Monday, March 16, 2009

Visa Yanks Heartland/RBS Compliance Status - BTN



Visa Yanks Heartland, RBS WorldPay Compliance Status

Bank Technology News | March 2009

By Rebecca Sausner

Visa pulled Heartland Payment Systems and RBS WorldPay from its list of PCI compliant service providers, placing the two on probation until they close the holes that led to the massive data breaches reported in January and December. Both continue to serve as processors in the Visa system.

“Heartland and RBS WorldPay are actively working on revalidation of PCI DSS compliance using a Qualified Security Assessor. Visa will consider re-listing both organizations following their submissions of their PCI DSS reports on compliance,” Visa said in a written statement.

Continue Reading at Bank Technology News

Reblog this post [with Zemanta]

HomeATM Prevents Cloned Bank Site Threat!

Major Cybercrime Busts Take Place In Romania

Major bank fraud ring broken up

By Tim Wilson - DarkReading

The Romanian police had a busy Wednesday, breaking up a major bank fraud ring and arresting another individual who is accused of breaking into major U.S. government and university servers.

According to news reports, the Romanian police, working along with the FBI, arrested 20 individuals who allegedly built cloned bank sites and then drained the accounts of users who were lured into logging in to them.


Editor's Note:  Did you know that the HomeATM SwipePIN device can be utilized as a log-in authentication device for online banking? Now you do.  More confirmation that we kick booty!  Here's why:

Instead of a bank providing the inherently weak (and what should have been obsolete years ago) username/password function, online banking customers could simply swipe their card and enter their PIN. 

Wow...an end-to-end encrypted login which would have prevented what transpired in this story.  Not only would HomeATM be able to identify that it was a cloned site, but the cloned site wouldn't be able to do ANYTHING with the E2EE 3DES DUKPT sign in data anyway.   

Suffice it to say that a cloned website wouldn't work with because we've cloned the secure process that banks use at the lobby of the bank's ATM machine.  Except we encrypt the Track 2 data as well.  So now the consumer is SwipePIN...instead of the fraudsters!   Sorry Click Jackers!


The information provided by our SwipePIN device is for non-cloned banks eye's only! Hey Bankers...the phone lines are open!  

Continuing with the story:

The cloned sites, which were deployed in Italy and Spain, looked and operated like the actual bank Websites, but they asked users questions that ultimately led to the divulging of personal bank details, according to Stefan Negrila, chief of the Romanian Police's organized crime division. Once obtained, the hackers allegedly used that information to access the real bank Websites and transfer or withdraw cash. 

Nearly 100 police officers from special troops entered suspects' houses in major cities across Romania, the reports said. Investigators said the ring stole at least 350,000 euros.

Continue DarkReading







Reblog this post [with Zemanta]

PIN Debit (20%) Closing Gap on Credit Cards (22%)

On Payments
World of Choice
Consumer Payment Preferences

By Chris Allen, Melissa Fox, Dan Hough (BAI), and Mark Riddle (BAI)

The inevitable and ongoing march from paper to electronic retail payments has become a full-on run, according to a recent consumer payment study conducted by BAI and Hitachi Consulting. Consumers are using debit cards more aggressively, particularly PIN debit, instead of cash or checks, even for small-value purchases in stores, while increasingly using electronic bill pay for recurring payments. This rise in the use of plastic and automated payment vehicles is putting greater pressure on banks to find new ways to reward and retain customers for their electronic payments. Bankers also need to find an appropriate balance managing cash and checks, as those become a smaller part of the payments mix.
Featured as the cover story of the January/February issue of Banking Strategies Magazine, this article discusses the decisive shift in consumer payment preferences from paper and cash to electronics and the implications of those changes for banks and the broader payments industry. To read the full article, click here.

Technorati Tags:


Reblog this post [with Zemanta]

Caveat Emptor: Swipe Do Not Type!


Editor's Note:  This article is rather vague but it supports my argument that e-commerce is NOT SAFE in a web browser.  Which is why HomeATM uses hardware to facilitate the transaction. 

How to tell, what to do if computer is infected (AP)  -Yahoo Tech

Computer-virus infections don't cause your machine to crash anymore.  Nowadays, the criminals behind the infections usually want your computer operating in top form so you don't know something's wrong.

That way, they can log your keystrokes and steal any passwords or credit-card numbers you enter at Web sites. 

Editor's Note:  If you Swipe vs. Type then they cannot "log your keystrokes."  


Here are some signs your computer is infected, tapped to serve as part of "botnet" armies run by criminals:

• You experience new, prolonged slowdowns. This can be a sign that a malicious program is running in the background.
• You continually get pop-up ads that you can't make go away. This is a sure sign you have "adware," and possibly more, on your machine.
• You're being directed to sites you didn't intend to visit, or your search results are coming back funky. This is another sign that hackers have gotten to your machine.

So what do you do?  Editor's Note:  The article really provide any sound advice as to what you need to do...it does, however, make suggestions for "possibly" reducing risk. That said, here's what you "don't do:"  Never, ever type your card information into a web browser.  

Which is why it's surprising/befuddling to read about "cautious acceptance" to a supposed PIN Debit solution which "instructs you" to type in your PAN (as usual using your keyboard)  Once you do that, the supposed solution will be "enabled" to decipher whether it's a card that can be used with a PIN. The question begs to be asked.  Who else might be enabled to do the same? If they can do it, so can somebody else. (maybe not right away, but sooner rather than later) 

Caveat Emptor.  By "instructing you" to type in your card information, you're being led down the wrong path from the get go


Here's why.  If you're not leery when suddenly, a "pop-up" PIN Pad appears out of nowhere...then you should be when you're informed that your computer's keyboard has just been remotely "taken over" and locked. 

Why do they do this?  Because it's NOT SAFE to type in a PIN with a keyboard...even though...moments ago, they implied it was safe, to "type in" the card number. 

Am I alone in making the determination that this makes absolutely no sense whatsoever?  What changed?  Is this not an ADMISSION that it's not safe to type in card information using a keyboard?   So now another question begs to be asked.  If their supposed solution is safe, then why would they instruct you to "type" in your PAN, as usual? 

Let's utilize some common sense and assume that since we know that keylogging and clickjacking exist, is  there not the very real likelihood that those two exisiting threats can be combined to create a new one?  Call it: "clicklogging."  Until then, hackers can always resort to screen scraping.

Now let's Add It Up.  Hardware is a NECESSITY.  Just as your cell-phone (which is hardware) requires a peripheral to charge it, whether it's the charger you plug into the wall or the charger you plug into your your car's old cigarette lighter receptacle, a peripheral is a NECESSITY.  The good thing, is that plugging in a HomeATM SwipePIN device is just as quick and easy to plug into your PC or laptop as it is to plug in a phone charger.  And there's NO SOFTWARE to download.  The SwipePIN device is truly plug and play.  Not only does it provide end-to-end encryption, but it also encrypts your cards Track 2 data.  The Black Hats hate the idea of a hardware device.  For that reason, security professionals tend to love it.         



Back to the story...  

• Having anti-virus software here is hugely helpful. For one, it can identify "known" malicious programs and disable them.  If the virus that has infected your machine isn't detected, many anti-virus vendors offer a service in which they can "remotely take over your computer" and delete the malware for a fee

Editor's Note: 
The Hacker's can "remotely take over your computer" for free...(the price you pay comes later when they empty your bank account(s).

• Some "anti-virus vendors" also offer free, online virus-scanning services.  Editor's Note:  ALL "virus vendors" offer free, online virus- infection services.  Plus, tests show that anti-virus programs don't really work that well.

• You may have to reinstall your operating system if your computer is still experiencing problems. It's a good idea even if you believe you've cleaned up the mess because malware can still be hidden on your machine. You will need to back up your files before you do this.


How do I know what information has been taken?

• It's very hard to tell what's been taken. Not every infection steals your data. Some just serve unwanted ads. Others poison your search result or steer you to Web sites you don't want to see. Others log your every keystroke. The anti-virus vendors have extensive databases about what the known infections do and don't do. Comparing the results from your virus scans to those entries will give you a good idea about what criminals may have snatched up.

Translation:  You'll know when you start buying things you didn't buy!



Sunday, March 15, 2009

Complete Listing of Everyone's PIN Number

Today's theme is Fraud from around the world.  Credit Card Fraud Doubles in Dubai...In the UK, fraud hit's record highs and here in the good ole' USA, the Chicago Tribune writes that wireless security is security-less.

From the wires...3 stories, from 3 continents, with 3 common denominators.

They say bad  things happen in threes, but when PIN's get breached, that will be a bad thing happening in 4's.

Below is a link to a list of everyone in the world's PIN number. The list is the most comprehensive one out there and not intended for criminal use!  If yours is not on the list, send  it to me and  I'll make sure it gets on.  Or enter it into a floating PIN pad and the hackers will...lol.

Click Here for the complete list.


Reblog this post [with Zemanta]

Wireless Security Does Not Have Any...

Security of wireless networks often leaves retailers, credit card firms at risk

Theft, breaches likely to increase in tough times


Motorola'sRichard Rushing walks Michigan Avenue on Feb. 2, checking the securityof wireless access points at surrounding stores. (Tribune photo by Nancy Stone / February 2, 2009)
RichardRushing has walked the Champs-Elysees in Paris and strolled anunderground mall in Seoul. But he's not a shopper. He's a wirelesssecurity expert who scans the airwaves in busy retail areas to studyhow stores are protecting your data.

"Retailers have always taken security very seriously," said Rushing,senior director of information security for mobile devices at Motorola Inc., noting the common use of security cameras and guards.

"But they're not looking at the airwaves to see what's leaking out oftheir stores wirelessly. You don't need the merchandise if you cansteal a credit card number and buy a gift card," Rushing said.

Most consumers don't think about what happens to their credit cardinformation when they swipe their plastic at the cash register. Thereality is that large retailers have wireless networks that connectcash registers, bar code scanners and store computers. Those networkscan be vulnerable to breaches by hackers or thieves.

In some high-profile cases, thieves didn't pluck one card number but tens of millions.

In 2007, discount retailer TJX Cos.said a computer breach exposed 45.7 million credit and debit cards toaccount information theft. The group accused of stealing the TJX datawas believed to have hacked into several stores' weakly encryptedwireless networks. Last year, supermarket company Hannaford Bros.reported a data breach, saying customer accounts at stores in theNortheast and Florida were compromised.

Stan Schatt, a vice president at ABI Research, said some retailers arebracing for an uptick in crime because of the economic downturn,whether it's increased shoplifting or employee theft. "What I'm hearingis that some retailers are cutting back in opening new stores andinstead are plowing some money into security."

His research shows 77 percent of retailers with 500 or more employees use wireless networks.

"Retailers work on very thin margins, and even a small increase intheft can wipe out their profit margins completely," Schatt said.

In February, Rushing conducted a "war walk" simulation along the Magnificent Mile,ambling up the sidewalk with a laptop that had an antenna affixed tothe side. Proprietary software collected information about activewireless devices and the level of encryption for those networks.


Continue Reading at the Chicago Tribune


Reblog this post [with Zemanta]

British Consumers Robbed Every 7 Seconds

Card fraud hits record high despite fortune spent on chip-and-pin security

British consumers are robbed once every seven seconds, often by criminals overseas.

Julian Knight and Kate Hughes report for The Independent:

Sunday, 15 March 2009


Fraud carried outon credit and debit cards is expected to have topped £600m for thefirst time last year, when banking industry figures are released thisweek. Despite the introduction nearly five years ago of chip-and-pinsecurity technology, at a cost of hundreds of millions of pounds, thetide of fraud is rising ever higher.

A British credit ordebit card gets fraudulently used or counterfeited once every sevenseconds, industry figures show. And Apacs, the UK payments service, isexpected to say this week that card fraud rose again in 2008, this timeby more than 10 per cent to around £600m. This compares to £535m forthe whole of the previous year.

But Sandra Quinn, a spokeswomanfor Apacs, says that following the introduction of chip-and-pin – whereusers have to verify their purchases by inputting a personalidentification number into till-side terminals – organised gangs ofcriminals have been turning to what is called "card not present" fraud.

"Asthe name suggests, this means that the fraudster uses a stolen cardnumber on the internet or by mail order," she says. "This is less riskyas they don't have to physically go to a shop to hand over acounterfeit card."

A substantial proportion of fraud on UKcards has taken place overseas. "Card numbers are acquired in the UK bycriminal gangs and then used overseas to buy goods. Card fraud is atruly global undertaking and so increasingly is the fight against it,"comments Steve Head, chief superintendent at the City of London Policeeconomic crime unit.

Several "hotspots" for card fraud havebeen identified, such as the US, Canada and the Far East, but in recenttimes gangs have emerged in Australia and China, all preying on Britishcard customers.

The banks say they have stepped up their fightagainst the card fraudsters. "It is difficult to pursue some of thesegangs because they are located overseas in a different jurisdiction andthey use the internet to commit their crimes," explains the leader ofan anti-fraud unit working for one of the UK's major high-street banks,who wished to remain anonymous.

