What Is a HIPAA Security Incident? Definition, Examples, and Reporting Steps

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

What Is a HIPAA Security Incident? Definition, Examples, and Reporting Steps

Kevin Henry

HIPAA

May 25, 2025

7 minutes read
Share this article
What Is a HIPAA Security Incident? Definition, Examples, and Reporting Steps

Definition of HIPAA Security Incident

A HIPAA security incident is any attempted or successful event that results in unauthorized access, use, disclosure, modification, or destruction of information, or interference with system operations, within an environment that stores or transmits electronic protected health information (ePHI). In practice, this includes anything from suspicious login attempts to confirmed account compromise affecting ePHI.

Under HIPAA Security Rule compliance, you must maintain policies and procedures to identify, report, and respond to these events. Not every security incident is a breach, but every breach begins as a security incident. If an incident may have exposed ePHI, you perform a risk assessment to determine whether breach notification requirements are triggered.

Security incident vs. breach

A security incident is the broad category; a breach is a subset where ePHI is compromised in a manner not permitted by HIPAA. To decide if a breach occurred, evaluate factors such as the nature of the data, who accessed it, whether it was actually viewed or acquired, and the effectiveness of mitigation strategies taken to reduce risk.

Examples of HIPAA Security Incidents

Security incidents span both successful compromises and meaningful attempts. The following common scenarios should be logged, investigated, and addressed promptly:

  • Phishing that leads to credential theft or suspicious inbox rules targeting ePHI.
  • Ransomware or malware impacting the confidentiality, integrity, or availability of systems with ePHI.
  • Lost or stolen laptops, phones, or USB drives containing unencrypted ePHI.
  • Unauthorized access or “snooping” by workforce members beyond minimum necessary use.
  • Misdirected emails, faxes, or portal messages containing ePHI sent to the wrong recipient.
  • Misconfigured cloud storage, exposed databases, or weak remote access controls.
  • Third-party vendor compromise that touches your systems or data as a business associate relationship.
  • Denial-of-service or outages that interfere with system operations supporting ePHI.
  • Disabled or tampered audit logs that limit your ability to trace activity involving ePHI.

Attempted incidents matter

Repeated failed logins, blocked malware, or unusual network scans may not result in data exposure, but they are still HIPAA security incidents. Tracking these patterns strengthens your defenses and informs risk management.

Reporting Requirements for Business Associates

Business associates (BAs) must report known security incidents to the covered entity as required by the HIPAA Security Rule and by the specific Business Associate Agreement (BAA). Most BAAs set short timeframes—often 24 to 48 hours—for initial notice, with ongoing updates as facts emerge.

If an incident is determined to be a breach of unsecured PHI, the BA must notify the covered entity without unreasonable delay and provide the details necessary for breach notification. The covered entity leads patient and regulator notifications, while the BA supports investigation and remediation.

What to include in a BA’s incident notice

  • A concise description of the incident and systems affected.
  • Types of ePHI involved and, if known, approximate number of individuals affected.
  • Dates of occurrence and discovery, plus current containment status.
  • Initial mitigation strategies taken and planned next steps.
  • A primary contact for coordination and incident documentation.

Notify promptly even when details are incomplete. Early coordination helps limit impact and supports timely HIPAA breach notification if required.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Reporting Requirements for Covered Entities

Covered entities (CEs) must ensure workforce members report suspected security incidents immediately to the security or privacy officer. For incidents that rise to a breach of unsecured PHI, CEs must provide breach notification to affected individuals without unreasonable delay and no later than 60 calendar days after discovery.

When a breach affects 500 or more residents of a state or jurisdiction, the CE must also notify prominent media outlets without unreasonable delay and notify the federal regulator within 60 days of discovery. For breaches affecting fewer than 500 individuals, the CE logs them and submits the annual report within 60 days after the end of the calendar year. Business associates provide facts and assistance, but the CE is ultimately responsible for required notifications.

Internal reporting discipline

Use clear escalation paths, preapproved message templates, and executive briefings to keep decisions and communications consistent. Tight coordination reduces delays and improves response quality.

Steps in Security Incident Response

Core phases

  1. Identify and triage. Detect the event, validate indicators, gauge impact on ePHI, and prioritize severity. Activate the security incident response team and open a case for incident documentation.
  2. Contain. Limit spread by isolating hosts, resetting credentials, disabling compromised accounts, and blocking malicious indicators. Preserve forensic evidence while restoring minimum necessary operations.
  3. Eradicate. Remove malware, backdoors, and unauthorized changes. Patch vulnerable systems, rotate keys, and harden configurations, especially for remote access and cloud services.
  4. Investigate and assess risk. Reconstruct the timeline, determine whether ePHI was accessed or exfiltrated, and perform a breach risk assessment to decide if breach notification is required.
  5. Notify, if required. Prepare breach notification to individuals and regulators within required timeframes. Coordinate with legal, privacy, executives, and—when appropriate—law enforcement.
  6. Recover. Restore systems from known-good backups, validate integrity, and monitor closely for recurrence. Communicate service restoration to stakeholders.
  7. Improve. Conduct a lessons-learned review to implement mitigation strategies, close process gaps, update runbooks, and strengthen training and monitoring.

Enablement practices

  • Maintain an up-to-date incident response plan with clear roles, authority, and contact trees.
  • Run tabletop exercises simulating ransomware, vendor compromise, and lost-device scenarios.
  • Deploy logging and audit controls that retain sufficient detail to trace activity involving ePHI.

Role of Security Incident Response Team

A security incident response team (SIRT) coordinates technical, legal, and operational actions from detection through closure. You assign an incident commander to drive decisions and keep the organization aligned on scope, risk, and timelines.

Typical composition and responsibilities

  • Security and IT leads: Forensics, containment, eradication, recovery, and hardening.
  • Privacy and compliance: Breach risk assessment, HIPAA Security Rule compliance alignment, and documentation quality.
  • Legal and executive sponsors: Decision-making on notification, contracts, and risk acceptance.
  • Communications: Internal and external messaging that is accurate, timely, and consistent.
  • Third-party partners: Forensic specialists, managed security providers, or impacted vendors as needed.

The team ensures disciplined evidence handling, accurate timelines, and that notifications, if required, are issued within statutory windows.

Documentation of Security Incidents

Robust incident documentation demonstrates due diligence, supports audits, and accelerates future response. Keep centralized records for every security incident, including those that do not become breaches. Retain required documentation for at least six years, consistent with HIPAA’s general record-retention expectations.

What to capture in each record

  • Incident summary, unique identifier, dates of occurrence and discovery, and current status.
  • Systems, accounts, and data types affected, with specific references to electronic protected health information.
  • Indicators of compromise, forensic artifacts, and relevant logs preserved.
  • Containment, eradication, and recovery actions taken, plus mitigation strategies to reduce residual risk.
  • Risk assessment outcome and whether breach notification was required.
  • Notifications sent (audience, content, dates) and any law-enforcement coordination.
  • Lessons learned, control improvements, and follow-up tasks with owners and due dates.

Conclusion

In short, treat every anomaly as a potential HIPAA security incident: investigate quickly, contain impact, assess risk to ePHI, and document thoroughly. Clear roles, disciplined processes, and strong incident documentation position you to meet breach notification obligations and strengthen your security posture over time.

FAQs

What qualifies as a HIPAA security incident?

Any attempted or successful event that compromises the confidentiality, integrity, or availability of systems handling ePHI qualifies. This includes unauthorized access, suspicious login activity, malware, ransomware, data loss, misdirected messages, or outages that affect system operations—even if no data is confirmed exposed.

How should business associates report security incidents?

Follow your Business Associate Agreement and notify the covered entity without delay, often within 24–48 hours for initial notice. Provide what happened, systems and ePHI affected, dates, containment status, mitigation efforts, and a point of contact. Continue sharing updates and assist with breach notification if required.

What steps are involved in responding to a security incident?

Identify and triage, contain the impact, eradicate the cause, investigate and assess breach risk, notify as required, recover securely, and improve controls. Throughout, maintain accurate records and engage the security incident response team to coordinate actions.

Who is responsible for documenting HIPAA security incidents?

The covered entity or business associate that experiences the incident is responsible for complete and accurate documentation. In practice, the security or privacy office leads recordkeeping, with input from IT, compliance, legal, and any third-party partners involved in the response.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles