Reporting a HIPAA Breach: Who Investigates and How to Prepare

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Reporting a HIPAA Breach: Who Investigates and How to Prepare

Kevin Henry

Data Breaches

October 20, 2024

7 minutes read
Share this article
Reporting a HIPAA Breach: Who Investigates and How to Prepare

Investigation of a HIPAA Breach

When a potential breach of protected health information (PHI) occurs, the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) is the primary federal body that investigates compliance with HIPAA. OCR opens investigations based on breach reports, complaints, or referrals from other regulators, and it assesses whether covered entities and business associates met the Privacy, Security, and Breach Notification Rules.

An OCR investigation typically progresses through intake and jurisdiction review, data requests, interviews, and technical assessments. Investigators examine your risk analysis and risk management program, policies and procedures, workforce training, access controls, audit logs, and how you applied the breach notification rule. Findings may lead to technical assistance, a resolution agreement with corrective action plans, or civil monetary penalties for serious or uncorrected violations.

Other actors can be involved. State attorneys general may bring parallel actions under HIPAA and state law, and the Department of Justice can pursue criminal cases involving knowingly wrongful uses or disclosures of PHI. You should anticipate multi-agency coordination and preserve all potentially relevant records from the outset.

Reporting a HIPAA Breach

Activate your incident response plan immediately. Contain the incident, preserve evidence, and perform the four-factor risk assessment to determine if there is a low probability that PHI was compromised. If not, treat the event as a reportable breach and begin notifications without unreasonable delay.

Notify affected individuals and, when applicable, the media and OCR through the breach portal. For breaches affecting 500 or more individuals in a state or jurisdiction, notify OCR without unreasonable delay and no later than 60 calendar days from discovery. For fewer than 500 individuals, log the incident and report it to OCR no later than 60 days after the end of the calendar year in which you discovered the breach.

Business associates must notify the relevant covered entities without unreasonable delay and provide information sufficient for notification, as required by the breach notification rule and the business associate agreements (BAAs). If law enforcement determines notice would impede an investigation, document the request and delay notifications consistent with that determination.

Preparation for a HIPAA Investigation

Preparation starts long before an incident. Maintain a current, enterprise-wide risk analysis and a living risk management plan. Implement administrative, physical, and technical safeguards such as strong access controls, encryption, audit logging, workforce training, sanctions policies, and vendor oversight aligned to your BAAs.

Document policies and procedures, proof of training, security evaluations, and contingency plans. Keep an accurate inventory of systems holding PHI, data flows, and all business associate agreements. Establish an incident response playbook with decision trees, communication templates, and an escalation matrix to leadership and counsel.

During an investigation, designate a single point of contact, issue a litigation hold, and gather responsive materials promptly. Be transparent and cooperative with OCR, demonstrate corrective actions taken, and, where appropriate, propose targeted corrective action plans to address root causes and prevent recurrence.

Breach Notification Requirements

Individual notice must be provided without unreasonable delay and in no case later than 60 days after discovery. Use first-class mail or email if the individual has agreed to electronic notice. If contact information for 10 or more individuals is insufficient, provide substitute notice consistent with the rule (for example, website posting and a toll-free number).

Content of individual notices should clearly describe what happened (including dates), the types of PHI involved, steps individuals should take to protect themselves, what you are doing to investigate and mitigate harm, and how to contact you. For breaches affecting 500 or more individuals in a state or jurisdiction, provide notice to prominent media outlets and to OCR within the same 60-day window.

Covered entities report directly to OCR, while business associates notify the covered entities per the terms of their BAAs and the breach notification rule. Maintain alignment between individual, media, and OCR notices so the facts, dates, and scope match across all audiences.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Documentation of a HIPAA Breach

Thorough, contemporaneous documentation is essential. Maintain records for at least six years from creation or last effective date, including:

  • Incident timeline, investigation steps, containment, and eradication activities.
  • The four-factor risk assessment and the basis for your breach determination.
  • Copies of all notices sent to individuals, media, and OCR, with dates and delivery proof.
  • Forensic findings, indicators of compromise, system logs, and evidence preservation details.
  • Mitigation measures offered (credit monitoring, call centers) and outcomes.
  • Updated policies, workforce re-training records, and any corrective action plans adopted.
  • Relevant contracts and business associate agreements, including BA notifications and data provided.
  • Any law enforcement delay requests and the period of delay applied.

State-Specific Breach Notification Laws

HIPAA generally preempts contrary state law, but more stringent state privacy and breach notification requirements still apply. Many states impose shorter notification timelines, additional content elements, or require notices to state agencies or attorneys general. Some laws are triggered by broader categories of personal information or have different encryption safe harbors.

To manage variability, maintain a state law matrix that tracks triggers, timelines, recipients, and content requirements by the individual’s state of residence. Coordinate federal and state obligations so that the earliest applicable deadline governs your project plan. Align messaging across all notices, and preserve records demonstrating how you reconciled overlapping federal and state rules.

Civil Monetary Penalties for HIPAA Violations

OCR applies a tiered penalty framework based on culpability and the nature and extent of harm. Tiers range from violations an organization did not know about (and could not have known with reasonable diligence), to reasonable cause, to willful neglect corrected within a prescribed period, and willful neglect not corrected. Penalties may be assessed per violation, with annual caps that are adjusted periodically for inflation.

In setting civil monetary penalties, OCR considers factors such as the number of individuals affected, sensitivity of PHI involved, duration of noncompliance, history of violations, financial condition, and the effectiveness and timeliness of corrective actions. Many cases resolve through resolution agreements that require multi-year corrective action plans and reporting to OCR, even when monetary penalties are not imposed.

Conclusion

Effective breach response blends swift action, precise reporting, and rigorous documentation. By preparing in advance—through risk analysis, strong safeguards, disciplined vendor management, and ready-to-execute playbooks—you can meet the breach notification rule, cooperate with investigators, and reduce exposure to corrective action plans and civil monetary penalties.

FAQs

Who is responsible for investigating HIPAA violations?

The Office for Civil Rights at HHS leads HIPAA enforcement and investigates potential violations. State attorneys general may conduct parallel actions under HIPAA and state law, and the Department of Justice can pursue criminal cases involving intentional misuse of PHI.

How soon must HIPAA breaches be reported?

Provide individual notice without unreasonable delay and no later than 60 calendar days after discovery. For 500 or more affected individuals in a state or jurisdiction, notify OCR and the media within the same 60-day window. For fewer than 500, log the event and report to OCR no later than 60 days after the end of the calendar year.

What documentation is required during a HIPAA breach investigation?

Expect to produce policies and procedures, risk analysis and risk management records, training logs, system and access audit logs, incident response files, the four-factor risk assessment, copies of all notices, business associate agreements and notices received, mitigation steps, and any corrective action plans—retained for at least six years.

How can covered entities prepare for a HIPAA investigation?

Conduct regular risk analyses, implement and document safeguards, train your workforce, maintain current business associate agreements, test incident response, and keep a litigation hold process ready. Designate a response lead, centralize evidence collection, and be prepared to demonstrate corrective actions and continuous improvement to OCR.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles