification of a breach
to include (1) a brief description of what happened, including the date
of the breach and the date of the discovery of the breach, if known;
(2) a description of the types of unsecured PHI that were involved in
the breach (such as full name, Social Security number, date of birth,
home address, account number, or disability code); (3) the steps
individuals should take to protect themselves from potential harm
resulting from the breach; (4) a brief description of what the covered
entity involved is doing to investigate the breach, to mitigate losses,
and to protect against any further breaches; and (5) contact procedures
for individuals to ask questions or learn additional information, which
shall include a toll-free telephone number, an e-mail address, Web
site, or postal address. Finally, section 13402(i) requires the
Secretary to annually prepare and submit to Congress a report regarding
the breaches for which the Secretary was notified.
The Department's interim final regulations will become effective 30
days after publication and will apply to breaches of unsecured PHI
thereafter.
II. Guidance Specifying the Technologies and Methodologies That Render
Protected Health Information Unusable, Unreadable, or Indecipherable to
Unauthorized Individuals
Please note that this guidance does not address the use of de-
identified information as a method to render protected health
information (PHI) unusable, unreadable, or indecipherable to
unauthorized individuals because once PHI has been de-identified in
accordance with the HIPAA Privacy Rule,\4\ it is no longer PHI and,
therefore, no longer subject to the HIPAA Privacy and Security
Rules.\5\ However, nothing in this guidance should be construed as
discouraging covered entities and business associates from using de-
identified information to the maximum extent practicable.
---------------------------------------------------------------------------
\4\ De-identified health information neither identifies nor
provides a reasonable basis to identify an individual. The HIPAA
Privacy Rule provides two ways to de-identify information: (1) A
formal determination by a qualified statistician; or (2) the removal
of 18 specified identifiers of the individual and of the
individual's relatives, household members, and employers, and the
covered entity has no actual knowledge that the remaining
information could be used to identify the individual. 45 CFR
164.514(b).
\5\ 45 CFR Parts 160 and Subparts A, C, and E of Part 164.
---------------------------------------------------------------------------
A. Background
This guidance identifies the technologies and methodologies that
can be used to render PHI (as defined in 45 CFR 160.103) unusable,
unreadable, or indecipherable to unauthorized individuals. It should be
used by covered entities and their business associates to determine
whether ``unsecured protected health information'' has been breached,
thereby triggering the notification requirements specified in section
13402 of the Act and its forthcoming implementing regulations.
This guidance is not intended to instruct covered entities and
business associates on how to prevent breaches of PHI. The HIPAA
Privacy and Security Rules, which are much broader in scope and
different in purpose than this guidance, are intended, in part, to
prevent or reduce the likelihood of breaches of PHI. Covered entities
must comply with the requirements of the HIPAA Privacy and Security
Rules by conducting risk analyses and implementing physical,
administrative, and technical safeguards that each covered entity
determines are reasonable and appropriate. Covered entities and
business associates seeking additional information also may want to
refer to the National Institute of Standards and Technology (NIST)
Special Publication 800-66-Revision 1, ``An Introductory Resource Guide
for Implementing the HIPAA Security Rule.'' \6\
---------------------------------------------------------------------------
\6\ Available at https://www.csrc.nist.gov/.
---------------------------------------------------------------------------
This guidance is intended to describe the technologies and
methodologies that can be used to render PHI unusable, unreadable, or
indecipherable to unauthorized individuals. While covered entities and
business associates are not required to follow the guidance, the
specified technologies and methodologies, if used, create the
functional equivalent of a safe harbor, and thus, result in covered
entities and business associates not being required to provide the
notification otherwise required by section 13402 in the event of a
breach. However, while adherence to this guidance may result in covered
entities and business associates not being required to provide the
notifications in the event of a breach, covered entities and business
associates still must comply with all other federal and state statutory
and regulatory obligations that may apply following a breach of PHI,
such as state breach notification requirements, if applicable, as well
as the obligation on covered entities at 45 CFR 164.530(f) of the HIPAA
Privacy Rule to mitigate, to the extent practicable, any harmful effect
that is known to the covered entity as a result of a breach of PHI by
the covered entity or business associate.
In accordance with the requirements of this Act, we are issuing
this guidance after consultation with stakeholders. Specifically, we
consulted with external experts in health informatics and security,
including representatives from several Federal agencies. In issuing
this guidance, HHS is soliciting additional public input on the
guidance, including whether there are other specific types of
technologies and methodologies that should be included in future
updates to the guidance if appropriate. This guidance may be modified
based on public feedback and updated guidance may be issued prior to or
concurrently with the interim final regulations.
The term ``unsecured protected health information'' includes PHI in
any form that is not secured through the use of a technology or
methodology specified in this guidance. This guidance, however,
addresses methods for rendering PHI in paper or electronic form
unusable, unreadable, or indecipherable to unauthorized individuals.
Data comprising PHI can be vulnerable to a breach in any of the
commonly recognized data states: ``data in motion'' (i.e., data that is
moving through a network, including wireless transmission \7\); ``data
at rest'' (i.e., data that resides in databases, file systems, and
other structured storage methods \8\); ``data in use'' (i.e., data in
the process of being created, retrieved, updated, or deleted \9\); or
``data disposed'' (e.g., discarded paper records or recycled electronic
media). PHI in each of these data states (with the possible exception
of ``data in use'' \10\) may be secured using one or more methods. In
consultation with information security experts at NIST, we have
identified two methods for rendering PHI unusable, unreadable, or
indecipherable to unauthorized individuals: encryption and destruction.
Both of these methods are discussed below.
---------------------------------------------------------------------------
\7\ Preventing Data Leakage Safeguards Technical Assistance,
Internal Revenue Service, https://www.irs.gov/businesses/small/article/0,,id=201295,00.html.
\8\ Kanagasingham, P. Data Loss Prevention, SANS Institute,
2008.
\9\ Sometimes referred to as ``data at the endpoints.''
\10\ We solicit comments on methods to protect data in use. See
Section III.A.1.
---------------------------------------------------------------------------
Encryption is one method of rendering electronic PHI unusable,
unreadable, or indecipherable to unauthorized persons. The successful
use of encryption depends upon two
[[Page 19009]]
main features: The strength of the encryption algorithm and the
security of the decryption key or process. The specification of
encryption methods in this guidance includes the condition that the
processes or keys that might enable decryption have not been breached.
This guidance also addresses the destruction of PHI both in paper
and electronic form as a method for rendering such information
unusable, unreadable, or indecipherable to unauthorized individuals. If
PHI is destroyed prior to disposal in accordance with this guidance, no
breach notification is required following access to the disposed hard
copy or electronic media by unauthorized persons.
Note that the technologies and methodologies referenced below in
Section B are intended to be exhaustive and not merely illustrative.
Solicitation of Public Comment on Additional Technologies and
Methodologies
Because we intend this guidance to be an exhaustive list of the
technologies and methodologies that can be used to render PHI unusable,
unreadable, or indecipherable to unauthorized individuals, we are
soliciting public comment on whether there are additional technologies
and methodologies the Department should consider adding to this
exclusive list in future iterations of this guidance.\11\
---------------------------------------------------------------------------
\11\ See Section III.A.3.
---------------------------------------------------------------------------
In particular, in the development of this guidance, the Department
considered whether PHI in limited data set form should be treated as
unusable, unreadable, or indecipherable to unauthorized individuals for
purposes of breach notification, and thus, included in this guidance. A
limited data set is PHI from which the 16 direct identifiers listed at
45 CFR 164.514(e)(2) of the HIPAA Privacy Rule, including an
individual's name, address, Social Security number, and account number,
have been removed. Although a limited data set requires the removal of
direct identifiers, the information is not completely de-identified
pursuant to 45 CFR 164.514(b) of the HIPAA Privacy Rule. Due to the
risk of re-identification of a limited data set, the HIPAA Privacy Rule
treats information in a limited data set as PHI, which must be
protected and only used or disclosed as permitted by the HIPAA Privacy
Rule. However, although the HIPAA Privacy Rule treats information in a
limited data set as PHI, the Rule does make distinctions in terms of
its requirements between PHI in a limited data set and PHI that
contains direct identifiers. First, the HIPAA Privacy Rule permits
covered entities to use or disclose PHI in a limited data set in
certain circumstances where fully-identifiable PHI is not permitted,
such as for research purposes where no individual authorization or an
Institutional Review Board waiver of authorization is obtained. See 45
CFR 164.502(a)(1)(vi) and 164.514(e). In these situations, to attempt
to control the risk of re-identification of PHI in a limited data set,
the HIPAA Privacy Rule requires a data use agreement to be in place
between the covered entity and the recipient of the limited data set
obligating the recipient to not re-identify the information or contact
the individuals (45 CFR 164.514(e)(4)). Second, the HIPAA Privacy Rule
further distinguishes between PHI in a limited data set and fully-
identifiable PHI by excluding disclosures of PHI in limited data set
form from the accounting of disclosures requirement at 45 CFR
164.528(a)(1)(viii).
In determining whether PHI in limited data set form should be
treated as unusable, unreadable, or indecipherable to unauthorized
individuals for purposes of breach notification, we considered the
following in support of including the creation of a limited data set in
this guidance: (1) Doing so would better align this guidance and the
forthcoming federal regulations with state breach notification laws,
which, as a general matter, only address the compromise of direct
identifiers; and (2) there may be administrative and legal difficulties
covered entities face in notifying individuals of a breach of a limited
data set in light of limited contact information and requirements in
data use agreements.
On the other hand, because PHI in limited data set form is not
completely de-identified, the risk of re-identification is a
consideration in determining whether it should be treated as unusable,
unreadable, or indecipherable to unauthorized individuals for purposes
of breach notification, and thus, included in this guidance as an
acceptable methodology. Therefore, the Department is interested in
receiving public comments on whether the risk of re-identification of a
limited data set warrants its exclusion from the list of technologies
and methodologies that render PHI unusable, unreadable, or
indecipherable to unauthorized individuals.
For those that believe the risk of re-identification of a limited
data set warrants exclusion, we also request comment on whether
concerns would be alleviated if we required, for purposes of inclusion
in the guidance, the removal of certain of the remaining indirect
identifiers in the limited data set. For example, some research
suggests that a significant percentage of the U.S. population can be
identified with just three key pieces of information, along with other
publicly available data: gender, birth date (month/day/year), and 5-
digit zip code.\12\ Would the removal of one further piece of
information from the limited data set--either the month and day of
birth (but not the year of birth) or the last 3 digits of a 5-digit zip
code (in addition to the elements listed in the HIPAA Privacy Rule at
45 CFR 164.514(e)(2) for creation of limited data sets)--sufficiently
reduce the risk of re-identification such that this modified data set
could be added to this guidance? \13\ Research suggests that doing so
could significantly reduce the risk of re-identification.\14\
---------------------------------------------------------------------------
\12\ Golle P. (2006). Revisiting the Uniqueness of Simple
Demographics in the US Population. Available at https://crypto.stanford.edu/pgolle/papers/census.pdf.
\13\ See Section III.A.5.
\14\ Golle P. (2006). Revisiting the Uniqueness of Simple
Demographics in the US Population. Available at https://crypto.stanford.edu/pgolle/papers/census.pdf.
---------------------------------------------------------------------------
B. Guidance Specifying the Technologies and Methodologies That Render
Protected Health Information Unusable, Unreadable, or Indecipherable to
Unauthorized Individuals
Protected health information (PHI) is rendered unusable,
unreadable, or indecipherable to unauthorized individuals only if one
or more of the following applies:
(a) Electronic PHI has been encrypted as specified in the HIPAA
Security Rule by ``the use of an algorithmic process to transform data
into a form in which there is a low probability of assigning meaning
without use of a confidential process or key'' \15\ and such
confidential process or key that might enable decryption has not been
breached. Encryption processes identified below have been tested by the
National Institute of Standards and Technology (NIST) and judged to
meet this standard.\16\
---------------------------------------------------------------------------
\15\ 45 CFR 164.304, definition of ``encryption.''
\16\ The NIST Computer Security Division's mission is to provide
standards and technology to protect information systems against
threats to the confidentiality of information, integrity of
information and processes, and availability of information and
services in order to build trust and confidence in Information
Technology (IT) systems. The NIST standards are the standards the
Federal government uses to protect its information systems.
