In general
Notification by third party service providers
1
Application of requirements for timeliness, method, and content of notifications
section 17932 of this titleSubsections (c), (d), (e), and (f) of shall apply to a notification required under subsection (a) and a vendor of personal health records, an entity described in subsection (a) and a third party service provider described in subsection (b), with respect to a breach of security under subsection (a) of unsecured PHR identifiable health information in such records maintained or offered by such vendor, in a manner specified by the Federal Trade Commission.
Notification of the Secretary
Upon receipt of a notification of a breach of security under subsection (a)(2), the Federal Trade Commission shall notify the Secretary of such breach.
Enforcement
section 57a(a)(1)(B) of title 15A violation of subsection (a) or (b) shall be treated as an unfair and deceptive act or practice in violation of a regulation under regarding unfair or deceptive acts or practices.
Definitions
Breach of security
The term “breach of security” means, with respect to unsecured PHR identifiable health information of an individual in a personal health record, acquisition of such information without the authorization of the individual.
PHR identifiable health information
Unsecured PHR identifiable health information
In general
section 17932(h)(2) of this titleSubject to subparagraph (B), the term “unsecured PHR identifiable health information” means PHR identifiable health information that is not protected through the use of a technology or methodology specified by the Secretary in the guidance issued under .
Exception in case timely guidance not issued
section 17932(h)(2) of this titleIn the case that the Secretary does not issue guidance under by the date specified in such section, for purposes of this section, the term “unsecured PHR identifiable health information” shall mean PHR identifiable health information that is not secured by a technology standard that renders protected health information unusable, unreadable, or indecipherable to unauthorized individuals and that is developed or endorsed by a standards developing organization that is accredited by the American National Standards Institute.
Regulations; effective date; sunset
Regulations; effective date
To carry out this section, the Federal Trade Commission shall promulgate interim final regulations by not later than the date that is 180 days after . The provisions of this section shall apply to breaches of security that are discovered on or after the date that is 30 days after the date of publication of such interim final regulations.
Sunset
If Congress enacts new legislation establishing requirements for notification in the case of a breach of security, that apply to entities that are not covered entities or business associates, the provisions of this section shall not apply to breaches of security discovered on or after the effective date of regulations implementing such legislation.
Pub. L. 111–5, div. A, title XIII, § 13407123 Stat. 269 (, , .)
Statutory Notes and Related Subsidiaries
Effective Date
section 13423 of Pub. L. 111–5section 17931 of this titleSection effective 12 months after , except as otherwise specifically provided, see , set out as a note under .