Purpose of the HIPAA Breach Notification Rule: A Practical Compliance Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Purpose of the HIPAA Breach Notification Rule: A Practical Compliance Guide

Kevin Henry

HIPAA

April 29, 2024

10 minutes read
Share this article
Purpose of the HIPAA Breach Notification Rule: A Practical Compliance Guide

The Purpose of the HIPAA Breach Notification Rule: A Practical Compliance Guide is to help you act quickly and transparently when unsecured Protected Health Information is compromised. The Rule sets Notification Requirements for Covered Entities and Business Associates, and it directs when to inform affected individuals, the Department of Health and Human Services, and, in some cases, the media. This guide translates those obligations into practical steps you can operationalize.

Overview of the HIPAA Breach Notification Rule

The HIPAA Breach Notification Rule requires notice following a breach of unsecured Protected Health Information (PHI). A “breach” is an acquisition, access, use, or disclosure of PHI not permitted by the Privacy Rule that compromises its security or privacy. Impermissible uses or disclosures are presumed to be breaches unless you can show a low probability of compromise through a documented risk assessment.

Key definitions

  • Protected Health Information (PHI): Individually identifiable health information in any form or medium, excluding properly de-identified data.
  • Unsecured PHI: PHI not rendered unusable, unreadable, or indecipherable to unauthorized persons (for example, not properly encrypted or destroyed per HHS guidance).
  • Covered Entities: Health plans, most healthcare providers that transmit health information electronically, and healthcare clearinghouses.
  • Business Associates: Vendors or subcontractors that create, receive, maintain, or transmit PHI on behalf of a Covered Entity.

When the Rule applies—and exceptions

The Rule applies to breaches of unsecured PHI. Exceptions include: unintentional access or use by a workforce member acting within authority; inadvertent disclosure to another authorized person within the same organization; and disclosures where you, in good faith, believe the recipient could not reasonably retain the information. Even when an exception may apply, document your justification.

Purpose and principles

  • Give individuals timely, actionable information to protect themselves.
  • Promote accountability to the Department of Health and Human Services and enable Compliance Enforcement.
  • Drive improvements in safeguards through lessons learned and a Security Risk Assessment cycle.

Requirements for Covered Entities

Covered Entities must maintain written policies and procedures that address breach identification, risk assessment, notification, and documentation. You must train your workforce on these procedures, apply appropriate sanctions for violations, and retain evidence of compliance (including risk assessments, notices, and logs) for at least six years.

Core obligations

  • Identify and investigate potential incidents involving PHI, including paper, verbal, and electronic forms.
  • Perform and document a breach risk assessment using the four-factor test: nature and extent of PHI; the unauthorized person; whether the PHI was actually acquired or viewed; and mitigation effectiveness.
  • Notify affected individuals, the Department of Health and Human Services, and, when applicable, the media, consistent with the timelines and methods described below.
  • Coordinate with Business Associates via Business Associate Agreements (BAAs) that define breach reporting duties and timeframes.
  • Mitigate harm, remedy control gaps, and update your Security Risk Assessment and risk management plan.

Who sends notices

Covered Entities are ultimately responsible for individual, HHS, and media notifications. A Business Associate may provide notices on your behalf if the BAA authorizes it, but the Covered Entity remains accountable for compliance outcomes.

Notification Procedures and Timelines

When the clock starts

The “discovery” date is when the breach is known—or should reasonably have been known—to your organization, not when the investigation concludes. Act without unreasonable delay and meet the outside deadlines below.

Deadlines at a glance

  • Individuals: Without unreasonable delay and no later than 60 calendar days after discovery.
  • HHS: For breaches affecting 500 or more individuals, without unreasonable delay and no later than 60 days after discovery; for fewer than 500, no later than 60 days after the end of the calendar year in which the breach was discovered.
  • Media: For breaches affecting 500 or more residents of a single state or jurisdiction, without unreasonable delay and no later than 60 days after discovery.
  • Law enforcement delay: You may delay notifications if a law enforcement official states that notice would impede an investigation or threaten national security. Document all requests and resume notices when the delay ends.

Required content of notices to individuals

  • A brief description of what happened, including the date of the breach and the discovery date, if known.
  • The types of PHI involved (for example, name, address, Social Security number, diagnoses, treatment information).
  • Steps individuals should take to protect themselves (for example, monitoring accounts or placing fraud alerts).
  • What you are doing to investigate, mitigate harm, and prevent future incidents.
  • Contact methods for questions (toll-free phone number, email, or postal address).

How to deliver notices

  • Individuals: First-class mail, or email if the individual has agreed to electronic notice.
  • Substitute notice: If you have insufficient or out-of-date contact information for fewer than 10 individuals, use an alternative such as telephone. If for 10 or more, post a conspicuous website notice for at least 90 days or provide notice via major print or broadcast media in the affected area, plus a toll-free number active for at least 90 days.
  • Media: Notify prominent media outlets serving the affected state or jurisdiction.
  • HHS: Submit the required breach report via the HHS online reporting process.

Operational playbook

  1. Contain and secure: Isolate affected systems, recover devices, or stop further disclosures.
  2. Triage facts: Identify what PHI, whose PHI, how it was exposed, and for how long.
  3. Risk assessment: Apply the four-factor analysis; decide if the incident is a breach.
  4. Notification workstream: Draft notices, validate recipient lists, and plan delivery methods.
  5. Regulatory reporting: Prepare HHS and, if needed, media notices; track deadlines.
  6. Mitigation and hardening: Offer support to individuals as appropriate and close control gaps.
  7. Documentation: Record decisions, notices, evidence, and post-incident improvements.

Responsibilities of Business Associates

Business Associates must implement administrative, physical, and technical safeguards; perform a Security Risk Assessment; and comply with their BAAs. Subcontractors that handle PHI are Business Associates too and must receive “flow-down” contractual obligations.

Breach reporting to Covered Entities

  • Notify the Covered Entity without unreasonable delay and no later than 60 days after discovery, supplying all information the Covered Entity needs to notify individuals, HHS, and media.
  • Provide ongoing updates as new facts emerge, including identities of affected individuals and the types of PHI involved.
  • Cooperate in investigation, mitigation, and root-cause analysis, and preserve evidence.
  • Perform corrective actions and update your risk management plan; share attestations as required by the BAA.

Many BAAs require shorter internal reporting timelines (for example, 24–72 hours for initial notice) to give the Covered Entity time to meet statutory deadlines. Build contract terms into your incident response plan and drills.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Impact on Patient Privacy and Security

The Rule strengthens patient trust by ensuring individuals learn promptly about risks to their information and receive clear steps to protect themselves. Transparent notice also incentivizes organizations to enhance safeguards for Protected Health Information and to retire high-risk practices.

Operationally, each breach drives measurable improvements: targeted training for misdirected mailings, stronger identity verification at call centers, better device encryption, and workflow redesign to reduce human error. Over time, the cycle of notification, mitigation, and Security Risk Assessment raises the overall security baseline across your ecosystem of Covered Entities and Business Associates.

Enforcement and Penalties

The Department of Health and Human Services Office for Civil Rights (OCR) enforces the Rule through complaint investigations, compliance reviews, and audits. Outcomes can include technical assistance, voluntary resolution agreements with multi-year corrective action plans, and civil monetary penalties that scale by violation category and culpability.

OCR considers factors such as the nature and extent of the violation, the number of individuals affected, the duration of the breach, cooperation, prior compliance history, and corrective actions. State attorneys general may also bring actions, and the Department of Justice can pursue criminal penalties for certain wrongful disclosures. Beyond fines, organizations face reporting on the HHS breach portal, contractual consequences, and reputational harm.

Best Practices for Compliance

Build a resilient governance foundation

  • Designate privacy and security leaders with clear authority and escalation paths.
  • Establish an incident response plan that aligns operations, legal, compliance, IT, clinical leadership, and communications.
  • Run regular tabletop exercises with Business Associates to validate roles and timing.

Strengthen safeguards through a Security Risk Assessment

  • Perform an enterprise Security Risk Assessment at least annually and after major changes; prioritize high-impact risks.
  • Encrypt PHI at rest and in transit; enforce strong authentication and endpoint protection on devices that store or access PHI.
  • Implement data loss prevention for email and file movement; monitor logs and alerts tied to PHI access anomalies.

Prevent common breach scenarios

  • Misdirected communications: Use verified addresses, secure messaging portals, and double-check workflows for mailings and faxes.
  • Lost or stolen devices: Enforce mobile device management, remote wipe, and rapid loss reporting.
  • Unauthorized access: Apply least privilege, periodic access reviews, and rapid termination of accounts.
  • Third-party gaps: Vet vendors, maintain current BAAs, and require prompt incident reporting and evidence of safeguards.

Operationalize notification readiness

  • Maintain current contact lists, letter templates, call-center scripts, and translation options.
  • Track the “discovery” date immediately and set internal deadlines well ahead of the 60-day outer limit.
  • Prepare media engagement plans for large incidents, including fact-checking and leadership approvals.

Document, learn, and improve

  • Retain risk assessments, notices, and decision logs; measure response times and quality.
  • Conduct post-incident reviews and feed lessons into training, technology, and policy updates.
  • Align federal and state obligations; when laws differ, follow the more protective standard for individuals.

Conclusion

The Purpose of the HIPAA Breach Notification Rule: A Practical Compliance Guide is to ensure timely, transparent notice and continuous risk reduction. If you prepare in advance, execute a rigorous risk assessment, and coordinate closely with Business Associates, you can meet Notification Requirements, protect patients, and satisfy Compliance Enforcement expectations.

FAQs.

What triggers the HIPAA Breach Notification Rule?

A breach is an impermissible acquisition, access, use, or disclosure of unsecured PHI that poses more than a low probability of compromise. You determine that probability through a documented four-factor risk assessment considering the sensitivity of the PHI, who received it, whether it was actually acquired or viewed, and how effectively you mitigated the risk.

Who must comply with the notification requirements?

Covered Entities must notify affected individuals, the Department of Health and Human Services, and, when applicable, the media. Business Associates must notify the Covered Entity (or, if the BAA permits, notify on the Covered Entity’s behalf) and provide all necessary details to support required notices.

What are the deadlines for breach notification?

Notify individuals without unreasonable delay and no later than 60 calendar days after discovery. For breaches affecting 500 or more individuals, notify HHS within the same 60-day window; for fewer than 500, report to HHS no later than 60 days after the end of the calendar year. For 500 or more residents in a single state or jurisdiction, notify the media within 60 days. Law enforcement can authorize a temporary delay to avoid impeding an investigation.

What penalties exist for non-compliance?

OCR can impose tiered civil monetary penalties, require corrective action plans, and enter resolution agreements. Penalty amounts scale with factors such as willful neglect, scope, and duration. State attorneys general may bring additional actions, and the Department of Justice can pursue criminal penalties for certain wrongful disclosures, alongside reputational and contractual consequences.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles