HIPAA Omnibus Final Rule Explained: Key Modifications, Requirements, and Compliance Steps
The HIPAA Omnibus Final Rule modernized the Privacy, Security, Enforcement, and Breach Notification Rules, clarifying responsibilities for covered entities and business associates while strengthening protections for Protected Health Information (PHI). Below, you’ll find the key modifications, practical requirements, and compliance steps to help you operationalize the Privacy Rule Amendments and meet your compliance deadlines.
Business Associate Liability
The rule makes business associates—and their subcontractors—directly liable for compliance with the HIPAA Security Rule and certain provisions of the Privacy Rule. Any organization that creates, receives, maintains, or transmits PHI on your behalf is a business associate, even if it only stores encrypted data (for example, cloud providers). This expands enforcement beyond covered entities and places obligations across the full vendor chain.
What changed
- Business associates must implement administrative, physical, and technical safeguards, conduct risk analyses, and maintain written policies and workforce training.
- Downstream subcontractors are bound by the same requirements through “flow‑down” Business Associate Agreements (BAAs).
- Business associates are directly subject to breach reporting under the Breach Notification Rule and may face Civil Money Penalties for violations.
Compliance steps
- Inventory all vendors that handle PHI; classify each as a business associate or subcontractor.
- Execute or update Business Associate Agreements to reflect Omnibus requirements, including security obligations, breach reporting timeframes, and flow‑down terms.
- Verify each business associate’s security program (risk analysis, safeguards, incident response) and document due diligence.
- Maintain a central register of BAAs and retain documentation for at least six years from the last effective date.
- Set internal compliance deadlines for periodic vendor reviews and contract refresh cycles.
Marketing and Fundraising Restrictions
The rule tightens marketing and fundraising practices to ensure transparent use of PHI. In general, marketing communications that involve financial remuneration from a third party require prior, written authorization. The sale of PHI likewise requires authorization. For fundraising, the rule allows limited use of PHI but mandates a simple, clear opt‑out.
What changed
- Marketing: Paid outreach about third‑party products or services requires authorization, with narrow exceptions (for example, face‑to‑face communications or nominal promotional gifts).
- Refill reminders and adherence messages are allowed if any payment is reasonably related to the cost of the communication.
- Fundraising: You may use limited data (demographics, dates of service, department of service, treating physician, outcome, and health insurance status), but every message must include a no‑cost, no‑hassle opt‑out.
Compliance steps
- Map all outreach activities; distinguish treatment/operations communications from marketing.
- Update authorization forms and processes for paid marketing and any sale of PHI.
- Embed opt‑out mechanisms in every fundraising message and honor preferences system‑wide.
- Train marketing and development teams on minimum necessary use of PHI and permissible data elements.
- Reflect these practices in your Notice of Privacy Practices and internal policies.
Individual Rights Expansion
The Omnibus Final Rule expands individuals’ control over their PHI. You must provide electronic access when you maintain PHI electronically, and you must honor a patient’s direction to transmit a copy to a designated third party. Individuals may also restrict disclosures to a health plan when they pay out‑of‑pocket in full for a service.
What changed
- Right of access: Provide copies in the requested form and format if readily producible; respond within 30 days (one 30‑day extension allowed).
- Third‑party directive: Upon a patient’s written request, send a copy of PHI to another person or entity.
- Restrictions: When a patient pays a provider in full out‑of‑pocket, you must not disclose that specific information to a health plan for payment or operations unless required by law.
- Fees: Limit any access fee to a reasonable, cost‑based amount (labor for copying, supplies, postage, and optional fees for creating an electronic copy or summary if requested).
Compliance steps
- Stand up a streamlined access workflow for electronic and paper records with a 30‑day response SLA.
- Offer secure electronic delivery options (portal, encrypted email, or media) and document patient preferences.
- Implement pay‑in‑full flags to enforce health‑plan disclosure restrictions across billing and release‑of‑information systems.
- Publish a compliant fee schedule and train staff on allowable cost‑based fees.
- Track and report access metrics to meet internal compliance deadlines and quality goals.
Breach Notification Requirements
The rule replaces the prior “harm threshold” with a presumption of breach for any impermissible use or disclosure of unsecured PHI unless you can demonstrate a low probability of compromise through a documented risk assessment. Timely notification to individuals, HHS, and in some cases the media, is mandatory.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
What changed
- Four‑factor risk assessment: Evaluate the nature and extent of PHI involved, the unauthorized person, whether the PHI was actually acquired/viewed, and the extent of mitigation.
- Timelines: Notify affected individuals without unreasonable delay and no later than 60 calendar days from discovery.
- Thresholds: Report to HHS immediately for incidents affecting 500+ individuals in a state/jurisdiction; smaller breaches are logged and submitted annually.
- Safe harbors: Breaches of properly encrypted or destroyed PHI generally are not reportable.
- Business associates must notify covered entities and provide details sufficient for individual notices.
Compliance steps
- Adopt a standard breach risk‑assessment template aligned to the four factors and the Breach Notification Rule.
- Harden preventive controls (access management, encryption, device/media controls) and test incident response.
- Define vendor reporting SLAs in BAAs and rehearse joint response playbooks.
- Prepare notice templates and media protocols; maintain an incident log for annual reporting.
- Retain investigation records and decisions for at least six years.
Genetic Information Protection
The rule integrates Genetic Information Nondiscrimination protections by treating genetic information as PHI and prohibiting most health plans from using or disclosing genetic information for underwriting purposes. “Underwriting” includes eligibility, premium setting, and benefit determinations. Long‑term care insurers are generally not subject to this underwriting prohibition.
What changed
- Genetic information—such as genetic test results, family medical history, and requests for genetic services—is protected PHI.
- Health plans (with limited exceptions) may not use or disclose genetic information for underwriting.
- Notice of Privacy Practices must describe this prohibition for applicable plans.
Compliance steps
- Audit plan underwriting workflows to exclude genetic information and remove it from rating algorithms.
- Update data maps and access controls to flag and segment genetic data elements.
- Revise plan documents and member communications to reflect the prohibition.
- Train benefits, actuarial, and utilization‑management teams on permitted versus prohibited uses.
Enforcement and Penalties
OCR may investigate complaints, conduct compliance reviews, and impose tiered Civil Money Penalties. Penalties scale by culpability—from “did not know” to “willful neglect not corrected”—with per‑violation amounts and annual caps per violation type. Business associates face the same enforcement framework.
What changed
- Four penalty tiers with escalating minimums; willful neglect triggers mandatory penalties.
- Resolution agreements and corrective action plans (CAPs) are common outcomes; monitoring may follow.
- Criminal liability may apply for certain knowing disclosures of PHI.
Compliance steps
- Establish governance (privacy and security officers, committees) and document your compliance program.
- Conduct enterprise risk analyses, remediate findings, and track evidence of completion.
- Implement role‑based training with sanction policies and ongoing awareness.
- Measure program effectiveness using audits, access logs, and key risk indicators.
- Maintain defensible documentation to demonstrate diligence if OCR inquires.
Notice of Privacy Practices
The Omnibus Final Rule requires content updates to your Notice of Privacy Practices so individuals understand how their PHI may be used and the choices they have. The NPP must address marketing, the sale of PHI, fundraising opt‑outs, breach notifications, restrictions when patients pay out‑of‑pocket, and—where applicable—limits on using genetic information for underwriting.
Compliance steps
- Revise the NPP to reflect Privacy Rule Amendments, including marketing and fundraising rules and breach notification rights.
- Describe the right to restrict disclosures to a health plan for services paid in full out‑of‑pocket.
- Explain any prohibition on the sale of PHI and how individuals can opt out of fundraising.
- Post the updated NPP prominently, distribute to new patients, and make it available upon request.
- Synchronize front‑desk scripts, portals, and acknowledgement processes with the new NPP language.
In practice, successful programs translate these changes into clear procedures, well‑designed Business Associate Agreements, disciplined breach response, and predictable review cycles tied to compliance deadlines. Done well, your organization protects individuals while reducing operational and enforcement risk.
FAQs
What are the key changes in the HIPAA Omnibus Final Rule?
The rule strengthens privacy and security by expanding business associate liability, tightening marketing and fundraising rules, enhancing individual rights to electronic access and third‑party directives, presuming breach unless low probability of compromise is shown, protecting genetic information from use in underwriting, increasing enforcement through tiered Civil Money Penalties, and requiring updated Notices of Privacy Practices.
How does the rule affect business associate liabilities?
Business associates and their subcontractors are directly responsible for Security Rule compliance and certain Privacy Rule obligations. They must implement safeguards, conduct risk analyses, report breaches under the Breach Notification Rule, and sign BAAs that flow obligations downstream. Failure to comply can lead to OCR investigations and penalties.
What are the new requirements for breach notifications?
Any impermissible use or disclosure of unsecured PHI is presumed a breach unless a documented four‑factor risk assessment shows a low probability of compromise. You must notify affected individuals without unreasonable delay and within 60 days of discovery, notify HHS (and in some cases the media), and maintain an incident log for smaller breaches.
How does the rule protect genetic information?
Genetic information is treated as PHI and cannot be used or disclosed by most health plans for underwriting purposes. The NPP for applicable plans must explain this prohibition, and organizations should segment genetic data, adjust underwriting workflows, and train staff to prevent prohibited uses.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.