Understanding the HIPAA Breach Notification Rule: Purpose, Scope, and Best Practices
The HIPAA Breach Notification Rule sets clear expectations for how you identify, assess, and report an unauthorized disclosure of Protected Health Information (PHI). Its purpose is to protect individuals from harm by ensuring timely, transparent communication and consistent remediation. This guide explains the rule’s scope and best practices so you can operationalize strong controls, meet compliance reporting obligations, and reduce breach risk.
Definition of Breach
Under HIPAA, a breach is an impermissible use or disclosure of PHI that compromises the security or privacy of the information. The rule presumes a breach has occurred unless you can demonstrate—via a documented risk assessment—that there is a low probability the PHI has been compromised.
What “PHI” Includes
- Any individually identifiable health information in any form (electronic, paper, or oral).
- Data elements that can identify a person, combined with health-related details (diagnoses, treatment, billing).
When a Breach Is “Discovered”
A breach is considered discovered on the first day it is known—or should reasonably have been known—to you (or any workforce member or agent). Discovery starts the clock for breach notification timelines.
Breach Exclusions
Not every privacy incident is a reportable breach. HIPAA identifies narrow exclusions you should evaluate before triggering notification.
- Unintentional acquisition, access, or use of PHI by a workforce member acting in good faith and within scope of authority, without further impermissible use or disclosure.
- Inadvertent disclosure of PHI by a person authorized to access PHI to another authorized person within the same covered entity or business associate, without further misuse.
- Situations where you have a good-faith belief the unauthorized recipient could not reasonably have retained the information (for example, sealed mail returned unopened).
De-identified information is not PHI. Limited Data Sets remain PHI and still require analysis under the rule.
Risk Assessment Factors
To overcome the presumption of breach, you must apply a defensible Risk Assessment Methodology and document the outcome. HIPAA requires you to evaluate four core factors.
The Four Required Factors
- Nature and extent of PHI involved, including types of identifiers and likelihood of re-identification.
- Unauthorized person who used the PHI or to whom the disclosure was made.
- Whether the PHI was actually acquired or viewed, or merely exposed.
- Extent to which the risk has been mitigated (for example, prompt retrieval, validated deletion, or satisfactory attestations).
Practical Methodology
- Confirm the data set involved and whether it meets the definition of PHI.
- Map the incident timeline, systems, and recipients to determine actual exposure.
- Score each factor (qualitatively or quantitatively), then determine the overall probability of compromise.
- Record evidence, mitigation steps, and the final decision. Retain your documentation consistent with HIPAA’s record-keeping requirements.
Notification Requirements
If the probability of compromise is not low, the incident is a breach and you must notify affected parties according to the Breach Notification Timelines. Your responsibilities differ by audience and breach size.
Notification to Individuals
- Timing: Without unreasonable delay and no later than 60 calendar days after discovery.
- Method: First-class mail (or email if the individual has agreed). For 10+ individuals with insufficient contact info, provide substitute notice (for example, conspicuous website posting for 90 days or major print/broadcast media in the affected area).
- Content: A plain-language description of what happened, types of information involved, steps individuals should take, what you are doing to investigate and mitigate, and contact methods (toll-free number, email, or postal address).
Notification to HHS
- 500 or more residents of a state/jurisdiction: Notify the Secretary of HHS without unreasonable delay and no later than 60 days from discovery.
- Fewer than 500: Log the breach and submit to HHS within 60 days of the end of the calendar year in which the breaches were discovered.
Notification to the Media
- For breaches affecting 500 or more residents of a state or jurisdiction, provide media notice in the affected area without unreasonable delay and no later than 60 days.
Business Associates and Delegation
- Business associates must notify the covered entity without unreasonable delay and no later than 60 days, including identification of affected individuals and any information needed to notify them.
- Covered entities may delegate notification tasks but retain ultimate responsibility for compliance reporting obligations.
Law Enforcement Delay
You may delay notifications if a law enforcement official determines that notice would impede a criminal investigation or cause damage to national security. Document oral requests and limit them to 30 days unless replaced by a written request specifying a longer period.
State breach laws may impose additional or shorter timelines and different content requirements. Align your federal and state obligations to avoid duplicate or conflicting notices.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Encryption Safe Harbor
If PHI is “secured” according to HHS guidance, an incident is generally not a reportable breach. The safe harbor hinges on strong Encryption Standards and proper key management.
What Counts as “Secured”
- PHI encrypted at rest and in transit using industry-recognized algorithms and FIPS-validated cryptographic modules, with keys stored and managed separately.
- Media sanitized or destroyed consistent with authoritative guidance for secure disposal (for example, methods aligned with NIST SP 800-88).
Caveats and Common Pitfalls
- Compromised or mismanaged encryption keys void the safe harbor.
- Partial encryption (for example, only the database but not backups, logs, or exports) leaves gaps.
- Endpoints and mobile devices require full-disk encryption plus controls against unauthorized access.
Compliance Challenges
Organizations struggle with data sprawl, legacy systems, third-party risk, and limited forensics visibility. The goal is to shorten time-to-detect, perform a consistent risk assessment, and meet notifications on time.
Operational Best Practices
- Maintain a current inventory of systems holding PHI and map data flows, including cloud services and business associates.
- Implement layered controls: access governance, audit logging, DLP, endpoint protection, and multi-factor authentication.
- Encrypt PHI everywhere feasible and enforce strong key management.
- Adopt a written incident response plan with 24/7 escalation, counsel involvement, and predefined Breach Notification Timelines.
- Train workforce on minimum necessary use, reporting channels, and phishing resilience.
- Perform tabletop exercises that test your Risk Assessment Methodology and decision criteria.
Third-Party Oversight
- Use risk-based vendor onboarding, including security questionnaires and evidence reviews.
- Ensure Business Associate Agreements define breach reporting procedures, data return/destruction, and right-to-audit.
- Track downstream subcontractors that create, receive, maintain, or transmit PHI.
Penalties for Non-Compliance
Regulatory penalties reflect culpability and corrective actions. Civil monetary penalties follow tiered categories (no knowledge, reasonable cause, willful neglect corrected, willful neglect not corrected) with per-violation amounts and annual caps adjusted for inflation. Aggravating factors include scope, duration, and harm; mitigating factors include prompt mitigation and strong compliance programs.
Serious misconduct can also trigger criminal liability for knowingly obtaining or disclosing PHI without authorization, with higher penalties for false pretenses or malicious intent. Beyond fines, enforcement often requires corrective action plans, external monitoring, and long-term reporting obligations.
Bottom line: demonstrate due diligence through prevention, rapid containment, faithful application of the risk assessment factors, and on-time, accurate notifications.
FAQs.
What constitutes a breach under the HIPAA rule?
A breach is an impermissible use or disclosure of PHI that compromises its security or privacy. HIPAA presumes a breach unless you document, via the four-factor analysis, a low probability that the PHI was compromised.
What are the timelines for breach notification?
You must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. Breaches affecting 500 or more residents require notice to HHS and, in most cases, local media within the same 60-day outer limit. Smaller breaches must be logged and reported to HHS within 60 days after the calendar year ends.
How does encryption affect breach notification requirements?
If PHI was encrypted and keys were properly protected in line with recognized Encryption Standards, the incident typically falls under the encryption safe harbor and is not a reportable breach. If keys were exposed or encryption was incomplete, you must assess and likely notify.
What penalties apply for non-compliance?
OCR can impose tiered civil monetary penalties based on culpability, with amounts and annual caps adjusted for inflation, and may require corrective action plans. Criminal penalties can apply for intentional misuse of PHI. Reputational harm and remediation costs often exceed the fines themselves.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.