---------------------------------------------------------------------------
(i) Valid encryption processes for data at rest are consistent with
NIST Special
[[Page 19010]]
Publication 800-111, Guide to Storage Encryption Technologies for End
User Devices.\17\
---------------------------------------------------------------------------
\17\ Available at https://www.csrc.nist.gov/.
---------------------------------------------------------------------------
(ii) Valid encryption processes for data in motion are those that
comply with the requirements of Federal Information Processing
Standards (FIPS) 140-2. These include, as appropriate, standards
described in NIST Special Publications 800-52, Guidelines for the
Selection and Use of Transport Layer Security (TLS) Implementations;
800-77, Guide to IPsec VPNs; or 800-113, Guide to SSL VPNs, and may
include others which are FIPS 140-2 validated.\18\
---------------------------------------------------------------------------
\18\ Available at https://www.csrc.nist.gov/.
---------------------------------------------------------------------------
(b) The media on which the PHI is stored or recorded has been
destroyed in one of the following ways:
(i) Paper, film, or other hard copy media have been shredded or
destroyed such that the PHI cannot be read or otherwise cannot be
reconstructed.
(ii) Electronic media have been cleared, purged, or destroyed
consistent with NIST Special Publication 800-88, Guidelines for Media
Sanitization,\19\ such that the PHI cannot be retrieved.
---------------------------------------------------------------------------
\19\ Available at https://www.csrc.nist.gov/.
---------------------------------------------------------------------------
III. Solicitation of Comments
A. Guidance Specifying the Technologies and Methodologies That Render
Protected Health Information Unusable, Unreadable, or Indecipherable to
Unauthorized Individuals
The Department is seeking comments on its guidance regarding the
technologies and methodologies that render PHI unusable, unreadable, or
indecipherable to unauthorized individuals for purposes of section
13402(h)(2) of the Act. In particular, the Department is interested in
receiving comments on the following:
1. Are there particular electronic media configurations that may
render PHI unusable, unreadable, or indecipherable to unauthorized
individuals, such as a fingerprint protected Universal Serial Bus (USB)
drive, which are not sufficiently covered by the above and to which
guidance should be specifically addressed?
2. With respect to paper PHI, are there additional methods the
Department should consider for rendering the information unusable,
unreadable, or indecipherable to unauthorized individuals?
3. Are there other methods generally the Department should consider
for rendering PHI unusable, unreadable, or indecipherable to
unauthorized individuals?
4. Are there circumstances under which the methods discussed above
would fail to render information unusable, unreadable, or
indecipherable to unauthorized individuals?
5. Does the risk of re-identification of a limited data set warrant
its exclusion from the list of technologies and methodologies that
render PHI unusable, unreadable, or indecipherable to unauthorized
individuals? Can risk of re-identification be alleviated such that the
creation of a limited data set could be added to this guidance?
6. In the event of a breach of protected health information in
limited data set form, are there any administrative or legal concerns
about the ability to comply with the breach notification requirements?
7. Should future guidance specify which off-the-shelf products, if
any, meet the encryption standards identified in this guidance?
B. Breach Notification Provisions Generally
In addition to public comment on the guidance, the Department also
requests comments concerning any other areas or issues pertinent to the
development of its interim final regulations for breach notification.
In particular, the Department is interested in comment in the following
areas:
1. Based on experience in complying with state breach notification
laws, are there any potential areas of conflict or other issues the
Department should consider in promulgating the federal breach
notification requirements?
2. Given current obligations under state breach notification laws,
do covered entities or business associates anticipate having to send
multiple notices to an individual upon discovery of a single breach?
Are there circumstances in which the required federal notice would not
also satisfy any notice obligations under the state law?
3. Considering the methodologies discussed in the guidance, are
there any circumstances in which a covered entity or business associate
would still be required to notify individuals under state laws of a
breach of information that has been rendered secured based on federal
requirements?
4. The Act's definition of ``breach'' provides for a variety of
exceptions. To what particular types of circumstances do entities
anticipate these exceptions applying?
Dated: April 22, 2009.
Charles E. Johnson,
Acting Secretary.
[FR Doc. E9-9512 Filed 4-22-09; 4:15 pm]
BILLING CODE 4150-03-P