"However, generally, we are gettingbetter at spotting frauds earlier and they are getting away with lessper transaction as a result."

Although it is usually the banksand retailers that pick up the tab for card fraud, Ms Quinn saysconsumers lose out too: "Having your card details stolen and used canbe worrying and create a lot of hassle. What's more, people areincreasingly finding that when they are on holiday abroad, their cardsare being stopped for security purposes."

DON'T LET THE CROOKS STEAL YOUR MONEY. TEN TIPS FOR PLASTIC SAFETY

Continue Reading at The Independent 







Reblog this post [with Zemanta]

Dubai: Credit Card Fraud Doubles in Last Year



Credit card fraud doubled in past year, police say

By Siham Al Najami, Staff Reporter
Published: March 14, 2009, 23:03

Dubai: More than 300 financial-related crimes were reported in 2008 with more than 600 people charged with such offencss, a senior police official said.

Lieutenant Colonel Abdul Rahman Al Nuaimi, Director of Dubai Police's Counter Economic Crimes Department, told Gulf News there were 322 financial-related cases last year while 602 individuals of different nationalities were charged.

In January 2009, 32 financial-related crimes were reported with 47 individuals charged with various kinds of crimes. While in February of this year, 30 cases were reported with 56 people charged, Lieutenant Colonel Al Nuaimi said.

The Department classifies economic related crime into three divisions: combating commercial fraud, combating deception and fraud and combating forgery.  The commercial fraud division includes intellectual property protection and trademark protection, he said.

The latest financial-related crimes were related to credit card fraud such as the arrest made last month by the Criminal Investigation Department (CID) of a member of a four-strong gang which specialised in counterfeiting credit cards and using them to buy expensive jewellery and watches.

In the same month more than 500 forged credit cards were recovered from two gangs in Dubai, who are accused of withdrawing "huge" sums of money from an ATM in a shopping mall.

On February 9, the police arrested the three other gang members in a nightclub, they had in their possession expensive goods, money and fake IDs.

Police also found memory cards, electronics, laptops and equipment used to clone credit cards and 146 blank cards ready to be counterfeited.


In a seminar held in January, Major General Khamis Mattar Al Mazeina, Dubai Police's Deputy Commandant General, urged banks to issue credit cards with pin codes for all transactions as fraud cases had more than doubled in the last year.

Credit and debit card fraud cases went up from 32 registered cases in 2007 to 65 cases in 2008. Cases of document forgery, however, have fallen from 876 in 2007 to 523 in 2008.

The most common crimes involving credit and debit card reported by Dubai Police are the use of credit cards after being stolen or lost before the card holder reported the loss; the stealing of bank information by hacking into a credit card with the help of a skimmer (a machine that can read credit card information) and the theft of credit cards by courier delivery boys, which they sell at a cheap price to criminals.


Continue Reading at GulfNews.com





Reblog this post [with Zemanta]

Saturday, March 14, 2009

Pago Report 2008 - E-Commerce Payments


Pago Report 2008 – Trends in consumer and payment behavior in e-commerce based on real transactions

Deutsche Bank report valuable to online merchants


Cologne, Germany, Mar. 13, 2009 -- In European online retailing, risks of non-payment are much lower for women than for men. This is indicated by a lower chargeback ratio, which describes the share of credit card transactions which had to be charged back after the cardholder rejected the transaction. At roughly 0.10%, female consumers' non-payment ratio for online purchases paid for by credit card is only half that of male customers (0.19%). One year before the opposite was true. This is one of the results of the Pago Retail Report 2008, which was recently published by Deutsche Card Services, a subsidiary of Deutsche Bank.

Chargeback ratio remains low in the retail sector

The Pago Retail Report 2008 underlined the encouraging fact that the overall chargeback ratio in European online purchasing remained very low, at 0.34%. A look at the reasons for chargebacks reveals an important difference between retailing and overall e-commerce (which is analysed in detail in the Pago Report 2008). In retailing, one out of five chargebacks (just below 20%) is the result of "unclear transactions", in contrast to only 8.57% in overall e-commerce. This reason of rejection might be avoided easily, for example by executing the order in a timely fashion and clearly stating the recipient of the payment - the online merchant - in the debit statement. This is a point where online merchants themselves have to do better - and in addition, they should educate their customers better about how they can avoid data entry mistakes.

Use of 3-D Secure reduces chargeback ratio

By using 3-D Secure European retailers can reduce their credit-card-related chargeback ratio, i.e. the risk of non-payment, to 0.24%. In other words: Only one out of 400 purchases paid for by credit card or Maestro fails. The 3-D Secure technology allows online merchants to protect themselves against misuse of credit cards and against wrongly entered credit card numbers. The procedure consists of the authentication stage and the actual credit card transaction. During the authentication stage the identity of the cardholder is verified by the card issuer's checking the cardholder's password, so potential fraudsters will fail to identify themselves correctly. Even though 3-D Secure is not yet offered by all banks, using it makes sense for merchants. If the procedure is used, it is no longer possible to insist on chargebacks by arguing that the cardholder has not initiated the transaction. And merchants will not be exposed to this risk either if they want to use 3-D Secure, but an authentication is impossible because the cardholder or the cardholder's bank do not support the system. It should be noted that 3-D Secure is obligatory for Maestro transactions, but voluntary for credit cards.

Lower chargeback ratio for consumers from outside Europe than in the year before The favourable overall development in chargeback ratios is particularly evident among consumers who, in the Pago Retail Report 2008 categorisation, come from the "rest of Europe". This term covers European customers who are not living in the e-commerce strongholds Germany and UK. In the rest of Europe the comparatively high chargeback ratio registered in the year before (1.03%) fell to a favourable 0.19%. The chargeback ratio is lowest for German customers, at only 0.08%.

Pago Retail Report 2008 an expansion of the Pago Report 2008

The Pago Retail Report 2008 differentiates between customers from Germany, the UK, the rest of Europe and regions outside Europe. In contrast, all merchants are domiciled in European countries - a logical restriction in that this is Deutsche Card Services' licensing area. Evaluations of new payment methods such as giropay and Maestro are particularly important at the European level, and the Pago Retail Report 2008 gives them for the first time ever. The analysis only covers online merchants which offer goods, i.e. whose business is similar to traditional mail-order retailing. Thus the Pago Retail Report 2008 supplements the Pago Report 2008, which deals with e-commerce as a whole.

The Pago Retail Report 2008, which is entitled "Purchasing and Payment Behaviour in Online Retail", gives numerous evaluations of European trends in purchasing and payment behaviour and non-payment risks and explains developments in retailing, one of the most important e-commerce sectors. This covers online shops which offer goods, i.e. pursue a similar business model as traditional mail-order business - a sector which should have blossomed in the Christmas shopping spree lately. The database consists of about seven and a half million retail transactions settled via the Pago platform between October 2006 and September 2007.

The Pago Retail Report 2008 is available at a price of EUR 250 (excl. VAT). For more information please see www.ecommerce-report.de .

Source: Company press release.



Payment Behavior
  • The credit card remained the dominant payment method in European e-commerce
  • Brand shares of Visa and MasterCard have remained almost unchanged
  • Maestro, the new payment method, has already taken a 4% share of the payment market
  • giropay, the new payment method in Germany, reached a market share of 2.38%
  • Credit card payment is becoming more important for German consumers, too
  • Already almost one in ten transactions in the UK are made using Maestro, the new online payment method
  • Highest transaction values were generally paid for by credit card
  • In Europe overall, MasterCard transactions recorded higher average transaction values than Visa
  • Visa and MasterCard continue to dominate the European e-commerce market
  • Other credit card brands are insignificant (exception: Germany)
  • Higher average transaction value with MasterCard
  • Visa has taken almost 7 percentage points of market share from MasterCard amongst male consumers
  • German women are conservative with regard to payment behaviour, still preferring to pay by direct debit
  • German males, on the other hand, use credit card payment in as many transactions as when paying by direct debit


    on-Payment Risk


    Lower chargeback ratios with Maestro than with credit card payments
    Transactions using 3-D Secure record considerably lower Chargeback ratios but also lower success rates
    Chargeback ratios for credit card transactions are still at a very low level
    Chargeback ratio has fallen mainly because of improvement for consumers from UK and Non-Europeans
    Large proportion of chargebacks seem to be due to attempted consumer fraud
    Overall European success rate has risen to 77%
    Declining trend in rejected payment attempts using blocked cards and attempted manipulation
    Increase in proportion of transactions rejected by credit card issuers
    Chargeback ratio for direct debits is ten times as high as for credit cards
    Chargeback ratio in UK shops higher than in German shops
    Highest chargeback ratio recorded for purchases made by Non-Europeanconsumers
    Highest chargeback ratio recorded in the transaction value category of between 100 Euro and 500 Euro (previous year: over 500 Euro)
    No significant difference in chargeback ratios between Visa and MasterCard brands
    Both chargeback and success rates are higher for females than for male consumers (exception: German chargeback ratios)




Reblog this post [with Zemanta]

E-Commerce Takes Toll on Home Depot

Large hardware stores have capitalized upon th...Image via Wikipedia

Home Depot Posts $54M Loss, Facing E-Commerce Competition

HomeDepot posted their first quarterly loss in over 25 years as competitionfrom smaller e-commerce firms like Exterior Solutions heated. HomeDepot expects sales to decline 9% this year, while smaller Internetrivals anticipate revenue increases.

St. Charles, Illinois (PRWEB)March 14, 2009 -- Home Depot posted a $54M dollar loss during thefourth quarter and said that they expect sales to decline 9% during theyear, despite e-retailers revenue increases. "We are anticipating atough year", said Home Depot CEO Frank Blake, while online nicheretailers such as Exterior Solutions are experiencing rapid revenuegrowth.

Exterior Solutions specializes in exterior vinyl shutters, wood shutters, vinyl window headers, sunbursts, and other siding accessories.

One of Exterior Solution's fulfillment centers in Illinois in mid-February.
One of Exterior Solution's fulfillment centers in Illinois in mid-February.

Exterior Solutions recently revamped their e-commerce website to expandtheir product line and make their site easier to use. The MarketingManager at the company, Ken Clark, said "We wanted to take the sitefrom a place where people come just to transact to a site that promotesbrand loyalty".
Although Exterior Solutions is much smaller than box retailers likeHome Depot they are still able to compete in some areas. The Internetretailer offers customers customized products that would not typicallybe available at stores like Home Depot. There simply isn't enough shelfspace in a brick and mortar store. For example, Home Depot stocksexterior vinyl shutters in three or four colors and just a hand full ofsizes. Exterior Solutions offers vinyl shutters in 23 colors and anycustom size.
We are anticipating a tough year



Prices at e-retailers are often more competitive than box stores due tosales tax laws, reduced overhead at internet stores, and free shippingpolicies offered by many e-commerce stores.

Our customers are pleased said Clark. "Thank you so much for theexcellent service. My husband and I were very impressed with thequality of our shutters and the professional service we received," saidCarrie from San Diego, CA.

For additional information on the news that is the subject of thisrelease (or for a sample, copy or demo), contact Ken Clark or visit http://www.ExteriorSolutions.com.

About Exterior Solutions:
Exterior Solutions is an innovative specialty electronic retailingcompany who supplies residential building products that improve thequality and performance of homes to the building, contracting, andconsumer markets. These products include exterior shutters, sunbursts& ellipticals, window headers, door surrounds, and accessories.Exterior Solution's industry leading technologies enhance the qualityof consumer experience and add value to our services, while alsoreducing our impact on the environment.

Contact:
Ken Clark, Marketing Manager
Exterior Solutions
866-760-2846
http://www.ExteriorSolutions.com

Reblog this post [with Zemanta]

New "Breach Driven" Compliance Rules for HIPAA

Newly Enacted HIPAA Security Breach Notification Requirements Raise New Risks For Employers


Employershave good reason to re-evaluate their HIPAA compliance efforts. Recentenforcement actions by the U.S. Department of Health and Human Services(HHS) that resulted in large settlement payments signal more pronouncedefforts to enforce HIPAA’s compliance requirements. These enforcementactions were driven by publicly disclosed security breaches thatbrought compliance lapses to HHS’ attention.

Recent amendments to the HIPAA Privacy Rule, enacted as part of themassive federal economic stimulus legislation, will fuel this“breach-driven enforcement.” Under existing law, the HIPAA Privacy Rulecontains no security breach notification requirement. EffectiveFebruary 17, 2010, however, employers will be required to take thefollowing steps when they learn that the “unsecured” protected healthinformation (PHI) of participants in HIPAA-covered plans has beensubjected to unauthorized access, use or disclosure:

• Notify major media outlets and HHS if a breach involves 500 or more plan participants
• Notify affected individuals within 60 days of becoming aware of the breach
• Provide in the notice to individuals, at a minimum, five specific categories of information
• Deliver the notice by first-class mail to each affected individual’s last known address

This notice obligation applies regardless of whether the employer ora third-party service provider, such as a benefits administrator,pharmacy benefits manager, or insurance broker is responsible for thebreach.

Continue Reading...

Reblog this post [with Zemanta]

Disqus for ePayment News