HIPAA Omnibus Rule Update: Breach Presumption, Business Associate Liability, Penalties Explained
Breach Presumption Principle
The HIPAA Omnibus Rule presumes that any impermissible use or disclosure of unsecured PHI is a breach unless you can demonstrate a low probability that protected health information has been compromised. This presumption shifts the burden to you to evaluate the incident, document your analysis, and justify why breach notification is not required.
What breach presumption means
When an incident involves protected health information outside permitted uses or disclosures, you start from “breach.” You may rebut that presumption only by conducting and documenting a risk assessment showing a low probability of compromise. If you cannot support that conclusion, you must treat the event as a reportable breach of unsecured PHI.
Risk assessment factors you must address
- Nature and extent of PHI involved, including types of identifiers and the likelihood of re-identification.
- The unauthorized person who used the PHI or to whom the disclosure was made.
- Whether the PHI was actually acquired or viewed.
- The extent to which the risk has been mitigated (for example, obtaining signed attestations of destruction or confirming return of data).
Secured versus unsecured PHI
If the PHI was rendered unusable, unreadable, or indecipherable to unauthorized individuals (for example, by strong encryption), it is not unsecured PHI and the incident is not a reportable breach. Otherwise, you must assume breach unless your documented analysis supports a low probability of compromise.
Practical steps
- Launch containment immediately and preserve evidence.
- Complete and retain a written risk assessment for each incident.
- Record mitigation steps and any assurances obtained from recipients.
- Decide promptly whether breach notification obligations are triggered, and if so, start drafting notices.
Business Associate Liability Requirements
The Omnibus Rule makes business associates directly liable for compliance with key HIPAA provisions. A business associate includes vendors that create, receive, maintain, or transmit PHI on your behalf—such as cloud service providers, EHR vendors, billing firms, and analytics partners.
Direct liability areas for business associates
- Implementing administrative, physical, and technical safeguards for ePHI under the Security Rule.
- Using or disclosing PHI only as permitted by HIPAA or the business associate agreement.
- Providing breach notification to the covered entity without unreasonable delay.
- Providing individuals access to their PHI and, when applicable, an accounting of disclosures.
- Disclosing PHI to HHS during investigations and compliance reviews.
- Applying the minimum necessary standard where required.
Subcontractor “flow-down” and monitoring
Business associates must execute written business associate agreements with their subcontractors that handle PHI and flow down applicable requirements. They may be liable for a subcontractor’s actions if they knew of a pattern of noncompliance and failed to act.
Covered entity obligations
Covered entities must ensure business associate agreements contain Omnibus Rule elements, verify the vendor’s role and permissible uses, and take reasonable steps if they know of a vendor’s material breach. These covered entity obligations include evaluating vendors’ safeguards, clarifying incident reporting timelines, and ending the relationship or reporting to HHS if a vendor fails to cure a material breach.
Tiered Penalty Structure
HIPAA uses a tiered civil monetary penalties model that scales consequences to culpability. While amounts are adjusted for inflation over time, the structure remains consistent and emphasizes whether the violation stems from willful neglect and whether it was corrected promptly.
The four tiers
- Tier 1 — Unknowing: You did not know and, with reasonable diligence, could not have known of the violation.
- Tier 2 — Reasonable Cause: You knew or should have known, but the violation was not due to willful neglect.
- Tier 3 — Willful Neglect (Corrected): The violation resulted from willful neglect but was corrected within the required period.
- Tier 4 — Willful Neglect (Not Corrected): The violation resulted from willful neglect and was not corrected in a timely manner.
How OCR sets amounts
Within each tier, OCR considers per-violation minimums and maximums and caps on annual totals for identical provisions. It weighs factors such as the size of the breach, duration, harm caused, prior compliance history, financial condition, and degree of cooperation. Penalties are civil monetary penalties; more egregious conduct can be referred for criminal enforcement.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Reducing exposure
- Document risk analyses and ongoing risk management activities.
- Train your workforce; audit access; promptly correct issues.
- Maintain thorough incident and mitigation records to demonstrate diligence.
Enforcement Mechanisms by HHS
The Office for Civil Rights enforcement program uses multiple tools to drive compliance. OCR opens investigations based on complaints, breach reports, and referrals, and it may initiate compliance reviews or audits even without a breach.
Investigations, reviews, and audits
OCR can request policies, procedures, risk analyses, training logs, and logs of disclosures; interview personnel; and test systems. Audits assess whether safeguards and processes align with HIPAA requirements and covered entity obligations.
Resolution agreements and corrective action plans
Many cases end with a resolution agreement requiring a corrective action plan and monitoring. These typically mandate updated risk analysis, risk management, workforce training, policy revisions, and regular reporting to OCR.
Civil penalties and referrals
When warranted, OCR imposes civil monetary penalties within the tiered framework. OCR may refer potential criminal violations—such as knowingly obtaining or disclosing PHI without authorization—to the Department of Justice.
What cooperation looks like
Early containment, transparent communications, thorough documentation, and timely remediation usually reduce enforcement risk and help avoid findings of willful neglect.
Affirmative Defenses to Violations
Under HIPAA, several defenses may bar or mitigate penalties when supported by evidence. The most significant is the statutory bar on civil monetary penalties for violations that are not due to willful neglect and are corrected within 30 days of when you knew or should have known of the violation.
Commonly raised defenses
- 30-day correction bar: If the violation was not due to willful neglect and you corrected it within the required period, OCR may not impose civil monetary penalties.
- Low probability of compromise: A documented risk assessment showing low probability can rebut breach presumption, avoiding breach notification obligations.
- Secured PHI: If PHI was properly encrypted or otherwise secured, the incident does not involve unsecured PHI and is not a reportable breach.
- Reasonable diligence: Demonstrating robust compliance efforts may place a violation in a lower penalty tier and substantially reduce exposure.
- Statute of limitations: OCR generally cannot impose penalties for violations that occurred more than six years earlier.
- Vendor separation: Covered entities with compliant business associate agreements and no knowledge of a vendor’s pattern of noncompliance can argue against liability for independent vendor misconduct.
Notification Obligations for Breaches
If you determine a breach of unsecured PHI occurred, you must notify affected individuals and, in specified cases, HHS and the media. Notice must be provided without unreasonable delay and no later than 60 calendar days after discovery.
Who you must notify and when
- Individuals: Direct written notice by first-class mail (or email if the individual agreed) without unreasonable delay and within 60 days of discovery. For urgent cases with possible imminent misuse, telephone or other appropriate means may be used in addition to written notice.
- HHS: For breaches affecting 500 or more individuals, notify HHS without unreasonable delay and within 60 days of discovery. For fewer than 500, log the incident and report to HHS no later than 60 days after the end of the calendar year.
- Media: If a breach affects 500 or more residents of a state or jurisdiction, you must also notify prominent media outlets serving that area.
- Business associates: A business associate must notify the covered entity without unreasonable delay and no later than 60 days, supplying the identities of affected individuals and other available details.
What the notice must include
- A brief description of what happened, including dates of the breach and discovery.
- The types of PHI involved (for example, names, addresses, diagnoses, or account numbers).
- Steps individuals should take to protect themselves.
- What you are doing to investigate, mitigate harm, and prevent recurrence.
- Contact methods for questions (toll-free number, email, postal address).
Special scenarios
- Insufficient contact information: Provide substitute notice (for example, website posting and toll-free number) following HIPAA’s rules, and consider media notice if required.
- Law enforcement delay: You may delay notification if a law enforcement official determines it would impede a criminal investigation or threaten national security.
- Documentation: Maintain your risk assessment, notices, and related correspondence for at least six years.
Conclusion
The HIPAA Omnibus Rule centers compliance on the breach presumption for unsecured PHI, extends direct liability to vendors through business associate requirements, and enforces a tiered civil monetary penalties framework that escalates for willful neglect. By documenting low probability determinations, strengthening business associate agreements, and executing timely, accurate notifications, you can reduce exposure and align with Office for Civil Rights enforcement expectations.
FAQs.
What is breach presumption under the HIPAA Omnibus Rule?
It is the default assumption that an impermissible use or disclosure of unsecured PHI is a breach. You must perform and document a risk assessment addressing specific factors to show a low probability of compromise; otherwise, breach notification requirements apply.
How does the rule affect business associate liability?
Business associates are directly liable for Security Rule safeguards, impermissible uses and disclosures, breach reporting to covered entities, access and accounting requests, disclosures to HHS, and minimum necessary requirements. They must also flow down obligations to subcontractors through business associate agreements.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.