Healthcare Third-Party Breach Notification: Requirements, Timelines, and Best Practices

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Healthcare Third-Party Breach Notification: Requirements, Timelines, and Best Practices

Kevin Henry

Data Breaches

September 25, 2025

8 minutes read
Share this article
Healthcare Third-Party Breach Notification: Requirements, Timelines, and Best Practices

Breach Definition and Impact

In healthcare, a third-party breach occurs when a vendor, contractor, or other partner with access to Protected Health Information (PHI) experiences unauthorized acquisition, access, use, or disclosure of unsecured PHI. Under the Breach Notification Rule, a “breach” is presumed unless you can demonstrate a low probability that the PHI was compromised based on a documented risk assessment.

Unsecured PHI means the data was not rendered unusable, unreadable, or indecipherable (for example, when it is unencrypted or improperly destroyed). Exceptions exist for certain good-faith, unintentional uses by authorized personnel, inadvertent disclosures between authorized recipients, or situations where the recipient could not reasonably retain the information.

The impact of a third-party breach extends beyond regulatory exposure. You face disruption to care operations, reputational harm, increased support costs, and patient risks such as identity theft and fraud. Clear lines of accountability between Covered Entities and Business Associates reduce confusion, speed containment, and protect patients.

Common third-party breach scenarios

  • Ransomware or exfiltration at a billing, EHR, or cloud service provider handling PHI.
  • Misconfigured storage or file-sharing platforms exposing PHI to the public internet.
  • Phishing that compromises vendor credentials and enables unauthorized access to PHI.

Breach Notification Rule Overview

The Breach Notification Rule requires Covered Entities and Business Associates to provide timely notices following a breach of unsecured PHI. Your obligations include notifying affected individuals, the U.S. Department of Health and Human Services (HHS), and, in some cases, prominent media outlets in the relevant state or jurisdiction.

Covered Entities must send individual notifications and handle HHS and media reporting. Business Associates must investigate, mitigate, and notify their Covered Entity partner(s) so the Covered Entity can meet downstream obligations. Your contracts (business associate agreements) should allocate responsibilities, set escalation timelines, and detail cooperation requirements.

What the rule expects from you

  • Prompt detection, containment, and mitigation of incidents involving PHI.
  • A risk-based determination of whether the incident constitutes a reportable breach.
  • Accurate, comprehensible notifications that help individuals protect themselves.
  • Documented processes that demonstrate diligence and compliance.

Notification Timelines and Procedures

Discovery starts the clock. A breach is “discovered” on the first day it is known to you—or by exercising reasonable diligence—should have been known. From that date, the following Notification Timelines apply unless law enforcement requests a delay to avoid impeding an investigation.

Timelines at a glance

  • Individuals: Without unreasonable delay and no later than 60 calendar days after discovery.
  • HHS for breaches affecting 500 or more individuals: Without unreasonable delay and no later than 60 calendar days after discovery.
  • HHS for breaches affecting fewer than 500 individuals: No later than 60 days after the end of the calendar year in which the breach was discovered.
  • Media notice: If 500 or more residents of a single state or jurisdiction are affected, without unreasonable delay and no later than 60 calendar days after discovery.
  • Business Associate to Covered Entity: Without unreasonable delay and no later than 60 calendar days after discovery, providing details needed for the Covered Entity’s notices.

Procedural steps you should operationalize

  • Trigger incident response within minutes: isolate affected systems, preserve logs, and engage privacy, security, and legal teams.
  • Open a breach assessment workstream immediately; begin stakeholder mapping for Covered Entities and Business Associates.
  • Establish counts of affected individuals by state/jurisdiction to determine media notice thresholds.
  • Create notification content, secure approvals, and prepare delivery channels (mail, email, web, call center).
  • File HHS submissions and track deadlines; maintain an auditable record of dates and decisions.

Law enforcement delay

If a law enforcement official states that notification would impede a criminal investigation or threaten national security, delay notifications for the time specified in the written statement (or up to 30 days for an oral statement, pending written confirmation).

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Individual and Media Notice Requirements

Individual notice: content and method

  • Method: First-class mail to the individual’s last known address, or email if the individual agreed to electronic notices. Use telephone or other appropriate means if there is an urgent risk of misuse.
  • Content: A plain-language description of what happened (including breach and discovery dates), the types of PHI involved (for example, names, diagnoses, Social Security numbers), steps individuals should take to protect themselves, what you are doing to investigate and mitigate harm, and how to contact you (toll-free number, email, or postal address).
  • Clarity: Ensure accessibility, appropriate reading level, and availability in prevalent languages in your service area.

Media notice

  • Threshold: Required when a breach affects 500 or more residents of a single state or jurisdiction.
  • Method: Provide a press release or similar notice to prominent media outlets serving the affected area.
  • Content: Aligns with individual notice—describe the event, PHI types involved, protective steps, your mitigation actions, and contact information.

Business Associate Responsibilities

Business Associates play a central role in healthcare third-party breach notification. You must promptly identify and contain incidents, evaluate whether unsecured PHI was involved, and notify each affected Covered Entity without unreasonable delay (no later than 60 days after discovery).

What to include in your notice to the Covered Entity

  • Known facts: description of the incident, dates of breach and discovery, and systems or services affected.
  • Scope: the categories of PHI involved and the preliminary estimate of affected individuals, including a list of individuals if available.
  • Mitigation: steps taken to stop further unauthorized access or use, and actions to reduce potential harm.
  • Support: proposed timeline and assistance for individual and media notices, call-center readiness, and credit monitoring if warranted.

Ensure your business associate agreement specifies escalation paths, reporting content, cooperation during investigations, record retention, and allocation of costs related to notifications and remediation.

Breach Risk Assessment and Documentation

Notification turns on whether there is a low probability that PHI has been compromised. Your Risk Assessment should be objective, repeatable, and well-documented. At a minimum, evaluate:

  • Nature and extent of PHI involved, including identifiers and likelihood of re-identification.
  • The unauthorized person who used or received the PHI (for example, a covered healthcare provider vs. an unknown actor).
  • Whether the PHI was actually acquired or viewed, or only exposed in theory.
  • The extent to which the risk has been mitigated (for example, verified destruction, robust encryption at the time of loss, or signed attestation of non-retention).

Apply encryption and proper media destruction to qualify for “secured PHI” safe harbors where appropriate. If your analysis supports a low probability of compromise, you may forgo notification—but you must retain the written analysis and rationale.

Documentation essentials

  • Chronology of events from detection through containment and notification decisions.
  • Evidence supporting the scope (system logs, forensics summaries, data mapping, and identity counts by jurisdiction).
  • Copies of all notices sent, HHS submissions, media materials, and call-center scripts.
  • Retention: Maintain documentation for at least six years from the date of creation or last effective date, whichever is later.

Substitute Notice Best Practices

Substitute Notice addresses situations where you cannot reach some individuals through standard channels. It preserves transparency while managing practical barriers.

When and how to use substitute notice

  • Fewer than 10 unreachable individuals: Use an alternative method such as telephone, email (if consented), or other appropriate means.
  • 10 or more unreachable individuals: Provide a conspicuous posting on your website home page or post a notice in major print or broadcast media in the affected area, for at least 90 days.
  • Include a toll-free number active for at least 90 days so individuals can learn whether they were affected and obtain support.

Execution tips

  • Make the web posting easy to find without revealing PHI; avoid listing specific medical details.
  • Write clear, scannable content with strong calls to action, and offer multilingual options where appropriate.
  • Coordinate timing with individual, HHS, and media notices to maintain consistency and meet Notification Timelines.
  • Monitor inbound questions and update FAQs or scripts to address common concerns quickly.

Conclusion

Effective healthcare third-party breach notification hinges on preparation: know your vendors, map PHI flows, and rehearse response. By aligning Covered Entities and Business Associates on the Breach Notification Rule, applying a rigorous Risk Assessment, meeting Notification Timelines, and executing clear individual, media, and substitute notices, you protect patients and demonstrate compliance.

FAQs.

What constitutes a healthcare third-party breach?

A healthcare third-party breach arises when a vendor or partner that creates, receives, maintains, or transmits PHI on your behalf experiences unauthorized acquisition, access, use, or disclosure of unsecured PHI. Unless your documented risk assessment shows a low probability of compromise, the incident is treated as a reportable breach.

What are the notification requirements for breaches affecting PHI?

You must notify affected individuals without unreasonable delay and no later than 60 days after discovery, include prescribed content, and provide notice to HHS within required timeframes. If 500 or more residents of a state or jurisdiction are affected, you must also issue a media notice within 60 days.

When must a media notice be issued for a breach?

Issue a media notice when a breach involves 500 or more residents of a single state or jurisdiction. Provide the notice to prominent media outlets serving that area, and align the content with the individual notice requirements.

How should business associates report a breach to covered entities?

Business Associates must notify the Covered Entity without unreasonable delay and no later than 60 days after discovery, sharing known facts, scope, affected individuals (if available), PHI types involved, and mitigation steps. They should also coordinate on timing, content, and logistics for individual and media notices.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles