3.2 HIPAA Security Rule and Breach Notification

Key Takeaways

  • The HIPAA Security Rule applies specifically to electronic Protected Health Information (ePHI) and requires administrative, physical, and technical safeguards
  • Administrative safeguards include security management, workforce training, contingency plans, and security incident procedures
  • Physical safeguards include facility access controls, workstation security, and device/media controls
  • Technical safeguards include access controls, audit controls, integrity controls, and transmission security (encryption)
  • A breach is the unauthorized acquisition, access, use, or disclosure of PHI that compromises its security or privacy
  • Individuals must be notified within 60 days of discovering a breach; breaches affecting 500+ individuals require notification to HHS and media
  • HITECH Act increased HIPAA penalties and extended requirements to business associates directly
Last updated: March 2026

HIPAA Security Rule and Breach Notification

While the Privacy Rule covers PHI in all forms, the Security Rule focuses specifically on electronic PHI (ePHI). The Security Rule requires covered entities and business associates to implement safeguards to ensure the confidentiality, integrity, and availability of ePHI.


Three Categories of Security Safeguards

Administrative Safeguards

Administrative safeguards are the policies, procedures, and actions to manage the security of ePHI:

SafeguardDescriptionCMAA Relevance
Security managementRisk analysis and risk management processesOffice must conduct regular risk assessments
Workforce securityProcedures to ensure proper ePHI access based on roleCMAAs access only what they need for their job
Information access managementPolicies for granting, modifying, and revoking accessNew employees get role-based access; terminated employees have access immediately revoked
Security awareness trainingRegular training on security threats and policiesAll staff, including CMAAs, must complete HIPAA training
Security incident proceduresPolicies for identifying, reporting, and responding to security incidentsKnow how to report a suspected breach
Contingency planData backup, disaster recovery, and emergency mode operationsPlans for system failures, natural disasters
Business associate agreementsWritten contracts with all business associatesEnsure BAAs are in place before sharing ePHI

Physical Safeguards

Physical safeguards protect the physical environment where ePHI is accessed or stored:

SafeguardDescriptionCMAA Relevance
Facility access controlsProcedures to limit physical access to ePHI systemsLocked doors, key cards, visitor logs
Workstation usePolicies for appropriate use of workstationsScreens face away from public areas; clean desk policy
Workstation securityPhysical safeguards for workstationsPrivacy screens, automatic screen locks, cable locks
Device and media controlsPolicies for hardware and electronic media disposalHard drives must be wiped or destroyed; flash drives encrypted

Technical Safeguards

Technical safeguards are the technology and policies that protect ePHI:

SafeguardDescriptionCMAA Relevance
Access controlsUnique user IDs, emergency access, automatic logoff, encryptionEach CMAA has a unique login; share passwords NEVER
Audit controlsHardware, software, and procedures to record and examine accessSystem tracks who accessed what records and when
Integrity controlsMeasures to ensure ePHI is not improperly altered or destroyedData validation, version control, checksums
Person or entity authenticationVerifying the identity of anyone seeking access to ePHIPasswords, PINs, biometrics, tokens
Transmission securityProtecting ePHI during electronic transmissionEncryption for emails, secure portals, VPN connections

CMAA Security Best Practices

PracticeWhy It Matters
Use a unique loginNever share your login credentials with anyone — your access is tracked
Create strong passwordsMinimum 8 characters with uppercase, lowercase, numbers, and symbols; change regularly
Lock your workstationPress Ctrl+L (Windows) or Cmd+Ctrl+Q (Mac) every time you step away
Position monitorsEnsure patient information on screens is not visible to unauthorized individuals
Secure paper PHILock filing cabinets, shred documents before disposal
Verify before sendingDouble-check fax numbers and email addresses before sending PHI
Report incidentsImmediately report any suspected security incident to your supervisor or privacy officer

Breach Notification Rule

What Constitutes a Breach?

A breach is the unauthorized acquisition, access, use, or disclosure of PHI that compromises its security or privacy. The key question is whether the breach poses a significant risk of financial, reputational, or other harm to the individual.

Breach Notification Requirements

Breach SizeNotification RequirementsTimeline
Fewer than 500 individualsNotify affected individuals in writingWithin 60 days of discovery
500 or more individualsNotify individuals, HHS, and prominent local mediaWithin 60 days of discovery
Annual logBreaches affecting fewer than 500 must be logged and reported to HHS annuallyWithin 60 days of the end of the calendar year

Exceptions (Not Considered Breaches)

ExceptionExample
Unintentional acquisitionAn employee accidentally accesses the wrong record and immediately closes it
Inadvertent disclosure within the organizationA provider shares PHI with another employee who is authorized to access it
Good faith beliefThe covered entity had a good faith belief that the unauthorized person could not retain the information

HITECH Act (2009)

The Health Information Technology for Economic and Clinical Health (HITECH) Act strengthened HIPAA enforcement:

EnhancementDetails
Extended to business associatesBusiness associates are now directly liable for HIPAA compliance
Increased penaltiesTiered penalty structure from $100 to $50,000 per violation, up to $1.5 million per year per violation category
Breach notificationEstablished the Breach Notification Rule
EHR incentivesProvided financial incentives for meaningful use of electronic health records
Patient rightsStrengthened patient right to electronic copies and self-pay restrictions

HIPAA Penalty Tiers

TierKnowledge LevelPenalty Per ViolationAnnual Maximum
Tier 1Did not know (and could not have known)$100 – $50,000$25,000
Tier 2Reasonable cause (not willful neglect)$1,000 – $50,000$100,000
Tier 3Willful neglect — corrected within 30 days$10,000 – $50,000$250,000
Tier 4Willful neglect — NOT corrected$50,000$1,500,000
Test Your Knowledge

A CMAA accidentally sends a fax containing patient lab results to the wrong number. The fax was received by a non-healthcare entity. What should the CMAA do FIRST?

A
B
C
D
Test Your Knowledge

Which HIPAA safeguard category includes unique user IDs, automatic logoff, and encryption?

A
B
C
D
Test Your Knowledge

Under the HIPAA Breach Notification Rule, how soon must affected individuals be notified after a breach is discovered?

A
B
C
D