HITECH Act Breach Notification Risk Assessment Tool: Guide and Checklist
Use this practical guide and checklist to build a repeatable HITECH Act Breach Notification Risk Assessment Tool. You will learn what constitutes a breach of Protected Health Information (PHI), how to investigate incidents, and how to meet Breach Notification Compliance duties, including Health and Human Services (HHS) Reporting.
Overview of HITECH Act Breach Notification Rule
The Breach Notification Rule requires covered entities and business associates to notify when there is an impermissible use or Unauthorized Disclosure of unsecured PHI. A breach is presumed unless you document a low probability that the PHI was compromised using the required risk assessment.
Exceptions exist for certain good‑faith, unintentional access by authorized workforce, inadvertent internal disclosures, and incidents where the information could not reasonably have been retained. If PHI is properly encrypted or destroyed, the safe harbor generally removes notification obligations.
Compliance hinges on timely notice to affected individuals, appropriate HHS Reporting, and—when applicable—media notification. You must also maintain robust Record-Keeping Requirements that show your assessment, decisions, and corrective actions.
Conducting a HITECH Risk Assessment
Approach every suspected incident with structured Breach Investigation Procedures. Treat the process as a repeatable tool that starts at discovery, prioritizes containment, and ends with a well‑supported decision to notify or not.
Step-by-step process
- Contain and stabilize: isolate affected systems, recover lost devices, revoke credentials, and initiate immediate Risk Mitigation Strategies.
- Launch the case file: record discovery date/time, who discovered it, and initial facts; start your deadline tracker.
- Scope the PHI: identify data elements, volume, and whether the PHI was secured (e.g., encrypted) at the time of the event.
- Map the flow: determine who accessed or received the PHI, through what channel, and for how long.
- Analyze risk: apply the four required factors, capture evidence (logs, forensics, attestations), and assign a clear rationale.
- Decide and act: if notification is required, plan individual, HHS, and media notices; if not, document the low‑probability determination.
- Close and improve: implement corrective actions, update policies, retrain staff, and record lessons learned.
Documentation checklist
- Incident narrative, discovery date, systems affected, and PHI elements involved.
- Identity and role of any unauthorized recipient(s) and how access occurred.
- Evidence of access/viewing versus mere exposure; forensics and log artifacts.
- Risk analysis worksheet with scores, rationale, and approvals.
- Notifications issued, dates sent, and proof of delivery; HHS Reporting confirmations.
- Risk Mitigation Strategies implemented and follow‑up monitoring results.
- Record-Keeping Requirements plan to retain all materials for the required period.
Key Risk Assessment Factors
Regulators expect a fact‑specific analysis. Use the following factors to determine whether there is a low probability that PHI was compromised and to decide whether notification is required.
The four required factors
- Nature and extent of PHI: sensitivity (e.g., diagnoses, SSNs), identifiability, and the volume involved.
- The unauthorized person: whether the recipient is obligated to protect confidentiality (e.g., another HIPAA‑regulated entity) or has motives to misuse the data.
- Whether the PHI was actually acquired or viewed: evidence from logs, file access records, unopened mail returns, or device forensics.
- Extent to which the risk has been mitigated: retrieval of information, remote wipe, secure deletion, confidentiality assurances, or prompt invalidation of credentials.
Additional considerations to calibrate risk
- Duration of exposure and ability to re‑identify individuals from limited data sets.
- Public posting versus isolated access; signs of exfiltration or tampering.
- Patterns or repeated incidents indicating systemic control gaps.
Complying with Breach Notification Timelines
Timeliness is central to Breach Notification Compliance. The countdown starts on the date of discovery—when you knew or should have known of the breach through reasonable diligence.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentTimeline checklist
- Individuals: notify without unreasonable delay and no later than 60 calendar days from discovery.
- HHS Reporting: for 500 or more affected individuals, report without unreasonable delay and no later than 60 days; for fewer than 500, log and submit within 60 days after the end of the calendar year.
- Media: if 500+ residents of a single state or jurisdiction are affected, provide media notice in addition to individual notice.
- Business associates: notify the covered entity without unreasonable delay and within 60 days, supplying identities and incident details.
- Law enforcement delay: document and honor any official request to postpone notice to avoid impeding an investigation.
Drafting Breach Notification Content
Notifications must be clear, accurate, and actionable. Write in plain language and limit technical jargon so individuals can understand what happened and how to protect themselves.
Notification content checklist
- Brief description of the incident, including the breach and discovery dates.
- Types of Protected Health Information (PHI) involved (e.g., names, addresses, clinical data).
- Steps individuals should take to protect themselves, such as monitoring accounts or placing fraud alerts.
- What you are doing: your Breach Investigation Procedures and Risk Mitigation Strategies (containment, enhanced safeguards, training).
- How to contact you: toll‑free number, email, postal address, and website for updates.
Plain-language tips
- Be specific about facts and avoid speculation; update notices if facts change.
- Use short sentences and headings; provide translations where appropriate.
- Retain copies of all versions to meet Record-Keeping Requirements.
Navigating State Law Considerations
HIPAA sets a federal floor; state breach laws may be stricter. You must harmonize requirements and follow the most protective standard that applies to your incident.
- Shorter notification deadlines in some states; plan for the strictest applicable timeframe.
- Additional content mandates (e.g., identity‑theft resources or specific phrasing).
- Mandatory notices to state Attorneys General, insurance regulators, or consumer reporting agencies.
- Broader definitions of personal information beyond PHI (credentials, biometrics, tax IDs).
- Format and language requirements for consumer notices and substitute notice rules.
Roles of Business Associates in Breach Notification
Business associates are integral to detection, assessment, and notification. Your Business Associate Agreement should detail duties, timelines, and cooperation requirements.
- Immediate escalation of suspected incidents and Unauthorized Disclosure to the covered entity.
- Provision of affected individual identities, incident description, and timeline to support notices.
- Cooperation on forensics, mitigation, and drafting; flow‑down obligations to subcontractors.
- Implementation of Risk Mitigation Strategies and verification of security controls.
- Maintenance of logs, assessments, and notices to satisfy Record-Keeping Requirements.
Conclusion
Build your HITECH Act Breach Notification Risk Assessment Tool around disciplined investigation, the four risk factors, and strict timelines. Document every step, coordinate with business associates, and align federal and state rules to sustain Breach Notification Compliance and protect patients.
FAQs.
What triggers a breach notification under the HITECH Act?
A notification is triggered when there is an impermissible use or disclosure of unsecured PHI that compromises privacy or security. The event is presumed a breach unless your documented assessment shows a low probability of compromise or a specific exception or encryption safe harbor applies.
How is a risk assessment conducted for a suspected breach?
You gather facts, contain the incident, and evaluate the four factors: the nature and extent of PHI, who received it, whether it was actually acquired or viewed, and how much you mitigated the risk. Record evidence, decide whether notification is required, and retain all materials per Record-Keeping Requirements.
What information must be included in a breach notification?
Include a concise description of what happened and the relevant dates, the types of PHI involved, steps individuals should take, what you are doing to investigate and mitigate, and clear contact information. Ensure the content meets both HIPAA and applicable state requirements.
What are the consequences of failing to comply with breach notification requirements?
Noncompliance can lead to HHS enforcement actions, civil monetary penalties, corrective action plans, and ongoing oversight. You may also face state investigations, contractual liability with business associates, litigation, and significant reputational harm and remediation costs.
Table of Contents
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment