Breach Notification Requirements
Following a breach of unsecured protected health information, covered
entities must provide notification of the breach to affected
individuals, the Secretary, and, in certain circumstances, to the media.
In addition, business associates must notify covered entities if a
breach occurs at or by the business associate.
Individual Notice
Covered entities must notify affected individuals following the
discovery of a breach of unsecured protected health information. Covered
entities must provide this individual notice in written form by
first-class mail, or alternatively, by e-mail if the affected individual
has agreed to receive such notices electronically. If the covered
entity has insufficient or out-of-date contact information for 10 or
more individuals, the covered entity must provide substitute individual
notice by either posting the notice on the home page of its web site for
at least 90 days or by providing the notice in major print or broadcast
media where the affected individuals likely reside. The covered entity
must include a toll-free phone number that remains active for at least
90 days where individuals can learn if their information was involved in
the breach. If the covered entity has insufficient or out-of-date
contact information for fewer than 10 individuals, the covered entity
may provide substitute notice by an alternative form of written notice,
by telephone, or other means.
These individual notifications must be provided without unreasonable
delay and in no case later than 60 days following the discovery of a
breach and must include, to the extent possible, a brief description of
the breach, a description of the types of information that were involved
in the breach, the steps affected individuals should take to protect
themselves from potential harm, a brief description of what the covered
entity is doing to investigate the breach, mitigate the harm, and
prevent further breaches, as well as contact information for the covered
entity (or business associate, as applicable).
With respect to a breach at or by a business associate, while the
covered entity is ultimately responsible for ensuring individuals are
notified, the covered entity may delegate the responsibility of
providing individual notices to the business associate. Covered
entities and business associates should consider which entity is in the
best position to provide notice to the individual, which may depend on
various circumstances, such as the functions the business associate
performs on behalf of the covered entity and which entity has the
relationship with the individual.
Media Notice
Covered entities that experience a breach affecting more than 500
residents of a State or jurisdiction are, in addition to notifying the
affected individuals, required to provide notice to prominent media
outlets serving the State or jurisdiction. Covered entities will likely
provide this notification in the form of a press release to appropriate
media outlets serving the affected area. Like individual notice, this
media notification must be provided without unreasonable delay and in no
case later than 60 days following the discovery of a breach and must
include the same information required for the individual notice.
Notice to the Secretary
In addition to notifying affected individuals and the media (where
appropriate), covered entities must notify the Secretary of breaches of
unsecured protected health information. Covered entities will notify the
Secretary by visiting the HHS web site and filling out and electronically submitting a breach report form.
If a breach affects 500 or more individuals, covered entities must
notify the Secretary without unreasonable delay and in no case later
than 60 days following a breach. If, however, a breach affects fewer
than 500 individuals, the covered entity may notify the Secretary of
such breaches on an annual basis. Reports of breaches affecting fewer
than 500 individuals are due to the Secretary no later than 60 days
after the end of the calendar year in which the breaches are discovered.
Covered entities and business associates must only provide the required notifications if the breach involved unsecured protected health information. Unsecured protected health information is protected health information that has not been rendered unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified by the Secretary in guidance. This guidance was first issued in April 2009 with a request for public comment. The guidance was reissued after consideration of public comment received and specifies encryption and destruction as the technologies and methodologies for rendering protected health information unusable, unreadable, or indecipherable to unauthorized individuals. Additionally, the guidance also applies to unsecured personal health record identifiable health information under the FTC regulations. Covered entities and business associates, as well as entities regulated by the FTC regulations, that secure information as specified by the guidance are relieved from providing notifications following the breach of such information. ...read more |
Think about service providers. If service providers were involved, examine what personal information they can access and decide if you need to change their access privileges. Also, ensure your service providers are taking the necessary steps to make sure another breach does not occur. If your service providers say they have remedied vulnerabilities, verify that they really fixed things. Check your network segmentation. When you set up your network, you likely segmented it so that a breach on one server or in one site could not lead to a breach on another server or site. Work with your forensics experts to analyze whether your segmentation plan was effective in containing the breach. If you need to make any changes, do so now. Work with your forensics experts. Find out if measures such as encryption were enabled when the breach happened. Analyze backup or preserved data. Review logs to determine ...read more |
A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information. An impermissible use or disclosure of protected health information is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised based on a risk assessment of at least the following factors: The nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification;The unauthorized person who used the protected health information or to whom the disclosure was made;Whether the protected health information was actually acquired or viewed; andThe extent to which the risk to the protected health information has been mitigated.Covered entities and business associates, where applicable, have discretion to provide the required breach notifications following an impermissible ...read more |
Notify individuals. If you quickly notify people that their personal information has been compromised, they can take steps to reduce the chance that their information will be misused. In deciding who to notify, and how, consider: state lawsthe nature of the compromisethe type of information takenthe likelihood of misusethe potential damage if the information is misused For example, thieves who have stolen names and Social Security numbers can use that information not only to sign up for new accounts in the victim’s name, but also to commit tax identity theft. People who are notified early can take steps to limit the damage. When notifying individuals, the FTC recommends you: Consult with your law enforcement contact about the timing of the notification so it doesn’t impede the investigation.Designate a point person within your organization for releasing information. Give the contact person the latest information about the breach, your response, and how ...read more |
|
August 2025
Su | Mo | Tu | We | Th | Fr | Sa |
| | | | | 1 | 2 |
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |
Blog Home
Newest Blog Entries
1/21/25 Healthcare Data Breaches and Their Devastating Impact
1/21/25 Your Essential Guide to Data Breach Reporting Procedures
1/21/25 Understanding Your Obligations in Data Breach Reporting
11/16/22 Administrative Requirements and Burden of Proof
11/16/22 Notification by a Business Associat
11/16/22 Breach Notification Requirements
11/16/22 Unsecured Protected Health Information and Guidance
11/16/22 Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals
11/16/22 Definition of Breach
11/16/22 Breach Notification Rule
11/16/22 Notify Individuals
Blog Archives
November 2022 (11) January 2025 (3)
Blog Labels
Health Care Data (1) Data Breach Notification (6) ePHI Data (1) Data Breach Reporting (6)
|