HIPAA Breach Notification Rule: What It Is + How To Comply
Join the thousands of companies using Secureframe
“There’s been a data breach.”
Words you never want to hear, especially as a leader in health care. A breach of unsecured protected health information (PHI) can mean HIPAA penalties, lawsuits, and a massive, organization-wide headache.
Understanding the HIPAA Breach Notification Rule could save your organization time and money while also safeguarding your reputation.
Let’s discuss what the rule means and how to comply with it.
What is the HIPAA Breach Notification Rule?
The HIPAA Breach Notification Rule requires organizations to notify affected individuals and the U.S. Department of Health and Human Services (HHS) when unsecured PHI has been breached.
The HHS’s Office for Civil Rights (OCR) investigates violations to the rule but tends to prioritize breach cases involving 500+ patient records.
What are the HIPAA Breach Notification requirements?
We’ve covered your general responsibility to the HIPAA Breach Notification Rule, but what about the technicalities? In this section, we’ll help you feel confident about complying with the rule in the event that your organization faces a PHI breach.
First, when must a breach be reported? To avoid a fine from the OCR, healthcare providers must send notifications to affected individuals within 60 days of discovery of the breach.
That said, the rule specifies that breached organizations shouldn’t have an unreasonable delay in notifying affected parties. It’s recommended to notify those affected as quickly as possible — ideally, as soon as the discovery of a breach has been confirmed.
Delivery and content of the notification
Notifications of a breach of unsecured PHI must be sent to each impacted individual either in a written notice by first-class mail, or via email if the individual has consented to be contacted via email.
If the contact information of over 10 affected individuals is outdated, the covered entity must publish the notice on its website or broadcast the notice where each individual resides for at least 90 days.
The notification must explain:
- What happened
- What information was compromised
- How the entity is responding to the breach
- How it will prevent breaches in the future
It should also provide advice regarding how affected individuals can protect themselves from harm that may result from the breach, such as identity theft.
Notification of HHS and media notice
In addition to notifying affected parties of a breach, covered entities are required to notify HHS through a breach report. The timeline for notifying HHS varies based on the number of individuals affected.
If the breach affected fewer than 500 people, HHS must be notified on an annual basis — specifically, within 60 calendar days of the end of the year in which the breach was identified.
However, if the breach affected more than 500 individuals, then HHS must be notified within 60 days of the breach. The covered entity must also notify prominent media outlets including local print and broadcast media outlets.
Notification by business associates
In the event that a business associate is responsible for an unsecured PHI breach, the associate plays an active role in helping the covered entity execute the Breach Notification Rule. Within 60 days of discovering the breach, the associate must:
- Provide identification of each affected individual for the covered entity
- Communicate as many details as possible about the breach to the covered entity
From there, the covered entity is responsible for complying with the Breach Notification Rule — notifying affected individuals, notifying HSS, and potentially contacting the media.
What is considered a breach?
The HHS defines a breach as the impermissible use, access, or disclosure of unsecured PHI under the Privacy Rule that compromises the security and privacy of that data.
The HIPAA Privacy Rule defines PHI using 18 identifiers:
- Dates, except year
- Telephone numbers
- Geographic data
- Fax numbers
- Social Security numbers
- Email addresses
- Medical record numbers
- Account numbers
- Health plan beneficiary numbers
- Certificate/license numbers
- Vehicle identifiers, including license plates
- Web URLs
- Device identifiers and serial numbers
- IP addresses
- Full face photos and comparable images
- Biometric identifiers (i.e., retinal scan, fingerprints)
- Any unique identifying number or code
Videos and images containing PHI are also protected by the HIPAA Privacy Rule, as is PHI that’s stored electronically.
What constitutes unsecured PHI?
The rule only applies when unsecured PHI is breached. If your data is protected by strict security measures and still gets compromised, the rule does not apply to you. If it isn’t properly secured when it gets compromised, it’s considered unsecured.
For example, imagine a doctor mistakenly leaves a patient’s printed records on a table in a common area — this PHI is unsecured. After returning to pick them up, they aren’t there. If the records were not taken by authorized personnel, this constitutes a breach and the Breach Notification Rule applies.
The best way to avoid a violation is to confirm that you and your business associates are securing PHI through the use of data protection measures like encryption and routine PHI destruction. It’s also important to train employees in PHI management for moments when documents can’t be totally secured, such as file transfers between authorized personnel.
Failing to comply with the Breach Notification Rule after a breach of unsecured PHI can have some pretty severe consequences. Take Illinois healthcare network Presence Health, for example. In 2013, operating room schedules filled with sensitive data on 836 patients went missing.
Presence Health failed to notify HHS of the breach until over a month after the HIPAA Breach Notification Rule’s 60-day deadline, violating the rule. It ended up settling the violation for $475,000 in 2017.
The “low probability of compromise” condition
Any unauthorized use or disclosure of PHI is considered a breach unless it can be proven that there’s a “low probability” that the PHI has been compromised based on a proper risk assessment. The HHS specifies four factors that must be evaluated to determine this:
- The nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification
- The unauthorized person who used the PHI or to whom the disclosure was made
- Whether the PHI was actually acquired or viewed
- The extent to which the risk to the PHI has been mitigated
This assessment should only be conducted if the HIPAA-covered entity is unsure whether PHI has been compromised. If a breach seems obvious, the above factors don’t need to be evaluated and all relevant parties should be notified.
What are the breach exceptions?
There are a few scenarios that technically fall under the definition of a breach, yet HHS extends grace to them. The three breach exceptions are:
- Unintentional access or use of PHI by an employee, made in good faith and within the scope of their authority
- Accidental disclosure of PHI between authorized persons
- The organization confidently believes that the person who obtained or accessed the PHI will not retain or compromise the data
If any of the three exceptions are true, then PHI is not considered “breached” and the covered entity isn’t required to notify affected parties or HHS under the Breach Notification Rule.
How Secureframe can help you stay HIPAA compliant and avoid rule violations
Secureframe takes the stress out of keeping your organization’s PHI safe. By training employees on HIPAA requirements and best practices, keeping track of vendors and associates that have access to PHI, and monitoring your individual PHI safeguards, you can be confident that your breach risk is at a minimum.
Learn more about HIPAA compliance automation with Secureframe today.