Breaking down HIPAA breaches: What they are and how to avoid them
Wondering what a HIPAA breach is, exactly? This article covers what they are, what they aren’t, and what to do if you experience one.
Learn what the HIPAA Breach Notification Rule is, what it requires, and how to apply it in your practice.
Estimated reading time: 10 minutes
If you own a small healthcare practice or work in one, you may think a breach won’t happen to you. But the truth is—breaches can happen to anyone. A stolen laptop or a misdirected email could be all it takes.
That’s why it’s essential to understand the HIPAA Breach Notification Rule: what it is, how it works, and what to do if a breach happens in your practice. Having clear policies in place—and following them—is key to staying compliant and protecting your clients.
But wading through the rule’s legal jargon isn’t always easy. This guide breaks it all down for you in plain English.
Table of Contents |
The Breach Notification Rule explains what breaches are and what they aren’t. It also outlines whom to notify in the event of a breach and how.
The rule applies to Covered Entities and Business Associates. Covered Entities include most healthcare providers, and Business Associates are third-party service providers that handle and store protected health information (PHI).
Covered Entity (CE) | Business Associate (BA) |
---|---|
E.g., physician, therapist, optometrist, dentist, chiropractor, physical therapist | E.g., encrypted email provider, accountant, billing service, attorney, telehealth service |
A healthcare provider, healthcare clearinghouse, or a health plan that…
|
A business that…
|
A breach happens when unsecured PHI is accessed, used, or shared in a way that's not allowed by the HIPAA Privacy Rule, and puts the security or privacy of that information at risk.
For example, when an employee of Human Development Services of Westchester, Inc. emailed PHI to an unauthorized individual as part of a phishing scam, it caused a breach. The private information of over 500 people was compromised.
A breach may also involve hard copy information. For example, Moveable Feast Inc. experienced a breach when the wind tipped over an outdoor recycling bin. Many of the documents containing PHI were scattered and couldn’t be retrieved. As a result, information, including names and social security numbers, was put at risk.
Individual or Organization | Required or Permitted to Disclose Information? | Example |
---|---|---|
The patient/client being treated or their legal representative | Required | A client requests treatment records |
The U.S. Department of Health and Human Services (HHS) | Required during a compliance investigation, review, or enforcement actions | The HHS is investigating your practice and requests records with PHI |
Organizations involved with treating the patient/client | Permitted | Referring a client to another healthcare provider |
Organizations involved with payment for healthcare services | Permitted | Sharing PHI with a medical biller |
Organizations involved in healthcare operations | Permitted for some activities if the organization has a relationship with the patient/client and the information pertains to the relationship | Giving PHI to a health plan for a Health Plan Employer Data and Information Set (HEDIS) |
Organizations providing public benefit activities | Permitted under certain circumstances | Disclosing PHI to a government authority regarding domestic violence |
Note: The table above is a summary only. For complete information, please visit the HHS website.
Although the breach definition seems relatively simple, there are some special situations that don’t count as breaches.
The Breach Notification Rule states that breaches only apply to PHI that is “unsecured,” meaning it’s in a form others can read and use. If the PHI has been secured according to HHS guidelines and a third party accesses it, then it likely wouldn’t be considered a breach.
What are the HHS guidelines? In a nutshell, PHI that’s digital (e-PHI) must be encrypted according to National Institute of Standards and Technology (NIST) recommendations to be considered secure. Hard copy data must be destroyed (e.g., shredded).
For example, if you use encrypted email that meets NIST standards and a third party intercepts one of your messages, it may not be considered a breach. This is because there is a low probability that the third party could get past the encryption to read the information.
Or, if someone accessed the contents of your office recycling bin, it wouldn’t count as a breach if all the documents containing PHI had been shredded.
There are also three main exceptions to the definition of “breach” in the rule.
1. A staff member (or someone acting under the direction) of a covered entity or business associate acquires, accesses, or uses PHI unintentionally. This counts as an exception as long as they came in contact with the PHI in good faith and within the scope of their role.
Example: A colleague accidentally opens the wrong hard copy file and sees the PHI of one of your clients.
2. A staff member of a covered entity or business associate discloses PHI to another staff member in the same organization or within an organized healthcare arrangement, and both people are authorized to access the information.
Example: You accidentally share a client’s name when talking to a colleague in the same practice.
3. A staff member of a covered entity or business associate shares information with someone who isn’t authorized to see or use it, but they have good reason to believe it won’t be retained.
Example: You are ready to leave the office when you notice a client sign-in sheet on the reception desk. You are about to put it away when a cleaning employee walks by the desk and glances at the sheet. Although the cleaner is not authorized to see the PHI, you have good reason to believe they won’t retain the information.
The Privacy Rule also makes exceptions for incidental disclosures. These are mini-disclosures that can happen when you work in healthcare but are unavoidable and unlikely to cause any significant harm.
How do you tell if an event is an incidental disclosure? It is:
For example, if a client walks past an office in a mental health clinic and overhears parts of a therapy session, it may not be considered a breach if it meets the criteria of an incidental disclosure.
Incidental disclosures apply as long as you have reasonable safeguards in place to protect PHI, according to the Privacy Rule. These include:
The Breach Notification Rule also makes allowances for breaches that are proven to have a low probability of compromising PHI based on a risk assessment. If you complete a risk assessment and have good reason to believe the breach is low risk, it may not be necessary to report it.
This risk assessment is optional, according to the HHS. If you would rather report the breach without doing a risk assessment, that’s fine.
You can complete a risk assessment by answering the following questions:
For example, let’s say a mental health clinic accidentally emailed a client, Jane Torres, a spreadsheet with PHI. Jane deleted it right away and informed the clinic. The spreadsheet contained a list of clients in the clinic diagnosed with depression. However, each client was identified by a number, not a name. The spreadsheet didn’t contain any client addresses, phone numbers, or other identifying information.
This situation could be classified as being a low risk to the privacy and security of the PHI. Jane Torres is a well-known client of the clinic, not a hacker. She deleted the email right away. And since each client was identified only by numbers, even if Jane did peek at the spreadsheet, she would have had no way to match the information in it with actual people.
However, it’s always best to approach a situation like this with extreme caution. Incorrectly deciding a breach is low risk and failing to report it could lead to an HHS investigation and other consequences.
When in doubt, make the required notifications.
In addition to defining what a breach is, the Breach Notification Rule describes whom to notify when a breach happens and how.
It’s vital to follow this process carefully. If you wait too long to report a breach or fail to document the actions you took, you are violating HIPAA.
According to the rule, you must notify the individuals affected, the HHS, and in some cases, the media. This is in addition to other steps you should take to make sure the breach is contained.
A breach may happen at your practice or may be reported to you by a Business Associate you’re working with. If the Business Associate experiences the breach, they must provide you with all the relevant details (e.g., what happened, the number of people affected, their names, etc.). You are then required to make the necessary notifications.
According to the Breach Notification Rule, you must notify individuals affected by the breach either by first-class mail to their last known address or by email, if they have given permission to be contacted this way.
You have 60 days after discovering a breach to report it to the people involved. The only exception to this is if a law enforcement official tells you verbally or in writing that providing this notification would impede an investigation or compromise national security.
If you are missing an email or physical address for fewer than 10 people, you may inform them of the breach by phone, another form of written notice, or in another way.
If you are missing an email or physical address for 10 or more people, you must either:
OR
For breaches affecting 500 people or more, you must inform prominent media outlets in your area in addition to sending individual notifications.
Don’t forget to include a toll-free phone number on all your notifications! The number must be active for at least 90 days.
If the situation is urgent, you may notify people by telephone first in addition to providing written notice.
In your notice to either individuals or the media, you should include:
In addition to notifying individuals impacted by a breach, you must also inform the Secretary of HHS. You do this by completing a form on the HHS website.
The timeline for notifying the HHS depends on the number of people who were affected.
If 500 individuals or more are impacted by the breach, you must notify the Secretary without unreasonable delay and no more than 60 days after the breach is discovered.
For smaller breaches involving fewer than 500 people, you must notify the HHS annually and no later than 60 days after the end of the year. You don’t have to wait until year-end, though; you can notify the HHS earlier if you prefer.
When a breach happens, it’s critical to keep good records. According to the Breach Notification Rule, Covered Entities and Business Associates carry the responsibility of proving they followed the regulations appropriately.
If you conduct a risk assessment of the breach, be sure to keep it on file. If you determine the breach is low risk, note how you arrive at that decision and keep copies of any emails or other related documents.
If you experience a breach, keep accurate and detailed notes on all the notifications you make and when. Retain significant emails and all other records.
Preparation is also key. If you don’t already have them, put written policies and procedures in place describing how you intend to follow the Breach Notification Rule in your practice. These should include:
And if you have staff, don’t forget to train them on your policies!
Dealing with a breach is complicated. Aside from making the appropriate notifications, breaches can trigger investigations by the Office for Civil Rights (OCR) and may lead to a loss of reputation, income, or other consequences.
Stop breaches before they happen by following these steps:
A breach means data has been compromised. A HIPAA violation happens when a Covered Entity or Business Associate has broken one or more of the HIPAA rules.
A HIPAA violation may lead to a breach, but breaches can happen even if the rules have been followed.
If you know your client has passed away and you have address information for their next of kin or legal representative (an executor, for example) then notify that person.
Need HIPAA-compliant email? Check out Hushmail for Healthcare!
Wondering what a HIPAA breach is, exactly? This article covers what they are, what they aren’t, and what to do if you experience one.
We’re taking a look at HIPAA violations: how they occur, how they are reported, what happens during and after an investigation, and what you can do...
Get clear answers to your top HIPAA questions about email, web forms, telehealth, and more. No jargon, just easy-to-understand guidance.