Bill mandates reporting of PII breaches by insurance exchanges

Jan. 7, 2014

Representative Gus Bilirakis (R-FL) introduced the One Hour Notification Act of 2013 or the “OH No Act of 2013” (H.R. 3795). The legislation requires the Secretary of Health and Human Services to notify Congress and the individuals impacted, when a breach of personal identifiable information (PII) occurs by system maintained by the Health Insurance Exchanges created under the Patient Protection and Affordable Care Act. The legislation has been referred to the House Committee on Energy and Commerce for consideration.

The legislation states that within one hour after the time the Secretary is notified of a breach, the individual that was the subject of the breach must alerted. Further, in a timely manner, the House Committees on Energy and Commerce, Ways and Means, and Education and Workforce and the Senate Committees on Finance and Health, Education, Labor, and Pensions must be notified.

The legislation also calls for an annual report to Congress beginning on January 1, 2015, detailing the breaches that occurred during the past year and the rules, standards and strategies pursued to prevent future breaches.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...