How to Use a HITECH Breach Risk Assessment Tool, Explained

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

How to Use a HITECH Breach Risk Assessment Tool, Explained

Kevin Henry

Risk Management

July 25, 2024

7 minutes read
Share this article
How to Use a HITECH Breach Risk Assessment Tool, Explained

A HITECH breach risk assessment tool helps you decide, document, and demonstrate whether an incident involving Protected Health Information PHI is a reportable breach. Used well, it turns complex rules into a repeatable workflow and creates defensible records.

The goal is simple: determine if an impermissible use or Unauthorized Disclosure of PHI presents more than a low probability of compromise, apply Mitigation Strategies, and satisfy Breach Notification Requirements. The steps below show you exactly how to use the tool and produce complete Regulatory Compliance Documentation.

Incident Documentation Procedures

Capture the core facts immediately

  • What happened, when it occurred, when discovered, and by whom.
  • Systems, locations, and data elements involved (names, MRNs, diagnoses, images, etc.).
  • Approximate number of individuals affected and whether PHI was secured (e.g., encrypted).
  • Path of exposure: loss/theft, misdirected email, wrong patient, insider snooping, ransomware, vendor error.
  • Role of any business associate and whether a BAA applies.

Enter these details in the tool’s intake form. Assign an incident ID, owner, severity, and time stamps. Attach screenshots, logs, emails, and any evidence that supports the narrative.

Preserve evidence and contain the incident

  • Isolate affected systems, disable compromised accounts, and revoke external access.
  • Preserve system/log evidence and maintain chain of custody for devices and media.
  • Retrieve or secure disclosed materials when feasible; record confirmations or refusals.
  • Initiate password resets, remote wipe, or link takedowns as applicable.

Document each containment action inside the tool as you take it. Time-stamped entries make later review and HITECH Act Enforcement inquiries far easier to answer.

Structure the incident narrative

Write a concise, fact-based narrative in the tool: what you know, how you know it, and current uncertainties. Avoid speculation. Update the narrative as new facts emerge to keep a single source of truth.

Conducting Risk Assessment

Apply the HHS four-factor framework

  • Nature and extent of PHI: sensitivity of elements, level of identifiers, and likelihood of re-identification.
  • Unauthorized person: who used/received the PHI and their obligations to protect confidentiality.
  • Whether PHI was actually acquired or viewed: evidence of access, exfiltration, or mere possibility.
  • Extent of mitigation: retrieval, destruction confirmations, or other measures reducing risk.

Use the tool’s fields to record factor-by-factor findings, not just scores. Your rationale matters more than the number. Attach artifacts that substantiate each conclusion.

Translate analysis into a breach decision

The rule presumes a breach unless you can demonstrate a low probability of compromise based on the four factors. Many organizations also maintain a Risk of Harm Analysis narrative; map that narrative to the same four-factor evidence to avoid gaps.

If PHI was encrypted to a recognized standard and the key was not compromised, the tool should flag potential safe harbor and prompt you to validate encryption status and key control.

Account for common scenarios

  • Misdirected communication to another covered entity workforce member with duty to protect PHI may lower risk if promptly deleted and confirmed.
  • Lost device with strong encryption and no key exposure generally lowers risk.
  • Vendor incidents require the business associate’s assessment and evidence; record both sides in the tool.
  • Ransomware with confirmed exfiltration usually raises risk; document forensic indicators carefully.

Implementing Mitigation Measures

Immediate Mitigation Strategies

  • Retrieve or secure PHI, obtain deletion/return attestations, and disable further sharing.
  • Rotate credentials, enforce multi-factor authentication, and invalidate exposed tokens or links.
  • Patch systems, remove malicious code, and harden configurations.
  • Apply workforce sanctions, targeted training, and revised procedures where human error contributed.

In the tool, log the date, owner, and evidence for each mitigation step. Strong mitigation can materially shift the assessment toward a lower probability of compromise.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Longer-term controls

Documentation and Reporting Requirements

What your record must include

  • Incident description, timeline from discovery to closure, and roles involved.
  • Four-factor analysis with evidence and your breach/not-a-breach determination.
  • Mitigation actions taken, dates, and outcomes.
  • Breach Notification Requirements analysis and any notices sent, with copies.
  • Approvals by privacy, security, and legal; final lessons learned and corrective actions.

Maintain Regulatory Compliance Documentation for audit readiness, including system logs, screenshots, vendor attestations, and call records. Retain the full case file and audit trail for at least six years.

Auditability and version control

Ensure the tool records who changed what and when. Capture the policy version, assessment rubric used, and any exceptions granted, so reviewers can reconstruct decisions months or years later.

Compliance with HITECH Breach Notification Rule

Determine if notification is required

If you cannot demonstrate a low probability of compromise for unsecured PHI, treat the event as a breach. Document the reasoning explicitly in the tool, including any law enforcement delay requests or safe harbor analysis.

Who to notify and by when

  • Individuals: without unreasonable delay and no later than 60 calendar days from discovery.
  • HHS: for 500+ affected, report without unreasonable delay (no later than 60 days); for fewer than 500, log and submit within 60 days after the end of the calendar year.
  • Media: if 500+ residents of a state or jurisdiction are affected, notify prominent media outlets.
  • Business associates: must notify the covered entity without unreasonable delay as required by the BAA.

What to include in notices

  • Brief description of the incident, including dates of occurrence and discovery.
  • Types of PHI involved and potential risks.
  • Steps individuals should take to protect themselves.
  • What you are doing to investigate, mitigate, and prevent future incidents.
  • Contact methods for questions (toll-free number, email, or postal address).

Store drafts, final letters, distribution proofs, and submission confirmations in the case file. This evidences timely compliance and supports responses during HITECH Act Enforcement reviews.

Best Practices for Risk Evaluation

Calibrate your rubric

  • Adopt scoring guidance with examples for common scenarios to reduce evaluator variance.
  • Update factors and playbooks to reflect emerging threats and enforcement trends.
  • Predefine thresholds that trigger privacy/legal review or automatic notification workflows.

Strengthen consistency and oversight

  • Use two-person review for close calls; document dissent and final resolution.
  • Run periodic quality checks on completed cases for completeness and timeliness.
  • Train staff on both the tool and the underlying decision standard, not just the clicks.

Integrate vendors and contracts

  • Require business associates to provide timely incident particulars and their own factor analysis.
  • Align BAAs with your reporting timelines and evidence needs to avoid delays.
  • Centralize vendor incidents in the same tool for uniform reporting and metrics.

In summary, use the tool to capture facts quickly, apply the four-factor analysis rigorously, document Mitigation Strategies, and execute Breach Notification Requirements on time. Complete, well-structured records are your best defense in audits and HITECH Act Enforcement actions.

FAQs.

What is a HITECH breach risk assessment tool?

It is a structured workflow that guides you through documenting an incident, evaluating the probability that PHI was compromised, recording Mitigation Strategies, and determining if Breach Notification Requirements are triggered. It also generates Regulatory Compliance Documentation for audits and enforcement.

How do you document a breach incident?

Capture the who, what, when, where, and how; preserve evidence; describe the PHI involved; and record containment steps. Then complete the four-factor analysis in the tool, attach proof, note decisions and approvals, and retain the full file for at least six years.

When is breach notification required under HITECH?

Notification is required when there is an impermissible use or Unauthorized Disclosure of unsecured PHI and you cannot show a low probability of compromise. Individuals must be notified without unreasonable delay and no later than 60 days from discovery, with additional reporting to regulators and media in specified large-breach scenarios.

What mitigation steps reduce breach risks?

Retrieve or delete disclosed data, revoke access, rotate credentials, enable encryption and MFA, patch systems, and train staff. Vendor attestations, remote wipe, and documented containment can significantly reduce risk and may change the breach determination when supported by evidence.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles