Notify Individuals
Notify individuals. If you quickly notify people
that their personal information has been compromised, they can take
steps to reduce the chance that their information will be misused. In
deciding who to notify, and how, consider:
- the nature of the compromise
- the type of information taken
- the likelihood of misuse
- the potential damage if the information is misused
For example, thieves who have stolen names and Social Security
numbers can use that information not only to sign up for new accounts in
the victim’s name, but also to commit tax identity theft. People who
are notified early can take steps to limit the damage.
When notifying individuals, the FTC recommends you:
- Consult with your law enforcement contact about the timing of the notification so it doesn’t impede the investigation.
- Designate a point person within your organization for releasing information. Give the contact person the latest information about the breach, your response, and how individuals should respond.
- Consider using letters (see sample below), websites, and toll-free numbers
to communicate with people whose information may have been compromised.
If you don’t have contact information for all of the affected
individuals, you can build an extensive public relations campaign into
your communications plan, including press releases or other news media
notification.
- Consider offering at least a year of free credit monitoring or other support
such as identity theft protection or identity restoration services,
particularly if financial information or Social Security numbers were
exposed. When such information is exposed, thieves may use it to open
new accounts.
State breach notification laws typically tell you what
information you must, or must not, provide in your breach notice. In
general, unless your state law says otherwise, you’ll want to:
- Clearly describe what you know about the compromise. Include:
- how it happened
- what information was taken
- how the thieves have used the information (if you know)
- what actions you have taken to remedy the situation
- what actions you are taking to protect individuals, such as offering free credit monitoring services
- how to reach the relevant contacts in your organization
Consult with your law enforcement contact about what information to include so your notice doesn’t hamper the investigation.
Tell people what steps they can take, given the type of information exposed, and provide relevant contact information.
For example, people whose Social Security numbers have been stolen
should contact the credit bureaus to ask that fraud alerts or credit
freezes be placed on their credit reports. See IdentityTheft.gov/databreach
for information on appropriate follow-up steps after a compromise,
depending on the type of personal information that was exposed. Consider
adding this information as an attachment to your breach notification
letter, as we’ve done in the model letter below.
Include current information about how to recover from identity theft. For a list of recovery steps, refer consumers to IdentityTheft.gov.
Consider providing information about the law enforcement
agency working on the case, if the law enforcement agency agrees that
would help. Identity theft victims often can provide important information to law enforcement.
Encourage people who discover that their information has been misused to report it to the FTC, using IdentityTheft.gov. IdentityTheft.gov
will create an individualized recovery plan, based on the type of
information exposed. And, each report is entered into the Consumer
Sentinel Network, a secure, online database available to civil and
criminal law enforcement agencies.
Describe how you’ll contact consumers in the future.
For example, if you’ll only contact consumers by mail, then say so. If
you won’t ever call them about the breach, then let them know. This
information may help victims avoid phishing scams tied to the breach,
while also helping to protect your company’s reputation. Some
organizations tell consumers that updates will be posted on their
website. This gives consumers a place they can go at any time to see the
latest information.
Covered entities and business associates must only provide the required notifications if the breach involved unsecured protected health information. Unsecured protected health information is protected health information that has not been rendered unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified by the Secretary in guidance. This guidance was first issued in April 2009 with a request for public comment. The guidance was reissued after consideration of public comment received and specifies encryption and destruction as the technologies and methodologies for rendering protected health information unusable, unreadable, or indecipherable to unauthorized individuals. Additionally, the guidance also applies to unsecured personal health record identifiable health information under the FTC regulations. Covered entities and business associates, as well as entities regulated by the FTC regulations, that secure information as specified by the guidance are relieved from providing notifications following the breach of such information. ...read more |
Covered entities and business associates must only provide the required notifications if the breach involved unsecured protected health information. Unsecured protected health information is protected health information that has not been rendered unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified by the Secretary in guidance. This guidance was first issued in April 2009 with a request for public comment. The guidance was reissued after consideration of public comment received and specifies encryption and destruction as the technologies and methodologies for rendering protected health information unusable, unreadable, or indecipherable to unauthorized individuals. Additionally, the guidance also applies to unsecured personal health record identifiable health information under the FTC regulations. Covered entities and business associates, as well as entities regulated by the FTC regulations, that secure information as specified by the guidance are relieved from providing notifications following the breach of such information. ...read more |
If a breach of unsecured protected health information occurs at or by a business associate, the business associate must notify the covered entity following the discovery of the breach. A business associate must provide notice to the covered entity without unreasonable delay and no later than 60 days from the discovery of the breach. To the extent possible, the business associate should provide the covered entity with the identification of each individual affected by the breach as well as any other available information required to be provided by the covered entity in its notification to affected individuals. ...read more |
Protected health information (PHI) is rendered unusable, unreadable, or indecipherable to unauthorized individuals if one or more of the following applies: Electronic PHI has been encrypted as specified in the HIPAA Security Rule by “the use of an algorithmic process to transform data into a form in which there is a low probability of assigning meaning without use of a confidential process or key” (45 CFR 164.304 definition of encryption) and such confidential process or key that might enable decryption has not been breached. To avoid a breach of the confidential process or key, these decryption tools should be stored on a device or at a location separate from the data they are used to encrypt or decrypt. The encryption processes identified below have been tested by the National Institute of Standards and Technology (NIST) and judged to meet this standard. Valid encryption processes for data at rest are ...read more |
|
August 2025
Su | Mo | Tu | We | Th | Fr | Sa |
| | | | | 1 | 2 |
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |
Blog Home
Newest Blog Entries
1/21/25 Healthcare Data Breaches and Their Devastating Impact
1/21/25 Your Essential Guide to Data Breach Reporting Procedures
1/21/25 Understanding Your Obligations in Data Breach Reporting
11/16/22 Administrative Requirements and Burden of Proof
11/16/22 Notification by a Business Associat
11/16/22 Breach Notification Requirements
11/16/22 Unsecured Protected Health Information and Guidance
11/16/22 Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals
11/16/22 Definition of Breach
11/16/22 Breach Notification Rule
11/16/22 Notify Individuals
Blog Archives
January 2025 (3) November 2022 (11)
Blog Labels
ePHI Data (1) Data Breach Reporting (6) Data Breach Notification (6) Health Care Data (1)
|