Notification by a Business Associat

If a breach of unsecured protected health information occurs at or by a business associate, the business associate must notify the covered entity following the discovery of the breach.  A business associate must provide notice to the covered entity without unreasonable delay and no later than 60 days from the discovery of the breach.  To the extent possible, the business associate should provide the covered entity with the identification of each individual affected by the breach as well as any other available information required to be provided by the covered entity in its notification to affected individuals.


Think about service providers. If service providers were involved, examine what personal information they can access and decide if you need to change their access privileges. Also, ensure your service providers are taking the necessary steps to make sure another breach does not occur. If your service providers say they have remedied vulnerabilities, verify that they really fixed things.  Check your network segmentation. When you set up your network, you likely segmented it so that a breach on one server or in one site could not lead to a breach on another server or site. Work with your forensics experts to analyze whether your segmentation plan was effective in containing the breach. If you need to make any changes, do so now.  Work with your forensics experts. Find out if measures such as encryption were enabled when the breach happened. Analyze backup or preserved data. Review logs to determine ...read more



...read more



Think about service providers. If service providers were involved, examine what personal information they can access and decide if you need to change their access privileges. Also, ensure your service providers are taking the necessary steps to make sure another breach does not occur. If your service providers say they have remedied vulnerabilities, verify that they really fixed things.  Check your network segmentation. When you set up your network, you likely segmented it so that a breach on one server or in one site could not lead to a breach on another server or site. Work with your forensics experts to analyze whether your segmentation plan was effective in containing the breach. If you need to make any changes, do so now.  Work with your forensics experts. Find out if measures such as encryption were enabled when the breach happened. Analyze backup or preserved data. Review logs to determine ...read more



Notify individuals. If you quickly notify people that their personal information has been compromised, they can take steps to reduce the chance that their information will be misused. In deciding who to notify, and how, consider: state lawsthe nature of the compromisethe type of information takenthe likelihood of misusethe potential damage if the information is misused For example, thieves who have stolen names and Social Security numbers can use that information not only to sign up for new accounts in the victim’s name, but also to commit tax identity theft. People who are notified early can take steps to limit the damage. When notifying individuals, the FTC recommends you: Consult with your law enforcement contact about the timing of the notification so it doesn’t impede the investigation.Designate a point person within your organization for releasing information. Give the contact person the latest information about the breach, your response, and how ...read more

February 2026
SuMoTuWeThFrSa
1234567
891011121314
15161718192021
22232425262728

Blog Home  

Newest Blog Entries
1/21/25 Healthcare Data Breaches and Their Devastating Impact

1/21/25 Your Essential Guide to Data Breach Reporting Procedures

1/21/25 Understanding Your Obligations in Data Breach Reporting

11/16/22 Administrative Requirements and Burden of Proof

11/16/22 Notification by a Business Associat

11/16/22 Breach Notification Requirements

11/16/22 Unsecured Protected Health Information and Guidance

11/16/22 Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals

11/16/22 Definition of Breach

11/16/22 Breach Notification Rule

11/16/22 Notify Individuals

Blog Archives
November 2022 (11)
January 2025 (3)

Blog Labels
Data Breach Notification (6)
ePHI Data (1)
Data Breach Reporting (6)
Health Care Data (1)