Many security risk insights and HIPAA compliance lessons can be learned from these and similar types of studies and associated statistics covering IoT use within healthcare organizations. Here are some of the common ones that I've seen in hundreds of real-life situations.
Many components and entities support and connect with IoT devices; cloud systems, apps, gateways, hubs, routers, business associates, supply chain entities, and more. The exponentially growing use of IoT products worldwide includes similar exponential growth of newly created pathways to health data regulated by HIPAA, as well as to applications that could potentially be exploited to gain access to networks and sensitive data or affect the availability of the devices.
How many of the 82% of reported IoT cyberattacks were enabled through such pathways? Consider just two specific examples: 1) 33% of bedside healthcare IoT devices have at least one unpatched critical vulnerability that could affect service availability, data confidentiality, or place patient safety in jeopardy; 2) 73% of IV pumps have a vulnerability that could jeopardize patient privacy, safety, and health if exploited.
All the pathways created by the full range of IoT product components must be protected within HIPAA-regulated situations to be in compliance with associated requirements. However, most CEs and their BAs are not even aware of all the components, and typically do not include the complete IoT product components within risk assessments.
Most IoT device users realize IoT devices collect and derive massive amounts of data. But the amount, and types, of data collected are much greater than what most realize; how can they know without training? Growing numbers of IoT devices are constantly listening, and recording, the sounds (e.g., conversations) in the environments within which they are being used—even without the so-called "wake words." Not only are they recording sounds, but often also video, and collecting other data about the environment, including locations and other environmental data that could possibly be associated with specific individuals. This IoT data could be considered a type of PHI (personal health information) when the associated IoT product is being used by CEs in the provision of patient care. Too many CEs and BAs use IoT devices that are always listening, watching, and collecting data within the vicinity where they are used, without realizing that these devices are collecting HIPAA-regulated PHI.
Over half of the medical and other IoT devices used within healthcare are vulnerable because software, firmware, and/or hardware patches are not applied. This is made worse when most CEs allow for a wide range of personally owned IoT devices to be used within their digital environments and don't have requirements for the IoT product owners to make updates as soon as they are available. And of the IoT devices owned and/or managed by the CEs, those responsible for making such updates don't include IoT in their IT inventories, and so they get overlooked. Or, the IT department simply doesn't view IoT technology as being part of its IT management responsibilities. This leaves the CE wide open to attackers exploiting the vulnerabilities to gain access to PHI, and associated applications, systems, and networks. It also leaves CEs not considering IoT devices within their risk management activities, violating a wide variety of HIPAA security requirements.
CEs and BAs can't protect what they don't know about. And lack of knowledge of such products that involve PHI results in a wide range of HIPAA security and privacy requirements violations. Proper discovery and classification of all IoT devices on a healthcare provider's network helps guard against this risk. IoT products must be properly identified, classified, and secured to effectively reduce risks and comply with HIPAA security requirements.
CEs must be able to provide an accounting of PHI disclosures under HIPAA. To do this, CEs must know where PHI is located. This becomes a significant challenge when IoT products are incorporated within CE digital ecosystems. For example, IoMT is increasingly being used in telehealth activities, for remote patient monitoring, medical asset tracking, tracking worker locations, and many other uses, to enable ongoing real-time monitoring, support automated care delivery, and to help support secure patient stays. Additional challenges are created when a large portion of IoT products enter and exit the digital ecosystems based upon the movements of those using the devices. Despite the challenges, these issues must be addressed to effectively mitigate risks and comply with HIPAA requirements.
IoT products often create business associate (BA) relationships that the associated CEs don't realize. Most IoT/IoMT product component manufacturers and support entities that support and/or have access to all the IoT data, which often includes PHI, also do not realize their compliance obligations. This sets the stage for some significant HIPAA non-compliance situations through unauthorized access to PHI, inappropriate use of PHI for which the associated individuals did not give consent where required by HIPAA, and all the way through the full spectrum of HIPAA non-compliance risks to PHI breaches.
Make sure IoT/IoMT product security and privacy risks are being appropriately addressed by establishing:
The U.S. Department of Health and Human Services (HHS) has published many guidance documents that have described in a wide range of ways the ways in which CEs and BAs must include controls for IoT within their HIPAA compliance activities. Here is just one example:
"An IT asset inventory that includes IoT devices can strengthen an organization's risk analysis by raising awareness of the potential risks such devices may pose to ePHI. The lack of an inventory, or an inventory lacking sufficient information, can lead to gaps in an organization's recognition and mitigation of risks to the organization's ePHI. Having a complete understanding of one's environment is key to minimizing these gaps and may help ensure that a risk analysis is accurate and thorough, as required by the Security Rule."
An additional parting thought: CEs and BAs also usually assume IoT products and associated components are secure by default, especially when considering they should be in compliance with HIPAA along with the growing number of data protection regulations. But this is rarely true.