Review this exciting guide to some of the recent content additions to Practical Guidance, designed to help you find the tools and insights you need to work more efficiently and effectively. Practical Guidance...
By: Romaine Marshall and Jennifer Bauer , Polsinelli PC This article addresses the broad scope of artificial intelligence (AI) laws in the United States that focus on mitigating risk, and discusses the...
By: Bijan Ghom , Saxton & Stump This article addresses existing deepfake technology and covers topics such as the available platforms to both create and detect deepfakes and the best practices for...
By: Ellen M. Taylor , SLOAN SAKAI YEUNG & WONG LLP THIS ARTICLE ADDRESSES THE BROAD SCOPE OF artificial intelligence (AI) laws in the United States that focus on mitigating risk. AI-driven employment...
By: Jessica Bishop and Sarah Stothart , GOODMANS LLP This checklist provides an overview of key legal considerations attorneys should review when advising clients on negotiating and drafting contracts...
Copyright © 2025 LexisNexis and/or its Licensors.
By: Amy M. Gordon, Ann Killilea, Michael G. Morgan, Susan M. Nash, and Angela M. Stockbridge, McDermott Will & Emery LLP.
The U.S. Department of Health and Human Services (HHS) recently issued guidance under the Health Insurance Portability and Accountability Act (HIPAA) on what covered entities and business associates can do to prevent and recover from ransomware attacks. Ransomware attacks can also trigger concerns under state data breach notification laws. This article provides guidance on what to do if you or your client are subject to a ransomware attack.
Ransomware is a type of malicious software (malware). It is deployed on devices and systems through spam, phishing messages, websites, and e-mail attachments, or it can be directly installed by an attacker who has hacked into a system. In many instances, when a user clicks on the malicious link or opens the attachment, it infects the user’s data. Ransomware attempts to deny access to a user’s data, usually by encrypting the data with a key known only to the hacker who deployed the malware. After the user’s data is encrypted, the ransomware attacker directs the user to pay a ransom in order to receive a decryption key. However, the attacker may also deploy ransomware that destroys or impermissibly transfers information from an information system to a remote location controlled by the attacker. Paying the ransom may result in the attacker providing the key necessary to decrypt the information, but it is not guaranteed. In 2016, at least four hospitals reported attacks by ransomware, but additional attacks are believed to have gone unreported.
The HIPAA Security Rule requires covered entities and business associates to implement security measures. It also requires covered entities and business associates to conduct an accurate and thorough risk analysis of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information (ePHI) the entities create, receive, maintain, or transmit and to implement security measures sufficient to reduce those identified risks and vulnerabilities to a reasonable and appropriate level. The HIPAA Security Rule establishes a floor for the security of ePHI, although additional and/or more stringent security measures are certainly permissible and may be required under state law. Compliance with HIPAA’s existing requirements provides covered entities and business associates with guidance on how to prevent and address breaches that compromise protected health information. The new HIPAA guidance specific to ransomware reinforces how the existing requirements can help an entity protect sensitive information.
HHS has suggested that covered entities and business associates frequently back up their documents because ransomware denies access to the covered entity’s and business associates’ data. Maintaining frequent backups and ensuring the ability to recover data from a separate backup source is crucial to recovering from a ransomware attack. Test restorations should be conducted periodically to verify the integrity of backed-up data and provide confidence in an organization’s data restoration capabilities. Because some ransomware variants have been known to remove or otherwise disrupt online backups, entities should consider maintaining backups offline and inaccessible from their networks.
Covered entities and business associates should also install malicious software protections and educate their workforce members on data security practices that can reduce the risk of ransomware, including how to detect malware-type e-mails, the importance of avoiding suspicious websites, and the need to comply with sound password policies.
Lastly, each covered entity or business associate should ensure that its incident response plan addresses ransomware incidents. Many entities have crafted their policies and incident response plans to focus on other more typical daily personal information risks, such as a lost laptop or personal device. A ransomware event should expressly trigger the activities required by the incident response plan, including the requirement to activate the response team, initiate the required investigation, identify appropriate remediation, determine legal and regulatory notification obligations, and conduct postevent review.
Indicators of a ransomware attack could include:
A covered entity or business associate that is subject to a ransomware attack may find it necessary to activate its contingency or business continuity plans. Once the contingency or business continuity plan is activated, an entity will be able to continue its day-to-day business operations while continuing to respond to, and recover from, a ransomware attack. The entity’s robust security incident procedures for responding to a ransomware attack should include the following processes to:
Additionally, it is recommended that an entity infected with ransomware consult, early on, with legal counsel who can assist with reporting the incident, to the extent it is a criminal matter, to law enforcement. Such counsel frequently have ongoing contacts within the cybercrime units of the Federal Bureau of Investigation (FBI) or the U.S. Secret Service that may deploy appropriate resources to address the matter and to supply helpful information. These agencies work with federal, state, local, and international partners to pursue cyber criminals globally and assist victims of cybercrime. Counsel can advise on the type of information appropriate to disclose to law enforcement, while taking steps to establish and maintain the attorney-client privilege and, if appropriate, the attorney work product protection. Counsel can also assist in preparing communications (e.g., mandatory notifications and reports to senior executives and boards), advise on potential legal exposure from the incident, and provide representation in connection with government inquiries or litigation.
Not necessarily. Whether or not the presence of ransomware would be a breach under the HIPAA Privacy Rule or HIPAA Security Rule (the HIPAA Rules) is a fact-specific determination. A breach under the HIPAA Rules is defined as, “the acquisition, access, use or disclosure of PHI in a manner not permitted under the [HIPAA Privacy Rule] which compromises the security or privacy of the PHI.” A covered entity or business associate should, however, perform a risk assessment after experiencing a ransomware incident to determine if a reportable breach has occurred and to determine the appropriate mitigating action.
If the ePHI was encrypted prior to the incident in accordance with the HHS guidance, there may not be a breach if the encryption that was in place rendered the affected PHI unreadable, unusable, and indecipherable to the unauthorized person or people. If, however, the ePHI is encrypted by the ransomware attack, a breach has occurred because the ePHI encrypted by the ransomware was acquired (i.e., unauthorized individuals have taken possession or control of the information), and thus is a disclosure not permitted under the HIPAA Privacy Rule.
Thus, in order to determine if the information was acquired and accessed in the incident, additional analysis will be required. Unless the covered entity or business associate can demonstrate that there is a “[l]ow probability that the PHI has been compromised,” based on the factors set forth in the HIPAA breach notification rule, a breach of PHI is presumed to have occurred. If a breach has occurred, the entity must comply with the applicable breach notification provisions under HIPAA and, if applicable, state law.
Possibly. In a majority of states, data breach notification requirements are triggered when there is both unauthorized access to and acquisition of personally identifiable information. Whether a ransomware event meets the access and acquisition elements of these statutes is, as in the HIPAA analysis, a factspecific determination. If, for example, the hackers were able to move the personally identifiable information from the entity’s network to their own, it is clear that the hackers achieved unauthorized access to and acquisition of the information. State data breach notification laws pertaining to the affected individuals would need to be analyzed and factored into the entity’s overall notification requirements.
Ransomware, though, is usually designed to extort money from victim entities rather than to steal personally identifiable information. If the forensics team can present credible evidence that no personally identifiable information was acquired by the hackers, then these obligations may not be triggered. The forensics team, consistent with the incident response team requirements, should document findings that support a defensible decision under these statutes, in case of a subsequent regulatory investigation or litigation, not to notify affected individuals.
In a minority of states, the data breach notification requirements are triggered when there is simply unauthorized access to personally identifiable information. This lower standard may mean that the entity must notify its customers of a data breach even when no personally identifiable information is acquired by a hacker. Entities that maintain personally identifiable information of residents of Connecticut, New Jersey, and Puerto Rico, for example, may find themselves in the unfortunate position of having to provide data breach notifications even when the information is not acquired by a hacker.
Finally, if the entity is providing services to a business customer, it will need to determine whether it is obligated to notify the business customer (as owner of the affected personal information) of the ransomware attack, taking into account state data breach notification requirements, contractual obligations to notify the business customer, and the overall value of the commercial relationship.
Amy M. Gordon (agordon@mwe.com) is a partner at McDermott Will & Emery LLP focusing her practice on welfare benefits compliance. Ann Killilea (akillilea@mwe.com) is counsel at the firm concentrating her practice on privacy and data protection and corporate commercial matters. Michael G. Morgan (mmorgan@ mwe.com) is a partner at the firm and a leader of the Global Privacy and Cybersecurity practice. Susan M. Nash (snash@mwe.com) is a partner at the firm practicing in the areas of health care reform and health and welfare benefit plans. Angela M. Stockbridge is an associate at the firm concentrating her practice on employee benefits matters.
RESEARCH PATH: Intellectual Property & Technology > Privacy & Data Security > Planning for and Managing a Data Breach > Articles > Preparing a Data Breach Avoidance Plan
For a comprehensive discussion on preparing for and responding to a data breach, see
> PLANNING FOR & MANAGING A DATA BREACH
RESEARCH PATH: Intellectual Property & Technology > Privacy and Data Security > Planning for & Managing a Data Breach > Practice Notes > Planning for & Managing a Data Breach
For assistance in preparing a data breach notification letter, see
> PREPARING A BREACH NOTIFICATION LETTER
For a list of the individual data breach security statutes by state, see
> CHART – KEY REQUIREMENTS OF STATE DATA BREACH LAWS: PROTECTED PERSONAL INFORMATION, NOTICE TO STATE AGENCIES AND/OR CREDIT REPORTING AGENCIES, AND SUBSTITUTE NOTICE
RESEARCH PATH: Intellectual Property & Technology > Privacy and Data Security > Planning for & Managing a Data Breach > Practice Notes > State Data Breach Notification Laws
For drafting advice on preparing a breach notification letter, see
> SAMPLE BREACH NOTIFICATION LETTER
RESEARCH PATH: Intellectual Property & Technology > Privacy & Data Security > Planning for and Managing a Data Breach > Forms > Planning for and Managing a Data Breach
For more information and assistance in creating a data breach avoidance and response plan, see
> CHECKLIST – PREPARING A DATA BREACH AVOIDANCE & RESPONSE PLAN
Pratt’s Privacy & Cybersecurity Law Report Volume 2, Number 9. Copyright © 2016. Matthew Bender & Company, Inc., a member of the RELX Group. All rights reserved. Materials reproduced from Pratt’s Privacy and Cybersecurity Law Report with permission of Matthew Bender & Company, Inc. No part of this document may be copied, photocopied, reproduced, translated or reduced to any electronic medium or machine readable form, in whole in in part, without prior written consent of Matthew Bender & Company, Inc.