HIPAA Privacy Rule Breach Response: Reporting, Notifications, and Risk Mitigation
Definition of Breach
A breach is any acquisition, access, use, or disclosure of unsecured Protected Health Information (PHI) that is not permitted by the HIPAA Privacy Rule and compromises the security or privacy of the PHI. A breach is presumed unless you can demonstrate, through a documented assessment, a low probability that the PHI has been compromised.
Three narrow exceptions apply: unintentional access or use by a workforce member acting in good faith within scope; inadvertent disclosure between authorized persons within the same organization; and disclosures where you have a good-faith belief the recipient could not reasonably retain the information. If PHI is rendered unusable, unreadable, or indecipherable to unauthorized individuals—most commonly through strong encryption or destruction—the incident falls under the Encryption Safe Harbor and is not reportable under the Breach Notification Rule.
Unsecured vs. Secured PHI
Unsecured PHI is PHI that has not been protected by a technology or methodology approved by federal guidance, such as robust encryption at rest and in transit. Secured PHI that meets these standards generally avoids breach notification because the risk to individuals is minimal.
Risk Assessment Procedures
When an incident occurs, you must evaluate the likelihood that PHI was compromised. Use the required four-factor analysis: the nature and extent of PHI involved; the unauthorized person who used or received it; whether the PHI was actually viewed or acquired; and the extent to which the risk has been mitigated.
How to Conduct and Document the Analysis
- Gather facts quickly: systems affected, types of identifiers, volume of records, and whether the data was viewable or exfiltrated.
- Evaluate who received the PHI and their ability to re-identify or misuse it.
- Confirm containment steps taken and their effectiveness.
- Decide whether notification is required and why.
Create formal Risk Assessment Documentation capturing your methodology, findings, determination, and the evidence supporting it. Retain this documentation for at least six years, and ensure it is consistent across incidents so you can demonstrate diligence during audits.
Notification Requirements
If notification is required, you must notify affected individuals without unreasonable delay and no later than 60 calendar days from discovery. Discovery occurs on the date the breach is known—or would have been known with reasonable diligence—by you or your agents.
Content of Individual Notices
- A brief description of what happened, including dates of the incident and discovery.
- The types of PHI involved (for example, names, diagnoses, Social Security numbers).
- Steps individuals should take to protect themselves.
- What you are doing to investigate, mitigate harm, and prevent recurrence.
- Contact methods for questions, including a toll-free number, email, or postal address.
Method and Substitute Notice
Send notices by first-class mail or by email if the individual has agreed to electronic notices. If contact information for 10 or more individuals is insufficient or outdated, provide substitute notice via conspicuous website posting or media; maintain the posting for at least 90 days and include a toll-free number active for the same period. For fewer than 10 individuals, alternative methods such as telephone may be used.
Reporting Obligations
Under the Breach Notification Rule, you also have external reporting duties. For incidents affecting 500 or more individuals in a single state or jurisdiction, you must provide Office for Civil Rights Reporting without unreasonable delay and within 60 days of discovery. For incidents affecting fewer than 500 individuals, log them and submit an annual report to the federal portal within 60 days after the end of the calendar year.
Media Notification
If a breach affects more than 500 residents of a state or jurisdiction, you must notify prominent media outlets serving that area without unreasonable delay and within 60 days of discovery. This media notice supplements, but does not replace, individual notifications.
Business Associate Obligations
Business Associates must notify the Covered Entity without unreasonable delay and no later than 60 days after discovery. The notice must include identification of affected individuals and any information the Covered Entity needs to provide complete individual notifications. Contracts may impose shorter internal deadlines and specific escalation procedures; build these into playbooks and vendor oversight.
Law Enforcement Delay
You may delay notifications if a law enforcement official determines they would impede a criminal investigation or harm national security. Obtain and retain the official’s statement and resume notifications when the delay expires.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentMitigation and Remediation Strategies
Act immediately to contain the incident: disable compromised accounts, terminate malicious sessions, block exfiltration paths, and secure or retrieve misdirected PHI. Preserve logs and evidence for forensics while restoring critical operations safely.
Protecting Affected Individuals
- Provide clear guidance on protective steps, such as password changes and fraud alerts.
- Offer identity protection or credit monitoring if Social Security or financial data was exposed.
- Staff a call center to answer questions and track concerns.
Hardening Controls
- Accelerate encryption at rest and in transit to benefit from the Encryption Safe Harbor.
- Implement multifactor authentication, least-privilege access, and rigorous audit logging.
- Patch vulnerable systems, rotate credentials, and improve email security to reduce phishing risk.
- Run tabletop exercises and update your incident response plan with measured lessons learned.
Administrative and Documentation Policies
Maintain written policies and procedures for incident detection, escalation, assessment, and notifications. Train workforce members periodically and upon role changes, emphasizing privacy principles and breach reporting lines.
Records You Must Keep
- Risk Assessment Documentation for each incident, including decisions and rationales.
- Copies of individual, media, and regulator notices, plus evidence of delivery.
- Investigation reports, timelines, containment steps, and remediation actions.
- Sanction records, workforce training logs, and Business Associate Agreements.
Retain all required documentation for at least six years. Use a centralized register to track incidents, decisions, and reporting deadlines across the organization.
Compliance and Penalties
The federal regulator may investigate reported breaches, request corrective actions, or enter resolution agreements with ongoing monitoring. Violations can result in tiered Civil Monetary Penalties that scale with culpability, the number of individuals affected, the duration of noncompliance, the harm caused, and your mitigation efforts.
Adopting and documenting robust security programs, promptly mitigating incidents, and demonstrating sustained compliance materially influence enforcement outcomes. Consistent adherence to policies, continuous training, and disciplined vendor oversight reduce both breach risk and enforcement exposure.
Summary
Define incidents precisely, assess risk using the four-factor test, notify individuals and report externally within required timelines, and remediate decisively. Strong documentation, clear Business Associate Obligations, and technical safeguards—especially encryption—position you to comply with the Breach Notification Rule and protect patients and your organization.
FAQs.
What constitutes a breach under the HIPAA Privacy Rule?
A breach is the impermissible acquisition, access, use, or disclosure of unsecured PHI that compromises its security or privacy. It is presumed to be a breach unless you can show a low probability of compromise based on a documented four-factor risk assessment, and none of the narrow exceptions apply.
How soon must affected individuals be notified of a breach?
You must notify affected individuals without unreasonable delay and no later than 60 calendar days from the date of discovery. Notices must include required content and be delivered by first-class mail or by email if the individual has agreed to receive electronic notices.
When is media notification required for a HIPAA breach?
Media notification is required when a breach affects more than 500 residents of a single state or jurisdiction. It must be provided without unreasonable delay and within 60 days of discovery and is in addition to, not a substitute for, individual notices.
What are the consequences of failing to comply with breach notification rules?
Failure to comply can lead to investigations, corrective action plans, and Civil Monetary Penalties. Penalty tiers reflect the level of culpability and the extent of harm, and enforcement can also require ongoing monitoring and reporting to ensure sustained compliance.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment