X Close Search

How can we assist?

Demo Request

5 Steps for HITECH Act Breach Reporting

Post Summary

When a breach of Protected Health Information (PHI) occurs, healthcare organizations must act quickly to comply with the HITECH Act's breach notification rules. Here's a simple breakdown of the five key steps to follow:

  • Identify and Evaluate the Breach: Determine if the incident qualifies as a breach. Conduct a risk assessment to analyze the type of PHI involved, the extent of exposure, and mitigation efforts. Document all findings and decisions.
  • Notify the Covered Entity (if a Business Associate): Inform the covered entity promptly with details about the breach, including affected individuals and the type of PHI involved. Follow any deadlines specified in your Business Associate Agreement (BAA).
  • Notify Affected Individuals: Send clear, timely notifications to impacted individuals, including details about the breach, compromised information, and protective actions they can take.
  • Issue Media Notification for Large Breaches: If 500 or more individuals in a single state are affected, notify prominent media outlets within 60 days of discovery.
  • Report to HHS and Maintain Breach Logs: Report breaches of 500+ individuals to HHS within 60 days. For breaches involving fewer than 500 individuals, submit an annual report by March 1 of the following year. Keep detailed logs for at least six years.

These steps ensure compliance, protect patient trust, and reduce penalties. Tools like Censinet RiskOps™ can help streamline assessments, notifications, and reporting.

5 Steps for HITECH Act Breach Reporting Compliance

5 Steps for HITECH Act Breach Reporting Compliance

The HIPAA Breach Notification Rule Requirements

Step 1: Identify and Evaluate the Breach

When your organization detects a PHI incident, time becomes your most critical resource. Discovery officially begins on the day the incident is identified - or should have been identified - through reasonable diligence [3][5]. From that moment, the 60-day notification window starts, triggered by the first staff member's awareness of the breach.

Performing a Risk Assessment

According to HITECH, any unauthorized use or disclosure of PHI is presumed to be a reportable breach unless a documented risk assessment proves otherwise [1][5]. To demonstrate a low probability of compromise, assess several factors: the type of PHI involved, the identity of the unauthorized party, the extent of the data exposure, and any steps taken to mitigate the issue immediately [1][5].

Kevin Henry from AccountableHQ underscores the importance of acting fast:

"Gather facts within hours, not days. Identify what data elements were involved, how they were protected, who accessed them, and how long exposure lasted" [5].

Containment is your first priority. Shut down compromised accounts, recover misdirected communications, secure attestations of data destruction, and remotely wipe lost devices. Before diving into the full four-factor risk assessment, check if the incident meets one of three regulatory exceptions: unintentional access by a workforce member acting in good faith, inadvertent disclosures between authorized individuals within the organization, or a good-faith belief that the unauthorized recipient couldn't retain the information [1][5].

Complete your assessment by documenting every decision, ensuring compliance and creating a clear record for future audits.

Recording Findings and Decisions

You are responsible for proving that an incident either didn’t qualify as a breach or that all required notifications were properly made [1]. This makes thorough documentation essential. Record the discovery date, timeline of events, affected systems, specific data elements, state-by-state population counts, and risk scores [6]. These records will guide breach notifications and regulatory reporting.

Preserve all technical evidence, such as access logs, DLP outputs, forensic reports, screenshots, and third-party attestations, to avoid losing critical details. Document every mitigation effort, from remote wipes and credential resets to written assurances of non-disclosure. HIPAA requires you to retain all breach-related documentation for at least six years [6][2]. If law enforcement requests a delay in notification, note the official's name and the delay period. Keep in mind that oral requests limit delays to 30 days unless followed by a written statement [3][5].

Step 2: Notify the Covered Entity if You Are a Business Associate

If you're a business associate, your first move after discovering a breach of unsecured PHI is to notify the covered entity. Under the HITECH Act, failing to report breaches can lead to liability [8]. This step is essential to ensure a coordinated response to the situation [1].

Required Information for Notification

Your notification should include enough details to help the covered entity fulfill its reporting duties to affected individuals and the Department of Health and Human Services. When possible, provide:

  • The names of individuals whose unsecured PHI was accessed, acquired, used, or disclosed.
  • A concise description of the incident, including when it occurred and when it was discovered.
  • The types of PHI involved, such as full names, Social Security numbers, birth dates, addresses, account numbers, or disability codes.
  • Actions you’re taking to investigate the breach, reduce potential harm, and prevent future occurrences.

"To the extent possible, the business associate should provide the covered entity with the identification of each individual affected by the breach as well as any other available information required to be provided by the covered entity in its notification to affected individuals."
– HHS.gov [1]

Providing this information promptly and accurately helps the covered entity meet its legal obligations and maintain trust.

Notification Deadlines

Timing is critical. The federal maximum deadline for notification is 60 days, but many Business Associate Agreements (BAAs) have stricter requirements, often mandating notification within 24 to 72 hours [4]. Check your BAA for specific terms.

The clock starts ticking on the discovery date - when any employee or agent in your organization becomes aware of the breach or when it could have been identified through reasonable diligence. Keep detailed, timestamped logs of all actions to show your diligence in managing the situation [2][4][7].

Step 3: Notify Affected Individuals

Once the covered entity has been notified, the next step is to inform the individuals directly impacted by the breach. If you're a business associate, this responsibility follows your initial notification to the covered entity. It’s crucial to act quickly - notifications must be sent without unreasonable delay. The timeline starts the moment the breach is discovered or should have been discovered with reasonable diligence, not when the investigation wraps up. Prompt notification is essential for enabling affected individuals to take protective measures.

Required Notification Content

When notifying individuals, the message must be clear and straightforward. Each notification should include:

  • A summary of the breach: Include the date it occurred and when it was discovered.
  • Details on the compromised information: Specify the types of unsecured PHI involved, such as names, Social Security numbers, birth dates, addresses, account details, or disability codes.
  • Protective steps for individuals: Outline actions they can take to safeguard themselves from potential harm.
  • Your organization's response: Describe the measures being taken to investigate and address the breach.
  • Contact information: Provide at least one way for individuals to reach out, such as a toll-free phone number, email address, website, or postal address.

It’s important to avoid including any unnecessary PHI in the notice. Stick to the essentials to ensure clarity and compliance.

Delivery Methods and Deadlines

The primary method for delivering notifications is by first-class mail to the last known address of each affected individual. If the individual has opted for electronic notices, email can be used instead. For deceased individuals, notifications should be sent to their next of kin or personal representative, provided their contact details are available.

In cases where contact information is incomplete, alternative methods come into play. If fewer than 10 individuals cannot be reached, you can use methods like alternative written notices or phone calls. However, if 10 or more individuals are unreachable, you must post a notice prominently on your website or issue it through major media outlets for at least 90 days. This notice should include a toll-free number for individuals to call. Additionally, if there’s an immediate threat, such as identity theft or fraud, consider supplementing written notices with urgent methods like phone calls.

"Covered entities must provide this individual notice in written form by first-class mail, or alternatively, by e-mail if the affected individual has agreed to receive such notices electronically." – U.S. Department of Health and Human Services [1]

Step 4: Issue Media Notification for Large Breaches

When a data breach affects 500 or more residents in a single state or jurisdiction, you must notify prominent media outlets. Keep in mind, this threshold applies per state. For example, if 600 individuals are impacted across three states with 200 in each, no media notification is required because no single state reaches the 500-resident mark. The clock starts ticking on the 60-day deadline as soon as the breach is discovered.

Creating a Media Notification

Your media notification should include:

  • A brief description of the breach, including the incident and discovery dates.
  • Information about the type of unsecured PHI (Protected Health Information) involved.
  • Recommended steps for individuals to protect themselves.
  • A summary of your response and mitigation efforts.
  • Contact details, including a toll-free number.

"The notification to the media include the same information required to be included in the notification to the individual under § 164.404(c)." – HHS [9]

When drafting your press release, stick to plain, non-technical language to ensure it’s accessible to the general public. Posting the notice solely on your website isn’t enough - you must actively send it to media outlets. While media outlets aren’t obligated to publish your notice, and you don’t need to pay for placement, you are required to make a direct effort to distribute the information. This approach not only informs affected individuals but also promotes public transparency.

Selecting Media Outlets

Once your notification is ready, identify the most relevant media outlets for distribution. Focus on outlets that serve the areas where affected individuals reside:

  • For state-wide breaches, target major daily newspapers with broad, state-wide circulation.
  • For breaches localized to a specific city, county, or town, choose prominent daily newspapers or television stations in that area.

"A newspaper serving only one town and distributed on a monthly basis, or a daily newspaper of specialized interest (such as sports or politics) would not be viewed as a prominent media outlet." – HHS [9]

Ensure your media notification aligns with individual notifications for consistency. Additionally, check for state-specific breach notification laws, as some states may require stricter timelines or additional information beyond the federal 60-day rule.

Step 5: Report to HHS and Maintain Breach Logs

HHS

Once you've notified individuals and the media, the next step is completing your HHS reporting and keeping thorough breach logs. The reporting process depends on the size of the breach, with different timelines and requirements for large and small incidents.

Reporting Breaches of 500 or More Individuals

If a breach impacts 500 or more individuals, you must notify the HHS Secretary within 60 calendar days from the date the breach is discovered[2]. This timeline begins as soon as the breach is identified - or reasonably should have been identified - by your organization. Setting a clear schedule can help ensure you meet this deadline.

Before using the HHS online breach reporting portal, gather the following information:

  • Contact details for the covered entity and any business associates
  • Incident type (e.g., hacking, theft, or improper disposal)
  • Breach location (e.g., network server, email, or portable device)
  • Types of unsecured PHI involved (e.g., Social Security numbers, medical diagnoses, financial data)
  • Approximate number of individuals affected
  • A summary of mitigation actions taken

If the exact number of affected individuals isn’t available at the time of reporting, estimates are acceptable. Should new information arise later, submit an addendum using your original transaction number. Make sure to retain all documentation for at least six years to comply with HIPAA’s audit requirements.

Annual Reporting for Smaller Breaches

For breaches involving fewer than 500 individuals, a different process applies. These breaches must be reported to the HHS Secretary no later than 60 days after the end of the calendar year in which they were discovered[1]. Submitting these reports promptly via the HHS online portal can help you avoid a last-minute rush.

Keep a real-time log of all smaller breaches throughout the year. For each incident, document:

  • A description of the breach
  • Key dates (when the breach occurred and was discovered)
  • Number of individuals affected
  • Types of unsecured PHI involved
  • Actions taken to mitigate the breach
  • Contact information
  • Risk assessment outcomes

Each incident must be submitted as a separate electronic notice - grouping multiple breaches into one report is not allowed.

"Covered entities and business associates, as applicable, have the burden of demonstrating that all required notifications have been provided." – U.S. Department of Health & Human Services[1]

Using Censinet RiskOps for HITECH Compliance

Censinet RiskOps

Meeting HITECH timelines is no small feat - there’s a lot to juggle, from managing deadlines to handling assessments and documentation. That’s where Censinet RiskOps™ comes in. It offers healthcare organizations a centralized platform that simplifies these processes, cutting down on administrative headaches and keeping compliance efforts on track.

Faster Risk Assessments

When a breach happens, the first step is figuring out if it’s a reportable incident. This means conducting a detailed risk assessment. Censinet RiskOps makes this process quicker with automated workflows tailored to HITECH requirements. Instead of pulling data from scattered sources, the platform consolidates everything you need - details about the breach, the type and scope of PHI involved, who accessed it, and whether it was actually acquired or viewed. This focused process lets you complete assessments in hours instead of days, helping you meet the tight deadlines outlined in HITECH’s steps.

Automated Reporting and Workflows

Censinet RiskOps doesn’t just speed up assessments - it also automates the reporting process. Tasks are automatically assigned to the right people, whether it’s the legal team reviewing notification letters, the communications team handling media outreach, or compliance officers managing HHS reporting. Automated reminders keep you on track, ensuring that the 60-day reporting window for large breaches isn’t missed. For smaller breaches, the system keeps everything organized for annual reporting. This level of automation minimizes the risk of delays and shows a strong commitment to timely breach notification.

Centralized Risk Management Dashboard

At its core, Censinet RiskOps serves as a one-stop shop for managing risks tied to PHI protection, patient safety, and vendor networks. Its centralized dashboard gives you a real-time view of your organization’s risk landscape, including ongoing breach investigations, vendor assessments, and security gaps. You can track which business associates have been notified, monitor the progress of individual notifications, and maintain the detailed breach logs required by HHS. Having everything in one place eliminates the need to pull information from multiple systems, making it much easier to respond to audits or update breach documentation. Plus, it helps you stay compliant with HIPAA’s six-year record retention rule without breaking a sweat.

Conclusion

HITECH breach reporting isn’t optional - and the consequences of ignoring it can be severe. The five steps outlined above provide a solid framework for staying compliant. Beyond the risk of penalties, timely reporting plays a critical role in protecting your organization’s reputation and giving affected individuals the chance to safeguard themselves. A prompt response helps contain the damage and limits business disruption.

That said, managing breach reporting manually can feel overwhelming. This is where tools like Censinet RiskOps™ come into play. By automating workflows and centralizing documentation, this platform simplifies risk assessments and ensures you meet compliance deadlines. With everything in one place - from the initial four-factor risk assessment to maintaining a six-year documentation trail - you can focus on what truly matters: keeping patient data secure.

The way forward is straightforward. By sticking to these five steps and using the right tools, healthcare organizations can not only meet HITECH requirements but also protect the trust of their patients and satisfy regulatory expectations.

FAQs

What qualifies as the “discovery” of a PHI breach under HITECH?

Under the HITECH Act, a breach of Protected Health Information (PHI) is deemed "discovered" when a healthcare organization or its business associate either becomes aware of it or reasonably should have known about it. This includes any unauthorized access, acquisition, use, or disclosure of PHI that jeopardizes its security or privacy.

When can a PHI incident be treated as not reportable after a risk assessment?

A Protected Health Information (PHI) incident might not need to be reported if a thorough risk assessment determines there’s a low likelihood of PHI being compromised. Four key factors must be evaluated:

  • The nature of the PHI involved: Consider the sensitivity of the information and whether it includes identifiers that could link it to an individual.
  • The unauthorized party: Assess who accessed or received the PHI and their potential intent or ability to misuse it.
  • Access or viewing: Determine whether the PHI was actually viewed or acquired.
  • Mitigation efforts: Evaluate actions taken to reduce the risk, like retrieving the information or ensuring it wasn’t further disclosed.

If these factors collectively suggest minimal risk, reporting the incident might not be necessary. However, it’s crucial to document the assessment thoroughly and retain these records for at least six years to remain compliant with regulations.

How do HHS reporting deadlines differ for breaches under 500 vs. 500+ people?

Under the HITECH Act, any breach impacting 500 or more individuals must be reported to the Department of Health and Human Services (HHS) right away. However, breaches affecting fewer than 500 individuals follow a different process. These smaller breaches don’t require immediate reporting; instead, organizations are required to document them and include the details in an annual report submitted at the end of the year. While the timeline for reporting is more flexible for smaller breaches, they still need to be carefully tracked and reported.

Related Blog Posts

Key Points:

Censinet Risk Assessment Request Graphic

Censinet RiskOps™ Demo Request

Do you want to revolutionize the way your healthcare organization manages third-party and enterprise risk while also saving time, money, and increasing data security? It’s time for RiskOps.

Schedule Demo

Sign-up for the Censinet Newsletter!

Hear from the Censinet team on industry news, events, content, and 
engage with our thought leaders every month.

Terms of Use | Privacy Policy | Security Statement | Crafted on the Narrow Land