breach notification

Introduction

When a data breach occurs in a healthcare organization, the response cannot be improvised. Federal law dictates exactly who must be notified, how quickly, and in what format. The HIPAA Breach Notification Rule establishes these requirements, and failure to comply can result in significant penalties on top of the reputational damage a breach already causes.

In 2026, breach incidents in healthcare remain one of the most significant risks facing the industry. Ransomware attacks, insider threats, and third-party vendor failures are all common triggers. Understanding the Breach Notification Rule is not optional — it is a core component of your overall HIPAA compliance program.

This guide breaks down exactly what the rule requires, when it applies, and how your organization can be ready to respond when the time comes.

What Is the HIPAA Breach Notification Rule?

The HIPAA Breach Notification Rule requires covered entities and their business associates to notify affected individuals, the U.S. Department of Health and Human Services (HHS), and in some cases the media, when unsecured protected health information (PHI) is breached.

The rule was introduced as part of the HITECH Act in 2009 and has been a core component of HIPAA compliance ever since. It operates alongside the HIPAA Privacy Rule and the HIPAA Security Rule to create a complete framework for protecting patient data — and responding appropriately when that protection fails.

At its core, the rule is built around one simple principle: if PHI is compromised, the people affected have a right to know.

What Counts as a Breach?

Under HIPAA, a breach is defined as the acquisition, access, use, or disclosure of unsecured PHI in a way that is not permitted under the Privacy Rule and that poses a significant risk of financial, reputational, or other harm to the affected individual.

It is important to understand what “unsecured” means in this context. If PHI has been encrypted in accordance with HHS guidance, a breach of that encrypted data may not trigger notification requirements. This is why encryption is considered one of the most practical safeguards in a healthcare IT environment.

However, not every unauthorized disclosure automatically constitutes a reportable breach. HIPAA allows for three specific exceptions: unintentional access by an authorized workforce member acting in good faith, inadvertent disclosure between authorized personnel at the same organization, and situations where the covered entity has a good faith belief that the unauthorized person who received the information could not have retained it.

If none of these exceptions apply, the organization must treat the incident as a breach and proceed accordingly.

Who Must Be Notified — and When?

The Breach Notification Rule establishes three distinct notification requirements, each with its own timeline and audience.

Notifying Affected Individuals

Covered entities must notify each individual whose PHI has been or is reasonably believed to have been accessed, acquired, used, or disclosed without authorization. This notification must be provided without unreasonable delay and no later than 60 days after discovery of the breach. The notification must be in plain language and include a description of what happened, the types of information involved, steps individuals should take to protect themselves, what the organization is doing to investigate and mitigate harm, and contact information for the organization.

Notification is typically sent by first-class mail to the last known address of the individual. If contact information is out of date for 10 or more individuals, substitute notice must be provided — either through a website posting or major media outlet.

Notifying HHS

In addition to notifying individuals, covered entities must report breaches to HHS. The timing depends on the size of the breach. For breaches involving 500 or more individuals, HHS must be notified within 60 days of discovery. These larger breaches are posted publicly on what is commonly referred to as the “Wall of Shame” — the HHS breach portal. For breaches affecting fewer than 500 individuals, covered entities may log them and submit an annual report to HHS no later than 60 days after the end of the calendar year.

Notifying the Media

For breaches affecting more than 500 residents of a particular state or jurisdiction, covered entities must also notify prominent media outlets serving that area. This requirement exists to ensure that large-scale breaches receive appropriate public awareness so that affected individuals who may not have received direct notice can still learn about the incident and take protective action.

Business Associate Obligations

Business associates — vendors, IT providers, billing companies, and other third parties that handle PHI — also have notification obligations under the Breach Notification Rule. When a business associate discovers a breach, it must notify the covered entity without unreasonable delay and no later than 60 days after discovery.

It then becomes the covered entity’s responsibility to notify affected individuals and HHS. This is why Business Associate Agreements (BAAs) are so critical — they define exactly how breach responsibilities are shared between parties, and they ensure that covered entities are not caught off guard by a vendor incident.

In practice, many breaches originate with third-party vendors. A covered entity that does not have a clear breach response process built into its vendor contracts is operating with a significant gap in its compliance program.

The Risk Assessment Requirement

One often overlooked aspect of the Breach Notification Rule is that organizations are not required to notify automatically for every potential incident. Before triggering notification, organizations must conduct a risk assessment to determine whether the incident constitutes a reportable breach.

This four-factor assessment examines: the nature and extent of the PHI involved, including the types of identifiers and the likelihood that the information could be used for harm; who accessed or could have accessed the information; whether the PHI was actually acquired or viewed; and the extent to which the risk has been mitigated.

If the covered entity can demonstrate through this assessment that there is a low probability the PHI has been compromised, notification may not be required. However, this determination must be documented thoroughly. HHS expects organizations to have a clear, well-supported rationale if they choose not to notify — and incomplete or absent documentation is itself a compliance problem.

Common Breach Notification Failures

Despite clear regulatory requirements, many organizations still struggle with breach notification. The most common failures include:

  • Missing the 60-day notification deadline
  • Failing to notify all affected individuals due to outdated contact information
  • Neglecting to report smaller breaches to HHS in the annual summary
  • Not having a BAA that clearly defines breach notification responsibilities
  • Conducting an inadequate or undocumented risk assessment before deciding not to notify

These failures are not just administrative — they carry real financial consequences. HHS has levied multi-million dollar penalties against organizations that failed to notify affected individuals in a timely manner, even when the underlying breach was relatively limited in scope.

How to Prepare Before a Breach Happens

The best time to build a breach notification process is before you need one. Organizations that respond effectively to breaches share a few common characteristics: they have a documented incident response plan that assigns clear roles and responsibilities; they conduct regular training so that workforce members know how to identify and report potential breaches; they maintain strong BAAs with all vendors and review them regularly; and they conduct periodic breach simulation exercises to test their response procedures.

A well-prepared organization can move from discovery to notification within days, not weeks — reducing regulatory exposure and demonstrating to patients that their trust is taken seriously. Aligning your breach notification procedures with your broader HIPAA compliance framework ensures that all three pillars of HIPAA work together effectively.

Final Thoughts

The HIPAA Breach Notification Rule is not just a legal formality — it is a fundamental commitment to transparency and patient trust. In a healthcare environment where data breaches are increasingly common, how an organization responds to an incident can define its reputation for years.

Organizations that treat breach notification as a box to check will always struggle to meet the 60-day deadline. Those that treat it as a core operational process — with documented procedures, trained staff, and clear vendor accountability — will be better positioned to protect their patients and their organization when an incident occurs.

Need Help Building a Breach-Ready Compliance Program?

At 4th Season Consulting, we help healthcare organizations build breach-ready compliance programs that cover every component of HIPAA — from risk assessments to vendor management to incident response planning.

Whether you need to build your process from scratch or strengthen an existing program, our team brings the healthcare IT expertise to get you there.

Contact us today to schedule a HIPAA compliance assessment and make sure your organization is ready before a breach occurs.

Subscribe for latest news & insights
Related articles