HIPAA Compliance Guide: What to Do After Unauthorized Patient Information Disclosure
Understanding Unauthorized Disclosure of PHI
When patient data is exposed, your first task is to determine whether Protected Health Information (PHI) was involved and if the use or disclosure was impermissible under the HIPAA Privacy Rule. PHI includes any individually identifiable health information in any form—paper, electronic, or oral—linked to a person’s past, present, or future health or payment.
Unauthorized disclosure occurs when PHI is accessed, used, or shared in a way not permitted by HIPAA or beyond the Minimum Necessary Standard. Common examples include misdirected emails or faxes, lost or stolen devices lacking encryption, snooping by workforce members, and disclosures to unauthorized family members or vendors.
Key exceptions that are not breaches
- Unintentional access or use by a workforce member acting in good faith within scope of authority, without further improper use.
- Inadvertent disclosure from one authorized person to another within the same organization or organized health care arrangement, if not further misused.
- Situations where the recipient could not reasonably have retained the information (for example, an unopened, returned letter).
If none of these exceptions apply, treat the incident as a potential breach and proceed with containment, documentation, and analysis.
Following the Breach Notification Rule
The Breach Notification Rule sets the roadmap for whom to notify, what to say, and how quickly to act. Your organization must be able to demonstrate compliance through clear, contemporaneous documentation at every step.
Who you must notify
- Impacted individuals: Provide direct notice to each person whose PHI was compromised.
- U.S. Department of Health and Human Services (HHS): Report through the federal portal according to case size.
- Media: If a breach affects 500 or more residents of a state or jurisdiction, notify prominent media outlets serving that area.
What the notice must include
- A brief description of what happened, including the breach date and date of discovery if known.
- The categories of PHI involved (for example, name, diagnosis, Social Security number), not the actual data.
- Steps individuals should take to protect themselves.
- What your organization is doing to investigate, mitigate harm, and prevent recurrence.
- Contact methods for questions (toll-free number, email, or postal address).
How to notify
- Individuals: First-class mail or email if the person has agreed to electronic notice. Use substitute notice if contact details are insufficient or out of date.
- Media: Press release to appropriate outlets when required by case size.
- HHS: Submit via the designated online portal per the applicable Reporting Deadlines.
Business associates
Business associates must notify the covered entity without unreasonable delay, supplying the identities of affected individuals and all information needed for downstream notices. Covered entities remain responsible for ensuring complete, timely notifications.
Conducting Risk Assessment for Breaches
Use a consistent, documented Risk Assessment Protocol to decide whether an impermissible use or disclosure constitutes a reportable breach. This analysis should be fact-specific, repeatable, and retained in your compliance files.
The four-factor assessment
- Nature and extent of PHI involved, including identifiers and the likelihood of re-identification.
- The unauthorized person who used the PHI or to whom the disclosure was made, and their relationship to the patient or entity.
- Whether the PHI was actually acquired or viewed, or merely at risk of exposure.
- The extent to which risks have been mitigated (for example, obtaining a satisfactory written assurance of destruction or verified return).
Document your analysis, findings, and decision. If the evidence supports a low probability that PHI has been compromised, the incident may not be a breach requiring notification. If the probability of compromise cannot be reduced to low, proceed with notifications under the Breach Notification Rule.
Documentation essentials
- Incident timeline, systems and data involved, and containment steps taken.
- Evidence supporting each factor and how you weighed it.
- Final determination, approvals, and date of decision.
Complying with Reporting Timeframes
HIPAA’s Reporting Deadlines use calendar days and start at discovery—the date the breach is known, or by reasonable diligence should have been known. Build these clocks into your incident response plan to avoid delays.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentCore deadlines
- Individuals: Without unreasonable delay and no later than 60 days after discovery.
- HHS (500+ individuals): Without unreasonable delay and no later than 60 days after discovery.
- Media (500+ in a state/jurisdiction): Within the same 60-day window.
- HHS (<500 individuals): No later than 60 days after the end of the calendar year in which the breach was discovered.
Special timing considerations
- Business associates: Notify the covered entity without unreasonable delay so the covered entity can meet its deadlines.
- Law enforcement delay: If a law enforcement official states that notice would impede an investigation or harm national security, delay notifications for the specified period.
- Weekends and holidays: Deadlines are calendar-based; plan mailings and approvals accordingly.
Mitigating Harmful Effects of Disclosure
Mitigation Strategies should run in parallel with investigation. Your goal is to reduce the risk of misuse, reassure patients, and stabilize operations while you fulfill regulatory duties.
Immediate containment and recovery
- Secure systems, disable compromised accounts, rotate credentials, and revoke inappropriate access.
- Retrieve, sequester, or request deletion of disclosed PHI; obtain written confirmation when feasible.
- Preserve forensic evidence and maintain a detailed chain of custody.
Support for affected individuals
- Provide clear guidance on steps they can take (for example, monitoring accounts or placing fraud alerts, depending on the data involved).
- Offer identity protection services when sensitive identifiers (such as SSNs) were involved.
- Staff a call center or help line to answer questions and document concerns.
Operational improvements
- Address process gaps, retrain staff involved, and apply appropriate sanctions under your policies.
- Update risk analyses and risk management plans to reflect new controls.
Implementing Preventive Measures
Strengthen your privacy and security program so incidents are rarer, smaller, and easier to manage. Embed Administrative Safeguards, along with technical and physical controls, to operationalize the Minimum Necessary Standard.
Administrative safeguards
- Role-based access, workforce training, sanction policies, and documented procedures for uses, disclosures, and minimum necessary review.
- Vendor governance: Business associate agreements, security questionnaires, right-to-audit clauses, and downstream subcontractor flow-downs.
- Incident response playbooks, tabletop exercises, and breach decision trees aligned to your Risk Assessment Protocol.
Technical safeguards
- Encryption of data at rest and in transit, strong authentication (including MFA), and timely patching.
- Data loss prevention, email security (TLS, DMARC), MDM for laptops and phones, and privacy screens for workstations.
- Comprehensive logging, alerting, and audit review for access to PHI.
Physical safeguards
- Secure facilities and records, locked storage, clean desk practices, and device/media disposal procedures.
- Visitor controls and restricted areas for PHI processing and storage.
Process controls for minimum necessary
- Standardized disclosure workflows that default to the least information needed.
- Checklists for outbound communications (addresses, recipients, attachments, and content redaction).
Managing Incidental Disclosures
Incidental disclosures are limited, unavoidable by-products of permitted uses or disclosures—such as a patient briefly overhearing another’s name at a nursing station—when reasonable safeguards and the Minimum Necessary Standard are in place. These are not violations when your underlying use or disclosure is permitted and safeguards are effective.
Best practices to minimize incidental disclosures
- Speak quietly in public areas, use privacy curtains or partitions, and position screens away from public view.
- Implement privacy screens, automatic screen locks, and workstation placement guidelines.
- Train staff to avoid discussing PHI in elevators, lobbies, or other public spaces.
When to reassess
If an “incidental” exposure occurs because safeguards were insufficient or the underlying disclosure was not permitted, treat it as a potential breach. Reevaluate controls, retrain staff, and document corrective actions.
Conclusion
After any unauthorized patient information disclosure, act fast: contain the incident, apply your Risk Assessment Protocol, meet Reporting Deadlines under the Breach Notification Rule, and mitigate harm to patients. Then harden safeguards—administrative, technical, and physical—to prevent a repeat and reinforce the Minimum Necessary Standard throughout daily operations.
FAQs.
What steps should be taken immediately after unauthorized disclosure of PHI?
Contain the incident, preserve evidence, and document facts. Secure accounts and devices, recover or request deletion of disclosed PHI, and notify your privacy officer. Begin the four-factor risk assessment, log decisions, and prepare draft notices in case the incident is determined to be a reportable breach.
How does the Breach Notification Rule affect reporting obligations?
It requires notifying affected individuals, HHS, and sometimes the media, within defined timeframes. Notices must describe the incident, the PHI involved, steps individuals can take, your mitigation efforts, and contact information. Business associates must notify covered entities so those entities can fulfill these obligations.
What criteria determine if a PHI incident constitutes a breach?
An impermissible use or disclosure is presumed a breach unless a documented four-factor analysis shows a low probability that the PHI has been compromised. The factors consider the nature of the PHI, who received it, whether it was actually acquired or viewed, and the extent of mitigation.
When must breaches be reported to HHS?
For breaches affecting 500 or more individuals, report to HHS without unreasonable delay and no later than 60 days from discovery; for fewer than 500 individuals, report no later than 60 days after the end of the calendar year in which the breach was discovered.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment