
CHIME and AEHIS Comments on CISA RFI to Implement CIRCIA
Date
Mon, Nov 14, 2022, 07:00 AM
CHIME25 Fall Forum Registration is Now Open. Register Today!
Date
Mon, Nov 14, 2022, 07:00 AM
November 14, 2022
Submitted via the Federal rulemaking Portal: http://www.regulations.gov
The Honorable Jen M. Easterly
Director, Cybersecurity and Infrastructure Security Agency
U.S. Department of Homeland Security
245 Murray Lane SW
Washington, DC, 20528
RE: Request for Information on the Cyber Incident Reporting for Critical Infrastructure Act of 2022 [CISA2022-0010)
Dear Director Easterly:
The College of Healthcare Information Management Executives (CHIME) and the Association for Executives in Healthcare Information Security (AEHIS) appreciate the opportunity to comment on the Cybersecurity and Infrastructure Security Agency (CISA) Request for Information (RFI) to receive input from the public as CISA develops proposed regulations required by the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), as published in the Federal Register on September 12, 2022 (Vol. 87, No. 175).
CHIME is an executive organization dedicated to serving chief information officers (CIOs) and other senior healthcare IT leaders in hospitals, health systems and other healthcare settings across the country. Consisting of more than 2,900 members in 60 countries, our members are responsible for the selection and implementation of clinical and business technology systems that are facilitating healthcare transformation. Launched by CHIME in 2014, AEHIS represents nearly one thousand healthcare security leaders and provides education and networking for senior IT security leaders in healthcare. CHIME and AEHIS members are among the nation’s foremost health IT experts, including on the topics of cybersecurity, privacy and the security of patient and provider data and devices connecting to their networks.
CHIME and AEHIS are pleased to provide input in response to this RFI, as CISA begins to develop and oversee implementation of regulations requiring covered entities to submit reports detailing covered cyber incidents and ransom payments. We believe the following areas are especially important for CISA to consider when creating the policies and provisions related to mandatory cybersecurity information sharing:
Cyberattacks pose a persistent threat to patient safety and our national security. As one of our members stated in testimony to the National Committee on Vital and Health Statistics (NCVHS) Subcommittee on Privacy, Confidentiality and Security last year, “Cybersecurity incidents are not only a threat to national security, they are also a threat to patient safety, as attacks can cause denial of service, medical device corruption, and data manipulation that directly impacts clinical operations, patient care and public health. In addition, healthcare data and information remain lucrative targets for theft and exploitation, particularly through ransomware attacks and COVID themed social engineering by criminal groups and adversarial nation states.” The techniques used are the same ones that have been successfully used against large, publicly traded companies with far greater resources than most healthcare providers.
Between 2009 and 2021, 4,419 healthcare data breaches of 500 or more records have been reported to the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR). Those breaches have resulted in the loss, theft, exposure, or impermissible disclosure of 314,063,186 healthcare records – equating to nearly 95 percent of the 2021 population of the United States. In 2021, an average of 1.95 healthcare data breaches of 500 or more records were reported each day, double the number of reported breaches only four years prior. When hackers and/or bad actors gain access to patient records and information, they will have the ability to change and manipulate patient data – which could have disastrous consequences to each individual patient. Two out of three of respondents to CHIME and AEHIS’s cybersecurity survey reported having had a security incident occur in the past 12 months.
In order to better understand the current cybersecurity challenges facing healthcare providers we polled our membership in a survey to better understand the threats our member organizations face, the resources they need and the education gaps that currently exist. The results continue to support what those who have been active in the cybersecurity landscape have known for years, healthcare is under constant threat, more resources are needed for healthcare providers and significant education gaps remain.
Pursuant to the CIRCIA law, “A covered entity that experiences a covered cyber incident shall report the covered cyber incident to the Agency not later than 72 hours after the covered entity reasonably believes that the covered cyber incident has occurred.” Furthermore, “ A covered entity that makes a ransom payment as the result of a ransomware attack against the covered entity shall report the payment to the Agency not later than 24 hours after the ransom payment has been made.” CIRCIA furthermore says a “cyber incident” “has the meaning given the term ‘incident’ in section 2209; and ‘‘(B) does not include an occurrence that imminently, but not actually, jeopardizes— ‘‘(i) information on information systems; or ‘‘(ii) information systems.”
The statute defines a significant cyber incident to be: “a cyber incident, or a group of related cyber incidents, that the Secretary determines is likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the people of the United States.” Finally, CIRCIA also establishes a definition for “substantial cyber incident” to mean, “a cyber incident, or a group of related cyber incidents, that the Secretary determines is likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the people of the United States.”
Healthcare providers are under constant attack and are fending off relentless cyberattacks on a daily basis. CHIME and AEHIS members believe it would overwhelm our sector, as well as CISA, if covered entities were required to report to CISA cyber incidents other than ones designated as “substantial.” Therefore, we strongly recommend that CISA: 1) only require that “substantial” events be required to be reported; 2) events that are a direct threat to patient safety be required to be reported; 3) that healthcare providers have the authority to use their discretion to ascertain to their best ability whether a threat is indeed a “substantial cyber incident”; and 4) should healthcare providers determine after a review that exceeds 72 hours that a cyber incident is, indeed, “substantial” – that reporting it after this timeframe is permitted, and should not result in any penalization (e.g., subpoenas and/or being reported to the U.S. Department of Justice (DOJ) for enforcement.)
Additionally, our members seek clarification from CISA on whether not-for-profit (NFP) entities will be subject to mandatory cyber reporting requirements. CIRCIA defines a “covered entity” to be, “an entity in a critical infrastructure sector, as defined in Presidential Policy Directive 21, that satisfies the definition established by the Director in the final rule issued pursuant to section 2242(b).” According to Presidential Policy Directive 21, this includes public and private entities. Given that most hospitals and healthcare delivery organizations (HDOs) are not-for-profit entities, we would appreciate clarification from CISA on whether they consider them to be private entities, and thus subject to the mandatory cyber reporting requirements.
In considering what data elements and information must be reported to CISA, our members recommend that the agency take into account several factors:
CHIME and AEHIS have long supported the need for stronger information sharing practices. While the Cybersecurity Information Sharing Act of 2015 took a big step in this direction by authorizing healthcare information sharing in certain situations. However, healthcare entities are often apprehensive to do so because they worry about running afoul of HIPAA rules, or suffering significant reputational harm. While suffering a cyber incident resulting in a HIPAA breach can create harm to reputation, we also believe it is imperative that providers be able to share threats in order to assist in averting potentially catastrophic patient safety incidents. Nonetheless, CHIME and AEHIS believe that to the degree possible, any duplicative reporting that is currently required under other federal policies (described in more detail below) should be avoided.
Under Section 2242(5)(B) of CIRCIA, pertaining to “Required Reporting of Certain Cyber Incidents”, there is an “Exceptions” provision for “Substantially Similar Reported Information.” It states: ‘‘(i) IN GENERAL.—Subject to the limitation described in clause (ii), where the Agency has an agreement in place that satisfies the requirements of section 104(a) of the Cyber Incident Reporting for Critical Infrastructure Act of 2022, the requirements under paragraphs (1), (2), and (3) shall not apply to a covered entity required by law, regulation, or contract to report substantially similar information to another Federal agency within a substantially similar timeframe. Therefore, consistent with this requirement in CIRCIA for CISA to not require reporting from a covered entity where that covered entity is required by law, regulation, or contract to report substantially similar information to another federal agency within a substantially similar timeframe, we ask that CISA consider the extent to which its reporting requirements may be harmonized with those of the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) and the Federal Trade Commission (FTC) such that a given incident need only be reported to a single federal agency.
The healthcare industry is already required to comply with a myriad of both state and federal cyber, security, and privacy data breach reporting requirements. These include federal authorities and requirements under HIPAA regulations and the Health Information Technology for Economic and Clinical Health (HITECH Act) regulations. Specifically, the HIPAA Breach Notification Rule, as well as the HITECH Act’s additional data breach reporting requirements to the HHS’ OCR, and the FTC’s Health Breach Notification Rule. ____ At the state-level, in 2021, at least 45 states and Puerto Rico introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity; and at least thirtysix states enacted bills in the same year. In 2022, at least 40 states and Puerto Rico introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity; and twenty-four states enacted at least 41 bills in 2022 so far.
CHIME and AEHIS would also appreciate significant consideration and clarification in the proposed rulemaking regarding the intersection of the potential future proposed rule regarding “Mandatory Cyber Incident Reporting” and existing federal and state laws, regulations and oversight. We strongly recommend that DHS and CISA coordinate with other federal agencies with existing jurisdiction – including HHS, HHS’ OCR, and the FTC – to ensure that duplicative cyber incident reporting requirements are avoided to the greatest extent possible. To the extent that CISA can leverage existing federal and state cyber incident and data breach reporting requirements for consistency and to reduce the burden on covered entities, we strongly urge it to do so.
CISA states that they are “particularly interested in input on definitions for and interpretations of the terminology to be used in the proposed regulations; the form, manner, content, and procedures for submission of reports required under CIRCIA; information regarding other incident reporting requirements including the requirement to report a description of the vulnerabilities exploited; and other policies and procedures, such as enforcement procedures and information protection policies, that will be required for implementation of the regulations.” Therefore, we strongly urge CISA to host a series of stakeholder meetings to garner feedback from the healthcare industry, specifically, before promulgating a proposed rule. It is critical that the proposed regulations do not inadvertently create overly duplicative requirements, penalize healthcare providers unfairly, and add burden to an already highly regulated sector of our critical infrastructure. CHIME and AEHIS members are executives and senior healthcare IT leaders – and we are offering to serve as a resource to CISA throughout this process. Our members are extremely knowledgeable and have decades of experience executing cybersecurity best practices, as well as real-world experience dealing with the ramifications of cyberattacks.
CHIME and AEHIS respectfully request that CISA allow a delay in reporting under CIRCIA in instances where “covered entities” in the healthcare critical infrastructure sector are already working with law enforcement. For example, HIPAA allows for a reporting delay if a law enforcement official indicates that a notification, notice, or posting required under HIPAA would impede a criminal investigation or result in harm to national security. Covered entities (as defined under HIPAA) may disclose protected health information (PHI), without the individual's authorization, to a public health authority acting as authorized by law in response to a bioterrorism threat or public health emergency.
The Privacy Rule also permits a covered entity to disclose protected health information to public officials who are reasonably able to prevent or lessen a serious and imminent threat to public health or safety related to bioterrorism in order to avert a serious threat to health or safety. In addition, disclosure of PHI, without the individual's authorization, is permitted where the circumstances of the emergency implicates law enforcement activities. If CISA promulgates rulemaking which fails to allow a law enforcement delay for notification by law enforcement, it would result in a direct conflict with the reporting requirements under HIPAA and the FTC Breach Reporting Rule. Furthermore, it could undermine the efforts of law enforcement, HIPAA, and increase the risk of harm to the covered entity, the overall healthcare industry, impacted individuals, state and/or federal investigations, and national security.
Patient safety in the healthcare sector means not just ensuring access to care, but ensuring that patient safety is not jeopardized. Adding an additional requirement to provide detailed reporting of all the vulnerabilities exploited during a catastrophic incident should not be prioritized over patient safety. Therefore, considerations should be given to the three-day reporting mandate and what precisely is required during this time period – when a provider is appropriately prioritizing and triaging patients during the impacted window.
A recent study found that about half (45 percent) of cyberattacks resulted in adverse impact on patients. About half (53 percent) of those with adverse impacts on patient care report increased mortality rates after a cyberattack (24 percent overall). About half (56 percent) have experienced one or more cyberattacks in the last 24 months. Almost half (43 percent) have experienced at least one ransomware attack in the last 24 months. When cyberattacks result in adverse patient care, patients face risks including high rates of impacted service (54 percent) and inappropriate therapy or treatment deliveries (26 percent). Furthermore, “for every reported set of vulnerabilities related to hospital robots or infusion pumps, there are likely thousands more that are unknown and far more dangerous.”
Many hospitals are under-resourced, and some do not even have a single, full-time employee devoted to the oversight of cybersecurity even as threats have escalated year after year. With the health sector only as strong as its weakest link, it is imperative that CISA prioritize assisting smaller and lesser resourced providers in fending off growing and sophisticated attacks aimed at stealing intellectual property, extorting ransoms, threatening patients by targeting medical devices and hindering their ability to deliver care overall.
CHIME is strongly supportive of and grateful that CISA offers a range of resources – including cybersecurity assessments that evaluate operational resilience, cybersecurity practices, organizational management of external dependencies, and other key elements of a robust and resilient cyber framework. These professional, no-cost assessments are provided upon request on a voluntary basis and can help any organization with managing risk and strengthening the cybersecurity of our Nation's critical infrastructure. The ability to rapidly respond to cybersecurity incidents – and when possible, preventing them – while sharing information with our federal partners is essential to protect hospitals and healthcare delivery organizations (HDOs).
In closing, CHIME would like to thank you for providing the opportunity to comment on this CISA RFI. As CISA continues to garner input from the public in developing proposed regulations required by the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), CHIME and our members would appreciate continued opportunities to help inform the important work being done by CISA. We look forward to continuing to be a trusted stakeholder and resource to you and continuing to deepen the longstanding relationship we have shared. Working together through the rulemaking process, such as with the RFI, is just one way we can accomplish our shared goals and make meaningful changes in healthcare. **
Should you have any questions or if we can be of assistance, please contact Chelsea Arnone, Director, Federal Affairs at [email protected] .
Sincerely,
Russell P. Branzell, CHCIO, LCHIME | President and CEO | CHIME