
What’s the difference between HIPAA requirements for covered entities, business associates and cybersecurity requirements for government contractors?
Practice administrators seeking federal grants or contracts must look beyond HIPAA, completing SAM registration and adopting FAR 52.204‑21’s 15 essential cybersecurity controls to safeguard PHI, PII, FCI and CUI.
When most people in the health care sector think about the privacy and security of data, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) immediately comes to mind. Not surprising given that HIPAA is almost thirty (30) years old, patients are familiar with it because of the HIPAA Authorizations and covered entities and business associates (45 CFR 160.103) have been required to comply with the respective Privacy Rule, Security Rule and Breach Notification Rule since before 2010.
What about cybersecurity requirements in the scenario where a person contracts with the United States Government (Government) and protected health information (PHI), individually identifiable health information (IIHI) or personally identifiable information (PII) are involved? Additionally, what if the
To be clear, I am not writing about the submission of a version of
First, SAM is under the umbrella of the U.S. General Services Administration (GSA). All contractors, subcontractors, grantees and subgrantees, as well as those applying for awards, must register through SAM. If approved, then an
(2) Will give the awarding agency, the Comptroller General of the United States and, if appropriate, the State, through any authorized representative, access to and the right to examine all records, books, papers, or documents related to the award; and will establish a proper accounting system in accordance with generally accepted accounting standards or agency directives (See 2 C.F.R. § 200-302 Financial Management and 2 C.F.R. § 200.303 Internal controls); …
(6) Will comply with all applicable requirements of all other Federal laws, executive orders, regulations, and public policies governing financial assistance and any Federal financial assistance awards and any Federal financial assistance project covered by this certification document, including but not limited to: (h) Civil Actions for False Claims Act, 31 U.S.C. § 3730; (i) False Claims Act, 31 U.S.C. §3729, 18 U.S.C. §§ 287 and 1001. (emphasis added).
For those who are unfamiliar, 2 C.F.R. § 200.303 is the first clue that cybersecurity compliance is relevant. Importantly, §200.303(e) expressly requires that SAM registrants “[t]ake reasonable cybersecurity measures to safeguard information including personally identifiable information (PII) and other types of information.”
What are “reasonable cybersecurity measures”? If we go off of the definition of 200.303(e), a good place to ascertain what constitutes “reasonable cybersecurity measures” is found at
Additionally, FAR 52.204-21(b)(2) states, “[t]his clause does not relieve the Contractor of any other specific safeguarding requirements specified by Federal agencies and departments relating to covered contractor information systems generally or other Federal safeguarding requirements for controlled unclassified information (CUI) as established by Executive Order 13356.” (emphasis added).
Hence, contractors, grantees, award recipients and their subs are required to actually read the Government agency regulations and directives, among other documents, addressing the specific legal requirements tied to cybersecurity. There are several laws that are commonly referenced in agreements with the Government or Government agency regulations. For example, required compliance with the Privacy Act of 1974, 5 U.S.C. § 552a, the Federal Information Security Management Act of 2002 and as revised in 2014 (FISMA) and Federal Risk and Authorization Management Program (FedRAMP), which was established by the Office of Management and Budget (OMB) in December 2011. Subsequently, FedRAMP Authorization Act was enacted as part of the
The National Institute of Standards and Technology (NIST) was established through
SAM registrants that store, maintain, or transmit FCI, CUI, and PII to a Government agency must adhere to mandated cybersecurity controls. Begin with FAR 52.204-21, which may be incorporated into a procurement, grant or award document either directly or indirectly by referencing FAR in general and related Government agency regulations. The relevant NIST SP 800-53 and/or 800-171 must also be referenced and can provide the framework for implementing the 15 basic cybersecurity requirements set forth by FAR. Therefore, from the outset of being evaluated to contract or to receive grants awards with the Government, persons are put on notice that basic cybersecurity safeguards must be implemented.
Newsletter
Optimize your practice with the Physicians Practice newsletter, offering management pearls, leadership tips, and business strategies tailored for practice administrators and physicians of any specialty.














