HIPAA Incident Response Plan: How to Build One (Requirements, Steps, and Template)

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Incident Response Plan: How to Build One (Requirements, Steps, and Template)

Kevin Henry

Incident Response

September 13, 2025

7 minutes read
Share this article
HIPAA Incident Response Plan: How to Build One (Requirements, Steps, and Template)

Incident Identification and Risk Assessment

Recognizing a potential incident

Your HIPAA incident response plan starts the moment you suspect exposure of Protected Health Information (PHI). Common triggers include lost or stolen devices, misdirected emails, unauthorized EHR access, ransomware, misconfigurations, third‑party alerts, or unusual network behavior.

Rapid triage and initial risk assessment

Open an incident record immediately and capture who, what, when, where, and how. Classify severity, preserve volatile data, and restrict further access. Begin a structured Risk Assessment to determine if the event likely compromised PHI and whether it meets the definition of a reportable breach.

Determining if it is a reportable breach

Evaluate four core factors: the nature and extent of PHI involved, the unauthorized person who used or received the PHI, whether the PHI was actually acquired or viewed, and the extent to which the risk has been mitigated. If there is more than a low probability of compromise of unsecured PHI, treat it as a breach and proceed to notification steps.

Evidence preservation

Preserve logs, images, emails, screenshots, and system states. Maintain chain of custody and avoid altering sources. Good documentation now accelerates containment and supports later Incident Documentation, regulatory inquiries, and any insurance claims.

Defining Roles and Responsibilities

Core team and decision rights

Assign a named Incident Response Lead to coordinate actions and make time‑sensitive decisions. Define roles for the Privacy Officer, Security Officer, IT/SecOps, Legal/Compliance, Communications, HR, and an executive sponsor to remove blockers and approve notifications.

RACI and on‑call coverage

Create a RACI matrix covering detection, triage, containment, investigation, notification, and post‑incident review. Establish 24/7 on‑call rotations, escalation thresholds, and maximum response times (for example, analyst triage within one hour and leadership briefing within four hours).

Third‑party coordination

Map Business Associates and their points of contact. Your plan should describe how you require and receive timely incident notices from vendors, plus how you validate their corrective actions and track shared responsibilities under the Breach Notification Rule.

Establishing Communication Channels

Secure internal communication

Use approved, monitored channels for incident traffic and a case management system for the record of evidence and decisions. Stand up a “war room,” maintain a single source of truth, and prohibit sharing PHI in chat or email threads unless strictly necessary and access‑controlled.

Out‑of‑band options and contact directories

If normal systems are compromised, switch to out‑of‑band channels. Keep current call trees, personal contact methods for key staff, and preapproved briefing templates. Practice these transitions during exercises.

External communications

Define how and when you coordinate with patients, partners, media, law enforcement, insurers, and the HHS Office for Civil Rights. All external messaging should be reviewed by Legal/Compliance and Communications for accuracy, consistency, and minimal disclosure of sensitive details.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Responding and Mitigating Incidents

Containment strategies

  • Isolate affected endpoints, revoke stolen credentials, disable suspicious sessions, and geofence or block malicious IPs.
  • Rotate keys and tokens, force password resets, and remove unauthorized access paths.
  • Quarantine phishing messages, stop exfiltration channels, and snapshot systems before cleanup.

Eradication and recovery

  • Remove malware, backdoors, and persistence; patch vulnerabilities and harden configurations.
  • Restore from known‑good backups, validate data integrity, and monitor closely for recurrence.
  • Document every corrective step in your Incident Documentation with timestamps and owners.

Corrective Actions

  • Address root causes with policy updates, additional MFA, network segmentation, least‑privilege access, and improved email and endpoint protections.
  • Deliver targeted training to address human factors, update vendor controls, and add monitoring for early detection of similar events.

Notification Procedures and Compliance

When notification is required

Under the Breach Notification Rule, you must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery of a breach of unsecured PHI. For incidents affecting 500 or more individuals in a state or jurisdiction, also notify the media within 60 days and notify HHS through the HHS Office for Civil Rights within the same time frame.

Reporting thresholds and timing

For breaches affecting fewer than 500 individuals, log them and submit the annual report to HHS within 60 days of the end of the calendar year. Business Associates must notify the covered entity without unreasonable delay and no later than 60 days, identifying the affected individuals and the nature of the PHI involved.

Content of notices

Notices should explain what happened (including dates), the types of PHI involved, steps you are taking (containment and corrective actions), what affected individuals can do, and how to contact your organization. If state law sets shorter deadlines or additional content requirements, follow the stricter standard.

Special considerations

If PHI was rendered unusable, unreadable, or indecipherable (for example, through strong encryption), the incident may not constitute a reportable breach. Document your rationale and evidence within the risk assessment.

Documentation and Recordkeeping

Incident Documentation essentials

  • Unique incident ID, reporter, date/time, and systems or data involved.
  • Investigation timeline, indicators of compromise, and containment strategies used.
  • Risk Assessment details, decision to notify (or not), and notification artifacts.
  • Corrective Actions, validation results, and closure criteria.
  • Preservation of evidence and chain of custody.

Retention and audit readiness

Retain policies, procedures, risk analyses, training, and incident records for at least six years, along with breach logs for events affecting fewer than 500 individuals. Keep documentation organized and easily retrievable for audits and inquiries.

Incident Response Plan Template (sample outline)

  • Purpose and scope; definitions (including PHI and “breach”); governance and approval.
  • Roles and Responsibilities; RACI; on‑call and escalation paths; decision authorities.
  • Incident lifecycle and severity matrix; playbooks for common scenarios (phishing, lost device, ransomware, misdirected PHI).
  • Detection and triage procedures; evidence handling; Incident Documentation standards.
  • Containment Strategies; eradication and recovery; Corrective Actions tracking.
  • Notification workflows for individuals, HHS Office for Civil Rights, media, and partners.
  • Vendor/Business Associate coordination; service‑level expectations; breach data collection.
  • Training, tabletop exercises, metrics, and plan maintenance schedule.
  • Appendices: contact lists, forms (incident intake, risk assessment, notification content), and checklists.

Conducting Post-Incident Review and Plan Updates

Lessons learned and root cause

Within days of containment, hold a blameless post‑incident review to reconstruct the timeline, validate findings, and identify technical and human contributors. Confirm which controls failed, which worked, and what would have shortened detection or response time.

Action tracking and validation

Convert findings into specific, time‑bound Corrective Actions with owners and due dates. Validate each change through testing, monitoring, or an additional tabletop exercise. Update training content and adjust vendor requirements as needed.

Plan maintenance and continuous improvement

Revise your HIPAA Incident Response Plan, playbooks, contact lists, and risk register. Track metrics such as mean time to detect, contain, notify, and close; use trends to prioritize investments and reduce the impact of future incidents.

Conclusion: key takeaways

A strong HIPAA incident response plan hinges on rapid identification, disciplined Risk Assessment, decisive containment, compliant notifications, and rigorous documentation. Treat each event as an opportunity to harden controls and raise organizational readiness.

FAQs

What are the essential components of a HIPAA incident response plan?

Include governance and scope; clearly defined roles; incident intake and triage; evidence handling; Risk Assessment criteria; Containment Strategies; eradication and recovery; Corrective Actions; notification workflows for individuals, HHS, media, and partners; Incident Documentation standards; vendor coordination; training and exercises; metrics; and a schedule for plan maintenance.

How soon must a breach be reported under HIPAA?

You must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovering a breach of unsecured PHI. If 500 or more individuals are affected in a state or jurisdiction, notify the media and the HHS Office for Civil Rights within 60 days. Breaches affecting fewer than 500 individuals are reported to HHS annually within 60 days after the end of the calendar year.

What steps should be taken during post-incident review?

Reconstruct the timeline, confirm the scope of PHI affected, perform root cause analysis, and identify what helped or hindered response. Translate findings into prioritized Corrective Actions with owners and deadlines, validate fixes, update policies and training, and revise your plan and playbooks accordingly.

How does risk assessment influence incident response?

Risk Assessment determines whether an event is a reportable breach, drives containment priorities, and shapes notification content and timing. By analyzing the nature of PHI, who accessed it, whether it was actually acquired or viewed, and how effectively you mitigated exposure, you choose proportionate actions and document defensible decisions.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles