PWC Data Security Report - Healthcare
PWC Data Security Report - Healthcare
June 2013
as the Quality and Outcomes Framework, in 2004.5 And healthcare payers in other
countries, including the Philippines, Vietnam, Rwanda, Tanzania and Zambia, are
experimenting with their own variants.6
The shift from the traditional fee-for-service model to value-based purchasing has
huge implications for the healthcare industry. All providers will have to capture,
measure and report on vast quantities of outcomes data. Providers and payers
are also likely to become more integrated, with the development of bundled
reimbursement packages for specific conditions.
A second key change will reinforce this trend towards closer collaboration. Its
commonly recognised that pooling and mining massive amounts of data can
generate insights that cant be gleaned from analysing many smaller, separate data
sets. But unleashing the potential of big data entails sharing more information
more widely, both inside and outside the industry.
Disruptive devices
The healthcare sector is simultaneously becoming more digitised, as electronic
medical record systems replace the paper-based systems of old and disruptive
technologies such as the smartphone offer new ways of engaging with patients. By
2017, the number of handheld mobile devices in use is expected to top 8.6 billion.7
And the newest models can be configured to interface directly with a patients
medical record.
Digitally enfranchised patients can also draw on more than 10,000 fitness and
healthcare apps in the iTunes store, including exercise, dieting and diabetes apps,
blood pressure and heart rate monitors, and sleep and mood trackers. In fact,
several companies have even developed peripherals that can be plugged into a
smartphone to perform eye checks and electrocardiograms, although theyre not
yet available to the public at large.8
So more and more sophisticated mechanisms for capturing health data are
rapidly reaching the market, but many of them are unregulated. Very few health
apps are currently classified as medical devices requiring regulatory oversight,
for example, although that may soon change.9 And since most mobile devices are
more vulnerable than computers used over a home network, theyre creating new
security risks.
Take the case of wirelessly implanted defibrillators for controlling the heartbeat.
In the right hands, these are valuable medical aids. But researchers have
demonstrated that its possible to glean personal information by eavesdropping on
the signals these implants emit. Indeed, they can even be reprogrammed to deliver
a fatal jolt of electricity.10
Nor is it just the patient whos in danger. When a device interfaces directly with a
patients medical record, it exposes that record to viruses. And a virus can spread
from one record to another, until its corrupted a healthcare providers entire
electronic medical record system.
New technologies such as cloud computing are compounding the challenge. Clouds
have a vital role to play in healthcare as a cost-effective means of storing, sharing
and analysing big data. Medical researchers are, for example, using the Amazon
cloud to crunch 200 terabytes of genetic data in search of new cures.11 But cloud
computing also brings new risks and data breaches head the list, according to the
Cloud Security Alliance.12
In short, the health ecosystem is becoming increasingly interconnected,
interdependent and integrated (see Figure 1). And thats a mixed blessing. On the
one hand, its paving the way for a much deeper understanding of disease and
the development of new treatments. On the other, its exposing all healthcare
providers, payers, patients and researchers to more cyber threats.
Physicians
practices
Social
media
sites
Hospitals
Patients
Genetic
testing
companies
Labs
Medical
research
centres
Healthcare
payers
Source: PwC
Putting data security on the top table
Moreover, recent research suggests that the industry is ill prepared to manage
them. A year-long study conducted by The Washington Post revealed so many
problems that one data security expert remarked: If our financial industry
regarded security the way the healthcare sector does, I would stuff my cash in a
mattress under my bed.13
Crackdown on compliance
Yet the healthcare sector like the financial services sector has to fulfil some
exacting regulatory requirements. And the rules governing the protection of
personal data are steadily getting tougher.
In January 2013, the US Department of Health and Social Security (HSS)
published a long-awaited modification of the Health Insurance Portability and
Accountability (HIPAA) Act of 1996. The Final HIPAA Rule, as its known, codifies
many of the interim requirements laid down under the Health Information
Technology for Economic and Clinical Health Act of 2009 and has some
significant implications.
Among other things, the new rule extends the privacy and security requirements
of HIPAA from covered entities to their business associates and subcontractors,
and increases the penalties for any violations. It also imposes new restrictions on
what covered entities can disclose, either for marketing and fundraising purposes
or for underwriting purposes.14
In addition, the rule gives patients several new rights, including the right to get
electronic access to their own records within 30 days of requesting it, and the
right to be notified of any suspected breaches affecting those records within 60
days of the breach being discovered. Lastly, it creates a new presumption that any
impermissible use or disclosure of protected health information is a reportable
breach, unless the organisation concerned can show there is little chance the data
has been compromised.15
Meanwhile, the member states of the European Union (EU) already have the
most extensive data protection laws in the world, and the European Commission
is currently revising them. In January 2012, it unveiled plans for a comprehensive
overhaul of the existing regulations, both to take account of technological
advances and to harmonise practice within all the member states.
The proposed reforms include creating a single set of rules, valid throughout the
EU, and making each national data protection authority a one-stop shop with
supervisory powers over any business operating in any member state. A company
will only have to report to the authority in the EU country where its based,
instead of having to inform the authorities in every country in which it trades (as
is now the case). But all serious breaches must be reported within 24 hours.16
Moreover, all EU citizens will be able to instigate a complaint through their own
national authorities, regardless of where a company is located or the data is
processed. They will also be able to get personal data deleted, if there are no good
grounds for keeping it. And any violation of the rules will attract a fine of up to 1
million or 2% of a companys global annual turnover.17
The new framework has yet to be approved by the relevant bodies, so its unlikely
to come into force before 2015. And, given the opposition from various quarters,
it may well be modified.18 But the fact that its a regulation as opposed to a
directive means it will be directly applicable to all EU member states without
requiring national legislation to implement it.19
Data protection is also rising up the agenda in Asia and Latin America. India,
Malaysia, South Korea and Taiwan recently passed new cyber security laws. And
the Chinese Ministry of Industry and Information Technology has published a
draft national standard, although whether Beijing plans to enshrine it in law isnt
yet clear.20
Eleven countries in Latin America have likewise enacted data privacy legislation.
These laws vary significantly from one country to another, but they all require
registration with a national data protection authority and impose cross-border
restrictions.21 So the safeguarding of personal data is becoming a hot topic
almost everywhere, and the penalties for leaking it are getting more punitive.
Impact of breaches to the business
Legal issues arent the only concern, though. The business risks are equally
important. In one recent survey of 80 US healthcare providers, the average
economic impact of a data breach was put at $2.4 million an increase of
$400,000 since 2010. Worse still, 39% of those that had experienced medical
identify theft said it resulted in inaccuracies in the patients medical record, while
26% said it affected the patients medical treatment. And 21% thought their
employee records were also at risk.22
Figure 2: Good cyber security helps a business get bigger and better
Improve efficiency
Combat threats
Protect sensitive information
Govern solutions
Control access
Source: PwC
form new partnerships to make the most of the data it holds, be they partnerships
with pharmaceutical researchers to develop new medicines, partnerships with
healthcare providers to develop better treatment protocols or partnerships with
health insurers to get a better understanding of costs. The ability to manage and
share sensitive data safely isnt simply a legal requirement, then; its a source of
competitive advantage.
Inadequate budgets and other roadblocks
So whats stopping many healthcare providers and payers from making their data
more secure? Insufficient funding is one major obstacle. More than half of the
healthcare IT managers whom weve surveyed say their budgets are too small (see
Figure 3).28 Other evidence bears them out. Total IT spending as a percentage of
revenues or gross output is just 3.8% in the healthcare sector, compared with 7.3% in
financial services and 4.5% in education and social services.29
Figure 3: Lack of money, expertise and leadership are the biggest problems
2012
Insufficient capital expenditure
27%
26%
24%
20%
19%
LeadershipCIO or equivalent
10%
10%
Source: PwC
Putting data security on the top table
The next step is to make sure the board is onside with the data security strategy
and, here, the internal compliance and assurance department can be a very useful
ally. The compliance team can help to get data protection on the management
agenda by reinforcing the CIOs arguments and explaining why requests for more
money are fuelled by legitimate concerns, not the desire for new gadgets.
Cyber security isnt just the boards concern, though; its everybodys business.
That means its vital to communicate the importance of preserving confidential
data to every employee in the organisation and show them how they can help.
Its also imperative to test and audit an organisations systems regularly, both
to measure how secure they are and to assess the impact of any attacks. In fact,
we recommend completing a full audit at least once a year. The worst risks
arent the ones a company knows about, theyre the ones it doesnt even know it
doesnt know about. And some breaches are so subtle that nobody realises theyre
happening, cautions one healthcare CIO.
Lastly, its advisable for any company with a global footprint to adopt the data
security standards of the country with the strictest regulations. That way, it can
be assured of meeting the required standards wherever it operates. And, where it
exceeds the standards, its efforts certainly wont be wasted; it will simply be in a
stronger position to capitalise on the benefits really robust data protection brings.
How to be an information
security leader
1. Assess your current IT systems
for strengths and weaknesses.
2. Prioritise the risks, focusing on
the data thats most valuable.
3. Assess your employee user
access policy.
4. Have a clear patch management
policy that ensures seamless
implementation.
5. Engage your board of directors
as partners to help secure
appropriate funding and
resources.
6. Communicate your data
security policy to all employees
and stakeholders.
7. Audit your IT systems at least
once a year.
One obvious benefit is a reputation for taking data protection seriously; patients
want to know their private details will stay private. But the ability to move fast,
partner speedily and effectively with other participants in the health ecosystem
and pre-empt the competition are also major strategic advantages. So, when it
comes to cyber security, the right thing is also the smart thing.
Notes
PwC, Dealing with disruption: How
healthcare CEOs are creating resilient
organisations (February 2013).
10
11
15
Ibid.
17
Ibid.
20
21
22
23
24
25
26
28
Ibid.
Contacts:
Australia
Klaus Boehncke
+61 2 8266 0626
[email protected]
Japan
Yasushi Tabuchi
+81 80 3710 4138
[email protected]
United States
Daniel Garrett
+1 267 330 8202
[email protected]
Canada
William Falk
+1 416 687 8486
[email protected]
Mexico
Jos Alarcn
+52 55 5263 6028
[email protected]
Peter Harries
+1 213 356 6760
[email protected]
China/HK
Mark Gilbraith
+86 21 2323 2898
[email protected]
Netherlands
Otto Vermeulen
+31 (0) 887926374
[email protected]
Germany
Robert Paffen
+49 89 5790 6025
[email protected]
Cokky Hilhorst
+31 (0) 8879 27384
[email protected]
Finland
Karita Reijonsaari
+358 (0) 9 22800
[email protected]
India
Dr. Rana Mehta
+91 124 330 6006
[email protected]
Italy
Andrea Fortuna
+2 66 720 547
[email protected]
Sweden
Jon Arwidson
+46 (0) 10 213 3102
[email protected]
Switzerland
Axel Timm
+41 (0) 58 792 2722
[email protected]
James H. Koenig
+1 267 330 1537
[email protected]
Nalneesh Gaur
+1 214 649 1261
[email protected]
Mick Coady
+1 713 356 4366
[email protected]
United Kingdom
Sunil Patel
+44 (0) 207 212 3484
[email protected]
South Africa
Diederik Fouche
+27 11 797 4291
[email protected]
2013 PwC. All rights reserved. PwC refers to the network of member firms of PricewaterhouseCoopers International Limited (PwCIL), or, as the context requires,
individual member firms of the PwC network. Each member firm is a separate legal entity and does not act as agent of PwCIL or any other member firm. PwCIL
does not provide any services to clients. PwCIL is not responsible or liable for the acts or omissions of any of its member firms nor can it control the exercise of their
professional judgment or bind them in any way. No member firm is responsible or liable for the acts or omissions of any other member firm nor can it control the
exercise of another member firms professional judgment or bind another member firm or PwCIL in any way. NY-13-0708