The Office of Civil Rights Issues Demanding HIPAA Guidance to Cloud Services Providers
Client Alert | 7 min read | 10.11.16
Last week, the HHS Office of Civil Rights (OCR) released its long-awaited “Guidance on HIPAA & Cloud Computing” (Guidance). Using 11 questions and comprehensive responses, the Guidance details OCR’s position on the obligations of covered entities and business associates who use cloud services providers (CSPs) to manage their electronic protected health information (ePHI). There are three important takeaways from the Guidance: (1) CSPs are presumably business associates with very limited exceptions even if they only handle encrypted data, (2) OCR continues to emphasize the importance of tailored security risk assessments in its enforcement efforts, and (3) OCR is increasing its scrutiny of contractual agreements involving ePHI in its enforcement efforts.
The Guidance Confirms the General Presumption That CSPs are Business Associates
Unsurprisingly, the Guidance confirms that OCR views the obligations of CSPs who create, receive, maintain, or transmit ePHI very broadly. There is no doubt that CSPs who engage in such activities for covered entities or business associates are themselves business associates under HIPAA. Even where a CSP receives or maintains only encrypted ePHI and does not have the decryption key to view the information, OCR asserts that the CSP is a business associate, albeit one that is providing “no-view services.” Furthermore, OCR asserts that CSPs that create receive, maintain, or transmit ePHI are business associates when they are a subcontractor to a business associate.
Conversely, the Guidance also describes two narrow circumstances under which CSPs are not business associates: (1) where they serve only as conduits to covered entities or business associates, or (2) where they only receive and maintain information that has been de-identified in accordance with the HIPAA Privacy Rule. OCR further clarified that CSPs that provide “no view services” cannot rely on the conduit exception unless they only provide ePHI transmission services to a covered entity or business associate and there is only incidental and temporary, not persistent, storage of any ePHI during transmission. If the CSP’s access to a covered entity’s or business associate’s ePHI is more than incident to the transmission of such ePHI, then the CSP is required to enter into a business associate agreement (BAA) with the covered entity or business associate. In addition, the Guidance confirms that a CSP cannot assert that it is not a business associate when it is performing transmission-related services for a covered entity or business associate if the CSP also provides storage or other services for that same customer.
The Guidance implicitly acknowledges that many CSPs may currently have arrangements with covered entities and business associates without a BAA in place. OCR reminds readers of OCR’s July 2016 resolution agreement and corrective action plan imposed on a covered entity that impermissibly used a CSP to store over 3,000 individuals’ ePHI without entering into a BAA. Where a CSP lacks a BAA with a covered entity or business associate, and is not aware that it is maintaining ePHI, the Guidance advises the CSP to take action to correct any non-compliance within 30 days of when it knew or should have known of the noncompliance. OCR notes that a CSP that discovers a customer’s use of the CSP’s resources to create, receive, maintain, or transmit ePHI without a BAA may have an affirmative defense against a HIPAA violation if: (1) the CSP takes quick action to get in compliance with HIPAA, or (2) the CSP returns the ePHI to the customer within 30 days (or destroys the ePHI with the customer’s consent). The defense, however, does not protect CSPs who willfully neglect their obligations under HIPAA. Thus, other than where the defense would apply, the Guidance reinforces the CSP’s obligation to proactively evaluate whether ePHI is being stored or maintained in its cloud programs and platforms.
The Guidance Reiterates OCR’s Emphasis on Comprehensive Security Risk Assessments and Risk Mitigation
Based on the above, OCR would deem most CSPs to be business associates that must have BAAs with a covered entity or a business associate customer for which the CSP creates, receives maintains, or transmits ePHI. Furthermore, the BAA, and any contracts such as Service Level Agreements (SLA), must be tailored to address the security risks unique to the relationship between the customer and the CSP. This security risk analysis must “identify and assess potential threats and vulnerabilities to the confidentiality, integrity, and availability of all ePHI they create, receive maintain or transmit.” Thus, for example, if a CSP stores a covered entity’s ePHI on servers outside of the United States, the CSP and the covered entity customer may need to take any increased risks associated with that remote storage into account in their respective security risk analyses. The Guidance also briefly addresses the administrative, physical and technical safeguards that parties using mobile devices to access or store ePHI, including third party service providers, must consider in their risk analyses.
Of note, the Guidance confirms that CSPs cannot rely solely on encryption to fulfill their responsibilities under the Security Rule. Though encryption to the level specified in the HIPAA Breach Notification Rule may provide a safe harbor from breach notification obligations, OCR maintains that encryption does not address many of the other Security Rule requirements that apply regardless of whether the data is encrypted. For example, encrypting data does not address how the CSP will maintain the integrity of ePHI, such as how to manage the risks from malware, or how to ensure the availability of ePHI through contingency planning for emergency or disaster situations. Encryption also does not address “administrative safeguards to analyze potential risks to the ePHI or physical safeguards for systems and services that may house the ePHI.”
Despite these strong statements regarding the limited protection that encryption provides with respect to Security Rule obligations, the Guidance does allow for the parties themselves to define the scope of their respective Security Rule-related responsibilities in a manner consistent with how ePHI is accessed and exchanged. For instance, if a CSP provides solely “no view services” to a covered entity or business associate customer, “certain Security Rule requirements that apply . . . may be satisfied for both parties through the actions of one of the parties.” Thus, although the CSP in a “no view services” arrangement may be responsible for using “reasonable and appropriate controls” to ensure that its cloud platform is encrypted, the responsibility of implementing an individual or group’s access controls to the ePHI may fall solely on the customer. Thus, OCR recognizes that “a CSP is not responsible for the compliance failures that are attributable solely to the actions or inactions of the customer.”
To address the foregoing issues, OCR strongly recommends that written contractual terms detail how all parties will address Security Rule obligations so that OCR may rely on those provisions if it subsequently investigates the parties’ compliance under HIPAA. These written provisions, however, do not need to expressly document the CSP’s actual security practices or permit a customer to audit those practices.
OCR Expects Contracts to Clearly Address the Responsibilities of CSPs, Covered Entities, and Business Associates
In line with the foregoing, the Guidance indicates more generally that OCR could review BAAs and SLAs for provisions that address the parties’ responsibilities as they relate to HIPAA concerns, such as:
- System availability and reliability.
- Back-up and data recovery.
- Responsibility for specific security controls (e.g., for accessing or authenticating ePHI).
- Limitations on use, disclosure, and retention of the ePHI (particularly in accordance with the Privacy Rule).
- How the ePHI will be returned or destroyed after ending the SLA.
CSPs should refer to the HHS Office of the National Coordinator for Health IT (ONC) EHR Contracts Untangled guidance, which we discussed in a prior alert, for sample contract terms with technology vendors that address these matters. In addition, OCR recently published an FAQ response that specifically states its view that provisions within agreements that block a covered entity or business associate’s access to its ePHI would cause all parties involved to be in violation of both the HIPAA Privacy and Security Rules.
These HHS publications, combined with the Guidance, signal OCR’s focus on enforcing not only the protections necessary to secure PHI under HIPAA, but also on ensuring that parties to a BAA fulfill their obligations to make PHI available as necessary to provide individuals with their rights to access, amend, and receive an accounting of permissible uses and disclosures of PHI.
Conclusions
The Guidance provides further warning to covered entities, business associates, and CSPs about their obligations under the HIPAA Privacy and Security Rules. But more importantly, the Guidance indicates that OCR expects the CSP contracting and negotiation process to define and delineate each party’s roles and responsibilities with respect to ePHI.
Crowell & Moring attorneys from the Health Care and Privacy & Cybersecurity Groups can assist CSPs and their health care customers to address HIPAA privacy and security risks that arise out of the transmission and storage of ePHI. Our attorneys’ past experience as employees of or at the bargaining table with ONC, OCR, the Federal Trade Commission, and other privacy and security regulatory bodies informs our comprehensive approach to creating compliant and effective agreements for all business arrangements involving the exchange of PHI – from evaluating potential storage solutions through the negotiation of SLAs, BAAs, and other contracts.
Insights
Client Alert | 8 min read | 12.20.24
End of Year Regulations on Interoperability
Federal policy efforts to advance health data exchange and interoperability are continuing to change rapidly. The latest changes are the publication of two final rules by the Assistant Secretary for Technology Policy/Office of the National Coordinator for Health Information Technology (ASTP/ONC) finalizing parts of the of the Health Data, Technology, and Interoperability (HTI-2) Proposed Rule. These rules adopt requirements regarding the Trusted Exchange Framework and Common Agreement (TEFCA) (HTI-2 Part 1), and create a new Information Blocking exception under Protecting Care Access (HTI-2 Part 2), on December 16th and 17th, respectively.
Client Alert | 4 min read | 12.19.24
Client Alert | 4 min read | 12.19.24
Key Changes to the State Attorneys General – 2024 to 2025 Transition
Client Alert | 4 min read | 12.19.24
New EU Directive Impacting Digital Platforms and Individuals Working for Them