(Editor's Note: This article has been contributed by David M. Governo, founding partner of Governo Law Firm LLC, and Corey M. Dennis, attorney at Governo Law Firm LLC.

Data privacy breaches occur daily and are estimated to cost $5.5 million per breach,[1] while the worldwide cost of cybercrime is estimated to be $388 billion annually.[2] In addition to the risk of significant financial loss, cyber attacks can ruin a company's reputation virtually overnight.

Although companies in the health care, hospitality, and retail industries are considered the prime targets of cyber attacks, companies in the insurance industry share the same risks of financial and reputational loss. In fact, a recent report found that despite increased focus on data security, approximately 40 percent of the 46 major insurance organizations have experienced data breaches in the past 12 months.[3]

The insurance industry has responded to the need for financial protection due to cyber risks by offering cyber liability insurance coverage. However, the insurance industry must recognize that it too is vulnerable to cyber attacks and subject to a myriad of data privacy laws and regulations. This article discusses the compliance obligations insurance companies face in the wake of these complex local, national, and international regulatory schemes.

The Gramm-Leach-Bliley Act

A federal law enacted in 1999 to reform the financial services industry and to address concerns relating to consumer financial privacy, The Gramm-Leach-Bliley Act established a Privacy Rule and a Safeguards Rule applicable to nonpublic consumer personal information held by any “financial institution,” which is broadly defined to include insurers, as well as insurance agents and brokers.[4] Under the Privacy Rule, these financial institutions must send their customers privacy notices describing their protections with respect to the customers' nonpublic consumer personal information, as well as “opt-out” notices before the customers' nonpublic personal information is shared with nonaffiliated third parties.[5]

The Safeguards Rule requires financial institutions to develop a written information security plan to protect the security and confidentiality of customer information.[6] Violations of the Act, which preempts weaker state laws,[7] may be enforced by the Federal Trade Commission, state insurance authorities, and other federal agencies.[8]

In 2000, the National Association of Insurance Commissioners (NAIC) adopted the Model Privacy of Consumer Financial and Health Information Regulation to implement the insurance industry privacy obligations under the Gramm-Leach-Bliley Act. The Model Regulation, which is similar to the Act, has been adopted in the vast majority of states.

HIPAA Privacy and Security Rules

The federal Health Insurance Portability and Accountability Act (HIPAA), enacted in 1996, established national health information privacy standards applicable to health care providers, health plans (including health insurance companies, HMOs, and company health plans), and health care clearinghouses holding individuals' “protected health information.”[9] The HIPAA Privacy Rule, promulgated in 2000, generally prohibits the unauthorized disclosure of protected health information.[10] Covered entities must also require by contract any “business associates” to whom they disclose protected health information (e.g., insurance brokers and agents, third party administrators of health plans, accounting firms providing services to health care providers) to appropriately safeguard the information.[11]

The HIPAA Security Rule, promulgated in 2003, requires covered entities to maintain “reasonable and appropriate” safeguards for protecting electronic health information, which must be documented in written policies and procedures.[12] The HIPAA Privacy and Security rules, violations of which may result in civil and criminal penalties, generally preempt less stringent state laws.[13]

The HITECH Act and Breach Notification Requirements

The Health Information Technology for Economic and Clinical Health (HITECH) Act was enacted in 2009 to combat the privacy and security concerns associated with the electronic transmission of health information. The Act strengthens penalties for HIPAA violations, extends HIPAA violation liability to business associates (such as insurance brokers and agents), establishes an audit program mandate, and authorizes state attorneys general to bring civil enforcement actions for HIPAA violations.[14] To implement the audit program mandate, the U.S. Department of Health and Human Services began a privacy and security audit pilot program in November 2011, and 115 audits will be conducted through December 2012.[15]

The HITECH Act's breach notification regulations require HIPAA covered entities to report data breaches affecting 500 or more individuals to the affected individuals, the U.S. Department of Health and Human Services, as well as to “prominent media outlets serving a State or jurisdiction.”[16] Breaches affecting fewer than 500 individuals must be reported to the Department annually. [17] In addition, business associates must notify covered entities of any breaches.[18]

State Data Privacy Laws

Over the past several years, 46 states have enacted laws governing data privacy and security. To comply with these laws and minimize the risk of a data breach, businesses, including those in the insurance industry, must adopt security measures to protect the personal information of both their customers and their employees.

Under the data privacy laws of California and Rhode Island, for example, businesses holding unencrypted personal information of state residents must implement “reasonable security procedures and practices,” and must require by contract third parties to whom they disclose such information to implement those safeguards.[26] Further, the laws of both states require notification to affected residents of any data security breaches “in the most expedient time possible.”[27]

The Massachusetts data privacy regulations, which became effective in March 2010, are among the most burdensome in the country. The regulations apply to every “person” or other entity, including companies both inside and outside of Massachusetts, holding personal information of Massachusetts residents.[28]

They require such entities to establish physical, administrative, and technical information security measures to safeguard personal information and to develop a “written comprehensive information security program” outlining those measures.[29] Covered entities must also require their third-party service providers (for example, payroll providers, outsourcers, contractors) to implement security measures by contract, and must ensure encryption of records containing personal information stored on portable devices or transmitted over wireless networks.[30]

In the event of a data security breach, covered entities are required to give notice to any affected Massachusetts residents, as well as to the Massachusetts Attorney General's Office and the Massachusetts Office of Consumer Affairs and Business Regulations.[31] The Massachusetts Attorney General is authorized to enforce the Massachusetts data privacy laws by bringing civil actions, which may result in substantial liability.[32]

Under Connecticut's data privacy laws, any business holding personal information must safeguard it to prevent misuse by third parties, and any business that collects Social Security numbers in the course of its business must create a “privacy protection policy” establishing safeguards for those Social Security numbers.[33] The laws also require those doing business in Connecticut to disclose any security breach involving unencrypted personal information to state residents and the state attorney general “without unreasonable delay.” [34]

In August 2010, the State of Connecticut Insurance Department issued Bulletin IC-25 regarding information security incidents, which applies to all entities regulated by the Department, including insurance producers, property and casualty insurers, life and health insurers, public adjusters, casualty claim adjusters, and pharmacy benefit plans. The Bulletin requires regulated entities to notify the Connecticut Insurance Commissioner of any information security breach of a Connecticut insured, member, subscriber, policyholder, or provider, including those involving their business associates, within five days.[35] The Departments of Insurance of several other states, including Rhode Island, Ohio, and Wisconsin, have issued similar bulletins and regulations requiring insurers to notify the state departments of insurance in the event of a data breach.[36]

The Payment Card Industry Data Security Standard (PCI-DSS), an international information security standard established by the Payment Card Industry Security Standards Council, imposes a set of security requirements on organizations that handle cardholder information for major credit and debit cards, including protecting cardholder data as well as maintaining a secure network, a vulnerability management program, and an information security policy. Several states, including Nevada, have incorporated the PCI-DSS requirements into their data security laws.[37]

International Data Privacy Laws

Insurers conducting business overseas must understand the compliance challenges posed by international data privacy laws. Significantly, the European Union Data Protection Directive (Directive 95/46/EC) represents one of the strictest data privacy frameworks in the world.[38] The Directive governs the processing of personal data and the free movement of such data and applies to all companies processing data of European residents.[39] It permits processing of personal data only under specified circumstances, such as when the data subject has given consent or it is necessary to fulfill a contract or meet another legal obligation.[40]

Under the Directive, personal data must be processed in accordance with certain data protection principles, including the requirements that it be processed fairly and lawfully; collected only for specified, explicit, and legitimate purposes; as well as adequate, relevant, and not excessive in relation to the purposes for which it is processed. Further, covered entities are required to implement appropriate technical and organizational measures to safeguard the data.[41]

The Directive prohibits the transfer of personal data to a non-EU country unless that country's level of protection is deemed adequate.[42] U.S. data privacy laws have been deemed inadequate. As a result, the U.S. Department of Commerce and the European Commission negotiated the U.S.-EU Safe Harbor Framework in 2000, under which U.S. companies are permitted to receive personal data transfers from the EU if they certify that they will comply with requirements similar to those imposed by the EU Data Protection Directive.[43] U.S. companies failing to comply with the Safe Harbor Framework have recently been subject to Federal Trade Commission enforcement actions.[44]

In light of the growing risk of cyber threats to all businesses, including insurance companies, attorney-directed data risk assessments have become critical in detecting vulnerabilities and ensuring compliance with applicable laws. It is recommended that outside counsel be retained to preserve the attorney-client privilege applicable to any reports or other communications relating to the assessment.[45] Such documents may also be protected by the work-product doctrine if they are prepared in anticipation of litigation,[46] or by the “self-critical analysis privilege,” which some courts have recognized in limited circumstances.[47]

President Obama recently declared that “the cyber threat to our nation is one of the most serious economic and national security challenges we face.”[48] While companies in the insurance industry may recognize that other businesses face these cyber liability risks, they should not disregard their own vulnerabilities and compliance obligations. Complying with the complex web of data privacy laws is challenging, but necessary to mitigate the liability and reputational damage that often results from data breaches today.

To view the accompanying footnotes, click “Next” on the right below.

Footnotes

1. See Ponemon Institute, 2011 Cost of Data Breach Study: United States

2. See Elise Ackerman, Secretary of Homeland Security: cybercrime as big a threat as Al Qaeda, Forbes QUBITs Blog (June 3, 2012). Since 2005, over 3,300 data breaches, resulting in more than 563 million comprised records, have been reported in the United States. See Privacy Rights Clearinghouse, Chronology of Data Breaches. As the reported cyber attacks “represent only a small fraction of cyber attacks carried out,” these figures may well be underestimates. See Bipartisan Policy Center, Too many cyber attacks hushed up, US panel says (July 19, 2012)

3. See Deloitte 2012 DTTL Global Financial Services Industry Security Study. The report also found that insurers are “bracing for the impact of more stringent consumer financial laws as well as the risks associated with newer technologies to meet the growing demand for virtual operations.” Id.

4. See 15 U.S.C. § 6801 et seq.; 16 C.F.R. § 313.3(k)(1).

5. See 16 C.F.R. § 313.1 et seq.

6. See 16 C.F.R. § 314.1 et seq.

7. See 15 U.S.C. § 6807; 16 C.F.R § 313.17.

8. See 15 U.S.C. § 6805. Three credit report resellers recently settled FTC charges based on their failure to reasonably protect consumers' personal information in violation of the Act, which resulted in computer hackers accessing the information. The settlements required the companies to strengthen their data security procedures and submit to audits for 20 years. See Federal Trade Commission Press Release, Credit Report Resellers Settle FTC Charges; Security Failures Allowed Hackers to Access Consumers' Personal Information (February 3, 2011),

9. See 45 C.F.R. § 160.102; 45 C.F.R. § 160.103. “Protected health information” is defined as individually identifiable health information relating to the individual's physical or mental health conditions, or the provision of or payment for health care to the individual. See 45 C.F.R. § 160.103. This includes the individual's name, address, birth date, and social security number.

10. See 45 C.F.R. § § 164.500 et seq.

11. See 45 C.F.R. § 164.502(e); 45 C.F.R. § 160.103.

12. See 45 C.F.R. § § 164.302 et seq.

13. See 45 C.F.R. § 160.203.

14. See 42 U.S.C. § 17931 et seq.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

  • All PropertyCasualty360.com news coverage, best practices, and in-depth analysis.
  • Educational webcasts, resources from industry leaders, and informative newsletters.
  • Other award-winning websites including BenefitsPRO.com and ThinkAdvisor.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.