Stakeholders Suggest Changes to CISA’s Cybersecurity Reporting Rule

July 8, 2024
MGMA, WEDI urge CISA to align its reporting timelines and requirements with other federal partners, including the HHS Office for Civil Rights, to decrease the administrative burden

Stakeholders in healthcare are proposing changes to the Cybersecurity and Infrastructure Security Agency’s proposed rule on cyber incident reporting requirements under the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). 

CISA proposes to institute reporting requirements for significant cyber events for critical infrastructure sectors including healthcare. 

The Medical Group Management Association expressed concerns about "burdensome, confusing, and duplicative reporting requirements that may impact medical groups’ ability operate effectively, especially in the midst of a significant cyberattack.”

Noting that medical groups are already subject to various reporting requirements under HIPAA, MGMA suggests that instead of implementing the duplicative reporting requirements in the proposed rule, CISA should work closely with HHS to avoid layering complex requirements on one another. “While there are different timeframes for the HIPAA Breach Notification Rule, the agencies should work together to seamlessly incorporate data that will already be reported to not only promote collaboration but ease the burden of reporting on the same incident multiple times in multiple different formats,” the association’s letter stated. 

CISA proposes to include a size-based threshold to determine what entities are responsible for the cyber reporting requirements. MGMA said that while it appreciates efforts to avoid instituting reporting requirements for small medical groups, it nevertheless harbors concerns that using the current SBA small-business standard will still unduly impact smaller physician offices reporting revenue of as low as $9 million per year.

The proposed rule estimates that the cost of compliance to the industry will be $1.4 billion. The Biden Administration included $500 million in its proposed 2025 budget for hospitals to bolster cyber defenses. MGMA said that medical groups need a similar infusion to not only combat sophisticated attacks from bad actors, but also to ensure the right infrastructure, staffing, and procedures are implemented to comply with additional reporting requirements proposed by CISA. 

Finally, to avoid instituting unnecessary financial costs for medical groups, MGMA said CISA should shorten the timeframe required for covered entities to retain data and streamline the required information.

Like MGMA, the multi-stakeholder Workgroup for Electronic Data Interchange (WEDI) urged CISA to align its reporting timelines and requirements with other federal partners, including HHS/Office for Civil Rights, to decrease the administrative burden faced by covered entities potentially required to submit incident reports to multiple agencies. Entities covered under both HIPAA and CIRCIA should only be required to report once, through OCR, to be compliant under both rules, per CIRCIA’s substantially similar reporting exception, WEDI said. 

WEDI claims that for many victims of these types of attacks it could take more than 72 hours to fully identify all the data elements required for the initial report. Its recommendation is that CISA add flexibility to this requirement, permitting covered entities to submit an initial report to the best of their ability within 72 hours while allowing updates to be submitted as more information and analysis become available.

WEDI also recommends that the federal government institute a policy to establish that ransomware is not considered a data breach when the covered entity has deployed a recognized security program and when no PHI has been accessed. Should no breach of the data occur that results in data being accessed by unauthorized entities and the covered entity is found to have a made good faith effort to deploy a recognized security program and instituted security policies and procedures, the covered entity should not be deemed to have experienced a data breach, WEDI said. 

Sponsored Recommendations

ASK THE EXPERT: ServiceNow’s Erin Smithouser on what C-suite healthcare executives need to know about artificial intelligence

Generative artificial intelligence, also known as GenAI, learns from vast amounts of existing data and large language models to help healthcare organizations improve hospital ...

TEST: Ask the Expert: Is Your Patients' Understanding Putting You at Risk?

Effective health literacy in healthcare is essential for ensuring informed consent, reducing medical malpractice risks, and enhancing patient-provider communication. Unfortunately...

From Strategy to Action: The Power of Enterprise Value-Based Care

Ever wonder why your meticulously planned value-based care model hasn't moved beyond the concept stage? You're not alone! Transition from theory to practice with enterprise value...

State of the Market: Transforming Healthcare; Strategies for Building a Resilient and Adaptive Workforce

The U.S. healthcare system is facing critical challenges, including workforce shortages, high turnover, and regulatory pressures. This guide highlights the vital role of technology...