ARRA/HITECH Act HIPAA Guide: Breach Notification, Penalties, and Business Associates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

ARRA/HITECH Act HIPAA Guide: Breach Notification, Penalties, and Business Associates

Kevin Henry

HIPAA

July 22, 2024

7 minutes read
Share this article
ARRA/HITECH Act HIPAA Guide: Breach Notification, Penalties, and Business Associates

HITECH Act Overview

The ARRA/HITECH Act strengthened HIPAA by expanding privacy and security protections for Protected Health Information, creating a federal Breach Notification Rule, and extending accountability to business associates. It made Privacy Rule Standards and Security Rule Compliance core obligations for both covered entities and their vendors.

Subtitle D of HITECH elevated enforcement and clarified that vendors handling electronic PHI are directly regulated, not just contractually bound. The result is a more consistent, auditable framework that emphasizes proactive risk management, incident response, and Business Associate Liability across the healthcare ecosystem.

Key changes introduced by HITECH

  • Created national breach notification duties for covered entities and business associates.
  • Imposed direct Security Rule and select Privacy Rule obligations on business associates and their subcontractors.
  • Established tiered Civil Monetary Penalties and broadened enforcement tools.
  • Authorized Office for Civil Rights Audits to assess real-world compliance.

Breach Notification Requirements

Who must notify and when

Covered entities must notify affected individuals following a breach of unsecured PHI without unreasonable delay and no later than 60 calendar days after discovery. Business associates must notify the covered entity without unreasonable delay and within the same outer 60‑day limit, providing details sufficient for the covered entity to notify individuals and regulators.

Timelines and reporting thresholds

  • Individuals: Notice without unreasonable delay and in all cases within 60 days of discovery.
  • HHS notification: For incidents affecting 500 or more individuals, report to HHS within 60 days of discovery; for fewer than 500, record the breach and report to HHS no later than 60 days after the end of the calendar year.
  • Media notice: If 500 or more residents of a single state or jurisdiction are affected, notify prominent media outlets within 60 days.
  • Business associates: Report to the covered entity promptly (no later than 60 days) and identify, to the extent possible, each affected individual and the nature of the PHI involved.

Content and method of the notice

Under the Breach Notification Rule, individual notices must include a brief description of the incident, the types of PHI involved, steps individuals should take to protect themselves, what the entity is doing to investigate and mitigate harm, and contact information. Provide notice by first‑class mail (or email if the individual has agreed). If 10 or more addresses are invalid, use substitute notice such as a website posting; for fewer than 10, use an alternative method like telephone.

Risk assessment, safe harbor, and exceptions

Entities must presume a breach unless a documented four‑factor risk assessment shows a low probability that PHI has been compromised. No notification is required when PHI was properly encrypted or destroyed in line with HHS guidance (safe harbor). Limited exceptions also apply to certain good‑faith or inadvertent disclosures that are not further used or disclosed.

Penalties for Non-Compliance

Civil Monetary Penalties

HITECH created four penalty tiers that scale with culpability—from violations where the entity did not know and could not have known with reasonable diligence, up through willful neglect not corrected. CMPs apply per violation, with per‑violation amounts that can reach tens of thousands of dollars and annual caps per violation category that can reach $1.5 million. Amounts are periodically adjusted for inflation, and HHS may apply lower annual caps for lesser‑culpability tiers.

Factors that influence penalty outcomes

  • Nature and extent of the violation, including number of individuals affected and types of PHI involved.
  • Duration, patterns of non‑compliance, and prior history (mitigating or aggravating).
  • Entity’s financial condition and the effectiveness of corrective actions taken.

Resolution pathways

OCR often resolves matters through technical assistance, voluntary corrective action, or resolution agreements with multi‑year corrective action plans. Where warranted, OCR can impose Civil Monetary Penalties. Separate from CMPs, criminal penalties may apply for egregious wrongful disclosures handled by the Department of Justice.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Direct Liability of Business Associates

What direct liability means

Business associates are directly liable for Security Rule Compliance and specific Privacy Rule Standards, not merely for breaching a contract. They must implement administrative, physical, and technical safeguards; perform risk analyses; manage vendors; and maintain written Business Associate Agreements that flow down obligations to subcontractors.

Common exposure areas

  • Unauthorized uses or disclosures beyond the minimum necessary standard.
  • Failure to implement access controls, encryption, auditing, or incident response.
  • Missing or deficient Business Associate Agreements, or failure to flow down requirements.
  • Delayed breach reporting to the covered entity or incomplete incident documentation.

Practical mitigation steps

  • Maintain an asset inventory and complete a risk analysis tied to concrete remediation plans.
  • Harden systems with role‑based access, MFA, encryption at rest and in transit, and continuous monitoring.
  • Train workforce members, test incident response, and document investigations thoroughly.

Expanded Enforcement and Audits

OCR’s enforcement toolkit

OCR enforces HIPAA and HITECH through complaint investigations, compliance reviews, and targeted Office for Civil Rights Audits. Outcomes range from technical assistance and corrective action to settlement agreements and CMPs, depending on the severity and responsiveness of the entity.

Beyond OCR: additional enforcers

State attorneys general may bring civil actions on behalf of residents for HIPAA violations under HITECH. While HIPAA does not create a private right of action, breach incidents can still lead to contractual disputes or state‑law claims, underscoring the value of prompt mitigation and clear communications.

Documentation and audit readiness

  • Maintain policies, risk analyses, risk management plans, training records, and BAAs in a retrievable format.
  • Log security incidents and breach assessments; keep evidence of mitigation and notification decisions.
  • Periodically test safeguards and access controls; remediate findings quickly and document completion.

Conclusion

The HITECH Act tightened HIPAA by mandating breach notifications, expanding Business Associate Liability, and elevating enforcement through OCR audits and penalties. Treat Security Rule and Privacy Rule duties as everyday operations: assess risk, implement safeguards, train your workforce, and document everything. Doing so reduces breach impact, accelerates response, and positions you for sustained compliance.

FAQs.

What are the breach notification timelines under the HITECH Act?

You must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. For breaches affecting 500 or more individuals, notify HHS and, if 500 or more residents of a state or jurisdiction are affected, the media within 60 days. For fewer than 500 individuals, record the breach and report to HHS no later than 60 days after the end of the calendar year. Business associates must notify the covered entity promptly and within the same 60‑day outer limit.

How are business associates held liable under HIPAA?

Under HITECH, business associates are directly liable for complying with the HIPAA Security Rule and specified Privacy Rule requirements. They must implement safeguards, limit uses and disclosures, report breaches to covered entities, and ensure subcontractors follow the same standards. OCR can investigate business associates and impose corrective actions or Civil Monetary Penalties for violations.

What penalties apply for HIPAA violations under HITECH?

Civil Monetary Penalties are tiered by culpability, with per‑violation amounts that can escalate and annual caps per violation category that can reach $1.5 million, subject to inflation adjustments and enforcement discretion. OCR considers factors like the nature and extent of the violation, harm, duration, and remediation. In egregious cases, criminal penalties may also apply.

How does OCR enforce compliance with the HITECH Act?

OCR enforces through complaint investigations, compliance reviews, and Office for Civil Rights Audits. Depending on findings, it may provide technical assistance, require corrective action plans, negotiate settlements, or impose CMPs. Thorough documentation, timely breach response, and demonstrable Security Rule Compliance are critical to favorable outcomes.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles