HIPAA Breach Notification Rule
The HIPAA Breach Notification Rule requires covered entities and business associates to notify affected individuals, the US Department of Health and Human Services (HHS), and—in some cases, the media following a breach of unsecured Protected Health Information (PHI).
A breach is defined as the impermissible access, acquisition, use, or disclosure of PHI that compromises its privacy or security. Unless an organization can demonstrate a low probability of compromise through a documented risk assessment, the incident is presumed to be a reportable breach.
The purpose of breach notification is to ensure transparency and give individuals the information they need to mitigate potential harm, such as identity theft or misuse of their health information.
Determining whether an incident is a breach
Not every incident involving PHI is automatically considered a breach. Organizations must conduct a risk assessment based on four required factors:
- The nature and extent of the PHI involved, including identifiers and sensitivity
- The unauthorized person who accessed or received the PHI
- Whether the PHI was actually acquired or viewed
- The extent to which the risk was mitigated, such as through prompt containment or retrieval
- Unintentional access by a workforce member acting in good faith
- Inadvertent disclosures between authorized individuals within the same organization
- Disclosures where the recipient could not reasonably retain the information
- A brief description of what happened
- The types of PHI involved
- Steps the organization is taking to investigate and mitigate the breach
- Actions individuals can take to protect themselves
- Contact information for questions or additional support
- Breaches affecting more than 500 individuals must be reported within 60 days of discovery
- Breaches affecting fewer than 500 individuals may be reported annually in an aggregated submission
- Maintain centralized breach and incident logs
- Document breach risk assessments and mitigation steps
- Track discovery dates and notification deadlines
- Generate compliant notification templates
- Prepare and submit reports to HHS
SOC Frameworks Overview
SOC 2 Basics
SOC 2 Compliance Process
SOC 2 Compliance Process
Sprinto: Your ally for all things compliance, risk, governance


