Unsecured Protected Health Information and Guidance
Covered entities and business associates must only provide the
required notifications if the breach involved unsecured protected health
information. Unsecured protected health information is protected health
information that has not been rendered unusable, unreadable, or
indecipherable to unauthorized persons through the use of a technology
or methodology specified by the Secretary in guidance.
This guidance was first issued in April 2009 with a request for
public comment. The guidance was reissued after consideration of public
comment received and specifies encryption and destruction as the
technologies and methodologies for rendering protected health
information unusable, unreadable, or indecipherable to unauthorized
individuals. Additionally, the guidance also applies to unsecured
personal health record identifiable health information under the FTC
regulations. Covered entities and business associates, as well as
entities regulated by the FTC regulations, that secure information as
specified by the guidance are relieved from providing notifications
following the breach of such information.
| When your business experiences a data breach, notify law enforcement, other affected businesses, and affected individuals. Determine your legal requirements. All states, the District of Columbia, Puerto Rico, and the Virgin Islands have enacted legislation requiring notification of security breaches involving personal information. In addition, depending on the types of information involved in the breach, there may be other laws or regulations that apply to your situation. Check state and federal laws or regulations for any specific requirements for your business. Notify law enforcement. Call your local police department immediately. Report your situation and the potential risk for identity theft. The sooner law enforcement learns about the theft, the more effective they can be. If your local police aren’t familiar with investigating information compromises, contact the local office of the FBI or the U.S. Secret Service. For incidents involving mail theft, contact the U.S. Postal Inspection Service. Did the ...read more |
| A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information. An impermissible use or disclosure of protected health information is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised based on a risk assessment of at least the following factors: The nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification;The unauthorized person who used the protected health information or to whom the disclosure was made;Whether the protected health information was actually acquired or viewed; andThe extent to which the risk to the protected health information has been mitigated.Covered entities and business associates, where applicable, have discretion to provide the required breach notifications following an impermissible ...read more |
| In today's digital landscape, data breaches are an unfortunate reality that businesses of all sizes must contend with. A single security lapse can lead to significant financial losses, reputational damage, and legal headaches. While prevention is paramount, having a clear and well-defined data breach reporting procedure is crucial for minimizing the fallout when the inevitable happens. This article will guide you through the essential steps your business needs to take. Why a Solid Breach Reporting Procedure is Non-Negotiable Data breaches are not just a concern for large corporations; they affect small and medium-sized businesses (SMBs) just as much, if not more so. A robust reporting procedure serves multiple critical purposes: Compliance with Regulations: Various data privacy regulations, like GDPR, CCPA, and others, mandate specific reporting timelines and requirements. Failure to comply can result in hefty fines and legal action.Minimizing Damage: Swift and decisive action can significantly limit the scope ...read more |
| The HIPAA Breach Notification Rule, 45 CFR §§ 164.400-414, requires HIPAA covered entities and their business associates to provide notification following a breach of unsecured protected health information. Similar breach notification provisions implemented and enforced by the Federal Trade Commission (FTC), apply to vendors of personal health records and their third party service providers, pursuant to section 13407 of the HITECH Act. ...read more |
|
February 2026
| Su | Mo | Tu | We | Th | Fr | Sa |
| 1 | 2 | 3 | 4 | 5 | 6 | 7 |
| 8 | 9 | 10 | 11 | 12 | 13 | 14 |
| 15 | 16 | 17 | 18 | 19 | 20 | 21 |
| 22 | 23 | 24 | 25 | 26 | 27 | 28 |
Blog Home
Newest Blog Entries
1/21/25 Healthcare Data Breaches and Their Devastating Impact
1/21/25 Your Essential Guide to Data Breach Reporting Procedures
1/21/25 Understanding Your Obligations in Data Breach Reporting
11/16/22 Administrative Requirements and Burden of Proof
11/16/22 Notification by a Business Associat
11/16/22 Breach Notification Requirements
11/16/22 Unsecured Protected Health Information and Guidance
11/16/22 Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals
11/16/22 Definition of Breach
11/16/22 Breach Notification Rule
11/16/22 Notify Individuals
Blog Archives
January 2025 (3) November 2022 (11)
Blog Labels
Data Breach Reporting (6) Health Care Data (1) ePHI Data (1) Data Breach Notification (6)
|