RSI Security

HIPAA Breach Notification Rule – What does it require?

Vulnerability Management Lifecycle

Companies in the healthcare industry are attractive targets for cybercrime. That’s why the US Department of Health and Human Services (HHS) developed the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to define and safeguard protected health information (PHI). Initially, HIPAA focused on the privacy and security of PHI to curb the number of cyberattacks. But with the passing of the HITECH Act, HHS built on the original framework to specify what companies should do when a HIPAA breach does happen.

 

Deep Dive into the HIPAA Breach Notification Rule

There will never be a guarantee that data is entirely safe from hacking and other cybersecurity threats. Even the best-protected companies occasionally fall victim to an accidental or targeted breach of information. HIPAA requires companies to plan for every contingency if a security breach does happen, including notifying all impacted parties. How companies must notify the impacted parties is detailed in the Breach Notification Rule.

The sections below are structured around three essential Breach Notification Rule questions:

Across the answers to these questions, we’ll break down everything you need to know about the Breach Notification Rule. But first, let’s take a look at some historical context.

 

Timeline of HIPAA and HITECH Developments

The primary goals of the HIPAA framework have remained the same since its first inception. However, breach reporting was not part of the original document. Hence the importance of understanding how and why it came to fruition. 

According to HHS’s synopsis of HIPAA for professionals, the most critical developments over time have been the following:

Impacts of the HITECH Act implementation on HIPAA included profound changes to enforcement, such as more significant penalties for noncompliance, as well as a more targeted focus on digital forms of PHI. The single most significant impact was the addition of an entirely new rule: Breach Notification Rule.

 

Assess your HIPAA / HITECH compliance

 

What is the HIPAA Breach Notification Rule?

The HIPAA Breach Notification Rule builds on existing HIPAA controls by adding another transparency layer for all stakeholders. Rather than expanding the scope of protection, the Breach Notification Rule requires companies to notify all impacted parties in the event of a data breach. Below, we’ll dive into these reporting requirements. First, let’s define what a breach is.

HIPAA defines data breaches as any use or disclosure of PHI prohibited by the Privacy Rule (detailed below). However, there are two categories of exceptions that can apply. The first exception involves when risk analysis demonstrates a low probability of compromised PHI. To determine this probability, companies must perform risk analysis across four critical factors:

The second category comprises three exceptions to the definition of a data breach:

Unless one or more of these criteria is met, use or disclosure of PHI outside the Privacy Rule will require notification to the PHI subject and other stakeholders. 

 

Breakdown of Breach Reporting Requirements

The Breach Notification Rule defines what constitutes a breach and the appropriate response. According to the HHS, these requirements include the following:

In sum, the Breach Notification Rule works in conjunction with the Privacy and Security Rules, adding an extra layer of responsibilities for companies who break them. To fully grasp the scope of Breach Notification, it’s essential to understand the other HIPAA rules.


Download Our HIPAA Compliance Checklist

How Does Breach Notification Relate to Other Rules?

The Breach Notification Rule first debuted in the Interim Rule and was then finalized in the HIPAA Omnibus Final Rule. The rule exists to extend beyond protection into transparency. It accounts for situations where a company still falls victim to a hack or other cyber attack, even when the other rules are followed perfectly. It exists independently of the other rules while maintaining some connection via basic definitions — the Privacy Rule defines a breach, for instance.

The following subsections take a close look at exactly how each HIPAA Rule relates to Breach Notification (sourced from the HIPAA Administrative Simplification). The most direct connection is to the Privacy Rule, but understanding the Security and Enforcement Rules is also critical to fully implement Breach Notification and the entire HIPAA framework.

 

Privacy Rule: Authorized Uses and Disclosures

The HIPAA Privacy Rule was the first HIPAA rule. Initially, it established PHI as a protected category and defined the basic parameters of its protection. Breach Notification directly relates to the Privacy Rule’s definitions of permitted use, per HHS’s synopsis of the Privacy Rule:

Any use or disclosure that falls outside the scope of permitted or required uses may constitute a data breach. As such, HIPAA Breach examples also include disclosures and uses that would be allowed if not for failing the minimum requirement.

 

Security Rule: Confidentiality, Integrity, Availability

The HIPAA Security Rule builds on the Privacy Rule’s protections, extending them out to meet the specific challenges of electronic PHI (ePHI). It relates to Breach Notification indirectly. Per HHS’s synopsis of the Security Rule, its main elements are:

To the extent that these safeguards and requirements expand upon the scope of the Privacy Rule’s specific controls, they are also an extension of the Breach Notification Rule. Failing to meet Security Rule requirements is likely to result in a data breach, requiring notification.


Also Read: What are the HIPAA Security Rule Requirements?

 

Enforcement Rule: Penalties for Non-Compliance

The HIPAA Enforcement Rule exists to define the stakes of compliance, which were raised significantly through HITECH. Noncompliance, including failure to meet Breach Notification Rule specifications, can result in the following tiers of civil money penalties:

Criminal charges may accompany these penalties. The process of Enforcement involves a collaboration between the HHS’s Office of Civil Rights (OCR) and the US Department of Justice (DOJ). If either party’s investigations suggest that a covered entity has violated HIPAA, then the resolution involves a combination of penalties and corrective measures.

 

Who Needs to Comply with HIPAA and How?

In the sections above, we’ve made several references to “covered entities.” These are the specific parties to whom HIPAA enforcement applies. They are responsible for implementing Breach Notification, Privacy, and Security safeguards. There are three main categories:

The HITECH Act significantly increased the scope of compliance by making these entities’ business associates responsible for compliance. Business associate contracts need to ensure that third-party service providers are responsible for reporting on breaches that impact their specific dealings with their clients who are covered entities.

 

How HIPAA Compliance Advisory Services Can Help

HIPAA casts a wide net out of necessity. PHI is no longer confined to physical file cabinets in medical facilities; even companies outside of the industry process PHI due to the interconnectivity of modern IT. 

However, many companies looking to expand their horizons and take on lucrative contracts with covered entities may find themselves unprepared for the compliance challenges.

RSI Security offers a suite of robust, scalable HIPAA compliance services to help any company follow the Privacy, Security, and Breach Notification Rules — and avoid the Enforcement Rule altogether. Our team of experts can help you spot a HIPAA breach before it happens, and we’re also happy to help with damage control if it does. Contact RSI Security today to see how simple compliance can be.

 

 

Exit mobile version