HIPAA Omnibus Rule Compliance Date Explained: Key Deadlines and Requirements

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Rule Compliance Date Explained: Key Deadlines and Requirements

Kevin Henry

HIPAA

August 20, 2024

6 minutes read
Share this article
HIPAA Omnibus Rule Compliance Date Explained: Key Deadlines and Requirements

Effective Date of HIPAA Omnibus Rule

The HIPAA Omnibus Rule finalized broad Omnibus Rule revisions to the HIPAA privacy rule, Security Rule, Breach Notification Rule, and Enforcement Rule. It was published on January 25, 2013 and took effect on March 26, 2013, aligning HIPAA with the HITECH Act and related statutory changes.

“Effective date” and “compliance date” are different. While the rule became effective March 26, 2013, most covered entities compliance obligations had a later HIPAA compliance deadline. The principal HIPAA enforcement date for the new provisions was September 23, 2013.

Compliance Deadlines for Covered Entities

For health plans, health care providers, and clearinghouses, the core compliance deadline for the Omnibus Rule was September 23, 2013. By that date, you needed updated policies, processes, and documentation that reflected the new standards.

Key milestones

  • January 25, 2013: Final rule published.
  • March 26, 2013: Rule effective; implementation work begins.
  • September 23, 2013: Compliance date for most provisions and OCR enforcement start.

What covered entities had to complete by September 23, 2013

  • Revise policies and procedures to incorporate Omnibus Rule revisions, including limits on marketing and sale of protected health information (PHI).
  • Update the notice of privacy practices (NPP) and redistribute or post as required.
  • Refresh workforce training to cover new rights, breach standards, and uses/disclosures.
  • Adjust breach notification processes to apply the “low probability of compromise” risk assessment.
  • Inventory business associate relationships and update oversight and documentation.

Revising Business Associate Agreements

The Omnibus Rule broadened who is a business associate, capturing entities like cloud service providers and data storage vendors that maintain PHI. Subcontractors that handle PHI also became directly subject to HIPAA through “downstream” obligations, requiring a business associate agreement (BAA) at each tier.

Deadlines and transition relief

  • New or renewed BAAs on or after September 23, 2013: Must meet Omnibus requirements as of execution/renewal.
  • Grandfathered BAAs: If a BAA was in place before January 25, 2013 and not modified between March 26 and September 23, 2013, you had until September 22, 2014 to bring it into compliance.

What a compliant BAA must include

  • Obligations to comply with the Security Rule and relevant provisions of the HIPAA privacy rule.
  • Use and disclosure limits, minimum necessary, and prohibition on unauthorized sale/marketing of PHI.
  • Breach notification duties and timelines, including reporting of security incidents.
  • Downstream subcontractor requirements to sign BAAs and adhere to HIPAA.
  • Termination, return/destruction of PHI, and access, amendment, and accounting support.

Updating Notice of Privacy Practices

Omnibus changes required a refreshed notice of privacy practices (NPP) by September 23, 2013. Your NPP must clearly describe new rights and limitations so individuals understand how their PHI is used and protected.

Required NPP content updates

  • Right to restrict disclosures to a health plan when paying out of pocket in full.
  • Statements on uses/disclosures that require authorization (e.g., most marketing, sale of PHI, psychotherapy notes).
  • Fundraising communications and a clear, no-penalty opt-out.
  • A description of breach notification practices.

Distribution and maintenance

Post the updated NPP prominently at service delivery sites and on your website, and make copies available upon request. Reissue or highlight changes to individuals as applicable; thereafter, update the NPP whenever material changes occur—there is no fixed cycle, but periodic review is prudent.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Enforcement and Penalties

OCR began enforcing the Omnibus provisions on September 23, 2013. From that HIPAA enforcement date forward, both covered entities and business associates faced direct oversight for the new requirements.

Civil penalties and corrective action

HIPAA uses a four-tier penalty structure that scales with culpability—from violations you could not have reasonably known about to willful neglect. Per-violation amounts can reach tens of thousands of dollars, with significant annual caps per identical requirement, and may include corrective action plans and monitoring.

Breach notification expectations

Breaches are presumed reportable unless a documented assessment shows a low probability that PHI was compromised. Notify affected individuals without unreasonable delay and no later than 60 days after discovery, and make required reports to HHS (and, for incidents affecting 500 or more residents of a state or jurisdiction, to prominent media).

Impact on Business Associates

Business associates now have direct liability for compliance with the Security Rule and key privacy provisions, not just contractual duties under a BAA. OCR may investigate and impose penalties for failures such as inadequate risk analysis, weak access controls, or untimely breach reporting.

Subcontractors and accountability

If you are a business associate, your subcontractors that create, receive, maintain, or transmit PHI must sign BAAs and meet HIPAA standards. You remain responsible for ensuring appropriate safeguards and oversight across your vendor chain.

Operational implications

Best Practices for Compliance

  • Map PHI flows to identify all systems, vendors, and subprocessors handling PHI.
  • Update policies, procedures, and forms to reflect Omnibus Rule revisions and the HIPAA privacy rule.
  • Centralize BAA lifecycle management with templates, renewal calendars, and transition tracking.
  • Refresh workforce training and role-based guidance ahead of system or policy changes.
  • Test breach response plans; pre-draft notices and establish evidence collection protocols.
  • Harden security controls: encryption, MFA, audit logging, and periodic access reviews.
  • Monitor changes in guidance and document all decisions, risk assessments, and remediation steps.

Conclusion

The Omnibus Rule became effective March 26, 2013, with a primary compliance and enforcement date of September 23, 2013. BAAs qualifying for transition relief were due by September 22, 2014. Staying compliant means keeping BAAs current, maintaining an accurate NPP, training your workforce, and continuously managing privacy and security risks.

FAQs

What is the effective date of the HIPAA Omnibus Rule?

The final rule took effect on March 26, 2013, following publication on January 25, 2013.

When must covered entities comply with the Omnibus Rule?

Most provisions carried a compliance deadline of September 23, 2013, which also marked the start of active enforcement.

What are the deadlines for revising business associate agreements?

BAAs executed or renewed on or after September 23, 2013 had to be Omnibus-compliant at signing. Grandfathered BAAs in place before January 25, 2013 and not modified between March 26 and September 23, 2013 had until September 22, 2014 to be updated.

How often must notice of privacy practices be updated?

There is no fixed schedule. Update the NPP whenever there is a material change in practices or law; after the Omnibus Rule, updates were due by September 23, 2013, and periodic reviews are recommended thereafter.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles