Skip to main content

Breach Notification Procedure

Breach Notification Procedure

Purpose: Establish procedures for responding to and reporting breaches of Protected Health Information (PHI).

Definitions

Breach: The acquisition, access, use, or disclosure of PHI in a manner not permitted under HIPAA that compromises the security or privacy of the PHI.

Unsecured PHI: PHI that is not secured through encryption or destruction that renders it unusable, unreadable, or indecipherable.

Discovery: The first day on which any employee, contractor, or agent knows or reasonably should have known of a breach.

Breach Assessment

Initial Risk Assessment

Upon discovery of a potential breach, conduct an immediate risk assessment:

Factors to Consider:

  1. Nature and extent of PHI involved
  2. Unauthorized person who accessed/received PHI
  3. Whether PHI was actually acquired or viewed
  4. Extent to which risk has been mitigated

Risk Levels:

Low Risk (Notification May Not Be Required):

  • Limited disclosure to authorized individual
  • PHI not sensitive
  • Low probability of re-identification
  • Immediate mitigation successful

High Risk (Notification Required):

  • Large number of individuals affected
  • Sensitive PHI exposed (SSN, financial, medical conditions)
  • PHI accessed by malicious actor
  • Public disclosure
  • No mitigation possible

Documentation Requirements

Breach Investigation Record:

  • Date and time of discovery
  • Description of breach
  • Type and amount of PHI involved
  • Number of individuals affected
  • Individuals/systems that accessed PHI
  • Investigation findings
  • Mitigation actions taken
  • Risk assessment conclusion

Notification Timelines

Individual Notification

Timeline: Within 60 days of breach discovery

Method:

  • First-class mail to last known address
  • Email if patient has agreed to electronic notification
  • Substitute notice if contact information insufficient:
    • Web site posting for 90 days
    • Major media notice (if 10+ individuals in jurisdiction)

Required Contents:

  1. Brief description of breach
  2. Types of PHI involved
  3. Steps individuals should take to protect themselves
  4. What the organization is doing to investigate and mitigate
  5. Contact information for questions

Template:

HHS Notification (Office for Civil Rights)

500+ Individuals:

Fewer than 500 Individuals:

  • Annual notification
  • Submit within 60 days of calendar year end
  • Aggregate all breaches from the year

Required Information:

  • Name of covered entity
  • Contact information
  • Business associate involved (if applicable)
  • Number of individuals affected
  • Date of breach
  • Date of discovery
  • Description of breach
  • Types of PHI involved
  • Actions taken in response

Media Notification

Required When:

  • Breach affects 500+ residents of a state or jurisdiction

Timeline:

  • Within 60 days of discovery

Method:

  • Prominent media outlet in affected jurisdiction
  • Press release via PR wire service
  • Organization website posting

Response Procedures

Immediate Actions (Within 24 Hours)

Containment:

  1. Disable compromised accounts
  2. Revoke exposed credentials
  3. Block malicious IP addresses
  4. Isolate affected systems
  5. Preserve evidence for investigation

Notification:

  1. Notify Privacy Officer immediately
  2. Notify Security Officer
  3. Notify Legal Counsel
  4. Document discovery time and actions

Investigation (Within 72 Hours)

Forensic Analysis:

  1. Review audit logs:

  2. Identify affected individuals:

  3. Determine PHI exposed:

    • Review accessed records
    • Check exported data
    • Analyze system logs
  4. Assess root cause:

    • Technical vulnerability
    • Human error
    • Malicious insider
    • External attack

Documentation:

  • Complete breach investigation form
  • Collect evidence (logs, screenshots, emails)
  • Timeline of events
  • List of affected individuals

Remediation (Within 7 Days)

Technical Fixes:

  1. Patch vulnerabilities
  2. Update access controls
  3. Deploy security enhancements
  4. Conduct security audit

Process Improvements:

  1. Update policies and procedures
  2. Enhance monitoring and alerts
  3. Additional training for staff
  4. Third-party security assessment

Breach Categories and Examples

Common Breach Types

1. Unauthorized Access

  • Employee accesses records without business need
  • Hacker gains access to database
  • Lost/stolen unencrypted device

Response:

  • Revoke access immediately
  • Review all accessed records
  • Notify affected individuals

2. Misdirected Communication

  • Email sent to wrong recipient
  • Fax sent to wrong number
  • Mail sent to wrong address

Response:

  • Attempt to retrieve communication
  • Request recipient to destroy/delete
  • Document attempt and response

3. Improper Disposal

  • PHI in regular trash
  • Unwiped hard drives
  • Unsecured file deletion

Response:

  • Recover materials if possible
  • Assess likelihood of access
  • Enhance disposal procedures

4. Loss or Theft

  • Lost laptop with PHI
  • Stolen backup drive
  • Missing patient files

Response:

  • Report to law enforcement
  • Remote wipe if possible
  • Assess encryption status

5. Cyber Attack

  • Ransomware attack
  • SQL injection
  • Phishing success

Response:

  • Engage incident response team
  • Forensic analysis
  • Law enforcement notification
  • Public statement if large-scale

Exceptions to Notification

Notification Not Required If:

  1. Encrypted Data: PHI encrypted to NIST standards and key not compromised

  2. Destroyed Data: PHI rendered unusable/unreadable/indecipherable (e.g., shredded, degaussed)

  3. Low Probability of Compromise:

    • Unintentional acquisition/access by workforce member acting in good faith
    • PHI not further used/disclosed
    • Inadvertent disclosure to authorized person at same organization
    • No reasonable belief PHI was retained

Documentation Required: Even if notification exception applies, document the incident and risk assessment.

Roles and Responsibilities

Privacy Officer

  • Oversee breach response
  • Conduct risk assessment
  • Approve notifications
  • Submit HHS reports
  • Maintain breach log

Security Officer

  • Lead technical investigation
  • Implement containment measures
  • Conduct forensic analysis
  • Deploy remediation

Legal Counsel

  • Assess legal obligations
  • Review notifications
  • Advise on regulatory reporting
  • Coordinate with law enforcement

IT Team

  • Preserve evidence
  • Analyze logs and systems
  • Implement technical fixes
  • Support investigation

Communications Team

  • Draft notifications
  • Coordinate media response
  • Manage public relations
  • Update website

Vendor Breach Notification

Business Associate Breach:

If business associate (vendor) discovers breach:

  1. BA must notify covered entity within 60 days

  2. BA provides:

    • Identification of affected individuals
    • Description of breach
    • Recommendations for notification
  3. Covered entity responsibilities:

    • Conduct own risk assessment
    • Notify affected individuals (CE responsibility)
    • Notify HHS
    • Notify media if applicable

BAA Requirements:

  • Breach notification obligations
  • Timeline for notification
  • Information to provide
  • Cooperation requirements

See: docs/compliance/BAA_TEMPLATE.md

Breach Log

Maintain Record of All Breaches:

Required Information:

  • Date of breach
  • Date of discovery
  • Number of individuals affected
  • Description of breach
  • Disposition (notifications sent, HHS report filed)

Retention: 6 years from creation or last effective date

Location: Secure compliance management system (organizational responsibility)

Training

All Staff Must Know:

  • How to recognize potential breach
  • Immediate reporting procedures
  • Contact information for Privacy/Security Officers
  • Importance of timely response

Annual Training Topics:

  • Breach definition and examples
  • Reporting requirements
  • Response procedures
  • Recent breach incidents (case studies)

Contact Information

Breach Response Team:

  • Privacy Officer: [Name, Email, Phone]
  • Security Officer: [Name, Email, Phone]
  • Legal Counsel: [Name, Email, Phone]
  • IT Director: [Name, Email, Phone]

External Resources:

Regulatory References