Unsafeguarded PHI: Enforcement Actions, Breach Notification, and Best Practices
Breach Definition and Risk Assessment
What “unsafeguarded PHI” means
Unsafeguarded PHI is protected health information that has been exposed through an impermissible use or disclosure without adequate technical or administrative safeguards. If the PHI was not rendered unusable, unreadable, or indecipherable (for example, through strong encryption) and left the entity’s control, you should treat the incident as a potential breach under the Breach Notification Rule.
When an impermissible use is not a breach
Three narrow exceptions may apply: unintentional access by a workforce member acting in good faith within scope; inadvertent disclosure between authorized persons at the same organization; or disclosures where you have a good-faith belief the recipient could not retain the information. If none apply, proceed to a risk assessment.
Required risk assessment factors
You must evaluate and document the following Risk Assessment Factors to determine the probability of compromise:
- Nature and extent of PHI involved (types of identifiers, sensitivity, and volume).
- The unauthorized person who used the PHI or to whom the disclosure was made.
- Whether the PHI was actually acquired or viewed versus merely exposed.
- The extent to which the risk has been mitigated (for example, rapid containment, verified deletion, or satisfactory assurances).
If, after this assessment, a low probability of compromise cannot be demonstrated, you must treat the incident as a breach and proceed with notification. Covered Entities and Business Associates should apply this analysis consistently and retain the documentation for HIPAA Compliance.
Notification Requirements and Timelines
Individual notifications
You must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. Use first-class mail, or email if the individual agreed to electronic notices. For urgent cases involving possible misuse, consider telephone contact in addition to written notice.
Content of the notice
Each notice should clearly explain:
- A brief description of what happened, including dates of the incident and discovery.
- Types of information involved (for example, names, diagnoses, Social Security numbers).
- Steps individuals should take to protect themselves.
- What you are doing to investigate, mitigate harm, and prevent recurrence.
- Contact methods for questions (toll-free number, email, or postal address).
Substitute notice
- Fewer than 10 individuals with insufficient contact details: use alternative means such as phone, email, or other appropriate written notice.
- 10 or more individuals: provide substitute notice via a conspicuous website posting or major print/broadcast media for at least 90 days, along with a toll-free number active for the same period.
Maintain proof of delivery efforts and the final text of notices as part of your compliance file.
Media and Secretary Notification
Media notification (500+ in a state or jurisdiction)
If a breach involves 500 or more residents of a single state or jurisdiction, you must notify prominent media outlets serving that area without unreasonable delay and no later than 60 days from discovery. Issue a press release that contains the same core elements as individual notices.
Secretary of HHS notification
- 500 or more affected individuals: notify the Secretary of Health and Human Services without unreasonable delay and in no case later than 60 days from discovery.
- Fewer than 500 affected individuals: log the breach and report to the Secretary no later than 60 days after the end of the calendar year in which the breach was discovered.
Submit complete and accurate entries, including incident dates, number of affected individuals, and a description of safeguards and mitigation steps.
Business Associate Responsibilities
Immediate duties when a breach is discovered
Business Associates must notify the Covered Entity without unreasonable delay and no later than 60 days after discovery. The report should include the identities of affected individuals, a description of the impermissible use or disclosure, the types of PHI involved, and mitigation actions taken.
Business Associate Agreements (BAAs)
Your BAA should specify permitted uses and disclosures, require implementation of administrative, physical, and technical safeguards, mandate breach reporting procedures, and flow these obligations down to subcontractors that handle PHI. Maintain current BAAs and verify vendor adherence through due diligence and periodic reviews.
Coordination and remediation
Coordinate on notification language, forensic investigation, and credit monitoring or identity protection services where appropriate. Document corrective actions, such as enhanced access controls, encryption rollouts, or workforce training tied to the incident.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentDocumentation and Compliance
Program essentials
Build a HIPAA Compliance program that includes role-based training, sanctions for violations, routine risk analyses, and written policies for incident response, media engagement, and breach notification. Designate Privacy and Security Officers to oversee governance and continuous improvement.
Recordkeeping
Retain risk assessments, notices, mailing proofs, media releases, logs of smaller breaches, investigation reports, and policy versions for at least six years. Keep audit trails for access to systems containing PHI and document security configurations and change management.
Response playbooks
Create step-by-step playbooks for common scenarios (lost laptop, misdirected email, insider snooping, ransomware). Run tabletop exercises to test decision-making, validate contact lists, and refine timelines so you can meet the 60-day outer limit without delay.
Enforcement and Penalties
How enforcement works
The Office for Civil Rights investigates complaints, breach reports, and audit findings. Outcomes range from technical assistance and voluntary corrective action to resolution agreements with multi-year corrective action plans and external monitoring.
Civil Monetary Penalties
HIPAA’s Civil Monetary Penalties are tiered by culpability (lack of knowledge, reasonable cause, willful neglect corrected, and willful neglect not corrected). Penalties apply on a per-violation basis with annual caps that are adjusted for inflation. OCR weighs factors such as the number of affected individuals, duration and scope, harm, prior history, and the entity’s cooperation when determining amounts.
Practical risk reducers
Maintain documented risk analyses, enforce least-privilege access, encrypt portable devices, patch promptly, and monitor for anomalous activity. Strong evidence of proactive controls and rapid mitigation often reduces enforcement exposure and supports negotiated resolutions.
Encryption and Data Destruction Best Practices
Encryption standards that qualify for safe harbor
Apply industry-accepted Encryption Standards to render PHI unusable, unreadable, or indecipherable. Use strong, FIPS-validated cryptography (for example, AES-256 for data at rest and modern TLS for data in transit). Enable full-disk encryption on laptops and mobile devices, and use secure patient portals or encrypted email for message delivery.
Key management and access control
Protect encryption keys with separation of duties, hardware-backed storage when feasible, regular rotation, and revocation on role changes. Combine encryption with multi-factor authentication, device compliance checks, and least-privilege access policies.
Endpoint, cloud, and backup protections
Enforce mobile device management, remote wipe, and screen-lock policies. In cloud services, configure encryption at rest and in transit, restrict public sharing, and log all administrative actions. Encrypt backups, store copies offline or immutable, and test restorations to withstand ransomware.
Secure data destruction
When PHI is no longer needed, sanitize media using recognized methods: cryptographic erase for SSDs, multi-pass overwrite or secure erase for HDDs, and degaussing or shredding as appropriate. For paper, use cross-cut shredding or pulping. Maintain chain-of-custody and obtain a Certificate of Destruction from vendors.
Vendor management
Evaluate third parties for encryption efficacy, incident response maturity, and breach reporting readiness. Require BAAs, verify subcontractor flow-down, and audit periodically to ensure controls remain effective.
Conclusion
Unsafeguarded PHI exposes patients and organizations to harm, regulatory scrutiny, and significant Civil Monetary Penalties. By applying rigorous risk assessments, meeting Breach Notification Rule timelines, coordinating with Business Associates, and implementing strong Encryption Standards and disposal controls, you can reduce breach likelihood and respond decisively when incidents occur.
FAQs
What defines an unsafeguarded PHI breach?
A breach occurs when an impermissible use or disclosure of unsecured PHI creates more than a low probability of compromise based on a documented risk assessment. If the incident does not meet a narrow exception and the PHI was not properly secured (for example, not strongly encrypted), you should treat it as a breach.
When must breach notifications be sent?
Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. If 500 or more residents of a state or jurisdiction are affected, notify prominent media within the same outer limit. Report 500+ breaches to the Secretary of HHS within 60 days; for fewer than 500, report no later than 60 days after the end of the calendar year.
What penalties apply for failing to safeguard PHI?
OCR may impose tiered Civil Monetary Penalties based on culpability, with per-violation amounts and annual caps that adjust for inflation. Enforcement can also include resolution agreements, corrective action plans, and monitoring. Aggravating or mitigating factors influence the final outcome.
How should covered entities document PHI breaches?
Maintain a written risk assessment addressing the four factors, incident timelines, decision rationale, copies of individual and media notices, HHS submissions, mitigation steps, forensic reports, and policy updates. Keep logs of smaller breaches and retain all records for at least six years as part of your HIPAA Compliance program.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment