The HIPAA Breach Notification Rule (45 CFR Part 164, Subpart D) requires covered entities and business associates to provide notification following a breach of unsecured protected health information. A breach is defined as the acquisition, access, use, or disclosure of PHI in a manner not permitted by the Privacy Rule that compromises the security or privacy of the PHI.

What Constitutes a Breach?

An impermissible use or disclosure of PHI is presumed to be a breach unless the covered entity or business associate demonstrates that there is a low probability that the PHI has been compromised based on a risk assessment of at least the following four factors:

  1. Nature and extent of PHI involved — Including the types of identifiers and the likelihood of re-identification
  2. The unauthorised person — Who used the PHI or to whom the disclosure was made
  3. Whether PHI was actually acquired or viewed — As opposed to the opportunity to do so
  4. Extent of risk mitigation — The extent to which risk to the PHI has been mitigated

Breach Notification Timelines

Notification ToThresholdDeadline
Affected IndividualsAll breaches of unsecured PHIWithout unreasonable delay, no later than 60 days after discovery
HHS (large breaches)500 or more individuals affectedWithout unreasonable delay, no later than 60 days after discovery
HHS (small breaches)Fewer than 500 individuals affectedAnnual log submitted within 60 days of the end of the calendar year
Prominent Media500 or more individuals in a state or jurisdictionWithout unreasonable delay, no later than 60 days after discovery
Covered Entity (from BA)All breaches discovered by a business associateWithout unreasonable delay, no later than 60 days after discovery by the BA

Managing Breaches in Venvera

The Breach Notification module helps you track the full lifecycle of each breach:

  1. Detected — Breach identified or reported (start of the 60-day clock)
  2. Risk Assessment — Perform the four-factor risk assessment to determine probability of compromise
  3. Investigating — Determine scope, affected individuals, and PHI categories involved
  4. Contained — Immediate measures taken to stop the breach and prevent further exposure
  5. Notifying — Individual, HHS, and media notifications issued as required
  6. Resolved — Root cause addressed, remediation complete
  7. Closed — Post-incident review completed, lessons learned documented

Exceptions to the Breach Definition

Three exceptions exist where an impermissible use or disclosure does not constitute a breach:

  • Unintentional access by a workforce member acting in good faith within the scope of authority, with no further impermissible use or disclosure
  • Inadvertent disclosure from one authorised person to another at the same covered entity or business associate
  • Good faith belief that the unauthorised person would not reasonably be able to retain the information