How to Comply with the HIPAA Omnibus Rule Mandate: A Practical Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Comply with the HIPAA Omnibus Rule Mandate: A Practical Guide

Kevin Henry

HIPAA

August 23, 2024

7 minutes read
Share this article
How to Comply with the HIPAA Omnibus Rule Mandate: A Practical Guide

This How to Comply with the HIPAA Omnibus Rule Mandate: A Practical Guide shows you what changed under the omnibus amendments, who is accountable, and how to harden your privacy and security program. You will learn how to protect Protected Health Information (PHI), manage vendors, and respond to incidents with confidence.

HIPAA Omnibus Rule Overview

The HIPAA Omnibus Rule consolidated and strengthened privacy, security, enforcement, and breach notification requirements. It implemented HITECH and GINA changes and expanded accountability beyond traditional covered entities to many vendors that create, receive, maintain, or transmit PHI.

Key impacts include revised definitions, stronger patient rights, and mandatory updates to your Notice of Privacy Practices. The rule raised the bar for breach risk analysis, marketing restrictions, and documentation needed to demonstrate compliance.

Who must comply

  • Covered entities: health plans, health care providers, and health care clearinghouses.
  • Business associates: service providers handling PHI on your behalf, plus their subcontractors.

What changed in practice

  • Direct liability for business associates and their subcontractors.
  • Presumption of breach unless a documented Risk Assessment shows a low probability of compromise.
  • Stricter rules on marketing and sale of PHI, and expanded individual rights.
  • Enhanced enforcement with tiered Civil Monetary Penalties.

Business Associate Liability

Vendors that create, receive, maintain, or transmit PHI for you are business associates and are directly liable for Security Rule compliance and many Privacy Rule obligations. Subcontractors with PHI also qualify and inherit the same duties.

You must execute a Business Associate Agreement (BAA) before sharing PHI. The BAA should define permitted uses, security expectations, breach reporting timelines, subcontractor flow-down, and termination/remediation processes for violations.

Operational expectations for business associates

  • Conduct a HIPAA Security Rule Risk Assessment and implement safeguards.
  • Limit PHI to the minimum necessary and segregate production, test, and analytics uses.
  • Maintain incident response capabilities and notify you promptly of suspected or confirmed breaches.

Breach Notification Standard

The omnibus rule presumes any impermissible use or disclosure of Unsecured PHI is a breach unless you document a low probability of compromise. Your Risk Assessment must evaluate specific factors and be retained as evidence of your decision.

Required Risk Assessment factors

  • Nature and extent of PHI involved, including sensitivity and likelihood of re-identification.
  • Unauthorized person who used the PHI or to whom disclosure was made.
  • Whether the PHI was actually acquired or viewed.
  • The extent to which the risk has been mitigated.

Notification and timing

  • Notify affected individuals without unreasonable delay and no later than 60 days after discovery.
  • Report to HHS as required, and to prominent media if a breach involves 500 or more residents of a state or jurisdiction.
  • Maintain a breach log for smaller incidents and submit annually as required.

Unsecured PHI and Encryption Requirements

PHI is “unsecured” if it is not rendered unusable, unreadable, or indecipherable to unauthorized persons. Applying strong encryption at rest and in transit can qualify for safe harbor if keys are protected and algorithms meet current standards.

Marketing and Sale of PHI

Using PHI for marketing generally requires an individual’s authorization if you or your business associate receive financial remuneration for the communication. Treatment and care coordination messages may be permitted, but conditions apply.

The sale of PHI is prohibited without explicit authorization, with narrow exceptions (for example, certain public health or research cost-based exchanges). Your Notice of Privacy Practices must explain these uses and any opt-out rights where applicable.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Patient Rights Expansion

Individuals have stronger access rights, including timely access to electronic copies of their PHI in the requested format if readily producible. You must fulfill requests within required timeframes and charge only reasonable, cost-based fees.

Patients may restrict disclosures to a health plan for items or services fully paid out of pocket. Your updated Notice of Privacy Practices must describe breach notifications, fundraising opt-outs, marketing limits, and other material changes.

Enforcement and Penalties

HHS OCR enforces the rule through complaints, investigations, audits, and resolution agreements. Civil Monetary Penalties follow a tiered structure based on culpability, with caps adjusted annually for inflation.

How OCR evaluates penalties

  • Nature and extent of the violation and resulting harm.
  • Number of individuals affected and duration of noncompliance.
  • History of compliance, corrective actions, and organization size/financial condition.

Resolution agreements typically include multi-year corrective action plans, independent monitoring, and ongoing reporting to verify sustained compliance.

Compliance Steps

1) Establish governance and accountability

  • Designate privacy and security officials with clear authority and resources.
  • Create a charter for your HIPAA committee and set measurable objectives.

2) Perform a comprehensive Risk Assessment

  • Inventory systems, data flows, vendors, and locations of PHI.
  • Analyze threats, vulnerabilities, likelihood, and impact; prioritize remediation.
  • Repeat at least annually and upon material changes to your environment.

3) Strengthen technical and administrative safeguards

  • Apply Encryption Requirements for data at rest and in transit; protect keys.
  • Enforce access controls, MFA, least privilege, and timely termination of access.
  • Maintain audit logging, anomaly detection, backups, and tested recovery plans.

4) Update policies, procedures, and training

  • Refresh policies for minimum necessary, device/media controls, and data retention.
  • Train workforce on reporting incidents, phishing, and secure handling of PHI.
  • Run tabletop exercises to practice breach response and decision-making.

5) Manage vendors and BAAs

  • Identify all business associates and execute a current Business Associate Agreement with each.
  • Flow down obligations to subcontractors and verify controls proportionate to risk.
  • Establish performance metrics and breach notification expectations.

6) Prepare for breach response

  • Define decision trees, roles, and communication templates for notifications.
  • Document each incident’s Risk Assessment, actions taken, and remediation.
  • Coordinate with counsel and leadership to meet timing and content requirements.

7) Honor patient rights and update NPP

  • Modernize your Notice of Privacy Practices to reflect omnibus requirements.
  • Implement processes for access, amendments, restrictions, and opt-outs.
  • Track deadlines and send responses within required timeframes.

8) Document everything and verify

  • Maintain evidence of policies, training, BAAs, assessments, and remediation.
  • Use internal audits to test controls and demonstrate continuous improvement.

Conclusion

Compliance is a continuous, risk-based discipline. By tightening vendor oversight, performing rigorous assessments, encrypting PHI, and honoring individual rights, you can satisfy the HIPAA Omnibus Rule mandate and strengthen trust in your organization.

FAQs.

What is the HIPAA Omnibus Rule mandate?

It is a set of consolidated updates to HIPAA that strengthened privacy, security, breach notification, marketing rules, and enforcement. It expanded accountability to many vendors and required updated Notices of Privacy Practices and stronger patient rights.

How does the rule affect business associates?

Business associates and their subcontractors are directly liable for safeguarding PHI and complying with many HIPAA provisions. They must execute a Business Associate Agreement, perform a Risk Assessment, implement safeguards, and report breaches promptly.

What are the penalties for noncompliance?

HHS OCR can impose tiered Civil Monetary Penalties per violation category, with annual caps adjusted for inflation, and require corrective action plans. Severe or willful neglect violations can lead to significant monetary penalties and long-term monitoring.

What steps are required for compliance?

Establish governance, complete a comprehensive Risk Assessment, implement administrative and technical safeguards (including Encryption Requirements), update policies and your Notice of Privacy Practices, manage BAAs, train your workforce, and prepare for breach notification and ongoing audits.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles