⚠️ January 2025 HIPAA Security Rule Updates Now in Effect
HIPAA Compliance Guide

HIPAA Incident Response Planning

Complete guide to incident response requirements under 45 CFR 164.308(a)(6). Learn how to identify, respond to, and document security incidents and breaches with proper notification timelines.

Why Incident Response Planning is Critical

HIPAA requires covered entities and business associates to identify and respond to suspected or known security incidents. A well-prepared incident response plan minimizes damage and ensures regulatory compliance.

Benefits of Strong Incident Response

  • Reduces damage and recovery time from security incidents
  • Ensures compliance with notification timelines
  • Demonstrates due diligence to regulators
  • Protects patient privacy and organizational reputation
  • Enables learning and continuous improvement

Consequences of Poor Response

Failure to properly respond to incidents can result in OCR penalties, increased breach severity, loss of patient trust, legal liability, and mandatory corrective action plans. Late breach notifications carry significant fines, and failure to have incident response procedures violates the Security Rule.

Security Incidents vs. Breaches

Understanding the difference between security incidents and breaches is critical for determining notification requirements.

Security Incidents

Events that compromise the security, confidentiality, integrity, or availability of ePHI.

Common Examples:

  • Unauthorized access to ePHI systems or records
  • Malware, ransomware, or virus infections
  • Lost or stolen devices containing ePHI
  • Phishing attacks targeting workforce members
  • Insider threats or unauthorized disclosures
  • System compromises or network intrusions
  • Denial of service attacks
  • Failed login attempts or brute force attacks

Breach Determination:

  • Not all security incidents are breaches
  • Requires breach determination process
  • Low probability of compromise may not trigger notification
  • Encrypted ePHI provides safe harbor
Breach of Unsecured PHI

Impermissible acquisition, access, use, or disclosure of PHI that compromises security or privacy.

Common Examples:

  • Unencrypted laptop theft containing ePHI
  • Email sent to wrong recipient with PHI
  • Hacking incident with confirmed data access
  • Improper disposal of PHI (dumpster diving)
  • Unauthorized employee snooping in records
  • Business associate breach notification received
  • Public disclosure of PHI online
  • Physical records theft or loss

Breach Determination:

  • Presumed to be breach unless low probability
  • Requires notification within specific timelines
  • 60-day notification to individuals
  • Without delay and no later than 60 days to HHS for 500+ individuals
  • Annual notification to HHS for <500 individuals

Incident Response Team Roles

Assemble a cross-functional team with clear responsibilities for responding to incidents.

Incident Response Coordinator
  • Overall incident management and coordination
  • Activate incident response plan
  • Communicate with leadership and stakeholders
  • Ensure documentation of all response activities
  • Coordinate with external parties (law enforcement, forensics)
IT/Security Team
  • Identify and contain security incidents
  • Preserve evidence for investigation
  • Perform forensic analysis
  • Implement remediation measures
  • Restore systems and data
Privacy Officer
  • Lead breach determination process
  • Conduct breach risk assessment
  • Coordinate notification requirements
  • Interface with HHS OCR
  • Review incident for Privacy Rule violations
Legal Counsel
  • Provide legal guidance on response actions
  • Review notification content
  • Advise on regulatory obligations
  • Manage law enforcement coordination
  • Assess liability and risk
Communications/PR
  • Draft individual and media notifications
  • Manage public relations
  • Coordinate with affected individuals
  • Handle media inquiries
  • Protect organizational reputation

Incident Response Procedures

Follow these five phases to effectively respond to and recover from security incidents.

Detection & Identification
Immediate - as soon as incident is detected

Detect and identify potential security incidents as quickly as possible.

  • Monitor security alerts, logs, and monitoring systems
  • Review reports from workforce, patients, or business associates
  • Investigate suspicious activity or anomalies
  • Classify incident type and severity
  • Document initial incident details (date, time, discovery method)
  • Alert incident response team
Containment
Within hours - rapid response critical

Prevent further damage and limit the scope of the incident.

  • Isolate affected systems or networks
  • Revoke compromised credentials or access
  • Preserve evidence (logs, system images, communications)
  • Block malicious IP addresses or email senders
  • Disable compromised accounts
  • Implement temporary security controls
Eradication
Days to weeks, depending on incident complexity

Remove the threat and vulnerabilities that allowed the incident.

  • Remove malware, backdoors, or unauthorized access
  • Patch vulnerabilities exploited in the attack
  • Update security configurations
  • Reset compromised passwords and credentials
  • Remove unauthorized accounts or access
  • Verify threat has been eliminated
Recovery
Varies - ensure complete remediation before restoration

Restore systems to normal operations and verify security.

  • Restore systems from clean backups if needed
  • Rebuild compromised systems
  • Re-enable systems and services gradually
  • Monitor for signs of continued compromise
  • Verify data integrity
  • Return to normal operations
Post-Incident Analysis
Within 30 days of incident resolution

Learn from the incident to prevent future occurrences.

  • Conduct comprehensive incident review
  • Identify root cause and contributing factors
  • Assess effectiveness of response
  • Document lessons learned
  • Update incident response plan
  • Implement preventive measures and controls

Breach Determination Process

Not every security incident is a breach requiring notification. Use this four-factor analysis to determine if an incident constitutes a breach under HIPAA.

1
1. Acquisition, Access, Use, or Disclosure

Was there an impermissible acquisition, access, use, or disclosure of PHI?

This is the threshold question. If PHI was not acquired, accessed, used, or disclosed in a manner not permitted by the Privacy Rule, there is no breach. Examples that do NOT meet this threshold: encrypted PHI stolen but not decrypted, inadvertent glimpse of PHI without actual viewing.

2
2. Not Permitted by Privacy Rule

Was the acquisition, access, use, or disclosure NOT permitted under HIPAA Privacy Rule?

Some uses and disclosures are permitted (treatment, payment, operations with proper authorization). If the activity was permitted under Privacy Rule, it's not a breach. Example: Sharing PHI for treatment coordination is permitted.

3
3. Applies to Unsecured PHI

Was the PHI 'unsecured' (not encrypted or destroyed per HIPAA guidance)?

If PHI was encrypted according to HIPAA guidance and the encryption key was not compromised, the incident is NOT a breach (safe harbor). Similarly, if PHI was properly destroyed, it's not considered unsecured. This is why encryption is critical.

4
4. Risk Assessment (Low Probability)

Is there a low probability that the PHI has been compromised?

If the first three factors are met, you must conduct a risk assessment considering: (1) Nature and extent of PHI involved, (2) Unauthorized person who used/accessed PHI, (3) Whether PHI was actually acquired or viewed, (4) Extent to which risk has been mitigated. If low probability of compromise, may not be a breach.

Important: Presumption of Breach

Under HIPAA, an impermissible use or disclosure of unsecured PHI is PRESUMED to be a breach unless you can demonstrate a low probability of compromise through a thorough risk assessment. The burden of proof is on you to show it's not a breach. When in doubt, treat it as a breach and provide notification. Document your entire breach determination process in writing.

Breach Notification Timelines & Requirements

Once you determine an incident is a breach, you must provide notifications within specific timelines.

Individuals (500+ affected)

Method: Written notice by first-class mail or email (if individual agreed)

Without unreasonable delay and no later than 60 days from discovery

Required Content:

  • Brief description of what happened
  • Types of PHI involved
  • Steps individuals should take to protect themselves
  • What the organization is doing to investigate and prevent future incidents
  • Contact information for questions
Media (500+ affected in same state/jurisdiction)

Method: Notice to prominent media outlets serving the area

Without unreasonable delay and no later than 60 days from discovery

Required Content:

  • Same information as individual notification
  • May be in press release format
  • Must reach affected individuals
HHS Secretary (500+ affected)

Method: Electronic submission via HHS Breach Portal

Without unreasonable delay and no later than 60 days from discovery

Required Content:

  • Detailed breach report form
  • Number of individuals affected
  • Description of incident
  • Types of PHI involved
HHS Secretary (<500 affected)

Method: Electronic submission via HHS Breach Portal

Annually (within 60 days of end of calendar year)

Required Content:

  • Log of all breaches affecting <500 individuals from the year
  • Same details as large breach reporting
Business Associates

Method: Written notice to covered entity

Without unreasonable delay and no later than 60 days from discovery

Required Content:

  • Identification of each individual affected
  • Description of breach
  • Other information covered entity needs for notification

Substitute Notice (Unable to Contact Individuals)

If you have insufficient or out-of-date contact information for 10+ individuals, you must provide substitute notice: (1) Post a conspicuous notice on your website for 90 days, OR (2) Notice in major print or broadcast media where affected individuals likely reside. If fewer than 10 individuals cannot be contacted, you may use alternative written notice, phone, or other means.

How to Implement Incident Response

Follow these steps to establish a comprehensive incident response program.

1
Develop Written Incident Response Plan

Create a comprehensive, documented incident response plan tailored to your organization.

  • Define security incident and breach
  • Establish incident classification and severity levels
  • Document response procedures for each phase
  • Assign roles and responsibilities
  • Include contact information for team members
  • Define escalation procedures
  • Create incident response checklists and templates
2
Assemble Incident Response Team

Identify and train personnel who will execute the incident response plan.

  • Designate incident response coordinator
  • Identify IT/security, privacy, legal, and communications members
  • Establish 24/7 contact methods for urgent incidents
  • Define backup personnel for each role
  • Document decision-making authority
  • Coordinate with business associates on their response capabilities
3
Implement Detection and Monitoring

Deploy tools and processes to detect security incidents quickly.

  • Implement security information and event management (SIEM)
  • Enable audit logging across all systems with ePHI
  • Configure automated alerts for suspicious activity
  • Establish incident reporting channels for workforce
  • Monitor business associate breach notifications
  • Review logs regularly for anomalies
4
Train Workforce on Incident Response

Ensure all workforce members know how to identify and report incidents.

  • Conduct incident response training during onboarding
  • Provide annual refresher training
  • Train on recognizing security incidents (phishing, suspicious access)
  • Explain how to report incidents promptly
  • Train incident response team on their specific roles
  • Conduct tabletop exercises and simulations
5
Test the Incident Response Plan

Regularly test and validate that the plan works effectively.

  • Conduct annual tabletop exercises
  • Simulate various incident scenarios (ransomware, data theft, insider threat)
  • Test breach determination and notification processes
  • Evaluate team response times and effectiveness
  • Identify gaps and weaknesses
  • Document testing results and improvements needed
6
Maintain and Update the Plan

Keep the incident response plan current and effective over time.

  • Review and update plan annually
  • Update after each incident or test
  • Incorporate lessons learned from real incidents
  • Update contact information when personnel change
  • Adjust for new technologies, systems, or threats
  • Ensure alignment with current HIPAA requirements

Documentation Requirements

Comprehensive documentation is critical for demonstrating compliance and supporting your response to incidents and breaches.

Incident Response Plan Documents

  • Written incident response policy and procedures
  • Incident response team roster and contact info
  • Incident classification and severity criteria
  • Response checklists and templates
  • Breach notification templates

Incident Response Records

  • Incident reports for each security incident
  • Breach determination risk assessments
  • Notification records and proof of delivery
  • Forensic analysis and investigation findings
  • Post-incident reviews and lessons learned
  • Plan testing and exercise results

Retention: Maintain incident response documentation for at least 6 years from the date of creation or last effective date per HIPAA requirements (45 CFR 164.316(b)(2)). Breach records may need to be retained longer if litigation or investigation is ongoing.

HIPAA Regulatory References

45 CFR 164.308(a)(6)

Security Incident Procedures (Required)

45 CFR 164.308(a)(6)(ii)

Response and Reporting (Required implementation specification)

45 CFR 164.402

Breach definition and determination

45 CFR 164.404

Notification to individuals (60-day timeline)

45 CFR 164.406

Notification to media (500+ in same jurisdiction)

45 CFR 164.408

Notification to HHS Secretary (immediate for 500+, annual for <500)

45 CFR 164.410

Business associate notification to covered entity

Frequently Asked Questions

Build Your Incident Response Plan

Get expert guidance on developing, testing, and maintaining a comprehensive incident response program for HIPAA compliance.