What Gets Recorded After a HIPAA Violation? Examples, Retention, Best Practices
Documentation of HIPAA Violations
When you suspect a HIPAA violation, your first task is to create a complete, contemporaneous record that satisfies HIPAA documentation requirements. Capture the facts, preserve evidence, and show the decisions you made from discovery through closure.
What to capture immediately
- Discovery details: date/time (with time zone), how it was detected, reporter, and ticket or case ID.
- Scope: systems, locations, and data flows involved; whether ePHI was touched and which applications store it.
- PHI specifics: identifiers and clinical or financial fields involved, data volume, and whether minors or sensitive categories were affected.
- People and roles: workforce members, business associates, and any subcontractors involved, including contact information.
- Containment: steps taken (account disabled, device isolated, messages recalled), start/finish times, and who approved them.
- Evidence preservation: forensic investigation records such as log exports, screenshots, email headers, database snapshots, EDR traces, and chain-of-custody notes.
Examples of artifacts to retain
- Incident report summarizing what happened, root cause, and corrective actions.
- Risk assessment documenting likelihood of compromise, nature/extent of PHI, unauthorized recipients, and mitigation performed.
- Breach notification documentation: notice templates, letter content, mailing proofs, call-center scripts, and copies of submissions to regulators.
- Workforce actions: sanction decisions, HR memos, retraining rosters, attestations, and policy acknowledgments.
- Policy/procedure updates, meeting minutes, and approvals showing how you reduced recurrence risk.
- Vendor correspondence related to Business Associate Agreement compliance and any downstream subcontractor notifications.
- PHI disposal documentation for media/device sanitization or destruction (certificates, serial numbers, dates, and witnessing parties).
Example entry
May 2, 2025 — Misdirected email containing one discharge summary to a non-intended recipient. Contained within 30 minutes; recipient confirmed deletion. Risk assessment deemed a reportable breach; individual notified May 10, 2025; case closed May 28, 2025 with mailbox auto-complete disabled and staff retrained.
Sanctions and workforce actions
Keep a written record of sanction decisions, rationale, and actions taken. Include dates, approvals, and any appeal outcome. Link the sanction file to the incident record without embedding PHI beyond what is necessary.
Patient-level documentation
Do not alter clinical notes to describe the violation. Instead, retain an accounting-of-disclosures entry, correspondence logs, and notices sent to the individual. These live alongside, not inside, the medical record.
Retention Period for Documentation
HIPAA requires you to retain required documentation for at least six years from the date of creation or the date when it last was in effect, whichever is later (for example, policies, procedures, sanctions, and incident records). Apply this minimum to incident files, breach notices, risk analyses, training attestations, and BAAs.
- Incident and breach files: keep all evidence, decisions, and communications for six years.
- Policies, procedures, and approvals: retain each version for six years after it is superseded.
- Business Associate Agreements: retain executed agreements and amendments for six years after their last effective date.
- Protected Health Information audit logs: keep according to record retention policies that support investigations and audits; many organizations retain critical logs up to six years.
- PHI disposal documentation: keep certificates of destruction and chain-of-custody records for at least six years.
State laws, payer contracts, litigation holds, and accreditation rules can require longer retention. Your record retention policies should harmonize these timelines and specify where and how records are stored and destroyed.
Best Practices for Documentation
- Use a single case record: maintain one authoritative file linking all artifacts (evidence, decisions, notices, sanctions, and approvals).
- Time-stamp everything: record who did what and when; preserve system time-synchronization evidence to support your timeline.
- Standardize templates: incident intake forms, risk assessment worksheets, breach notification documentation, and closure checklists reduce gaps.
- Preserve integrity: store evidence in write-once or versioned repositories with access controls and hash values to prove authenticity.
- Minimize PHI in the record: reference patient IDs instead of copying clinical content; keep only what you need to explain the incident.
- Demonstrate remediation: attach policy updates, technical change tickets, retraining rosters, and monitoring plans that address the root cause.
- Track Business Associate Agreement compliance: include vendor SLAs, notification timelines, and proof of the BA’s corrective actions.
- Review and sign off: have privacy/security officers and legal review key decisions; document approvals and exceptions.
Incident Response and Breach Reports
Document your incident lifecycle from detection to lessons learned. Your records should make it easy for an auditor to see why you called it a breach or not and how you fulfilled notification duties.
Workflow to document
- Detection and triage: reporter, severity rating, initial scope, and containment owner.
- Containment and eradication: actions taken, start/stop times, residual risk, and system validation steps.
- Risk assessment: factors considered, supporting evidence, and determination (breach vs. not a breach) with sign-offs.
- Notification plan: audiences (individuals, HHS, media when 500+ in a state/jurisdiction), delivery channels, and deadlines.
- Execution: copies of notices, dates sent, undeliverable handling, FAQs provided, and call-center volume summaries.
- Post-incident: corrective actions, metrics to verify effectiveness, and lessons learned.
What belongs in breach reports
- What happened and when (discovery and occurrence dates) and how the incident was contained.
- Types of PHI involved (e.g., names, MRNs, diagnoses, billing elements) and potential risks to individuals.
- Steps individuals should take to protect themselves, if any.
- What you are doing to investigate, mitigate harm, and prevent future incidents.
- Counts by state/jurisdiction, method of notification, and reasons for any delay (including documented law-enforcement holds).
Maintain confirmation numbers or receipts for regulator submissions and media notices. Keep drafts and approvals to show how the final message was vetted.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentBusiness Associate Agreements
Incidents involving vendors require you to document Business Associate Agreement compliance alongside the incident file. Capture what the BA reported, when, and how you validated their remediation.
- Contract terms: permitted uses, safeguards, breach reporting timelines, subcontractor flow-downs, and termination/return-or-destruction clauses.
- Event documentation: BA’s incident report, evidence provided, corrective actions, and attestation of completion.
- Due diligence: risk questionnaires, security attestations, audit results, and any corrective action plans.
- Lifecycle records: executed BAAs, amendments, renewals, and termination certificates, each retained for the required period.
Technical Safeguards and System Configurations
Technical documentation shows how your environment was configured when the incident occurred and which safeguards you adjusted afterward. Treat these as part of the investigative record.
- System inventory: applications and devices that store or transmit ePHI, data flows, owners, and environments.
- Configuration baselines: access control settings, role definitions, MFA enforcement, encryption (in transit/at rest), and key management.
- Security controls: DLP rules, email security settings, EDR policies, network segmentation, firewall and IDS/IPS rules, and backup/restore configs.
- Change records: tickets for hotfixes, patches, logging-level changes, and new monitoring rules introduced after the incident.
- PHI disposal documentation: device/media sanitization steps when hardware is retired or repurposed after an incident.
Audit Logs and Access Reports
Protected Health Information audit logs are often the most decisive evidence you have. Your records should prove that logging was enabled, trustworthy, and reviewed.
What your logs should capture
- User identity, device or IP, date/time, source system, object accessed (patient ID/chart/module), and action (view, create, modify, export, delete).
- Outcome (success/failure), session duration, and unusual patterns (bulk access, after-hours, or excessive queries).
- Linkage to tickets for approvals of role changes, emergency access, or break-glass events.
Reviews and reports
- Routine audits: scheduled reviews of high-risk workflows (VIP charts, break-glass, bulk exports) with documented findings and remediation.
- Ad-hoc reviews: targeted deep dives for a specific patient or user, with preserved queries and results.
- Retention and integrity: log retention durations aligned to record retention policies, immutability settings, and hash or archival proofs.
Tie audit findings back to policy enforcement and training updates so you can demonstrate complete follow-through.
FAQs.
Does a HIPAA violation appear on individual records?
No. You do not annotate the clinical record to describe a violation. Instead, maintain an accounting-of-disclosures entry and correspondence history outside the chart, plus internal incident files that explain what happened and how you responded.
How long must HIPAA violation documentation be retained?
Retain required HIPAA documentation for at least six years from creation or last effective date. Apply this to incident records, risk assessments, notices, sanctions, training attestations, and BAAs. If other laws or contracts require longer periods, follow the longest applicable requirement.
What is included in HIPAA breach reports?
Breach reports describe what happened and when, types of PHI involved, steps individuals should take, and what you are doing to investigate, mitigate, and prevent recurrence. They also record who was notified, how and when notices were sent, and any law-enforcement delays.
How are HIPAA violations documented for audit purposes?
Use a single case file that links the incident report, forensic investigation records, Protected Health Information audit logs, risk assessment, breach notification documentation, sanctions and training, policy updates, and evidence of vendor and Business Associate Agreement compliance.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment