HIPAA and Cloud Computing
October 18, 2018
On October 7, 2016, HHS released a guidance on HIPAA and cloud computing.¹ As the use of cloud computing continues to grow, it is important for HIPAA covered entities and their Cloud Service Providers (CSPs) to understand how they can use cloud computing while still following HIPAA rules and regulations put in place to protect ePHI.
What is cloud computing?
Cloud computing is defined by IBM as “the delivery of on-demand computing resources—everything from applications to data centers—over the Internet on a pay-for-use basis.”² Many of the applications we use every day are cloud computing services. For example, Google Drive, iCloud, Dropbox, and Netflix all use the cloud.
How can cloud computing be used?
Some common uses of cloud computing are:
- Storing and retrieving files
- Disaster recovery
- Unlimited backup space
Can cloud computing be used by HIPAA covered entities/business associates?
HHS has determined that HIPAA covered entities and business associates are permitted to use cloud computing to store and process ePHI as long as they have a Business Associate Agreement (BAA) with the CSP. This agreement would make the CSP responsible for safeguarding ePHI in compliance with the HIPAA Security Rule.
Even if the CSP is only used for storing encrypted data with no access to the decryption key, the CSP is still a business associate because it is receiving and maintaining ePHI for a covered entity or business associate. Encryption does not completely protect ePHI. For example, the information is still vulnerable to natural disasters or malware attacks. It is up to the CSPs to protect this information because they are storing it.
Relationship between Cloud Service Providers and HIPAA covered entity
While there is a conduit exception in which a business like the postal service or phone service provider would not be considered a business associate that has to comply with HIPAA, this exception does not apply to CSPs. This exception is for services that only transmit PHI and CSPs store PHI.
A CSP is considered a business associate of the covered entity whose ePHI it creates, receives, maintains or transmits. Thus, a CSP and the HIPAA covered entity are to enter a BAA. CSPs are then responsible under the Security Rule for protecting ePHI by implementing controls that limit access to the information. Additionally, HHS Office for Civil Rights (OCR) states that the BAA must include provisions requiring the CSP to make PHI available as necessary to the HIPAA covered entity.
Like any other business associate, CSPs need to alert the HIPAA covered entity of any security incident involving their PHI. Business associates must also respond to the security incident and attempt to fix it to the best of their ability. OCR states “a business associate CSP must implement policies and procedures to address and document security incidents, and must report security incidents to its covered entity or business associate customer.”¹ Use the BAA to specify the level of detail, such as how soon a breach must be reported to the covered entity. Though, it is not up to the CSP alone to protect PHI. CSPs as business associates and covered entities share the responsibility of protecting PHI.
What we recommend for a Security Plan for cloud computing:
Putting ePHI in the hands of a 3rd party requires careful selection of which CSP you want to choose. HHS does not endorse or recommend specific products. However, we suggest you complete these 6 HIPAA compliance tasks before selecting the right CSP for your organization.
- Risk Assessment: Does your provider meets all of your HIPAA protocols?
- Business Associate Agreements: Does the cloud provider understand the need to backup data, protect the integrity of the information and have it available 24/7.
- Encryption Standards: What standard do they use? Your provider should use a minimum of 128-bit encryption and encrypt all files in transit, storage and at rest.
- Logging: Can your CSP produce a log of who accessed what files when?
- Access Levels: Can your provider allow you to designate access levels for information?
- Audit Report: Can your CSP produce an annual HIPAA audit report conducted by a reputable third party that you can review?
BAAs and requirements
HHS states that using a CSP to maintain ePHI without first signing a BAA is in violation of HIPAA. Since CSPs either receive, maintain, or transmit ePHI on behalf of a covered entity or business associate, they are considered a business associate or a business associate subcontractor and it is your responsibility to be sure the CSP is in compliance with HIPAA. The CSP must either come into compliance with HIPAA Rules or securely return the ePHI to the customer if requested.
“Privacy Rule states that a BAA must require a business associate to return or destroy all ePHI at the termination of the agreement.” Since the CSP is not required to maintain the data beyond the time specified in their agreement the covered entity is responsible to offload any data needed before the agreement terminates.
HIPAA does not require a business associate CSP to provide documentation of its security practices, but the CSP is directly liable for failing to safeguard ePHI in accordance with the Security Rule. However, customers can require documentation of safeguards through the BAA. The business associate CSP is responsible for implementing reasonable and appropriate controls to protect the ePHI it maintains.
Additionally, if a CSP experiences a security problem with the covered entity’s or business associate’s ePHI, the CSP is responsible for reporting this security incident to the covered entity or business associate. If a business associate discovers a breach, they must provide notification without unreasonable delay and not later than 60 days after discovery of the breach. A business associate CSP must have policies and procedures in place to address, document, and report security concerns.
HIPAA rules do allow covered entities and business associates to use a CSP from outside the US as long as a BAA is entered with the business associate CSP. However, outsourcing these services abroad often include increased risks to the ePHI. When covered entities and business associates complete their risk analysis, these security risks should be taken into consideration.
Access to the cloud
HHS has permitted health care providers, business associates, and covered entities to access ePHI through the cloud on mobile devices. As long as safeguards are put in place, both on the mobile device and the cloud, to protect the ePHI. For mobile device access, BAAs should also be in place with third party providers for the device as well as for the cloud services.
It is also required that business associate CSPs always make the information available to the covered entity or business associate whose ePHI they maintain even in the event of a disaster situation.
One exception: de-identified information
“A CSP is not a business associate if it receives and maintains (e.g., to process and/or store) only information de-identified following the processes required by the Privacy Rule.” HHS provides guidance for de-identification of PHI in accordance with the HIPAA Rule here.
Cloud computing is a cost-effective solution for storing and securing ePHI. The use of cloud storage is continuing to grow in businesses that control or generate PHI. So, it is important to understand how to safely use these third party CSPs for storage of ePHI. If used properly, cloud storage can be a huge advantage for your organization by saving you time and money.
The main take away from this guidance by HHS is to make sure there is a BAA in place to protect ePHI before storing data with a CSP. When entering into a BAA with a CSP, include agreements on reporting, access, and rules for maintaining ePHI. As the use of cloud services continues to grow, understanding the relationship between the covered entity or business associate and the CSP is extremely important to the protection of ePHI.
Sign up for Our Blog
September 30, 2019
HIPAA compliant cloud backup is a must for all businesses that store sensitive data, like PHI (Protected Health Information). It is a storage strategy that makes an identical copy of… Read More ›Read More
September 11, 2019
This post aims to answer all of your HIPAA compliance questions. If you’re just learning about HIPAA compliance, or beginning the process of becoming HIPAA compliant, this article will guide… Read More ›Read More