HIPAA Omnibus Final Rule Requirements: Business Associates, Breach, and NPP Updates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Final Rule Requirements: Business Associates, Breach, and NPP Updates

Kevin Henry

HIPAA

August 21, 2024

9 minutes read
Share this article
HIPAA Omnibus Final Rule Requirements: Business Associates, Breach, and NPP Updates

The HIPAA Omnibus Final Rule reshaped how you safeguard Protected Health Information by expanding business associate obligations, refining the Breach Notification Rule, and requiring updates to the Notice of Privacy Practices. This guide explains what changed, why it matters, and how to operationalize the requirements without disrupting care.

Throughout, you will see how the HIPAA Privacy Rule and HIPAA Security Rule connect, what risk analysis and incident-specific risk assessments demand, and how Civil Monetary Penalties can apply when controls fall short.

Business Associate Liability

Who qualifies as a business associate

A business associate (BA) is any vendor or contractor that creates, receives, maintains, or transmits PHI on your behalf. This includes data hosting providers, claims processors, health information exchanges, e-prescribing gateways, analytics firms, and consultants who access PHI to perform services for a covered entity or another BA (as a subcontractor).

Direct obligations and enforcement exposure

The Omnibus Final Rule makes BAs directly liable for compliance with the HIPAA Security Rule and for certain provisions of the HIPAA Privacy Rule, including permissible uses and disclosures, minimum necessary, and providing access to PHI when their role requires it. Violations by a BA can trigger investigations, corrective action plans, and Civil Monetary Penalties directly against the BA.

Subcontractors are in scope

Any subcontractor that handles PHI for your BA inherits BA status. You must flow down the same privacy and security requirements, ensuring written business associate agreements (BAAs) extend to lower-tier vendors that create, receive, maintain, or transmit PHI.

Business associate agreements that work

  • Define permitted and required PHI uses and disclosures, aligning with the Privacy Rule.
  • Require administrative, physical, and technical safeguards consistent with the Security Rule.
  • Mandate breach reporting to the covered entity without unreasonable delay.
  • Flow down obligations to subcontractors, including breach reporting and safeguards.
  • Address return or destruction of PHI at termination and prohibit unauthorized sale of PHI.

Breach Notification Procedures

Presumption of breach and the four-factor test

The rule presumes an impermissible use or disclosure is a breach unless you document a low probability of compromise using an incident-specific risk assessment. Your analysis must consider:

  • Nature and extent of PHI involved (types of identifiers and the likelihood of re-identification).
  • Unauthorized person who used or received the PHI.
  • Whether the PHI was actually acquired or viewed.
  • The extent to which the risk has been mitigated (e.g., prompt retrieval, satisfactory assurances).

If you cannot support a low-probability finding, treat the incident as a breach and proceed with notifications under the Breach Notification Rule.

Timelines and recipients

  • Individuals: Notify without unreasonable delay and no later than 60 calendar days after discovery. Use first-class mail (or email if the individual agreed to electronic notice).
  • U.S. Department of Health and Human Services: For breaches affecting 500 or more individuals, notify without unreasonable delay and no later than 60 days after discovery. For fewer than 500, log the event and submit annually.
  • Media: If a breach affects 500 or more residents of a single state or jurisdiction, notify prominent media outlets in that area.
  • Business associates: Must notify the covered entity without unreasonable delay and no later than 60 days after discovery, supplying known details and supplementing as more facts emerge.

Content of the notice

  • A brief description of what happened, including dates of incident and discovery.
  • The types of PHI involved (for example, name, diagnosis, treatment, account number).
  • Steps individuals should take to protect themselves.
  • What you are doing to investigate, mitigate harm, and prevent recurrence.
  • Contact information for questions and assistance.

Safe harbor through encryption and lawful delays

If PHI is properly encrypted or destroyed in line with recognized guidance, it is not “unsecured PHI,” and breach notification is typically not required. Law enforcement may request a delay to avoid impeding an investigation; document the request and resume notices when allowed.

Risk Assessment Requirements

Risk assessment vs. risk analysis

Do not confuse the incident-focused breach risk assessment with the enterprise-wide Security Rule risk analysis. The latter is a continuous, documented evaluation of threats and vulnerabilities to confidentiality, integrity, and availability of electronic PHI, informing your safeguards. Both are required: risk analysis for your security program, and a four-factor assessment for each impermissible use or disclosure.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Documentation that stands up to scrutiny

  • Record your assessment methodology, evidence, and rationale for every incident.
  • Tie decisions to your organization’s risk analysis, policies, and technical audit logs.
  • Capture mitigation steps (e.g., privilege revocation, data recovery, recipient attestations).
  • Retain documentation for at least six years from the date of creation or last effective date.

Practical tips

  • Use standardized questionnaires and decision trees to drive consistent outcomes.
  • Align with minimum necessary, access controls, and transmission security requirements.
  • Reassess risk when systems, vendors, or data flows change.

Notice of Privacy Practices Updates

What must change

The Omnibus Final Rule requires your NPP to reflect new rights and limitations under the HIPAA Privacy Rule. At a minimum, include:

  • A statement that most uses and disclosures of psychotherapy notes, marketing, and any sale of PHI require individual authorization, with limited exceptions (Individual Authorization Requirements).
  • An explanation of the right to restrict disclosures to a health plan for items or services paid in full out-of-pocket.
  • A description of breach notification duties and how individuals will be informed of breaches of unsecured PHI.
  • A notice that individuals may opt out of fundraising communications.
  • A statement that genetic information will not be used or disclosed for underwriting purposes.

How to distribute and post

  • Post the current NPP prominently in physical locations and on your public website, if you have one.
  • Provide the NPP to new patients at the first service encounter and make copies available on request.
  • When materially revised, replace posted copies and inform individuals of the changes using your standard communication channels.

Make it clear and actionable

Write for comprehension: plain language, headings, and contact points for privacy questions and complaints. Ensure your NPP aligns with actual practices and downstream BAAs to avoid inconsistencies.

Civil Monetary Penalties

The tiered penalty framework

HIPAA enforcement uses a four-tier structure reflecting culpability: violations due to a lack of knowledge; violations due to reasonable cause; willful neglect corrected within the required timeframe; and willful neglect not corrected. Penalty ranges escalate across tiers, and amounts are adjusted periodically for inflation.

Factors that influence the outcome

  • Nature and extent of the violation and the resulting harm.
  • Number of individuals affected and sensitivity of PHI exposed.
  • History of prior compliance, corrective actions, and cooperation.
  • Organizational size, resources, and the effectiveness of your compliance program.

Enforcement may also include resolution agreements and multi-year corrective action plans. Strong documentation, timely breach handling, and demonstrable risk analysis efforts can mitigate exposure.

Compliance Implementation Strategies

Strengthen governance and vendor oversight

  • Inventory all BAs and subcontractors that touch PHI; confirm signed BAAs with breach reporting terms.
  • Establish BA onboarding, due diligence, and security review processes, including periodic reassessments.
  • Define clear ownership for Privacy Rule and Security Rule compliance across legal, security, and operations.

Operationalize the Security Rule

  • Perform an enterprise-wide risk analysis; prioritize controls for access, audit logging, encryption, and integrity.
  • Implement training, sanction policies, and role-based access to support minimum necessary.
  • Test backups and disaster recovery to protect availability of electronic PHI.

Build a breach response playbook

  • Define steps for detection, containment, forensic investigation, and the four-factor assessment.
  • Use letter templates that meet Breach Notification Rule content requirements and maintain a breach log.
  • Track the 60-day outer boundary, with interim updates to covered entities when you are a BA.

Align NPP, authorizations, and forms

  • Update your NPP to reflect authorization requirements for marketing and sale of PHI.
  • Refresh authorization forms and fundraising materials; provide simple opt-out mechanisms.
  • Ensure intake workflows can honor requests to restrict disclosures for out-of-pocket payments.

Measure and improve

  • Audit access logs, BA performance, and policy adherence; remediate gaps promptly.
  • Run tabletop exercises for likely incidents (misdirected mail, misconfigured cloud storage, lost devices).
  • Maintain records for six years and periodically review your risk analysis and incident metrics.

Conclusion

The HIPAA Omnibus Final Rule tightened accountability across your ecosystem: business associates now carry direct liability, breach handling follows a documented risk assessment, and your NPP must clearly communicate rights and limits. By integrating the Privacy Rule, Security Rule, and Breach Notification Rule into daily operations, you can reduce risk, maintain trust, and avoid Civil Monetary Penalties.

FAQs.

What are the new liabilities for business associates under the HIPAA Omnibus Final Rule?

Business associates are directly liable for complying with the HIPAA Security Rule and key Privacy Rule provisions, including permissible uses and disclosures, minimum necessary, and providing access when applicable. They must implement safeguards, report breaches to covered entities without unreasonable delay, and bind subcontractors to the same obligations. Failures can lead to investigations, corrective action plans, and Civil Monetary Penalties imposed directly on the BA.

How does the rule affect breach notification timelines?

The rule presumes a breach unless your documented four-factor assessment shows a low probability of compromise. If notification is required, you must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. Large breaches require timely notice to HHS and, when 500 or more residents of a single state or jurisdiction are affected, to the media. Business associates must notify covered entities within the same 60-day outer limit.

What updates are required for the Notice of Privacy Practices?

Your NPP must explain that most uses and disclosures of psychotherapy notes, marketing, and any sale of PHI require individual authorization; describe breach notification duties; inform individuals of the right to opt out of fundraising communications; state the prohibition on using genetic information for underwriting; and describe the right to restrict disclosures to a health plan when services are paid in full out-of-pocket. It must be posted prominently, provided to new patients, and updated when materially revised.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles