Breach Notification for Unsecured Protected Health Information, 42740-42770 [E9-20169]
Download as PDF
42740
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Office of the Secretary
45 CFR Parts 160 and 164
RIN 0991–AB56
Breach Notification for Unsecured
Protected Health Information
erowe on DSK5CLS3C1PROD with RULES_2
AGENCY: Office for Civil Rights,
Department of Health and Human
Services.
ACTION: Interim final rule with request
for comments.
SUMMARY: The Department of Health and
Human Services (HHS) is issuing this
interim final rule with a request for
comments to require notification of
breaches of unsecured protected health
information. Section 13402 of the
Health Information Technology for
Economic and Clinical Health (HITECH)
Act, part of the American Recovery and
Reinvestment Act of 2009 (ARRA) that
was enacted on February 17, 2009,
requires HHS to issue interim final
regulations within 180 days to require
covered entities under the Health
Insurance Portability and
Accountability Act of 1996 (HIPAA) and
their business associates to provide
notification in the case of breaches of
unsecured protected health information.
For purposes of determining what
information is ‘‘unsecured protected
health information,’’ in this document
HHS is also issuing an update to its
guidance specifying the technologies
and methodologies that render protected
health information unusable,
unreadable, or indecipherable to
unauthorized individuals.
DATES: Effective Date: This interim final
rule is effective September 23, 2009.
Comment Date: Comments on the
provisions of this interim final rule are
due on or before October 23, 2009.
Comments on the information collection
requirements associated with this rule
are due on or before September 8, 2009.
ADDRESSES: You may submit comments,
identified by RIN 0991–AB56, by any of
the following methods (please do not
submit duplicate comments):
• Federal eRulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
Attachments should be in Microsoft
Word, WordPerfect, or Excel; however,
we prefer Microsoft Word.
• Regular, Express, or Overnight Mail:
U.S. Department of Health and Human
Services, Office for Civil Rights,
Attention: HITECH Breach Notification,
Hubert H. Humphrey Building, Room
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
509F, 200 Independence Avenue, SW.,
Washington, DC 20201. Please submit
one original and two copies.
• Hand Delivery or Courier: Office for
Civil Rights, Attention: HITECH Breach
Notification, Hubert H. Humphrey
Building, Room 509F, 200
Independence Avenue, SW.,
Washington, DC 20201. Please submit
one original and two copies. (Because
access to the interior of the Hubert H.
Humphrey Building is not readily
available to persons without federal
government identification, commenters
are encouraged to leave their comments
in the mail drop slots located in the
main lobby of the building.)
Inspection of Public Comments: All
comments received before the close of
the comment period will be available for
public inspection, including any
personally identifiable or confidential
business information that is included in
a comment. We will post all comments
received before the close of the
comment period at https://
www.regulations.gov. Because
comments will be made public, they
should not include any sensitive
personal information, such as a person’s
social security number; date of birth;
driver’s license number, state
identification number or foreign country
equivalent; passport number; financial
account number; or credit or debit card
number. Comments also should not
include any sensitive health
information, such as medical records or
other individually identifiable health
information.
Docket: For access to the docket to
read background documents or
comments received, go to https://
www.regulations.gov or U.S. Department
of Health and Human Services, Office
for Civil Rights, 200 Independence
Avenue, SW., Washington, DC 20201
(call ahead to the contact listed below
to arrange for inspection).
FOR FURTHER INFORMATION CONTACT:
Andra Wicks, 202–205–2292.
SUPPLEMENTARY INFORMATION:
I. Background
The Health Information Technology
for Economic and Clinical Health
(HITECH) Act, Title XIII of Division A
and Title IV of Division B of the
American Recovery and Reinvestment
Act of 2009 (ARRA) (Pub. L. 111–5), was
enacted on February 17, 2009. Subtitle
D of Division A of the HITECH Act (the
Act), entitled ‘‘Privacy,’’ among other
provisions, requires the Department of
Health and Human Services (HHS or the
Department) to issue interim final
regulations for breach notification by
covered entities subject to the
PO 00000
Frm 00002
Fmt 4701
Sfmt 4700
Administrative Simplification
provisions of the Health Insurance
Portability and Accountability Act of
1996 (HIPAA) (Pub. L. 104–191) and
their business associates.
These breach notification provisions
are found in section 13402 of the Act
and apply to HIPAA covered entities
and their business associates that
access, maintain, retain, modify, record,
store, destroy, or otherwise hold, use, or
disclose unsecured protected health
information. The Act incorporates the
definitions of ‘‘covered entity,’’
‘‘business associate,’’ and ‘‘protected
health information’’ used in the HIPAA
Administrative Simplification
regulations (45 CFR parts 160, 162, and
164) (HIPAA Rules) at § 160.103. Under
the HIPAA Rules, a covered entity is a
health plan, health care clearinghouse,
or health care provider that transmits
any health information electronically in
connection with a covered transaction,
such as submitting health care claims to
a health plan. Business associate, as
defined in the HIPAA Rules, means a
person who performs functions or
activities on behalf of, or certain
services for, a covered entity that
involve the use or disclosure of
individually identifiable health
information. Examples of business
associates include third party
administrators or pharmacy benefit
managers for health plans, claims
processing or billing companies,
transcription companies, and persons
who perform legal, actuarial,
accounting, management, or
administrative services for covered
entities and who require access to
protected health information. The
HIPAA Rules define ‘‘protected health
information’’ as the individually
identifiable health information held or
transmitted in any form or medium by
these HIPAA covered entities and
business associates, subject to certain
limited exceptions.
The Act requires HIPAA covered
entities to provide notification to
affected individuals and to the Secretary
of HHS following the discovery of a
breach of unsecured protected health
information. In addition, in some cases,
the Act requires covered entities to
provide notification to the media of
breaches. In the case of a breach of
unsecured protected health information
at or by a business associate of a covered
entity, the Act requires the business
associate to notify the covered entity of
the breach. Finally, the Act requires the
Secretary to post on an HHS Web site
a list of covered entities that experience
breaches of unsecured protected health
information involving more than 500
individuals.
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
Section 13400(1) of the Act defines
‘‘breach’’ to mean, generally, the
unauthorized acquisition, access, use, or
disclosure of protected health
information which compromises the
security or privacy of such information.
The Act provides exceptions to this
definition to encompass disclosures
where the recipient of the information
would not reasonably have been able to
retain the information, certain
unintentional acquisition, access, or use
of information by employees or persons
acting under the authority of a covered
entity or business associate, as well as
certain inadvertent disclosures among
persons similarly authorized to access
protected health information at a
business associate or covered entity.
Further, section 13402(h) of the Act
defines ‘‘unsecured protected health
information’’ as ‘‘protected health
information that is not secured through
the use of a technology or methodology
specified by the Secretary in guidance’’
and provides that the guidance specify
the technologies and methodologies that
render protected health information
unusable, unreadable, or indecipherable
to unauthorized individuals. Covered
entities and business associates that
implement the specified technologies
and methodologies with respect to
protected health information are not
required to provide notifications in the
event of a breach of such information—
that is, the information is not
considered ‘‘unsecured’’ in such cases.
As required by the Act, the Secretary
initially issued this guidance on April
17, 2009 (it was subsequently published
in the Federal Register at 74 FR 19006
on April 27, 2009). The guidance listed
and described encryption and
destruction as the two technologies and
methodologies for rendering protected
health information unusable,
unreadable, or indecipherable to
unauthorized individuals.
In cases in which notification is
required, the Act at section 13402
prescribes the timeliness, content, and
methods of providing the breach
notifications. We discuss these and the
above statutory provisions in more
detail below where we describe sectionby-section how these new regulations
implement the breach notification
provisions at section 13402 of the Act.
In addition to the breach notification
provisions for HIPAA covered entities
and business associates at section
13402, section 13407 of the Act, which
is to be implemented and enforced by
the Federal Trade Commission (FTC),
imposes similar breach notification
requirements upon vendors of personal
health records (PHRs) and their third
party service providers following the
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
discovery of a breach of security of
unsecured PHR identifiable health
information.1 As with the definition of
‘‘unsecured protected health
information,’’ the provisions at section
13407(f)(3) define ‘‘unsecured PHR
identifiable health information’’ as PHR
identifiable health information that is
not protected through the use of a
technology or methodology specified by
the Secretary of HHS in guidance. Thus,
entities subject to the FTC breach
notification rules must also use the
Secretary’s guidance to determine
whether the information subject to a
breach was ‘‘unsecured’’ and, therefore,
whether breach notification is required.
When HHS issued the guidance, HHS
also published in the same document a
request for information (RFI), inviting
public comment both on the guidance
itself, as well as on the breach
provisions of section 13402 of the Act
generally. After considering the public
comment, we are issuing an updated
version of the guidance in Section II
below. In addition, we discuss public
comment received on the Act’s breach
notification provisions where relevant
below in the section-by-section
description of the interim final rule.
We have concluded that we have good
cause, under 5 U.S.C. 553(b)(B), to
waive the notice-and-comment
requirements of the Administrative
Procedure Act and to proceed with this
interim final rule. Section 13402(j)
explicitly required us to issue these
regulations as ‘‘interim final
regulations’’ and to do so within 180
days. Based on this statutory directive
and limited time frame, we concluded
that notice-and-comment rulemaking
was impracticable and contrary to
public policy. Nevertheless, we sought
comments in the RFI referenced above
and considered those comments when
drafting this rule. In addition, we
provide the public with a 60-day period
following publication of this document
to submit comments on the interim final
rule.
II. Guidance Specifying the
Technologies and Methodologies That
Render Protected Health Information
Unusable, Unreadable, or
Indecipherable to Unauthorized
Individuals
A. Background
As discussed above, section 13402 of
the Act requires breach notification
following the discovery of a breach of
unsecured protected health information.
Section 13402(h) of the Act defines
1 The FTC issued a notice of proposed rulemaking
to implement section 13407 of the Act on April 20,
2009 (74 FR 17914).
PO 00000
Frm 00003
Fmt 4701
Sfmt 4700
42741
‘‘unsecured protected health
information’’ as ‘‘protected health
information that is not secured through
the use of a technology or methodology
specified by the Secretary in guidance’’
and requires the Secretary to specify in
the guidance the technologies and
methodologies that render protected
health information unusable,
unreadable, or indecipherable to
unauthorized individuals. As required
by the Act, this guidance was issued on
April 17, 2009, and later published in
the Federal Register on April 27, 2009
(74 FR 19006). The guidance specified
encryption and destruction as the
technologies and methodologies for
rendering protected health information,
as well as PHR identifiable health
information under section 13407 of the
Act and the FTC’s implementing
regulation, unusable, unreadable, or
indecipherable to unauthorized
individuals such that breach
notification is not required. The RFI
asked for general comment on this
guidance as well as for specific
comment on the technologies and
methodologies to render protected
health information unusable,
unreadable, or indecipherable to
unauthorized individuals.
Many commenters expressed concern
and confusion regarding the purpose of
the guidance and its impact on a
covered entity’s responsibilities under
the HIPAA Security Rule (45 CFR part
164, subparts A and C). We emphasize
that this guidance does nothing to
modify a covered entity’s
responsibilities with respect to the
Security Rule nor does it impose any
new requirements upon covered entities
to encrypt all protected health
information. The Security Rule requires
covered entities to safeguard electronic
protected health information and
permits covered entities to use any
security measures that allow them to
reasonably and appropriately
implement all safeguard requirements.
Under 45 CFR 164.312(a)(2)(iv) and
(e)(2)(ii), a covered entity must consider
implementing encryption as a method
for safeguarding electronic protected
health information; however, because
these are addressable implementation
specifications, a covered entity may be
in compliance with the Security Rule
even if it reasonably decides not to
encrypt electronic protected health
information and instead uses a
comparable method to safeguard the
information.
Therefore, if a covered entity chooses
to encrypt protected health information
to comply with the Security Rule, does
so pursuant to this guidance, and
subsequently discovers a breach of that
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
42742
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
encrypted information, the covered
entity will not be required to provide
breach notification because the
information is not considered
‘‘unsecured protected health
information’’ as it has been rendered
unusable, unreadable, or indecipherable
to unauthorized individuals. On the
other hand, if a covered entity has
decided to use a method other than
encryption or an encryption algorithm
that is not specified in this guidance to
safeguard protected health information,
then although that covered entity may
be in compliance with the Security
Rule, following a breach of this
information, the covered entity would
have to provide breach notification to
affected individuals. For example, a
covered entity that has a large database
of protected health information may
choose, based on their risk assessment
under the Security Rule, to rely on
firewalls and other access controls to
make the information inaccessible, as
opposed to encrypting the information.
While the Security Rule permits the use
of firewalls and access controls as
reasonable and appropriate safeguards, a
covered entity that seeks to ensure
breach notification is not required in the
event of a breach of the information in
the database would need to encrypt the
information pursuant to the guidance.
We also received several comments
asking for clarification and additional
detail regarding the forms of
information and the specific devices
and protocols described in the guidance.
As a result, we provide clarification
regarding the forms of information
addressed in the National Institute of
Standards and Technology (NIST)
publications referenced in the guidance.
We clarify that ‘‘data in motion’’
includes data that is moving through a
network, including wireless
transmission, whether by e-mail or
structured electronic interchange, while
‘‘data at rest’’ includes data that resides
in databases, file systems, flash drives,
memory, and any other structured
storage method. ‘‘Data in use’’ includes
data in the process of being created,
retrieved, updated, or deleted, and ‘‘data
disposed’’ includes discarded paper
records or recycled electronic media.
Additionally, many commenters
suggested that access controls be
included in the guidance as a method
for rendering protected health
information unusable, unreadable, or
indecipherable to unauthorized
individuals. We recognize that access
controls, as well as other security
methods such as firewalls, are important
tools for safeguarding protected health
information. While we believe access
controls may render information
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
inaccessible to unauthorized
individuals, we do not believe that
access controls meet the statutory
standard of rendering protected health
information unusable, unreadable, or
indecipherable to unauthorized
individuals. If access controls are
compromised, the underlying
information may still be usable,
readable, or decipherable to an
unauthorized individual, and thus,
constitute unsecured protected health
information for which breach
notification is required. Therefore, we
have not included access controls in the
guidance; however, we do emphasize
the benefit of strong access controls,
which may function to prevent breaches
of unsecured protected health
information from occurring in the first
place.
Other commenters suggested that the
guidance include redaction of paper
records as an alternative to destruction.
Because redaction is not a standardized
methodology with proven capabilities to
destroy or render the underlying
information unusable, unreadable or
indecipherable, we do not believe that
redaction is an accepted alternative
method to secure paper-based protected
health information. Therefore, we have
clarified in this guidance that only
destruction of paper protected health
information, and not redaction, will
satisfy the requirements to relieve a
covered entity or business associate
from breach notification. We note,
however, that covered entities and
business associates may continue to
create limited data sets or de-identify
protected health information through
redaction if the removal of identifiers
results in the information satisfying the
criteria of 45 CFR 164.514(e)(2) or
164.514(b), respectively. Further, a loss
or theft of information that has been
redacted appropriately may not require
notification under these rules either
because the information is not protected
health information (as in the case of deidentified information) or because the
unredacted information does not
compromise the security or privacy of
the information and thus, does not
constitute a breach as described in
Section IV below.
In response to comments received, we
also make two additional clarifications
in the guidance. First, for purposes of
the guidance below and ensuring
encryption keys are not breached, we
clarify that covered entities and
business associates should keep
encryption keys on a separate device
from the data that they encrypt or
decrypt. Second, we also include in the
guidance below a note regarding
roadmap guidance activities on the part
PO 00000
Frm 00004
Fmt 4701
Sfmt 4700
of the NIST pertaining to data storage on
enterprise-level storage devices, such as
RAID (redundant array of inexpensive
disks), or SAN (storage-attached
network) systems.
For ease of reference, we have
published this updated guidance in this
document below; however, it will also
be available on the HHS Web site at
https://www.hhs.gov/ocr/privacy/. Any
further comments regarding this
guidance received in response to the
interim final rule will be addressed in
the first annual update to the guidance,
to be issued in April 2010.
B. Guidance Specifying the
Technologies and Methodologies that
Render Protected Health Information
Unusable, Unreadable, or
Indecipherable to Unauthorized
Individuals
Protected health information (PHI) is
rendered unusable, unreadable, or
indecipherable to unauthorized
individuals if one or more of the
following applies:
(a) Electronic PHI has been encrypted
as specified in the HIPAA Security Rule
by ‘‘the use of an algorithmic process to
transform data into a form in which
there is a low probability of assigning
meaning without use of a confidential
process or key’’ 2 and such confidential
process or key that might enable
decryption has not been breached. To
avoid a breach of the confidential
process or key, these decryption tools
should be stored on a device or at a
location separate from the data they are
used to encrypt or decrypt. The
encryption processes identified below
have been tested by the National
Institute of Standards and Technology
(NIST) and judged to meet this standard.
(i) Valid encryption processes for data
at rest are consistent with NIST Special
Publication 800–111, Guide to Storage
Encryption Technologies for End User
Devices.3 4
(ii) Valid encryption processes for
data in motion are those which comply,
as appropriate, with NIST Special
Publications 800–52, Guidelines for the
Selection and Use of Transport Layer
Security (TLS) Implementations; 800–
77, Guide to IPsec VPNs; or 800–113,
Guide to SSL VPNs, or others which are
Federal Information Processing
Standards (FIPS) 140–2 validated.5
2 45
CFR 164.304, definition of ‘‘encryption.’’
Roadmap plans include the development
of security guidelines for enterprise-level storage
devices, and such guidelines will be considered in
updates to this guidance, when available.
4 Available at https://www.csrc.nist.gov/.
5 Available at https://www.csrc.nist.gov/.
3 NIST
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
erowe on DSK5CLS3C1PROD with RULES_2
(b) The media on which the PHI is
stored or recorded have been destroyed
in one of the following ways:
(i) Paper, film, or other hard copy
media have been shredded or destroyed
such that the PHI cannot be read or
otherwise cannot be reconstructed.
Redaction is specifically excluded as a
means of data destruction.
(ii) Electronic media have been
cleared, purged, or destroyed consistent
with NIST Special Publication 800–88,
Guidelines for Media Sanitization,6 such
that the PHI cannot be retrieved.
detailed discussion and an example of
our harmonization efforts.
III. Overview of Interim Final Rule
We are adding a new subpart D to part
164 of title 45 of the Code of Federal
Regulations (CFR) to implement the
breach notification provisions in section
13402 of the Act. These provisions
apply to HIPAA covered entities and
their business associates and set forth
the requirements for notification to
affected individuals, the media, and the
Secretary of HHS following a breach of
unsecured protected health information.
In drafting this interim final regulation,
we considered the public comments
received in response to the RFI
described above.
In addition, we consulted closely with
the FTC in the development of these
regulations. Commenters in response to
both the RFI as well as the FTC’s notice
of proposed rulemaking urged HHS and
the FTC to work together to ensure that
the regulated entities know with which
rule they must comply and that those
entities that are subject to both rules
because they may operate in different
roles are not subject to two completely
different and inconsistent regulatory
schemes. In addition, commenters were
concerned that individuals could
receive multiple notices of the same
breach if the HHS and the FTC
regulations overlapped. Thus, HHS
coordinated with the FTC to ensure
these issues were addressed in the
respective rulemakings. First, the rules
make clear that entities operating as
HIPAA covered entities and business
associates are subject to HHS’, and not
the FTC’s, breach notification rule.
Second, in those limited cases where an
entity may be subject to both HHS’ and
the FTC’s rules, such as a vendor that
offers PHRs to customers of a HIPAA
covered entity as a business associate
and also offers PHRs directly to the
public, we worked with the FTC to
ensure both sets of regulations were
harmonized by including the same or
similar requirements, within the
constraints of the statutory language.
See Section IV.F. below for a more
A. Applicability—Section 164.400
6 Available
at https://www.csrc.nist.gov/.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
IV. Section-by-Section Description of
Interim Final Rule
The following discussion describes
the provisions of the interim final rule
section by section. Those interested in
commenting on the interim final rule
can assist the Department by preceding
discussion of any particular provision or
topic with a citation to the section of the
interim final rule being discussed.
Section 164.400 of the interim final
rule provides that this breach
notification rule is applicable to
breaches occurring on or after 30 days
from the date of publication of this
interim final rule. See Section IV.K.
Effective/Compliance Date of this rule
for further discussion.
B. Definitions—Section 164.402
Section 164.402 of the interim final
rule adopts definitions for the terms
‘‘breach’’ and ‘‘unsecured protected
health information.’’
1. Breach
Section 13402 of the Act and this
interim final rule require covered
entities and business associates to
provide notification following a breach
of unsecured protected health
information. Section 13400(1)(A) of the
Act defines ‘‘breach’’ as the
‘‘unauthorized acquisition, access, use,
or disclosure of protected health
information which compromises the
security or privacy of the protected
health information, except where an
unauthorized person to whom such
information is disclosed would not
reasonably have been able to retain such
information.’’ Section 13400(1)(B) of the
Act provides several exceptions to the
definition of ‘‘breach.’’ Based on section
13400(1)(A), we have defined ‘‘breach’’
at § 164.402 of the interim final rule as
‘‘the acquisition, access, use, or
disclosure of protected health
information in a manner not permitted
under subpart E of this part which
compromises the security or privacy of
the protected health information.’’ We
have added paragraph (1) to the
definition to clarify when the security or
privacy of information is considered to
be compromised. Paragraph (2) of the
definition then includes the statutory
exceptions, including the exception
within section 13400(1)(A) that refers to
whether the recipient would reasonably
have been able to retain the information.
PO 00000
Frm 00005
Fmt 4701
Sfmt 4700
42743
Protected Health Information
We note that the definition of
‘‘breach’’ is limited to protected health
information. With respect to a covered
entity or business associate of a covered
entity, protected health information is
individually identifiable health
information that is transmitted or
maintained in any form or medium,
including electronic information. 45
CFR 160.103. If information is deidentified in accordance with 45 CFR
164.514(b), it is not protected health
information, and thus, any inadvertent
or unauthorized use or disclosure of
such information will not be considered
a breach for purposes of this subpart.
Additionally, § 160.103 excludes certain
types of individually identifiable health
information from the definition of
‘‘protected health information,’’ such as
employment records held by a covered
entity in its role as employer. If
individually identifiable health
information that is not protected health
information is used or disclosed in an
unauthorized manner, it would not
qualify as a breach for purposes of this
subpart—although the covered entity
should consider whether it has
notification requirements under other
laws. Further, we note that although the
definition of ‘‘breach’’ applies to
protected health information generally,
covered entities and business associates
are required to provide the breach
notifications required by the Act and
this interim final rule (discussed below)
only upon a breach of unsecured
protected health information. See also
Section II of this document for a list of
the technologies and methodologies that
render protected health information
secure such that notification is not
required in the event of a breach.
Unauthorized Acquisition, Access, Use,
or Disclosure
The statute defines a ‘‘breach’’ as the
‘‘unauthorized’’ acquisition, access, use,
or disclosure of protected health
information. Several commenters asked
that we define ‘‘unauthorized’’ or that
we clarify its meaning. We clarify that
‘‘unauthorized’’ is an impermissible use
or disclosure of protected health
information under the HIPAA Privacy
Rule (subpart E of 45 CFR part 164).
Accordingly, the definition of ‘‘breach’’
at § 160.402 of the interim final rule
interprets the ‘‘unauthorized
acquisition, access, use, or disclosure of
protected health information’’ as ‘‘the
acquisition, access, use, or disclosure of
protected health information in a
manner not permitted under subpart E
of this part.’’ We emphasize that not all
violations of the Privacy Rule will be
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
42744
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
breaches under this subpart, and
therefore, covered entities and business
associates need not provide breach
notification in all cases of impermissible
uses and disclosures. We also note that
the HIPAA Security Rule provides for
administrative, physical, and technical
safeguards and organizational
requirements for electronic protected
health information, but does not govern
uses and disclosures of protected health
information. Accordingly, a violation of
the Security Rule does not itself
constitute a potential breach under this
subpart, although such a violation may
lead to a use or disclosure of protected
health information that is not permitted
under the Privacy Rule and thus, may
potentially be a breach under this
subpart.
The Act does not define the terms
‘‘acquisition’’ and ‘‘access.’’ Several
commenters asked that we define or
identify the differences between
acquisition, access, use, and disclosure
of protected health information, for
purposes of the definition of ‘‘breach.’’
We interpret ‘‘acquisition’’ and ‘‘access’’
to information based on their plain
meanings and believe that both terms
are encompassed within the current
definitions of ‘‘use’’ and ‘‘disclosure’’ in
the HIPAA Rules. Accordingly, we have
not added separate definitions for these
terms. We have retained the statutory
terms in the regulation in order to
maintain consistency with the statute.
In addition, we note that while the
HIPAA Security Rule at § 164.304
includes a definition of the term
‘‘access,’’ such definition is limited to
the ability to use ‘‘system resources’’
and not to access to information more
generally and thus, we have revised that
definition to make clear that it does not
apply for purposes of these breach
notification rules.
For an acquisition, access, use, or
disclosure of protected health
information to constitute a breach, it
must constitute a violation of the
Privacy Rule. Therefore, one of the first
steps in determining whether
notification is necessary under this
subpart is to determine whether a use or
disclosure violates the Privacy Rule. We
note that uses or disclosures that
impermissibly involve more than the
minimum necessary information, in
violation of §§ 164.502(b) and
164.514(d), may qualify as breaches
under this subpart. In contrast, a use or
disclosure of protected health
information that is incident to an
otherwise permissible use or disclosure
and occurs despite reasonable
safeguards and proper minimum
necessary procedures would not be a
violation of the Privacy Rule pursuant to
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
45 CFR 164.502(a)(1)(iii) and, therefore,
would not qualify as a potential breach.
Finally, violations of administrative
requirements, such as a lack of
reasonable safeguards or a lack of
training, do not themselves qualify as
potential breaches under this subpart
(although such violations certainly may
lead to impermissible uses or
disclosures that qualify as breaches).
Compromises the Security or Privacy of
Protected Health Information
The Act and regulation next limit the
definition of ‘‘breach’’ to a use or
disclosure that ‘‘compromises the
security or privacy’’ of the protected
health information. Accordingly, once it
is established that a use or disclosure
violates the Privacy Rule, the covered
entity must determine whether the
violation compromises the security or
privacy of the protected health
information.
For the purposes of the definition of
‘‘breach,’’ many commenters suggested
that we add a harm threshold such that
an unauthorized use or disclosure of
protected health information is
considered a breach only if the use or
disclosure poses some harm to the
individual. These commenters noted
that the ‘‘compromises the security or
privacy’’ language in section
13400(1)(A) of the Act contemplates that
covered entities will perform some type
of risk assessment to determine if there
is a risk of harm to the individual, and
therefore, if a breach has occurred.
Commenters urged that the addition of
a harm threshold to the definition
would also align this regulation with
many State breach notification laws that
require entities to reach similar harm
thresholds before providing notification.
Finally, some commenters noted that
failure to include a harm threshold for
requiring breach notification may
diminish the impact of notifications
received by individuals, as individuals
may be flooded with notifications for
breaches that pose no threat to the
security or privacy of their protected
health information or, alternatively, may
cause unwarranted panic in individuals,
and the expenditure of undue costs and
other resources by individuals in
remedial action.
We agree that the statutory language
encompasses a harm threshold and have
clarified in paragraph (1) of the
definition that ‘‘compromises the
security or privacy of the protected
health information’’ means ‘‘poses a
significant risk of financial,
reputational, or other harm to the
individual.’’ This ensures better
consistency and alignment with State
breach notification laws, as well as
PO 00000
Frm 00006
Fmt 4701
Sfmt 4700
existing obligations on Federal agencies
(some of which also must comply with
these rules as HIPAA covered entities)
pursuant to OMB Memorandum M–07–
16 to have in place breach notification
policies for personally identifiable
information that take into account the
likely risk of harm caused by a breach
in determining whether breach
notification is required. Thus, to
determine if an impermissible use or
disclosure of protected health
information constitutes a breach,
covered entities and business associates
will need to perform a risk assessment
to determine if there is a significant risk
of harm to the individual as a result of
the impermissible use or disclosure. In
performing the risk assessment, covered
entities and business associates may
need to consider a number or
combination of factors, some of which
are described below.7
Covered entities and business
associates should consider who
impermissibly used or to whom the
information was impermissibly
disclosed when evaluating the risk of
harm to individuals. If, for example,
protected health information is
impermissibly disclosed to another
entity governed by the HIPAA Privacy
and Security Rules or to a Federal
agency that is obligated to comply with
the Privacy Act of 1974 (5 U.S.C. 552a)
and the Federal Information Security
Management Act of 2002 (44 U.S.C.
3541 et seq.), there may be less risk of
harm to the individual, since the
recipient entity is obligated to protect
the privacy and security of the
information it received in the same or
similar manner as the entity that
disclosed the information. In contrast, if
protected health information is
impermissibly disclosed to any entity or
person that does not have similar
obligations to maintain the privacy and
security of the information, the risk of
harm to the individual is much greater.
We expect that there may be
circumstances where a covered entity
takes immediate steps to mitigate an
impermissible use or disclosure, such as
by obtaining the recipient’s satisfactory
assurances that the information will not
be further used or disclosed (through a
confidentiality agreement or similar
means) or will be destroyed. If such
steps eliminate or reduce the risk of
harm to the individual to a less than
‘‘significant risk,’’ then we interpret that
the security and privacy of the
7 Covered entities may also wish to review OMB
Memorandum M–07–16 for examples of the types
of factors that may need to be taken into account
in determining whether an impermissible use or
disclosure presents a significant risk of harm to the
individual.
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
information has not been compromised
and, therefore, no breach has occurred.
In addition, there may be
circumstances where impermissibly
disclosed protected health information
is returned prior to it being accessed for
an improper purpose. For example, if a
laptop is lost or stolen and then
recovered, and a forensic analysis of the
computer shows that its information
was not opened, altered, transferred, or
otherwise compromised, such a breach
may not pose a significant risk of harm
to the individuals whose information
was on the laptop. Note, however, that
if a computer is lost or stolen, we do not
consider it reasonable to delay breach
notification based on the hope that the
computer will be recovered.
In performing a risk assessment,
covered entities and business associates
should also consider the type and
amount of protected health information
involved in the impermissible use or
disclosure. If the nature of the protected
health information does not pose a
significant risk of financial,
reputational, or other harm, then the
violation is not a breach. For example,
if a covered entity improperly discloses
protected health information that
merely included the name of an
individual and the fact that he received
services from a hospital, then this
would constitute a violation of the
Privacy Rule, but it may not constitute
a significant risk of financial or
reputational harm to the individual. In
contrast, if the information indicates the
type of services that the individual
received (such as oncology services),
that the individual received services
from a specialized facility (such as a
substance abuse treatment program 8), or
if the protected health information
includes information that increases the
risk of identity theft (such as a social
security number, account number, or
mother’s maiden name), then there is a
higher likelihood that the impermissible
use or disclosure compromised the
security and privacy of the information.
The risk assessment should be fact
specific, and the covered entity or
business associate should keep in mind
that many forms of health information,
not just information about sexually
transmitted diseases or mental health,
should be considered sensitive for
purposes of the risk of reputational
8 Note that an impermissible disclosure that
indicates that an individual has received services
from a substance abuse treatment program may also
constitute a violation of 42 U.S.C. 290dd–2 and the
implementing regulations at 42 CFR part 2. These
provisions require the confidentiality of substance
abuse patient records.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
harm—especially in light of fears about
employment discrimination.
We also address impermissible uses
and disclosures involving limited data
sets (as the term is used at 45 CFR
164.514(e) of the Privacy Rule), in
paragraph (1) of the definition of
‘‘breach’’ at § 164.402 of the interim
final rule. In the RFI discussed above,
we asked for public comment on
whether limited data sets should be
considered unusable, unreadable, or
indecipherable and included as a
methodology in the guidance. A limited
data set is created by removing the 16
direct identifiers listed in
§ 164.514(e)(2) from the protected health
information.9 These direct identifiers
include the name, address, social
security number, and account number of
an individual or the individual’s
relative, employer, or household
member. When these 16 direct
identifiers are removed from the
protected health information, the
information is not completely deidentified pursuant to 45 CFR
164.514(b). In particular, the elements of
dates, such as dates of birth, and zip
codes, are allowed to remain within the
limited data set, which increase the
potential for re-identification of the
information. Because there is a risk of
re-identification of the information
within a limited data set, the Privacy
Rule treats this information as protected
health information that may only be
used or disclosed as permitted by the
Privacy Rule.
Several commenters suggested that
the limited data set should not be
included in the guidance as a method to
render protected health information
unusable, unreadable, or indecipherable
to unauthorized individuals such that
breach notification is not required.
These commenters cited concerns about
the risk of re-identification of protected
health information in a limited data set
and noted that, as more data exists in
electronic form and as more data
becomes public, it will be easier to
combine these various sources to reestablish the identity of the individual.
Furthermore, due to the risk of re9 A limited data set is protected health
information that excludes the following direct
identifiers of the individual or of relatives,
employers, or household members of the
individual: (1) Names; (2) postal address
information, other than town or city, State, and zip
code; (3) telephone numbers; (4) fax numbers; (5)
e-mail addresses; (6) social security numbers; (7)
medical record numbers; (8) health plan beneficiary
numbers; (9) account numbers; (10) certificate/
license plate numbers; (11) vehicle identifiers and
serial numbers; (12) device identifiers and serial
numbers; (13) Web URLs; (14) Internet Protocol (IP)
address numbers; (15) biometric identifiers,
including finger and voice prints; and (16) full face
photographic images and any comparable images.
PO 00000
Frm 00007
Fmt 4701
Sfmt 4700
42745
identification, these commenters stated
that creating a limited data set was not
comparable to encrypting information,
and therefore, should not be included as
a method to render protected health
information unusable, unreadable, or
indecipherable to unauthorized
individuals.
The majority of commenters,
however, did support the inclusion of
the limited data set in the guidance.
These commenters stated that it would
be impractical to require covered
entities and business associates to notify
individuals of a breach of information
within a limited data set because, by
definition, such information excludes
the very identifiers that would enable
covered entities and business associates,
without undue burden, to identify the
affected individuals and comply with
the breach notification requirements.
Additionally, these commenters cited
contractual concerns regarding the data
use agreement, which prohibits the
recipient of a limited data set from reidentifying the information and
therefore, may pose problems with
complying with the notification
requirements of section 13402(b) of the
Act.
These commenters also noted that the
decision to exclude the limited data set
from the guidance, such that a breach of
a limited data set would require breach
notification, would reduce the
likelihood that covered entities would
continue to create and share limited
data sets. This, in turn, would have a
chilling effect on the research and
public health communities, which rely
on receiving information from covered
entities in limited data set form.
Finally, commenters noted that the
removal of the 16 direct identifiers in
the limited data set presents a minimal
risk of serious harm to the individual by
limiting the possibility that the
information could be used for an illicit
purpose if breached. These commenters
also suggested that the inclusion of the
limited data set in the guidance would
align with most state breach notification
laws, which, as a general matter, only
require notification when certain
identifiers are exposed and when there
is a likelihood that the breach will result
in harm to the individual.
We also asked commenters if they
believed that the removal of an
individual’s date of birth or zip code, in
addition to the 16 direct identifiers in
45 CFR 164.514(e)(2), would reduce the
risk of re-identification of the
information such that it could be
included in the guidance. Several
commenters responded to this question.
While some stated that the removal of
these data elements would render the
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
42746
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
information useless to the research and
public health communities, which may,
for example, require zip codes for many
population based studies, many
commenters did acknowledge that the
removal of these additional identifiers
would reduce the risk of reidentification of the information.
After considering these comments, we
decided against including the limited
data set in the guidance as a method for
rendering protected health information
unusable, unreadable, or indecipherable
to unauthorized individuals due to the
potential risk of re-identification of this
information. However, we address
breaches of limited data sets in the
definition of ‘‘breach’’ as follows.
Under the definition of ‘‘breach’’ at
§ 164.402, in order to determine
whether a covered entity’s or business
associate’s impermissible use or
disclosure of protected health
information constitutes a breach, the
covered entity or business associate will
need to perform the risk assessment
discussed above. This applies to
impermissible uses or disclosures of
protected health information that
constitute a limited data set, unless, as
discussed below, the protected health
information also does not include zip
codes or dates of birth. In performing
the risk assessment to determine the
likely risk of harm caused by an
impermissible use or disclosure of a
limited data set, the covered entity or
business associate should take into
consideration the risk of reidentification of the protected health
information contained in the limited
data set.
Through a risk assessment, a covered
entity or business associate may
determine that the risk of identifying a
particular individual is so small that the
use or disclosure poses no significant
risk of harm to any individuals. For
example, it may be determined that an
impermissible use or disclosures of a
limited data set that includes zip codes,
based on the population features of
those zip codes, does not create a
significant risk that a particular
individual can be identified. Therefore,
there would be no significant risk of
harm to the individual. If there is no
significant risk of harm to the
individual, then no breach has occurred
and no notification is required. If,
however, the covered entity or business
associate determines that the individual
can be identified based on the
information disclosed, and there is
otherwise a significant risk of harm to
the individual, then breach notification
is required, unless one of the other
exceptions discussed below applies.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
We have provided a narrow, explicit
exception to what compromises the
privacy or security of protected health
information for a use or disclosure of
protected health information that
excludes the 16 direct identifiers listed
at 45 CFR 164.514(e)(2) as well as dates
of birth and zip codes. Thus, we deem
an impermissible use or disclosure of
this information to not compromise the
security or privacy of the protected
health information, because we believe
that impermissible uses or disclosures
of this information—if subjected to the
type of risk assessment described
above—would pose a low level of risk.
We emphasize that this is a narrow
exception. If, for example, the
information does not contain birth dates
but does contain zip code information
or contains both birth dates and zip
code information, then this narrow
exception would not apply, and the
covered entity or business associate
would be required to perform a risk
assessment to determine if the risk of reidentification poses a significant risk of
harm to the individual. We invite
comments on this narrow exception. We
do not believe that this narrow
exception will have the unintended
consequence of discouraging the use of
encryption and other methods for
rendering protected health information
unusable, unreadable, or
indecipherable; however, we invite
comments on this issue as well. Finally,
we note that this narrow exception
should not be construed as encouraging
or permitting the use or disclosure of
more than the minimum necessary
information, in violation of
§§ 164.502(b) and 164.514(d).
We do not intend to interfere with
research or public health activities that
rely on dates of birth or zip codes. Uses
and disclosures of limited data sets that
include this information continue to be
permissible under the Privacy Rule if
the applicable requirements, such as a
data use agreement, are satisfied.
Further, we note that a covered entity or
business associate is not responsible for
a breach by a third party to whom it
permissibly disclosed protected health
information, including limited data sets,
unless the third party received the
information in its role as an agent of the
covered entity or business associate. To
the extent that a third party recipient of
the information is itself a covered entity,
and the information is breached while at
the third party (i.e., used or disclosed in
an impermissible manner and in a
manner determined to compromise the
privacy or security of the information),
then the third party will be responsible
for complying with the provisions of
PO 00000
Frm 00008
Fmt 4701
Sfmt 4700
this interim final rule. In cases where a
covered entity is the recipient of a
limited data set pursuant to § 164.514(e)
of the Privacy Rule and it is unable to
re-identify the individuals after a breach
occurs, it may satisfy the requirements
of § 164.404 without re-identifying the
information, by providing substitute
notice to the individuals as required by
paragraph (d)(2) of that section.
We note that the discussion above
regarding ‘‘limited data sets’’ applies to
any protected health information that
excludes the 16 direct identifiers listed
at § 164.514(e)(2), regardless of whether
the information is used for health care
operations, public health, or research
purposes (see § 164.514(e)(3)(i)), and is
subject to a data use agreement under
§ 164.514(e) of the Privacy Rule. Thus,
for example, a covered entity that
impermissibly uses or discloses data
that is stripped of the 16 direct
identifiers described above, zip codes,
and dates of birth, may take advantage
of the exception to what is a breach,
regardless of the intended purpose of
the use or disclosure or whether a data
use agreement was in place.
With respect to any type of protected
health information, we note that
§ 164.414, discussed below, gives
covered entities and business associates
the burden of demonstrating that no
breach has occurred because the
impermissible use or disclosure did not
pose a significant risk of harm to the
individual. Covered entities and
business associates must document their
risk assessments, so that they can
demonstrate, if necessary, that no
breach notification was required
following an impermissible use or
disclosure of protected health
information. For impermissible uses or
disclosures of protected health
information that fall under the narrow
exception at paragraph (1)(ii) of this
definition, which do not qualify as
breaches because the protected health
information is a limited data set that
does not include zip codes or dates of
birth, documentation that demonstrates
that the lost information did not include
these identifiers will suffice.
Exceptions to Breach
Section 13400(1) of the Act also
includes three exceptions to the
definition of ‘‘breach’’ that encompass
situations Congress clearly intended to
not constitute breaches: (1)
Unintentional acquisition, access, or use
of protected health information by an
employee or individual acting under the
authority of a covered entity or business
associate (section 13400(1)(B)(i)); (2)
inadvertent disclosure of protected
health information from one person
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
authorized to access protected health
information at a covered entity or
business associate to another person
authorized to access protected health
information at the covered entity or
business associate (section
13400(1)(B)(ii) and (iii)); and (3)
unauthorized disclosures in which an
unauthorized person to whom protected
health information is disclosed would
not reasonably have been able to retain
the information (section 13400(1)(A)).
We have included these three
exceptions as paragraphs (2)(i), (ii), and
(iii), respectively.
The first regulatory exception at
paragraph (2)(i) of this definition, for
unintentional acquisition, access, or use
of protected health information,
generally mirrors the exception in
section 13400(1)(B)(i) of the Act. This
statutory section excepts from the
definition of ‘‘breach’’ the unintentional
acquisition, access, or use of protected
health information by an employee or
individual acting under the authority of
a covered entity or a business associate,
if the acquisition, access, or use was
made in good faith, within the course
and scope of employment or other
professional relationship, and does not
result in further use or disclosure.
We modified the statutory language to
use ‘‘workforce members’’ instead of
employees. Workforce member is a
defined term in 45 CFR 160.103 and
means ‘‘employees, volunteers, trainees,
and other persons whose conduct, in the
performance of work for a covered
entity, is under the direct control of
such entity, whether or not they are
paid by the covered entity.’’
A person is acting under the authority
of a covered entity or business associate
if he or she is acting on its behalf. This
may include a workforce member of a
covered entity, an employee of a
business associate, or even a business
associate of a covered entity. Similarly,
to determine whether the access,
acquisition, or use was made ‘‘within
the scope of authority,’’ the covered
entity or business associate should
consider whether the person was acting
on its behalf at the time of the
inadvertent acquisition, access, or use.
Additionally, while the statutory
language provides that this exception
applies where the recipient does not
further use or disclose the information,
we have interpreted this exception as
encompassing circumstances where the
recipient does not further use or
disclose the information in a manner
not permitted under the Privacy Rule. In
circumstances where any further use or
disclosure of the information is
permissible under the Privacy Rule, we
interpret that there is no breach because
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
the security and privacy of the
information has not been compromised
by any such permissible use or
disclosure.
To illustrate this exception, we offer
the following example. A billing
employee receives and opens an e-mail
containing protected health information
about a patient which a nurse
mistakenly sent to the billing employee.
The billing employee notices that he is
not the intended recipient, alerts the
nurse of the misdirected e-mail, and
then deletes it. The billing employee
unintentionally accessed protected
health information to which he was not
authorized to have access. However, the
billing employee’s use of the
information was done in good faith and
within the scope of authority, and
therefore, would not constitute a breach
and notification would not be required,
provided the employee did not further
use or disclose the information accessed
in a manner not permitted by the
Privacy Rule.
In contrast, a receptionist at a covered
entity who is not authorized to access
protected health information decides to
look through patient files in order to
learn of a friend’s treatment. In this
case, the impermissible access to
protected health information would not
fall within this exception to breach
because such access was neither
unintentional, done in good faith, nor
within the scope of authority.
The second regulatory exception, at
paragraph (2)(ii) of this definition,
covers inadvertent disclosures and
generally mirrors the exception
provided in section 13400(1)(B)(ii) and
(iii) of the Act, with slight
modifications. The statute excepts from
the definition of ‘‘breach’’ inadvertent
disclosures from an individual who is
otherwise authorized to access protected
health information at a facility operated
by a covered entity or business associate
to another similarly situated individual
at the same facility if the information is
not further used or disclosed without
authorization. We have modified the
statutory language slightly to except
from breach inadvertent disclosures of
protected health information from a
person who is authorized to access
protected health information at a
covered entity or business associate to
another person authorized to access
protected health information at the same
covered entity, business associate, or
organized health care arrangement in
which the covered entity participates.
Organized health care arrangement is
defined by the HIPAA Rules to mean,
among other things, a clinically
integrated care setting in which
individuals typically receive health care
PO 00000
Frm 00009
Fmt 4701
Sfmt 4700
42747
from more than one health care
provider.10 See 45 CFR 160.103. This
includes, for example, a covered entity,
such as a hospital, and the health care
providers who have staff privileges at
the hospital.
We received several comments with
respect to this exception, and many
commenters asked that we clarify and
explain the statutory language regarding
what it means to be a ‘‘similarly situated
individual’’ and what constitutes the
‘‘same facility’’ for purposes of this
exception. We believe that a ‘‘similarly
situated individual,’’ for purposes of the
statute, means an individual who is
authorized to access protected health
information, and thus, for clarity, we
have substituted this language for the
statutory language in the regulation.
Thus, a person who is authorized to
access protected health information is
similarly situated, for purposes of this
regulation, to another person at the
covered entity, business associate of the
covered entity, or organized health care
arrangement in which the covered entity
participates, who is also authorized to
access protected health information
(even if the two persons may not be
authorized to access the same types of
protected health information). For
example, a physician who has authority
to use or disclose protected health
information at a hospital by virtue of
participating in an organized health care
arrangement with the hospital is
similarly situated to a nurse or billing
employee at the hospital. In contrast,
the physician is not similarly situated to
an employee at the hospital who is not
authorized to access protected health
information.
Additionally, we have interpreted
‘‘same facility’’ to mean the same
covered entity, business associate, or
organized health care arrangement in
which the covered entity participates
and have substituted this language in
the regulation. By focusing on the legal
entity or status of the entities as an
organized health care arrangement when
interpreting ‘‘same facility,’’ we believe
we have more clearly captured the
intent of the statute and have also
alleviated commenter concerns that the
term ‘‘facility’’ was too narrow.
Therefore, the size of the covered entity,
10 45 CFR 160.103 also defines ‘‘organized health
care arrangement’’ to include ‘‘an organized system
of health care in which more than one covered
entity participates’’ and in which the participating
covered entities engage in certain joint utilization
review, quality assessment and improvement, or
payment activities. In addition, the definition
encompasses certain relationships between group
health plans and health insurance issuers or health
maintenance organizations (HMO), as well as
relationships among group health plans which are
maintained by the same plan sponsor.
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
42748
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
business associate, or organized health
care arrangement will dictate the scope
of this exception. If a covered entity has
a single location, then the exception
will apply to disclosures between a
workforce member and, e.g., a physician
with staff privileges at that single
location. However, if a covered entity
has multiple locations across the
country, the same exception will apply
even if the workforce member makes the
disclosure to a physician with staff
privileges at a facility located in another
state.
We interpret the statutory limitation
that the information not be ‘‘further
acquired, accessed, used, or disclosed
without authorization’’ as meaning that
the information is not further used or
disclosed in a manner not permitted by
the Privacy Rule. Thus, this exception
encompasses circumstances in which a
person who is authorized to use or
disclose protected health information
within a covered entity, business
associate, or organized health care
arrangement inadvertently discloses that
information to another person who is
authorized to use or disclose protected
health information within the same
covered entity, business associate, or
organized health care arrangement, as
long as the recipient does not further
use or disclose the information in
violation of the Privacy Rule.
The final regulatory exception to
breach at paragraph (2)(iii) of this
definition mirrors the exception found
in section 13400(1)(A) of the Act. The
statute excepts from the definition of
‘‘breach’’ situations in which the
unauthorized person to whom protected
health information has been disclosed
would not reasonably have been able to
retain the information. We have slightly
modified this language to except from
‘‘breach’’ situations where a covered
entity or business associate has a good
faith belief that the unauthorized person
to whom the disclosure of protected
health information was made would not
reasonably have been able to retain the
information.
For example, a covered entity, due to
a lack of reasonable safeguards, sends a
number of explanations of benefits
(EOBs) to the wrong individuals. A few
of the EOBs are returned by the post
office, unopened, as undeliverable. In
these circumstances, the covered entity
can conclude that the improper
addressees could not reasonably have
retained the information. The EOBs that
were not returned as undeliverable,
however, and that the covered entity
knows were sent to the wrong
individuals, should be treated as
potential breaches.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
As another example, a nurse
mistakenly hands a patient the
discharge papers belonging to another
patient, but she quickly realizes her
mistake and recovers the protected
health information from the patient. If
the nurse can reasonably conclude that
the patient could not have read or
otherwise retained the information, then
this would not constitute a breach.
With respect to any of the three
exceptions discussed above, a covered
entity or business associate has the
burden of proof, pursuant to
§ 164.414(b) (discussed below), for
showing why breach notification was
not required. Accordingly, the covered
entity or business associate must
document why the impermissible use or
disclosure falls under one of the above
exceptions.
Based on the above, we envision that
covered entities and business associates
will need to do the following to
determine whether a breach occurred.
First, the covered entity or business
associate must determine whether there
has been an impermissible use or
disclosure of protected health
information under the Privacy Rule.
Second, the covered entity or business
associate must determine, and
document, whether the impermissible
use or disclosure compromises the
security or privacy of the protected
health information. This occurs when
there is a significant risk of financial,
reputational, or other harm to the
individual. Lastly, the covered entity or
business associate may need to
determine whether the incident falls
under one of the exceptions in
paragraph (2) of the breach definition.
We treat the breach as having
occurred at the time of the
impermissible use or disclosure (or in
the case of the exceptions listed at
paragraphs (2)(i) and (ii) of the
definition of ‘‘breach,’’ at the time of the
‘‘further’’ impermissible use or
disclosure), but recognize that a covered
entity or business associate may require
a reasonable amount of time to confirm
whether the incident qualifies as a
breach. As discussed below, a breach is
considered discovered when the
incident becomes known, not when the
covered entity or business associate
concludes the above analysis of whether
the facts constitute a breach.
2. Unsecured Protected Health
Information
The interim final rule adopts a
definition of ‘‘unsecured protected
health information’’ to identify to what
information the breach notification
provisions apply. Section
13402(h)(1)(A) of the Act defines
PO 00000
Frm 00010
Fmt 4701
Sfmt 4700
‘‘unsecured protected health
information’’ as ‘‘protected health
information that is not secured through
the use of a technology or methodology
specified by the Secretary in guidance
issued under [section 13402(h)(2)].’’
Further, the Act at section 13402(h)(2)
requires that the Secretary specify in the
guidance the technologies and
methodologies that render protected
health information unusable,
unreadable, or indecipherable to
unauthorized individuals. Accordingly,
the interim final rule defines
‘‘unsecured protected health
information’’ to mean protected health
information that is not rendered
unusable, unreadable, or indecipherable
to unauthorized individuals through the
use of a technology or methodology
specified by the Secretary in guidance.
We also provide in the regulation that
the guidance will be published on the
HHS Web site.
Section 13402(h)(2) of the Act
required that the Secretary initially
issue such guidance, after consultation
with stakeholders, no later than 60 days
after enactment, or April 17, 2009. As
discussed above, the Secretary issued
the guidance along with a request for
information on April 17, 2009, on the
HHS Web site at https://www.hhs.gov/
ocr/privacy/ and the guidance was later
published in the Federal Register on
April 27, 2009 (74 FR 19006). The
Department has reviewed the public
comment received in response to the
request for information and provides an
update to the guidance in Section II of
this document. As provided in this
interim final rule, this updated guidance
is also (and any future updates will be)
available on the HHS Web site at https://
www.hhs.gov/ocr/privacy/.
We note that the definition of
‘‘unsecured protected health
information’’ in the Act and this interim
final rule incorporates generally the
term ‘‘protected health information,’’ as
defined at 45 CFR 160.103 of the HIPAA
Rules, which includes information in
any form or medium. Accordingly, the
term ‘‘unsecured protected health
information’’ can include information in
any form or medium, including
electronic, paper, or oral form.
C. Notification to Individuals—Section
164.404
Section 164.404 of the interim final
rule provides the requirements for the
notifications covered entities are to
provide to individuals affected by a
breach of unsecured protected health
information. This section includes
implementation specifications regarding
timeliness, content, and methods of the
notice.
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
General Rule
Section 164.404(a)(1) provides the
general rule that a covered entity shall,
following the discovery of a breach of
unsecured protected health information,
notify each individual whose unsecured
protected health information has been,
or is reasonably believed by the covered
entity to have been, accessed, acquired,
used, or disclosed as a result of such
breach. This regulatory provision
implements section 13402(a) of the Act,
but does not include the phrase ‘‘that
accesses, maintains, retains, modifies,
records, stores, destroys, or otherwise
holds, uses, or discloses’’ used in the
statute to describe a covered entity’s
actions with respect to unsecured
protected health information because
inclusion of such terms was deemed
unnecessary. In addition, the statute
refers to protected health information
that has been ‘‘accessed, acquired, or
disclosed’’; it does not include ‘‘used.’’
In contrast, the statutory definition of
‘‘breach’’ refers to the ‘‘acquisition,
access, use, or disclosure’’ of protected
health information. For consistency
with the definition, therefore, we have
added ‘‘used’’ to the list of actions for
which notification is required in
§ 164.404(a)(1).
erowe on DSK5CLS3C1PROD with RULES_2
Breaches Treated as Discovered
Section 164.404(a)(2) states that a
breach shall be treated as discovered by
a covered entity as of the first day the
breach is known to the covered entity,
or by exercising reasonable diligence
would have been known to the covered
entity. Thus, a covered entity is not
liable for failing to provide notification
in cases in which it is not aware of a
breach unless the covered entity would
have been aware of the breach had it
exercised reasonable diligence. Section
164.404(a)(2) further provides that a
covered entity is deemed to have
knowledge of a breach if such breach is
known, or by exercising reasonable
diligence would have been known, to
any person, other than the person
committing the breach, who is a
workforce member or agent of the
covered entity (determined in
accordance with the federal common
law of agency). These provisions
implement section 13402(c) of the Act
but clarify that the federal common law
of agency is to control in determining
who is an agent of the covered entity.
This approach is consistent with the
HIPAA Enforcement Rule (45 CFR part
160, subparts C through E), which
provides that the federal common law of
agency applies in determining agency
liability under the HIPAA Rules.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
We have also modified the statutory
language slightly to better conform to
existing language in the HIPAA
Enforcement Rule by incorporating the
term ‘‘by exercising reasonable
diligence.’’ The term ‘‘reasonable
diligence’’ means the ‘‘business care and
prudence expected from a person
seeking to satisfy a legal requirement
under similar circumstances.’’ We have
made these clarifications for consistency
and uniformity across the regulations.
Because a covered entity or business
associate is liable for failing to provide
notice of a breach when the covered
entity or business associate did not
know—but by exercising reasonable
diligence would have known—of a
breach, it is important for such entities
to implement reasonable systems for
discovery of breaches. We also note that
these provisions attribute knowledge of
a breach by a workforce member or
other agent (other than the person
committing the breach), such as certain
business associates, to the covered
entity itself. This is important, as
knowledge of a breach, i.e., when a
breach is treated as ‘‘discovered,’’ starts
the clock in terms of the period of time
a covered entity has to make the
notifications required by the interim
final rule. Thus, covered entities should
ensure their workforce members and
other agents are adequately trained and
aware of the importance of timely
reporting of privacy and security
incidents and of the consequences of
failing to do so.
Timeliness
Regarding timeliness of individual
notifications, § 164.404(b) mirrors the
statutory requirement in section
13402(d) of the Act and requires that,
except when law enforcement requests
a delay in accordance with § 164.412
(provision discussed below), a covered
entity shall send the required
notification without unreasonable delay
and in no case later than 60 calendar
days after the date the breach was
discovered by the covered entity. Thus,
provisions for timeliness should be read
together with the above provisions for
when a breach is treated as discovered.
We expect a covered entity to make the
individual notifications as soon as
reasonably possible. The covered entity
may take a reasonable time to
investigate the circumstances
surrounding the breach, in order to
collect and develop the information that
§ 164.404(c) requires to be included in
the notice to the individual. As
discussed below, covered entities are
also permitted to provide the required
information to individuals within the
required time period in multiple
PO 00000
Frm 00011
Fmt 4701
Sfmt 4700
42749
mailings as the information becomes
available.
In response to the RFI, some
commenters suggested that suspected
but unconfirmed breaches should not be
treated as discovered until all the facts
of the breach could be confirmed.
Others suggested that 60 days was an
insufficient amount of time to conduct
a complete investigation and send the
required notifications. We disagree.
Waiting longer than 60 days to notify
individuals of breaches of their
unsecured protected health information
could substantially increase the risk of
harm to individuals as a result of the
breach and decrease the ability of the
individuals to effectively protect
themselves from such harm. The statute
and interim final rule provide that the
notification must be provided without
unreasonable delay and in no case later
than 60 calendar days. The purpose of
this period is to give covered entities
and business associates time to conduct
a prompt investigation into the incident
to identify and collect the information
needed to provide meaningful notice to
the individual about what happened.
Thus, the time period for breach
notification begins when the incident is
first known, not when the investigation
of the incident is complete, even if it is
initially unclear whether the incident
constitutes a breach as defined in this
rule.
Further, the duration of an
investigation is limited by the statute
and interim final rule’s requirement that
any delay be reasonable—the
investigation cannot take an
unreasonable amount of time. Thus, if a
covered entity learns of an
impermissible use or disclosure but
unreasonably allows the investigation to
lag for 30 days, this would constitute an
unreasonable delay. Further, the 60 days
is an outer limit and therefore, in some
cases, it may be an ‘‘unreasonable
delay’’ to wait until the 60th day to
provide notification. For example, if a
covered entity has compiled the
information necessary to provide
notification to individuals on day 10 but
waits until day 60 to send the
notifications, it would constitute an
unreasonable delay despite the fact that
the covered entity has provided
notification within 60 days.
We also note that if a covered entity
promptly investigates a reported breach
and can swiftly conclude that there was
no breach, then the covered entity need
not send out breach notifications. For
example, where a laptop with
unsecured protected health information
is initially reported by an employee to
be stolen but is discovered the next day
in another secure office within the
E:\FR\FM\24AUR2.SGM
24AUR2
42750
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
erowe on DSK5CLS3C1PROD with RULES_2
covered entity, then the covered entity
need not send out breach notifications.
Content
Section 13402(f) of the Act sets forth
the content requirements for the breach
notice to the individual. Section
164.404(c) of the interim final rule
implements section 13402(f) of the Act
and requires the notification to include,
to the extent possible, the following
elements: (1) A brief description of what
happened, including the date of the
breach and the date of the discovery of
the breach, if known; (2) A description
of the types of unsecured protected
health information that were involved
in the breach (such as whether full
name, social security number, date of
birth, home address, account number,
diagnosis, disability code, or other types
of information were involved); (3) any
steps individuals should take to protect
themselves from potential harm
resulting from the breach; (4) a brief
description of what the covered entity
involved is doing to investigate the
breach, to mitigate harm to individuals,
and to protect against any further
breaches; and (5) contact procedures for
individuals to ask questions or learn
additional information, which must
include a toll-free telephone number, an
e-mail address, Web site, or postal
address. With respect to indicating in
the notification the types of protected
health information involved in a breach,
we emphasize that this provision
requires covered entities to describe
only the types of information involved.
Thus, covered entities should not
include a listing of the actual protected
health information that was breached
(e.g., list in the notice the individual’s
social security number or credit card
number that was breached) and
generally should avoid including any
sensitive information in the notification
itself. Further, in the interim final rule
at § 164.404(c)(1)(B), we add the term
‘‘diagnosis’’ in the parenthetical listing
of examples of types of protected health
information to make clear that, where
appropriate, a covered entity may need
to indicate in the notification to the
individual whether and what types of
treatment information were involved in
a breach. In addition, at
§ 164.404(c)(1)(D), we replace the
statutory term ‘‘mitigate losses’’ with
‘‘mitigate harm to the individual’’ to
make clear that the notification should
describe the steps the covered entity is
taking to mitigate potential harm to the
individual resulting from the breach and
that such harm is not limited to
economic loss.
Under these content requirements, for
example, and depending on the
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
circumstances, the notice to the
individual may include
recommendations that the individual
contact his or her credit card company
and information about how to contact
the credit bureaus and obtain credit
monitoring services (if credit card
information was breached); information
about steps the covered entity is taking
to retrieve the breached information,
such as filing a police report (if a
suspected theft of unsecured protected
health information occurred);
information about steps the covered
entity is taking to improve security to
prevent future similar breaches; and
information about sanctions the covered
entity imposed on workforce members
involved in the breach.
Some commenters recommended that
we impose a page limitation on the
length of the notice (e.g., one page in
length) and ensure the content of the
notice is non-technical and noncomplex so individuals can easily
understand the information being
provided. We agree that it is important
for individuals to be able to understand
the information being provided to them
in the breach notifications and thus, at
§ 164.404(c)(2) of the interim final rule,
include a requirement that such
notifications be written in plain
language. To satisfy this requirement,
the covered entity should write the
notice at an appropriate reading level,
using clear language and syntax, and not
include any extraneous material that
might diminish the message it is trying
to convey. We do not impose a page
limitation, however, so as not to
constrain covered entities in including
in the notifications the information they
believe could be helpful to individuals.
Further, we note that some covered
entities may have obligations under
other laws with respect to their
communication with affected
individuals. For example, to the extent
a covered entity is obligated to comply
with Title VI of the Civil Rights Act of
1964, the covered entity must take
reasonable steps to ensure meaningful
access for Limited English Proficient
persons to the services of the covered
entity, which could include translating
the notice into frequently encountered
languages. Similarly, to the extent that
a covered entity is obligated to comply
with Section 504 of the Rehabilitation
Act of 1973 or the Americans with
Disabilities Act of 1990, the covered
entity has an obligation to take steps
that may be necessary to ensure
effective communication with
individuals with disabilities, which
could include making the notice
available in alternate formats, such as
Braille, large print, or audio.
PO 00000
Frm 00012
Fmt 4701
Sfmt 4700
Methods of Notification
Section 13402(e)(1) of the Act
provides for both actual written notice
to the individual, as well as substitute
notice to the individual if contact
information is insufficient or out-ofdate. Accordingly, the interim final rule
at § 164.404(d) adopts the statutory
provisions for actual and substitute
breach notification to the individual.
Section 164.404(d)(1)(i) requires a
covered entity to provide breach notice
to the individual in written form by
first-class mail at the last known address
of the individual. Consistent with the
statute, the interim final rule also
provides that written notice may be in
the form of electronic mail, provided the
individual agrees to receive electronic
notice and such agreement has not been
withdrawn. We note that, consistent
with § 164.502(g) of the Privacy Rule,
where the individual affected by a
breach is a minor or otherwise lacks
legal capacity due to a physical or
mental condition, notice to the parent or
other person who is the personal
representative of the individual will
satisfy the requirements of
§ 164.404(d)(1). The statute also requires
that, if the individual is deceased,
notice must be sent to the last known
address of the next of kin. The interim
final rule adopts this provision at
§ 164.404(d)(1)(ii), but provides that
such notice be sent to either the
individual’s next of kin or personal
representative, as such term is used for
purposes of the Privacy Rule,
recognizing that in some cases, a
covered entity may have contact
information for a personal
representative of a deceased individual
rather than the next of kin. We believe
this conforms to the intent of the statute
and improves consistency between this
subpart and the Privacy Rule. Under 45
CFR 164.502(g), a ‘‘personal
representative’’ of a deceased individual
is a person who has authority to act on
behalf of the decedent or the decedent’s
estate. The interim final rule also
clarifies that a covered entity is only
required to provide notice to next of kin
or the personal representative if the
covered entity both knows the
individual is deceased and has the
address of the next of kin or personal
representative of the decedent. This
clarification should address some of the
comments which raised both
administrative and privacy concerns
with a covered entity being required to
obtain contact information for next of
kin of a deceased patient, if the
individual did not otherwise provide
the information while alive.
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
If a covered entity does not have
sufficient contact information for some
or all of the affected individuals, or if
some notices are returned as
undeliverable, the covered entity must
provide substitute notice for the
unreachable individuals in accordance
with § 164.404(d)(2) of the interim final
rule. Substitute notice should be
provided as soon as reasonably possible
after the covered entity is aware that it
has insufficient or out-of-date contact
information for one or more affected
individuals. Whatever form of substitute
notice is provided, the notice must
contain all the elements that
§ 164.404(c) requires be included in the
direct written notice to individuals.
With respect to decedents, however, the
rule provides that a covered entity is not
required to provide substitute notice for
the next of kin or personal
representative in cases where the
covered entity either does not have
contact information or has out-of-date
contact information for the next of kin
or personal representative.
Section 164.404(d)(2) requires that the
substitute form of notice be reasonably
calculated to reach the individuals for
whom it is being provided. If there are
fewer than 10 individuals for whom the
covered entity has insufficient or out-ofdate contact information to provide the
written notice, § 164.404(d)(2)(i) permits
the covered entity to provide substitute
notice to such individuals through an
alternative form of written notice, by
telephone, or other means. For example,
if the covered entity learns that the
home address it has for one of its
patients is out-of-date but it has the
patient’s e-mail address, it may provide
substitute notice by e-mail even if the
patient has not agreed to electronic
notice. Similarly, in the above example,
if the covered entity has a current
telephone number rather than e-mail
address for the patient, then the covered
entity may telephone the patient and
provide the information required by the
notice over the phone. We note,
however, that the covered entity should
be sensitive to not unnecessarily
disclose protected health information in
the process of providing substitute
notice, such as where the covered entity
leaves an answering machine message
that could be picked up by other
household members. In such cases, the
covered entity should take care to limit
the amount of information disclosed on
an answering machine message, such as,
for example, by leaving only its name
and number and indicating it has a very
important message for the individual.
Alternatively, posting a notice on the
Web site of the covered entity or at
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
another location may be appropriate if
the covered entity lacks any current
contact information for the patients, so
long as the posting is done in a manner
that is reasonably calculated to reach
the individuals.
If a covered entity has insufficient or
out-of-date contact information for 10 or
more individuals, then
§ 164.404(d)(2)(ii) requires the covered
entity to provide substitute notice
through either a conspicuous posting for
a period of 90 days on the home page
of its Web site or conspicuous notice in
major print or broadcast media in
geographic areas where the individuals
affected by the breach likely reside. As
described above, these substitute
notifications must be provided in a
manner that is reasonably calculated to
reach the affected individuals. In
addition, substitute notice through the
Web site or media for 10 or more
individuals requires the covered entity
to have a toll-free phone number, active
for 90 days, where an individual can
learn whether the individual’s
unsecured protected health information
may be included in the breach and to
include the number in the notice.
If the covered entity chooses to
provide substitute notice on the home
page of its Web site, the notice must be
conspicuous and posted for at least 90
days. A covered entity may provide all
the information described at
§ 164.404(c) directly on its home page or
may provide a hyperlink to the notice
containing such information. We
interpret ‘‘home page’’ to include the
home page for visitors to the covered
entity’s Web site and the landing page
or login page for existing account
holders. If a covered entity uses a
hyperlink on the home page to convey
the substitute notice, the hyperlink
should be prominent so that it is
noticeable given its size, color, and
graphic treatment in relation to other
parts of the page, and it should be
worded to convey the nature and
importance of the information to which
it leads.
Alternatively, or if the covered entity
does not have or does not wish to use
a Web site for the substitute notice, the
covered entity may provide substitute
notice of the breach in major print or
broadcast media in geographic areas
where the individuals affected by the
breach likely reside. What constitutes
major print or broadcast media for a
particular area will depend on the
geographic area where the affected
individuals are likely to reside and what
is reasonably calculated to reach the
affected individuals. We emphasize that
what is considered major print or
broadcast media for a metropolitan area
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
42751
may be very different from what is
considered major print or broadcast
media in a rural area. For example, if
the affected individuals are reasonably
likely to reside in a rural area, then a
local newspaper could be the major
newspaper serving that area and most
likely to reach the individuals affected.
For affected individuals in a
metropolitan area, then a newspaper
serving the entire metropolitan area or
the entire State would be more likely to
reach the individuals affected. If the
affected individuals likely reside in
different regions or States, then the
covered entity may need to utilize
multiple media outlets to reasonably
reach these individuals.
Also, we clarify in this interim final
rule that any notice in print or broadcast
media under this section must be
conspicuous, similar to the posting on
the Web site. Thus, for example, for
notice in print media, thought should be
given to what location and duration of
the notice is reasonably calculated to
reach the affected individuals.
Some commenters were concerned
that providing substitute notice in major
media would be costly and onerous.
Covered entities that are concerned with
the cost of providing substitute notice in
this manner have the option of instead
posting the substitute notice on their
Web sites. For smaller covered entities
that do not have Web sites, we would
expect those covered entities generally
serve a patient population located in a
relatively compact and discrete area. In
such cases, the geographic area in which
the affected individuals reside would be
comparably small, and, therefore, we do
not believe that providing substitute
notice in the appropriate local
newspaper or television station would
be excessively costly or onerous.
Finally, we note that covered entities
with out-of-date or insufficient contact
information for some individuals can
attempt to update the contact
information so that they can provide
direct written notification, in order to
limit the number of individuals for
whom substitute notice is required and,
thus, potentially avoid the obligation to
provide substitute notice through a Web
site or major print or broadcast media
under § 164.404(d)(2)(ii).
Other commenters were concerned
that the requirement to include a tollfree phone number in the substitute
media notice would overly burden a
covered entity with calls from
individuals unaffected by the breach.
We note that the statute requires that
covered entities include a toll-free
phone number in cases where substitute
notice is required for 10 or more
individuals. Covered entities concerned
E:\FR\FM\24AUR2.SGM
24AUR2
42752
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
with the number of calls they may
receive from unaffected individuals may
wish to include sufficient information
in the notice itself or a Web address in
the notice for more information (or other
means) as a way for individuals to
determine whether their information
may have been included in the breach.
erowe on DSK5CLS3C1PROD with RULES_2
Additional Notice in Urgent Situations
Finally, § 164.404(d)(3) of the interim
final rule implements the provision in
the statute at section 13402(e)(1)(c),
which makes clear that notice by
telephone or other means may be made,
in addition to written notice, in cases
deemed by the covered entity to require
urgency because of possible imminent
misuse of unsecured protected health
information. We emphasize, however,
that such notice, if utilized, is in
addition to, and not in lieu of, the direct
written notice required by
§ 164.404(d)(1).
D. Notification to the Media—164.406
Section 164.406 implements section
13402(e)(2) of the Act, which requires
that notice be provided to prominent
media outlets serving a State or
jurisdiction, following the discovery of
a breach if the unsecured protected
health information of more than 500
residents of such State or jurisdiction is,
or is reasonably believed to have been,
accessed, acquired, or disclosed during
such breach. This media notice differs
from the substitute media notice
described in § 164.404(d)(1)(2) in that it
is directed ‘‘to’’ the media and is
intended to supplement, but not
substitute for, individual notice. The
Act requires that notification to the
media under this provision be provided
within the same timeframe as notice is
to be provided to the individual. See
section 13402(d)(1) of the Act.
Accordingly, § 164.406(b) of the interim
final rule requires a covered entity to
notify prominent media outlets without
unreasonable delay and in no case later
than 60 calendar days after discovery of
the breach. In paragraph (c) of this
section, we require that notification to
the media under this provision include
the same information required to be
included in the notification to the
individual under § 164.404(c). We
expect that most covered entities will
provide notification to the media under
this section in the form of a press
release.
Commenters asked that we define
what constitutes a ‘‘prominent media
outlet.’’ We do not define ‘‘prominent
media outlet’’ in this regulation because
what constitutes a prominent media
outlet will differ depending upon the
State or jurisdiction affected. For
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
example, for a breach affecting 500 or
more individuals across a particular
state, a prominent media outlet may be
a major, general-interest newspaper
with a daily circulation throughout the
entire state. In contrast, a newspaper
serving only one town and distributed
on a monthly basis, or a daily
newspaper of specialized interest (such
as sport, politics) would not be viewed
as a prominent media outlet. If a breach
affects 500 or more individuals in a
limited jurisdiction, such as a city, then
a prominent media outlet may be a
major, general-interest newspaper with
daily circulation throughout the city,
even though the newspaper does not
serve the whole State.
Commenters also asked HHS to clarify
what is meant by ‘‘State or jurisdiction’’
for purposes of notice to the media
under this provision. We note that
‘‘State’’ is already defined at § 160.103
of the HIPAA Rules to mean ‘‘any of the
several States, the District of Columbia,
the Commonwealth of Puerto Rico, the
Virgin Islands, and Guam.’’ That
definition applies to this new provision.
We also note that the Act includes a
definition of ‘‘State’’ which applies for
purposes of this provision and defines
‘‘State’’ to include, in addition to what
is included at § 160.103, American
Samoa and the Northern Mariana
Islands. Thus, we provide at
§ 164.406(a) that, for purposes of this
provision, ‘‘State’’ also includes
American Samoa and the Northern
Mariana Islands. With respect to
jurisdiction, we clarify that, for
purposes of this provision, jurisdiction
is a geographic area smaller than a state,
such as a county, city, or town.
To illustrate how these provisions
apply, we provide the following
example. If laptops containing the
unsecured protected health information
of more than 500 residents of a
particular city were stolen from a
covered entity, notification under this
section should be provided to
prominent media outlets serving that
city. In this case, the prominent media
outlet may be a major television station
or newspaper (or other media outlet)
serving primarily the residents of that
city or a prominent media outlet serving
the entire state. Alternatively, for a
breach involving 500 or more residents
across a State and not within any one
particular county or city of the State, the
prominent media outlet chosen must
serve the entire State.
In response to comments received, we
also offer clarification on how to
address a breach involving residents in
multiple States or jurisdictions. For
example, if a covered entity discovers a
breach of 600 individuals, 200 of which
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
reside in Virginia, 200 of which reside
in Maryland, and 200 of which reside in
the District of Columbia, such a breach
did not affect more than 500 residents
of any one State or jurisdiction, and as
such, notification is not required to be
provided to the media pursuant to
§ 164.406. However, individual
notification under § 164.404 would be
required, as would notification to the
Secretary under § 164.408 because the
breach involved 500 or more
individuals. Conversely, if a covered
entity discovered a breach of unsecured
protected health information involving
600 residents within the state of
Maryland and 600 residents of the
District of Columbia, notification must
be provided to a prominent media outlet
serving the state of Maryland and to a
prominent media outlet serving the
District of Columbia.
We also recognize that in some cases
a breach may occur at a business
associate and involve the protected
health information of multiple covered
entities. In that case, a covered entity
involved would only be required to
provide notification to the media if the
information breached included the
protected health information of 500 or
more individuals located in any one
State or jurisdiction. For example, if a
business associate discovers a breach
affecting 800 individuals, the business
associate must notify the appropriate
covered entity (or covered entities)
subject to § 164.410 (discussed below).
If 450 of the affected individuals are
patients of one covered entity and the
remaining 350 are patients of another
covered entity, because the breach has
not affected more than 500 individuals
at either covered entity, there is no
obligation to provide notification to the
media under this section. Additionally,
neither covered entity has the obligation
of notifying the Secretary under
§ 164.408(b) concurrently with notice to
the affected individuals; however, both
covered entities must include this
breach in their annual submission to the
Secretary pursuant to § 164.408(c). In
cases where the entities involved are
unable to determine which entity’s
protected health information was
involved, the covered entities may
consider having the business associate
provide the notification to the media on
behalf of all of the covered entities.
Section 164.406(c) sets forth the
content requirement for covered entities
notifying the media. In this section, we
require that the notice to the media
include the same content as that
required for notification to the
individual under § 164.404(c). We
emphasize that this provision does not
replace either direct written or
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
erowe on DSK5CLS3C1PROD with RULES_2
substitute notice to the individual under
§ 164.404. If a covered entity is required
to provide substitute notice under
§ 164.404(d)(2)(ii)(A) and chooses to do
so through major print or broadcast
media, notification to the media under
this section would only satisfy such
substitute notice if the prominent media
outlet ran a notification reasonably
calculated to reach the individuals for
which substitute notice was required
and included all the information
required be provided in the individual
notice, including the toll-free number
required by § 164.404(d)(2)(ii)(B).
E. Notification to the Secretary—
164.408
Section 164.408 of the interim final
rule implements section 13402(e)(3) of
the Act, which requires covered entities
to notify the Secretary of breaches of
unsecured protected health information.
For breaches involving 500 or more
individuals, the Act requires covered
entities to notify the Secretary
immediately. For breaches involving
less than 500 individuals, the Act
provides that a covered entity may
maintain a log of such breaches and
annually submit such log to the
Secretary documenting the breaches
occurring during the year involved.
Section 164.408(a) of the interim final
rule contains the general rule that
requires a covered entity to notify the
Secretary following the discovery of a
breach of unsecured protected health
information. Section 164.408(b)
provides the implementation
specification for breaches involving 500
or more individuals. Section 164.408(c)
provides the implementation
specification for breaches involving
fewer than 500 individuals.
With respect to breaches involving
500 or more individuals, we interpret
the term ‘‘immediately’’ in the statute to
require notification be sent to the
Secretary in the case of these larger
breaches concurrently with the
notification sent to the individual under
§ 164.404, which must be sent without
unreasonable delay but in no case later
than 60 calendar days following
discovery of a breach. Many
commenters were concerned that
covered entities would be required to
provide notification to the Secretary in
a much shorter time frame than the
other notifications required by the Act,
making it difficult for covered entities to
comply. This interpretation thus allows
the notice to the Secretary to include all
of the information provided in the
notice to the individual and better
avoids the situation where a covered
entity reports information to the
Secretary that later turns out to be
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
incorrect because the entity did not
have sufficient time to conduct an
investigation into the facts surrounding
the breach. In addition, this
interpretation satisfies the statutory
requirement that notifications of larger
breaches be provided to the Secretary
immediately as compared to the reports
of smaller breaches the statute allows be
reported annually to the Secretary. The
interim final rule also provides that the
notification be provided in a manner to
be specified on the HHS Web site. The
Department will post instructions on its
Web site for submitting both this
notification as well as the annual
notification described below. In
addition, as required by section
13402(e)(4) of the Act, the Secretary will
post on the HHS Web site a list of
covered entities that submit reports of
breaches of unsecured protected health
information involving more than 500
individuals.
Covered entities must notify the
Secretary of discovered breaches
involving more than 500 individuals
generally, without regard to whether the
breach involved more than 500
residents of a particular State or
jurisdiction (the threshold for triggering
notification to the media under
§ 164.406 of the interim final rule).
Thus, where a covered entity has
discovered a breach of 600 individuals,
300 of which reside in Maryland and
300 of which reside in the District of
Columbia, notification of the breach
must be provided to the Secretary
concurrently with notification to the
affected individuals. However, the
breach in this example would not trigger
the requirement to notify the media
under § 164.406 because the breach did
not involve more than 500 residents of
any one State or jurisdiction.
For breaches involving less than 500
individuals, § 164.408(c) requires a
covered entity to maintain a log or other
documentation of such breaches and to
submit information annually to the
Secretary for breaches occurring during
the preceding calendar year. As
recommended by several commenters,
we have designated a date for
submission of the information to the
Secretary. The interim final rule
requires the submission of this
information to the Secretary no later
than 60 days after the end of each
calendar year. As with notification of
the larger breaches above, the interim
final rule provides that information
about breaches involving less than 500
individuals is to be provided to the
Secretary in the manner specified on the
HHS Web site. HHS will specify on its
Web site the information to be
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
42753
submitted and how to submit such
information.
For calendar year 2009, the covered
entity is only required to submit
information to the Secretary for
breaches occurring after the effective
date of this regulation, i.e., on or after
September 23, 2009. Information about
breaches occurring prior to that date
need not be submitted. This is because,
pursuant to § 164.400, this subpart only
applies to breaches occurring on or after
that date.
We emphasize that although covered
entities need only provide notification
to the Secretary of breaches involving
less than 500 individuals annually, they
must still provide notification of such
breaches to affected individuals without
unreasonable delay and not later than
60 days after discovery of the breach
pursuant to § 164.404. In addition, we
note that pursuant to § 164.414(a), a
covered entity must follow the
documentation requirements that
otherwise apply to the HIPAA Privacy
Rule under § 164.530 with respect to the
requirements of this rule. Thus,
pursuant to § 164.530(j)(2), covered
entities must maintain the internal log
or other documentation for six years.
Further, as with other required
documentation, a covered entity must
make such information available to the
Secretary upon request in accordance
with § 160.310.
F. Notification by a Business
Associate—164.410
Section 13402(b) of the Act requires a
business associate of a covered entity
that accesses, maintains, retains,
modifies, records, destroys, or otherwise
holds, uses, or discloses unsecured
protected health information to notify
the covered entity when it discovers a
breach of such information. Section
164.410(a) implements section 13402(b)
of the Act, but does not include the
terms ‘‘that accesses, maintains, retains,
modifies, records, stores, destroys, or
otherwise holds, uses, or discloses’’
used in the statute to describe a
business associate’s actions with respect
to unsecured protected health
information because inclusion of such
terms was deemed unnecessary.
Thus, following the discovery of a
breach of unsecured protected health
information, a business associate is
required to notify the covered entity of
the breach so that the covered entity can
notify affected individuals. We clarify
that a business associate that maintains
the protected health information of
multiple covered entities need notify
only the covered entity(s) to which the
breached information relates. However,
in cases in which a breach involves the
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
42754
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
unsecured protected health information
of multiple covered entities and it is
unclear to whom the breached
information relates, it may be necessary
to notify all potential affected covered
entities.
We received several comments in
support of adding a provision to require
business associates to provide notice to
a senior official or privacy official at the
covered entity. We do not believe such
a provision is necessary, however.
Covered entities and business associates
already have established business
relationships and communication
channels, including with respect to
privacy and security matters. For
example, the HIPAA Rules already
require a business associate contract to
provide that the business associate
report to the covered entity uses or
disclosures not provided by the contract
as well as security incidents of which
the business associate becomes aware.
See 45 CFR 164.504(e)(2)(ii)(C) and
164.314(a)(2)(i)(C). Thus, we believe it is
appropriate to leave it up to covered
entities and business associates to
determine how the required reporting
should be implemented.
Section 164.410(a)(2) implements
section 13402(c) of the Act, which
provides when a breach is to be treated
as discovered by the business associate.
Accordingly, § 164.410(a)(2) states that a
breach shall be treated as discovered by
a business associate as of the first day
on which such breach is known to the
business associate or, by exercising
reasonable diligence, would have been
known to the business associate. Section
164.410(a)(2) further provides that a
business associate shall be deemed to
have knowledge of a breach if the
breach is known, or by exercising
reasonable diligence would have been
known, to any person, other than the
person committing the breach, who is
an employee, officer, or other agent of
the business associate (determined in
accordance with the federal common
law of agency). As with § 164.404(a)(2)
with respect to a covered entity’s
knowledge of a breach, we clarify in this
provision that the federal common law
of agency is to control in determining
who is an agent of the covered entity.
This approach is consistent with the
HIPAA Enforcement Rule (45 CFR part
160, subparts C through E), which
provides that the federal common law of
agency applies in determining agency
liability under the HIPAA Rules. Also,
as with § 164.404(a)(2), we have
modified the statutory language slightly
to better conform to existing language in
the HIPAA Enforcement Rule at 45 CFR
160.410, by incorporating the term
‘‘reasonable diligence.’’ We have made
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
these clarifications for consistency and
uniformity across the regulations.
Section 164.410(b) implements
section 13402(d)(1) of the Act and
provides that, with the exception
provided in § 164.412, a business
associate must provide notice of a
breach of unsecured protected health
information to a covered entity without
unreasonable delay and in no case later
than 60 days following the discovery of
a breach. With respect to breaches at the
business associate, the covered entity
must provide the required notifications
to affected individuals under
§ 164.404(a) without unreasonable
delay, but no later than 60 days.
If a business associate is acting as an
agent of a covered entity, then, pursuant
to § 164.404(a)(2), the business
associate’s discovery of the breach will
be imputed to the covered entity.
Accordingly, in such circumstances, the
covered entity must provide
notifications under § 164.404(a) based
on the time the business associate
discovers the breach, not from the time
the business associate notifies the
covered entity. In contrast, if the
business associate is an independent
contractor of the covered entity (i.e., not
an agent), then the covered entity must
provide notification based on the time
the business associate notifies the
covered entity of the breach. As
reflected in the comments we received
in response to the timing of business
associate notification to a covered entity
following a breach, covered entities may
wish to address the timing of the
notification in their business associate
contracts.
Section 164.410(c) implements the
second sentence of section 13402(b) of
the Act, which specifies the information
that a business associate must provide
to a covered entity following a breach of
unsecured protected health information.
Section 164.410(c)(1) requires business
associates, to the extent possible, to
provide covered entities with the
identity of each individual whose
unsecured protected health information
has been, or is reasonably believed to
have been, breached. Depending on the
circumstances, business associates may
provide the covered entity with
immediate notification of the breach, as
discussed above and then follow up
with the required information in
§ 164.410(c) when available but without
unreasonable delay and within 60 days.
Section 164.410(c)(1) departs slightly
from the statutory language by only
requiring business associates to provide
this information ‘‘to the extent
possible.’’ Based on some comments
received, we recognize that there may be
situations in which a business associate
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
may be unaware of the identification of
the individuals whose unsecured
protected health information was
breached. For example, a business
associate that is a record storage
company holds hundreds of boxes of
paper medical records on behalf of a
covered entity. The business associate
discovers that several boxes are missing
and is unable to provide the covered
entity with a list of the individuals
whose information has been breached. It
is not our intent that the business
associate delay notification of the
breach to the covered entity, when the
covered entity may be better able to
identify the individuals affected.
Further, we recognize that, depending
on the circumstances surrounding a
breach of unsecured protected health
information, a business associate may be
in the best position to gather the
information the covered entity is
required by § 164.404(c) to include in
the notification to the individual about
the breach. Thus, in addition to the
identification of affected individuals,
§ 164.410(c)(2) requires a business
associate to provide the covered entity
with any other available information
that the covered entity is required to
include in the notification to the
individual under § 164.404(c), either at
the time it provides notice to the
covered entity of the breach or promptly
thereafter as information becomes
available. Because we allow this
information to be provided to a covered
entity after the initial notification of the
breach as it becomes available, a
business associate should not delay the
initial notification to the covered entity
of the breach in order to collect
information needed for the notification
to the individual. To ensure the covered
entity is aware of all the available facts
surrounding a breach, we also note that
a business associate should provide this
information even if it becomes available
after notifications have been sent to
affected individuals or after the 60-day
period specified in § 164.410(b) has
elapsed.
In response to a significant number of
commenters who expressed concern
that this requirement would prevent
covered entities and their business
associates from addressing these issues
in their business associate contracts, we
emphasize that we do not intend for this
section to interfere with the current
relationship between covered entities
and their business associates. Business
associates and covered entities will
continue to have the flexibility to set
forth specific obligations for each party,
such as who will provide notice to
individuals and when the notification
from the business associate to the
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
erowe on DSK5CLS3C1PROD with RULES_2
covered entity will be required,
following a breach of unsecured
protected health information, so long as
all required notifications are provided
and the other requirements of the
interim final rule are met. We encourage
the parties to consider which entity is
in the best position to provide notice to
the individual, which may depend on
circumstances, such as the functions the
business associate performs on behalf of
the covered entity and which entity has
the relationship with the individual. We
also encourage the parties to ensure the
individual does not receive notifications
from both the covered entity and the
business associate about the same
breach, which may be confusing to the
individual.
Finally, we note that where an entity
provides PHRs to customers of a HIPAA
covered entity through a business
associate arrangement but also provides
PHRs directly to the public and a breach
of its records occurs, in certain cases, as
described in its rule, the FTC will deem
compliance with certain provisions of
HHS’ rule as compliance with FTC’s
rule. In particular, in such situations, it
may be appropriate for the vendor to
provide the same breach notice to all its
PHR customers since it has a direct
relationship with all the affected
individuals. Thus, in those limited
circumstances where a vendor of PHRs
(1) provides notice to individuals on
behalf of a HIPAA covered entity, (2)
has dealt directly with these individuals
in managing their personal health
record accounts, and (3) provides notice
to its customers at the same time, the
FTC will deem compliance with HHS
requirements governing the timing,
method, and content of notice to be
compliance with the corresponding FTC
rule provisions.11
G. Law Enforcement Delay—164.412
Section 13402(g) of the Act provides
that if a law enforcement official
determines that a notification, notice, or
posting required under this section
would impede a criminal investigation
or cause damage to national security,
such notification, notice, or posting
shall be delayed in the same manner as
provided under 45 CFR 164.528(a)(2) of
the Privacy Rule in the case of a
disclosure covered under such section.
Section 164.412 implements section
13402(g) of the Act and thus, requires a
covered entity or business associate to
temporarily delay notification under
11 We note, however, that with respect to the
customers to whom it provides PHRs directly, the
vendor must comply with all other FTC rule
requirements, including the requirement to notify
the FTC within ten business days after discovering
the breach.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
§§ 164.404, 164.406, 164.408, and
164.410 if instructed to do so by a law
enforcement official.
We retain the definition of ‘‘law
enforcement official’’ currently used in
the Privacy Rule at § 164.501, which
defines such person as ‘‘an officer or
employee of any state agency or
authority of the United States, a State,
a territory, a political subdivision of a
State or territory, or an Indian tribe, who
is empowered by law to: (1) Investigate
or conduct an official inquiry into a
potential violation of law; or (2)
prosecute or otherwise conduct a
criminal, civil, or administrative
proceeding arising from an alleged
violation of law.’’ However, in this
interim final rule, we move the
definition up to § 164.103 so that it will
apply to this subpart D as well as
continue to apply to subpart E (Privacy
Rule).
Section 164.412(a), which is based on
the requirements of 45 CFR
164.528(a)(2)(i) of the Privacy Rule,
provides for a temporary delay of
notification in situations in which a law
enforcement official provides a
statement in writing that the delay is
necessary because notification would
impede a criminal investigation or cause
damage to national security, and
specifies the time for which a delay is
required. In these instances, the covered
entity is required to delay the
notification, notice, or posting for the
time period specified by the official.
Similarly, § 164.412(b), which is
based on 45 CFR 164.528(a)(2)(ii) of the
Privacy Rule, requires a covered entity
or business associate to temporarily
delay a notification, notice, or posting if
a law enforcement official states orally
that a notification would impede a
criminal investigation or cause damage
to national security. However, in this
case, the covered entity or business
associate is required to document the
statement and the identity of the official
and delay notification for no longer than
30 days, unless a written statement
meeting the above requirements is
provided during that time. We interpret
these provisions as tolling the time
within which notification is required
under §§ 164.404, 164.406, 164.408, and
164.410, as applicable.
H. Administrative Requirements and
Burden of Proof—164.414
Section 164.414(a) requires covered
entities to comply with the
administrative requirements of
§ 164.530(b), (d), (e), (g), (h), (i), and (j)
of the Privacy Rule with respect to the
breach notification provisions of this
subpart. These provisions, for example,
require covered entities and business
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
42755
associates to develop and document
policies and procedures, train workforce
members on and have sanctions for
failure to comply with these policies
and procedures, permit individuals to
file complaints regarding these policies
and procedures or a failure to comply
with them, and require covered entities
to refrain from intimidating or
retaliatory acts. Thus, a covered entity is
required to consider and incorporate the
requirements of this subpart with
respect to its administrative compliance
and other obligations. In addition to
§ 164.414(a), to make clear that these
provisions apply to this subpart as well
as subpart E, we have made conforming
modifications in each of the above
sections of the Privacy Rule to include
a reference to this subpart D.
Consistent with section 13402(d)(2) of
the Act, § 164.414(b) provides that,
following an impermissible use or
disclosure under the Privacy Rule,
covered entities and business associates
have the burden of demonstrating that
all notifications were made as required
by this subpart. Additionally, as part of
demonstrating that all required
notifications were made, we clarify in
the regulatory text that a covered entity
or business associate, as applicable, also
must be able to demonstrate that an
impermissible use or disclosure did not
constitute a breach, as such term is
defined at § 164.402, in cases where the
covered entity or business associate
determined that notifications were not
required. We also make conforming
changes to § 160.534 of the HIPAA
Enforcement Rule to make clear that,
during any administrative hearing, the
covered entity has the burden of going
forward and the burden of persuasion
with respect to these issues.
Thus, when a covered entity or
business associate knows of an
impermissible use or disclosure of
protected health information, it should
maintain documentation that all
required notifications were made, or,
alternatively, of its risk assessment
(discussed above in § 164.402) or the
application of any exceptions to the
definition of ‘‘breach’’ to demonstrate
that notification was not required.
I. Other Conforming Changes to the
HIPAA Rules
In addition to the conforming
modifications discussed above, we make
the following changes to align the
HIPAA Rules in light of the new breach
notification requirements of this rule.
First, we revise the statutory basis and
purpose sections at §§ 160.101 and
164.102 to include references to section
13402 of the Act. Second, in Part 160,
for purposes of the preemption of State
E:\FR\FM\24AUR2.SGM
24AUR2
42756
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
erowe on DSK5CLS3C1PROD with RULES_2
law, we amend § 160.202 to revise the
definition of ‘‘contrary’’ to include a
reference to section 13402 of the Act.
(See below for a discussion of
preemption and these new
requirements.) Finally, in Part 164,
subpart C, which contains the HIPAA
Security Rule requirements, we revise
the definition of ‘‘access’’ in § 164.304
to make clear that the definition does
not apply to any use of the term in
subpart D.
J. Preemption
We received several public comments
regarding the issue of preemption and
the interaction between this regulation
and state breach notification laws.
HIPAA (Pub. L. 104–191) added section
1178 of the Social Security Act, 42
U.S.C. 1320d–7, which sets forth the
general effect of the HIPAA provisions
on State law. Section 1178 provides that
HIPAA administrative simplification
provisions generally preempt conflicting
State law. This section of the statute is
implemented by 45 CFR 160.203, which
states that a standard, requirement, or
implementation specification that is
adopted as regulation at 45 CFR parts
160, 162, or 164 and that is ‘‘contrary to
a provision of State law preempts the
provision of State law.’’ Section 160.203
provides several exceptions in which
State law will not be preempted;
however, we do not believe these
exceptions apply to the breach
notification regulations in 45 CFR part
164 subpart D.12 Therefore, contrary
State law will be preempted by these
breach notification regulations. We
solicit comment in this area.
Whether a State law is contrary to
these breach notification regulations is
to be determined based on the definition
of ‘‘contrary’’ at § 160.202. A State law
is contrary if ‘‘a covered entity could
find it impossible to comply with both
the State and federal requirements’’ or if
the State law ‘‘stands as an obstacle to
the accomplishment and execution of
the full purposes and objectives’’ of the
breach notification provisions in the
Act. As discussed above, we make a
conforming change to paragraph (2) of
the definition of ‘‘contrary’’ in this
section to incorporate reference to the
breach notification provisions at section
13402 of the Act. Therefore, covered
entities will need to analyze relevant
State laws with respect to this
regulation to understand the interaction
12 We do not interpret the preemption exception
at § 160.203(b), which addresses more stringent
State law related to privacy, as applying to these
breach notification provisions because that
paragraph only applies to the provisions of the
Privacy Rule promulgated under section 264(c) of
the HIPAA statute. See section 264(c)(2) of HIPAA.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
and apply this preemption standard
appropriately.
Although we received many
comments concerning perceived
conflicts between the interaction of
State laws and these breach notification
provisions, based on the ‘‘contrary’’
standard for preemption, in general we
believe that covered entities can comply
with both the applicable State laws and
this regulation. In addition, based on the
comments received, we believe that, in
most cases, a single notification can
satisfy the notification requirements
under State laws and this regulation.
For example, if a state breach
notification law requires notification to
be sent to the individual within five
days following the detection of a breach,
a covered entity that sends that notice
within five days to comply with State
law will also be in compliance with this
regulation, as the covered entity must
send the notification ‘‘without
unreasonable delay and in no case later
than 60 calendar days after the
discovery of a breach.’’ If covered
entities do not have all the information
required by this regulation available to
them within five days, they may send
the individual an additional notification
when they have accumulated the
appropriate information.
Likewise, if a State law requires a
breach notification but requires
additional elements be included in the
notice, or requires that certain elements
be described in a certain way, there is
no conflict between the State law and
this regulation. As the Act and interim
final rule are flexible in terms of how
the elements are to be described, and do
not prohibit additional elements from
being included in the notice, covered
entities can develop a notice that
satisfies both laws.
K. Effective/Compliance Date
Section 13402(j) of the Act states that
section 13402 applies to breaches that
are discovered by a covered entity or
business associate on or after 30
calendar days from the date of
publication of this interim final rule.
Commenters expressed concern that this
effective date did not allow enough time
for covered entities to implement the
guidance for rendering protected health
information unusable, unreadable, or
indecipherable to unauthorized
individuals or have systems in place to
comply with the requirements of the
rule and suggested that compliance with
these breach notification provisions not
be required in 30 days.
In response, we note that the guidance
on securing protected health
information is not mandatory; it is
discretionary. Accordingly, a covered
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
entity or business associate will not be
out of compliance with this subpart if,
after the date set forth at § 164.400, the
entity maintains unsecured protected
health information. We recognize,
though, that many covered entities and
business associates are voluntarily
choosing to secure their protected
health information in accordance with
the guidance in order to avoid the
possibility of having to provide breach
notifications pursuant to this subpart.
We encourage covered entities and
business associates to take such an
approach—securing their protected
health information—and understand
that the process may take more than 30
days from the publication of this interim
final rule.
We also recognize that it will take
covered entities and business associates
time to implement the processes and
procedures necessary to comply with
this subpart. For example, once
compliance with this subpart is
required, a covered entity or business
associate will be held accountable for
breaches that, through the exercise of
reasonable diligence, would have been
known to the entity. This means that a
covered entity or business associate
must have reasonable systems in place
to detect breaches. Putting such systems
in place may take some time.
On the other hand, the majority of
states already have breach notification
laws in place. While this interim final
rule differs from any such State laws,
we believe that most covered entities or
business associates should already have
some form of breach notification
procedures in place. Those covered
entities and business associates should
be able to build upon such existing
procedures in order to come into
compliance with this interim final rule.
We have decided that, consistent with
section 13402(j) of the Act, the
provisions of this subpart are effective,
and compliance is required, for breaches
occurring on or after 30 calendar days
from the publication of this rule.
However, based on the concerns
described above, and based on some
ambiguity within the statute,13 we will
13 While section 13402(j) of the HITECH Act
provides that section 13402 becomes effective 30
calendar days after publication of this interim final
rule, it is section 13410(a)(2) that provides the
Department with authority to impose civil money
penalties, pursuant to § 1176 of the Social Security
Act (42 U.S.C. 1320d–5), on violations by covered
entities of the requirements imposed by the
HITECH Act, including those of section 13402.
Moreover, authority to impose civil money
penalties on business associates for violations of the
HITECH Act is provided by sections 13401(b) and
13404(c). Sections 13410(a)(2), 13401(b), and
13404(c) do not become effective until February 18,
2010 (see section 13423 of the Act). Thus, there is
a statutory ambiguity due to the HITECH Act
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
use our enforcement discretion to not
impose sanctions for failure to provide
the required notifications for breaches
that are discovered before 180 calendar
days from the publication of this rule,
or February 22, 2010. During this initial
time period—after this rule has taken
effect but before we are imposing
sanctions—we expect covered entities to
comply with this subpart and will work
with covered entities, through technical
assistance and voluntary corrective
action, to achieve compliance.
erowe on DSK5CLS3C1PROD with RULES_2
V. Impact Statement and Other
Required Analyses
A. Introduction
Section 13402 of the Act prescribes in
specific terms the obligations and
responsibilities on HIPAA covered
entities to notify an affected individual
when a breach of his or her unsecured
protected health information occurs, to
notify the Secretary, to notify the media
in certain circumstances, and for
business associates to notify covered
entities of such breaches. In most
instances, the interim final regulation
adheres and conforms to the language of
the statute in defining terms and in
prescribing remedies. The rule tracks
the language of the statute with regard
to the actions covered entities must take
to notify an affected individual when a
reportable breach occurs, the time frame
in which the covered entity must act,
the mode of communicating with an
affected individual and the content of
the notice.
The prescriptive language of the
statute leaves little discretion for the
Secretary in how to implement the
statute. Measures we have taken to
modify the statutory language are
minimal and were undertaken to make
certain terms used in the statute
conform to other parts of the HIPAA
Rules. We also clarify when a breach of
protected health information
compromises the security or privacy of
such information. Yet, because the
statutory language is so detailed and
specific as to the requirements and
definitions placed on covered entities,
and because we have endeavored to
follow the statutory language as closely
as possible, we believe that, in large
measure, the economic burden imposed
on covered entities results from the
statute and not from the interim final
regulation.
We have examined the impacts of this
rule as required by Executive Order
12866 on Regulatory Planning and
providing an effective date of 30 days from
publication of this rule, but a later date for when
the Department may impose civil money penalties
for violations of section 13402.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
Review (September 30, 1993, as further
amended), the Regulatory Flexibility
Act (RFA) (5 U.S.C. 601 et seq.), section
202 of the Unfunded Mandates Reform
Act of 1995 (2 U.S.C. 1532), Executive
Order 13132 on Federalism (August 4,
1999), and the Congressional Review
Act (5 U.S.C. 804(2)).
Executive Order 12866 directs
agencies to assess all costs and benefits
of available regulatory alternatives and,
if regulation is necessary, to select
regulatory approaches that maximize
net benefits (including potential
economic, environmental, public health
and safety effects, distributive impacts,
and equity). A regulatory impact
analysis (RIA) must be prepared for
major rules with economically
significant effects ($100 million or more
in any one year). This interim final rule
is not an economically significant rule
because we estimate that the breach
notification requirements are not
expected to cost more than $100 million
per year. Nevertheless, because of the
public interest in this rule, we have
prepared an RIA that to the best of our
ability presents the costs and benefits of
the proposed rule. We request
comments on the economic analysis
provided in this proposed rule.
The RFA requires agencies to analyze
options for regulatory relief of small
businesses if a rule has a significant
impact on a substantial number of small
entities. The scope of the interim final
rule will apply to all HIPAA covered
entities and their business associates.
Based on U.S. business census data
provided to the Small Business
Administration Office of Advocacy
there were 605,845 entities classified
under the North American Industrial
Classification System (NAICS) 62. Code
62 encompasses physicians, dentists,
ambulatory care centers, kidney dialysis
centers, family planning clinics, home
care services, mental health and drug
rehabilitation centers, medical
laboratories, hospitals and nursing
facilities. In addition, based on data
from the Centers for Medicare &
Medicaid Services, we estimate that
there are 107,567 suppliers of durable
medical equipment and prosthetics.
Almost all of these health providers fall
under the RFA’s definition of a small
entity by either meeting the Small
Business Administration’s (SBA’s) size
standard of a small business or by being
a non-dominant nonprofit organization.
The SBA’s size standard for NAICS 62
ranges between $7 million and $34.5
million in annual receipts. Also covered
under HIPAA are health insurance firms
and third party administrators (NAICS
codes 524114 and 524292). The 2006
business census data show that there are
PO 00000
Frm 00019
Fmt 4701
Sfmt 4700
42757
1,045 insurance firms and 3,522 third
party administrators. Of the combined
total of health insurance firms and third
party administrators, we estimate that
approximately 71 percent, or 3,266,
meet the SBA’s definition of a small
entity of annual receipts of $7 million
or less. Pharmacies are also considered
covered entities under HIPAA (NAICS
code 44611) and based on the 2007
National Association of Chain Drug
Stores Industry Profile approximately
17,500 independent pharmacy
drugstores meet the SBA definition of a
small business of $7 million or less in
annual receipts. For more information
on SBA’s size standards, see the Small
Business Administration’s Web site at
https://sba.gov/idc/groups/public/
documents/sba_homepage/
serv_sstd_tablepdf.pdf.
Although the RFA only requires an
initial regulatory flexibility analysis
(IRFA) when an agency issues a
proposed rule, the Department has a
policy of voluntarily conducting an
IRFA for interim final regulations. We
examine the burden of the interim final
regulation in section D below.
Section 202 of the Unfunded
Mandates Reform Act of 1995 (UMRA)
also requires that agencies assess
anticipated costs and benefits before
issuing any rule whose mandates
require spending in any one year of
$100 million in 1995 dollars, updated
annually for inflation. In 2009, that
threshold is approximately $133
million. This rule will not impose an
unfunded mandate on States, tribal
government or the private sector of more
than $133 million annually.
Executive Order 13132 establishes
certain requirements that an agency
must meet when it promulgates a
proposed rule (and subsequent final
rule) that imposes substantial direct
costs of compliance on State and local
governments, preempts State law, or
otherwise has Federalism implications.
Section 13421(a) of the Act expressly
provides that provisions or
requirements of subtitle D of the Act,
which includes the provisions requiring
breach notification, shall preempt State
law in the same respect that the HIPAA
Rules preempt State law pursuant to
section 1178 of the Social Security Act.
Accordingly, this rule expressly adopts
the preemption provisions that are
applicable to the HIPAA Rules and as
discussed in Section IV.J. Preemption
above.
B. Why Is This Rule Needed?
This regulation is required to
implement section 13402 of the Act.
The purpose of the statute is to establish
a uniform requirement on all HIPAA
E:\FR\FM\24AUR2.SGM
24AUR2
erowe on DSK5CLS3C1PROD with RULES_2
42758
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
covered entities to inform individuals of
when the individual’s unsecured
protected health information has been
improperly used or disclosed and the
result of the improper use or disclosure
may lead to financial damage, harm to
the individual’s reputation, or other
harm. Without the statutory requirement
for notifying an individual of data
breaches, it would be left to the entity
to decide whether to notify an affected
individual or the decision would be
subject to significantly varying State
laws (which are generally focused on
breaches of financial information rather
than health information).
Because notification requires
expenditures and exposes the covered
entity to loss of business and possible
legal action, there is little incentive for
the entity to take such action. While
individuals whose protected health
information was improperly accessed
would be forewarned and as a result of
being notified, could take action to
mitigate financial or personal harm,
they may not continue to patronize the
entity which notifies them. If alternative
providers in the individual’s
community offer similar services, the
individual may take their business to
one of the alternative entities. Moreover,
if other individuals, not directly affected
by the breach, learn of the event, they
too may seek services from other
providers out of fear that their protected
health information may be improperly
accessed. The Ponenmon Institute, LLC
report of February 2009, ‘‘2008 Annual
Study: Cost of a Data Breach’’ estimates
that 69 percent of the cost of a data
breach is the result of lost business (see
page 4). The study identifies the health
care industry as experiencing the
highest customer turnover rate directly
attributable to data breaches of
protected health information. Moreover,
since a health care provider is unlikely
to suffer financially from the direct loss
of protected health information, there is
little incentive for the covered entity to
notify affected individuals.
In such situations, the covered entity
may perceive that it is more beneficial
to not disclose breaches. The possibility
of lawsuits arising out of a lack of
response to the breach represents a risk
but one which is uncertain and lies in
the future. This compares to the more
imminent and certain risk of loss of
business if the entity discloses the
breach.
By imposing a duty on all covered
entities to notify affected individuals of
breaches of protected health
information, the statute and the interim
final regulation place a similar burden
on all covered entities to notify affected
individuals and run the same risk of
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
losing business as a result of
notification. Moreover, requiring breach
notification creates an incentive on all
covered entities to invest in data
security improvements in efforts to
minimize the possibility of reportable
data breaches.
At the same time that the statute and
interim final regulation create the
incentive to minimize breaches of
protected health information, in the
event that a breach occurs, the affected
individual will be notified and thereby
be given an opportunity to mitigate any
harm that may result from the breach.
C. Costs and Benefits
1. Summary of Costs and Benefits
Throughout the following analysis we
invite comments on specific portions of
our analysis. The public, however, is
invited to offer comments on any and all
elements of the analysis and the
assumption underlying the analysis.
Costs: In the analysis that follows, we
applied the provisions of the interim
final regulation to the dataset of data
breaches found at DataLossdb.org. The
database shows, among other things, the
name of the organization and the type
of business, such as finance, medical,
government, education, or business. The
field called ‘‘Total Affected’’ shows a
count of either records or individuals
affected by the breach. Without
examining the source reports of the
breach, we do not know which is being
reported. For these purposes, we will
take the more conservative approach
and assume that the count is of
individuals. We acknowledge the
possibility that an individual may have
more than one record housed at a
provider, especially if the provider is a
multi-unit facility. An individual may
have separate inpatient, outpatient, and
clinic records. Thus, a major breach
could involve more than one record per
breach, and to the extent that this is the
case, we may overstate the costs, which
we believe is preferable to understating
them.
The data we selected covers calendar
year 2008 and includes the subset of
breaches from medical firms or
containing medical information. Our
analysis, thus, not only includes HIPAA
covered entities found in the dataset but
may include business associates of
HIPAA covered entities. In addition, the
data may include breaches of health
information that State agencies may
hold such as Medicaid State agencies
that also serve as health plans and are
also HIPAA covered entities. Table 1
presents the estimated costs of the
interim final rule based on 2008
PO 00000
Frm 00020
Fmt 4701
Sfmt 4700
breaches presented in the
DataLossdb.org tables.
Upon examining the distribution of
affected individuals and records for
2008, we identified one breach
involving 2.2 million individuals. The
incident occurred at a major university
hospital system and involved the theft
of backup tapes that were being
transported to storage. The next highest
breach affected 344,482 individuals.
Including the outlier breach in our
analysis, we believe, would significantly
skew the analysis. Removing this case
produces a more homogeneous
distribution of affected individuals and
improves the reliability of the analysis.
Removing the outlier reduced the
number of affected individuals from
5,087,032 to 2,887,032.
Although the type of data breach that
occurred in 2008 was not unusual, the
number of persons affected was six
times greater than the next highest
breach and the number of individuals
affected is far from the average number
for the year. In 2007, a State mental
health agency reported the loss of
records affecting 2.9 million individuals
resulting from the agency’s data
processor’s negligence. The next largest
breach in 2007 involved 375,000
individuals and represents one eighth
the number of individuals in the mental
health agency breach.
Without doubt, breaches of the
magnitude we see in the university
hospital and State mental health
breaches are a serious concern to the
Department. Excluding such
disproportionately large breaches from
the cost analysis should not be
construed as a lack of interest or
concern in the security of protected
health information at these institutions.
We could have included the university
hospital breach in our 2008 analysis, but
it is clear that the incident does not
represent the average or typical case.
Since our purpose is to present and
illustrate the costs of an average breach,
we believe that the inclusion of the one
unusually large breach in 2008 would
skew the results and present a distorted
picture of the level of costs that a typical
covered entity could expect.
In reviewing the following analysis,
one must keep in mind that we are able
to capture only breaches that are either
reported to the DataLoss database or are
reported in the media. We suspect that
some percent of breaches in the
healthcare sector as well as in other
sectors of the economy go unreported
either because they are not detected or
because, in the opinion of the entity, no
harm was done. We cannot determine if
the ‘‘no harm’’ type of unreported
breach would meet the harm threshold
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
in § 164.402 of the interim final rule for
a reportable breach. If some or all of
such breaches reach the harm threshold
for a breach, as defined in the interim
final rule, then the analysis understates
the cost of the rule to the degree that
these breaches are not included in our
analysis.
Table 1 shows the costs of the
provisions of the interim final rule. We
also present the costs required for
investigating breaches and the amount
42759
of time we anticipate individuals will
spend calling the toll-free number. The
total cost estimated for the rule is $17
million based on the number of
breaches and the number of affected
individuals.
TABLE 1—SUMMARY OF COMPLIANCE COST FOR NOTIFYING AFFECTED INDIVIDUALS *
Number of
affected
individuals
Number of
breaches
Cost elements
Cost/breach
Cost/affected
individuals
Cost
E-mail and 1st Class Mail ....................................................
Alternative Notices Media Notice .........................................
Toll-Free Number .................................................................
Imputed cost to affected individuals ....................................
Notice to Media Breach 500+ ..............................................
Report to the Secretary .......................................................
Investigation Costs:
Under 500 .....................................................................
Over 500 .......................................................................
Annual Report to the Secretary ...........................................
106
70
70
70
56
56
2,888,804
2,888,804
2,888,804
2,888,804
2,887,032
2,887,032
$12,986
487
117,676
103,172
75
75
$0.477
0.012
2.851
2.500
0.001
0.001
1,376,528
34,080
8,237,309
7,222,010
4,200
4,200
50
56
106
1,772
2,887,032
2,888,804
400
2,211
30
11
0.043
0.001
20,000
123,800
3,180
TOTAL COST ...............................................................
........................
........................
160,616
5.89
17,025,306
erowe on DSK5CLS3C1PROD with RULES_2
* Source: https://www.datalossdb.org.
Our cost impact for HIPAA covered
entities of approximately $17 million is
approximately 350 percent of the FTC
cost estimate for non-HIPAA covered
entities. The FTC estimate was based on
requiring toll-free lines for six months.
Their final rule requires toll-free lines
for only three months, as does this rule.
This should reduce the FTC estimated
costs by approximately half to about $5
million; about 30 percent of our cost
estimate for HIPAA covered entities of
$17 million.
Benefits: Notifying individuals of a
breach of their personal health
information as close in time to the
breach can benefit the individuals
directly affected, as well as other
entities such as credit card companies
and credit agencies. We found little
information showing the monetary
benefits of medical data notification, but
one study 14 presents evidence to show
that the sooner affected individuals
learn of their personal financial
information being compromised, the
lower the risk of financial loss to the
individual.
We did not find any information
regarding the benefits of notification of
breached medical information.
However, early notification of the
breach of sensitive medical information
may help an affected individual mitigate
the embarrassment that exposure of
sensitive medical information may
cause. Notification may permit an
individual to intervene sooner rather
than later to forestall the harmful effects
14 ‘‘Toward a Rational Personal Data Breach
Notification Regime,’’ by Michael Turner:
Information Policy Institute, June, 2006.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
of damaging information. As suggested
above, perhaps the greatest benefit of
improved data security accrues to the
HIPAA entity. We believe the cost of
notifying affected individuals and loss
of business that may result from a
breach of protected health information
provide strong incentives for the entity
to improve its data security so as to
prevent future breaches.
2. Costs
In this analysis we rely entirely on
historical data from 2008 for estimating
the costs of the interim final rule. We
could have attempted to project future
costs but two factors argued against
such an effort. First, the DataLossdb
dataset provides only four years of
reasonably good data going back to
2005. Although, in theory, we could use
the four data points to establish a trend,
it is not clear whether the trend
presented for the four years represents
a trend in the number of breaches
reported, or a trend in the reporting of
breaches. In the first instance, the
growth in data breaches would be the
result of a real growth in the number of
breaches. If this were the case, we
would have confidence that the data
represented a real trend. In the latter
case, however, the growth in the
number of breaches may simply reflect
a growth in the reporting of breaches
rather than an actual growth in the
number of breaches. Under these
circumstances, projecting a future trend
would lead us to erroneous conclusions.
More likely, the changes we see from
year to year are a combination of both
phenomena, which still leaves us with
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
the problem of discerning the real
change in breaches from the growth in
reporting breaches. Therefore, we
decided to base our estimates on the
latest and most complete year of data
available.
The second factor is the Department’s
implementation of the ARRA provisions
regarding health information and
privacy. Implementation of incentive
payments to health care providers and
the issuance of health IT standards
provided in the ARRA are likely to
stimulate adoption of health IT systems;
and with growth in IT adoption, one
may expect the number of data breaches
of protected health information to
increase.
At the same time, the Department is
taking steps to ensure greater protection
of protected health information, for
example, by promulgating this interim
final rule along with the encryption
guidance that the Department issued on
April 17, 2009. In the event that
protected health information is
compromised, affected individuals will
be notified of breaches.
As a result of the efforts to both
stimulate growth in the adoption of
health IT (and the implications that has
for increased risk of data breaches) and
the countervailing efforts to reduce the
incidences of breaches by encrypting
records, we believe that at the present
time there is no reasonable way to
forecast the net effects of both the
change in costs or number of breaches
that are likely to occur. Nevertheless, to
the extent that the rate of adoption of
encryption technology out paces health
IT adoption, we can predict fewer
E:\FR\FM\24AUR2.SGM
24AUR2
42760
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
reportable breaches under this rule.
Given the state of flux, however, we
believe the most prudent analysis is to
simply rely on the historical data at
hand.
a. Affected Entities
Section 13402 of the Act applies to
HIPAA covered entities that are health
care providers, health plans, or
clearinghouses and their business
associates that access, maintain, retain,
modify, record, store, destroy, or
otherwise hold, use, or disclose
unsecured protected health information.
Based on 2006 data from the Office of
Advocacy, Small Business
Administration there are 605,845 health
care entities, 4,567 health insurance
plans and third party administrators.
The Centers for Medicare & Medicaid
Services report 107,567 durable medical
equipment and prosthetic suppliers, and
the National Association of Chain Drug
Stores reports 88,396 pharmacies. In
addition, we estimate that each covered
entity has contractual arrangements
with three business associates as
defined under our regulations at 45 CFR
160.103. It should be noted, however,
that many of the same business
associates contract or have arrangements
with many different HIPAA covered
entities. To the extent that this occurs,
the total number of business associates
will be overstated. Since we do not
know the extent of duplication among
business associates, we cannot estimate
the number of business associates
affected by this rule. However, we can
estimate that approximately 0.9 million
HIPAA covered entities will be subject
to the interim final rule. Table 2
presents the number of HIPAA covered
entities. However, as noted, only the
number of HIPAA covered entities is
well established. It is possible the
number of affected business associates
could be small if a few firms contracted
with many HIPAA entities. In any event,
we need not speculate about this
relationship as our cost estimate is not
based on the number of affected entities.
Instead, it is based on a unique database
of breaches and affected individuals as
described below.
TABLE 2—NUMBER OF HIPAA COVERED ENTITIES BY NAICS CODE 1
Number of
entities
NAICS code
Providers/suppliers
622 ....................
623 ....................
Hospitals (General Medical and Surgical, Psychiatric and Drug and Alcohol Treatment, Other Specialty) .......
Nursing Facilities (Nursing care facilities, Residential mental retardation, mental health and substance abuse
facilities, Residential mental retardation facilities, Residential mental health and substance abuse facilities,
Community care facilities for the elderly, Continuing care retirement communities).
Offices of MDs (DOs, Mental health, Dentists, Practitioners, PT, OT, ST, Audiologists) ...................................
Outpatient Care Centers (Family Planning Centers, Outpatient Mental Health and Drug Abuse Centers,
Other Outpatient Health Centers, HMO Medical Centers, Kidney Dialysis Centers, Freestanding Ambulatory Surgical and Emergency Centers, All Other Outpatient Care Centers).
Medical Diagnostic, and Imaging Services ..........................................................................................................
Home Health Services ..........................................................................................................................................
Other Ambulatory Care Services (Ambulance and Other) ...................................................................................
Durable Medical Equipment Supliers 2 .................................................................................................................
Pharmacies 3 .........................................................................................................................................................
Heath Insurance Carriers .....................................................................................................................................
Third Party Administrators ....................................................................................................................................
6211–6213 ........
6214 ..................
6215 ..................
6216 ..................
6219 ..................
n/a .....................
4611 ..................
524114 ..............
524292 ..............
4,060
34,400
419,286
13,962
7,879
15,329
5,879
107,567
88,396
1,045
3,522
1 Office
of Advocacy, Small Business Administration https://www.sba.gov/advo/research/data.html.
for Medicare and Medicaid Services.
Chain Pharmacy Industry https://www.nacds.org/wmspage.cfm?parm1=507.
2 Centers
3 The
Healthcare clearinghouses are also
considered covered entities. In the final
rule implementing the 5010 standard
published in the Federal Register on
January 16, 2009 (74 FR 3318), we
estimated that 162 clearinghouses will
be affected by the interim final rule.
b. How Many Breaches Will Require
Notification?
erowe on DSK5CLS3C1PROD with RULES_2
(1) What Is a Breach of Protected Health
Information?
The interim final rule at § 164.402
defines a breach as an event that
‘‘compromises the security or privacy of
the protected health information,’’
which means that it poses a significant
risk of financial, reputational, or other
harm to the individual. Events such as
hacking into a database to steal
protected health information would
clearly constitute a breach of protected
health information. Other events,
however, such as a hospital
inadvertently posting protected health
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
information on a Web site, or the office
staff mailing a medical report to the
wrong patient, may constitute a breach.
In the case of posting information on a
facility’s Web site or mailing the wrong
report, the entity responsible for the
inappropriate release of protected health
information may not have to notify the
affected person if the entity has
determined (e.g., by performing a risk
assessment) that the release of the
protected health information will not
result in financial, reputational, or other
harm to the individual. For example, if
a general hospital impermissibly posted
protected health information on its Web
site that included only an individual’s
name and address, under paragraph (1)
of the definition of ‘‘breach’’ at
§ 164.402(1), the facility may not have to
notify affected individuals if it
determines that only minimal or no
harm could result from such an
inadvertent posting. However, if the
same information were posted on the
PO 00000
Frm 00022
Fmt 4701
Sfmt 4700
Web site of a drug rehabilitation facility,
a reasonable person may conclude that
the association of a person’s name with
the facility could cause damage to their
reputation. In that case, the provider
would be required to notify the affected
individuals. Therefore, a covered entity
may not assume that these types of
breaches do not require notices to the
affected individuals. The entity must
undertake an analysis of the information
that was improperly divulged and only
after an investigation may it conclude
that the information released poses no
significant harm.
Contrasted with an event that clearly
falls into the category of a data breach
and, after investigation requires notice
to affected individuals, paragraph (2) of
the definition of ‘‘breach’’ at § 164.402
specifies three types of improper uses
and disclosures of protected health
information that are excluded from the
definition of a breach. The first is
unintentional access to protected health
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
information in good faith in the course
of performing one’s job, and such access
does not result in further impermissible
use or disclosure. For example, a staff
person receives and opens an e-mail
from a nurse containing protected
health information about a patient that
the nurse mistakenly sent to the staff
person, realizes the e-mail is
misdirected and then deletes it.
The second exclusion is an
inadvertent disclosure of protected
health information by a person
authorized to access protected health
information at a covered entity or
business associate to another person
authorized to access protected health
information at the same covered entity
or business associate, or organized
health care arrangement in which the
covered entity participates. For
example, a nurse calls a doctor who
provides medical information on a
patient in response to the inquiry. It
turns out the information was for the
wrong patient. Such an event would not
be considered a breach under paragraph
(2)(ii) of the definition of ‘‘breach’’ at
§ 164.402, provided the information
received was not further used or
disclosed in a manner not permitted by
the Privacy Rule.
The third type of improper disclosure
that is excluded from the definition of
a ‘‘breach’’ is when protected health
information is improperly disclosed, but
the covered entity or business associate
believes, in good faith, that the recipient
of the unauthorized information would
not be able to retain the information. For
example, a nurse hands a patient a
medical report, but quickly realizes that
it was someone else’s report and
requests the return of the incorrect
report. In this case, if the nurse can
reasonably conclude that the patient
could not have read or otherwise
retained the information, then providing
the patient report to the wrong patient
does not constitute a breach.
erowe on DSK5CLS3C1PROD with RULES_2
(2) How Many Breaches Occur and How
Many Individuals Are Affected?
The sources for identifying the
number of HIPAA covered entity
breaches and the number of individuals
are limited to State health agencies and
one database maintained by a nonprofit
organization. There is no national
registry of data breaches that captures
all data breaches. Thus, we have to rely
on the few sources available to us and
accept that each source has specific
limitations. Essentially, we examined
three sources and methods for
estimating the number of breaches and
then attempted to apply them to the
universe of HIPAA covered entities and
their business associates.
On April 20, 2009, the FTC published
a proposed rule that would implement
section 13407 of ARRA (74 FR 17914)
and that applies to entities that are not
HIPAA covered entities but which may
retain, accept, and process personal
health information in the form of
personal health records. Examples of the
kind of entities to which the FTC rule
applies are web-based organizations that
will receive, store, and maintain an
individual’s health information for that
individual. The FTC estimated there are
900 such entities.
To arrive at an estimate of the number
of breaches per year that would occur to
personal health records that these
entities retain, the FTC examined a
general database of breaches from 2002
to 2007. They identified 246 breaches
occurring within the 5-year period for
businesses. Averaging the number of
breaches over the 5-year period equals
50 breaches per year. FTC next
identified 418,713 retail businesses with
revenues of $1 million or more per year.
However, concerned that applying the
annual number of breaches to so large
a number would yield an unrealistically
small number of breaches per entity, the
FTC took one percent of the number of
retail businesses (which equals 4,187
entities) on the assumption that only
one percent of the industry had such
weak security that they would be
attractive targets for data breaches. The
FTC then calculated the breach rate
based on the smaller number. The
resulting rate is 1.2 percent which when
applied to the 900 entities the FTC
identified as maintainers of personal
health records, equals 11 breaches per
year.
To estimate the number of affected
individuals, the FTC used a survey by
the Ponemon Institute, ‘‘National
Survey on Data Security Breach
Notification,’’ 2005 to derive a percent
of the number of individuals notified as
a result of a breach. Using 11.6 percent
and applying the value to an estimated
2 million individuals using the services
of the 900 personal health record
42761
holders, the FTC estimated that 232,000
individuals will be notified each year of
data breaches. We believe this
methodology has little applicability to
the HIPAA universe of covered entities.
We do not believe these estimates are
appropriate for the purposes of this rule
for several reasons. First, the HIPAA
covered universe contains many more,
but also much smaller, entities than the
FTC web-based universe. Second, this
rule exempts many small breaches from
reporting requirements because they
either fall under the exceptions to the
definition of ‘‘breach’’ in the regulation
or the entity determines that no harm
will occur. Third, although we use
historical data for our impact estimates,
it is possible that the provisions of this
rule that exempt from the notification
requirements data encrypted pursuant
to the Secretary’s guidance may greatly
reduce the future number of reportable
breaches; and fourth, as the FTC itself
states, their costs are over-estimated
because they apply all cost factors to all
estimated web-based breaches.
Because the interim final regulation
specifies different levels of responses on
the part of HIPAA covered entities when
unsecured protected health information
is breached, we had to determine the
number of breaches occurring using the
size categories contained in our interim
final regulation. The regulation requires
increasing levels of notification for
breaches that affect fewer than ten
individuals, 10 to 499 individuals and
for breaches affecting more than 500
individuals.
Rather than follow the approach the
FTC adopted we turned to the DataLoss
database maintained by the Open
Security Foundation at https://
datalossdb.org/. The database identifies
data breaches by type of business and
the number of records or individuals
affected. Because business associates
also must comply with provisions of the
interim final rule in addition to HIPAA
covered entities, we looked at all entries
that either were identified as a medical
entity or identified medical information
as being involved in the data breach.
Table 3 is a summary of the findings
from the database for the year 2008,
categorized by the number of
individuals affected by each breach. We
chose 2008 because it is the latest year
for which we have a full year of data.
TABLE 3—NUMBER OF BREACHES BY NUMBER OF AFFECTED FOR 2008
Affected size
Data
Year
2008
Unknown .....................................................................................
Breaches ....................................................................................
Affected Individuals ....................................................................
36
........................
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
PO 00000
Frm 00023
Fmt 4701
Sfmt 4700
E:\FR\FM\24AUR2.SGM
24AUR2
42762
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
TABLE 3—NUMBER OF BREACHES BY NUMBER OF AFFECTED FOR 2008—Continued
Year
2008
Affected size
Data
10 to 499 ....................................................................................
Breaches ....................................................................................
Affected Individuals ....................................................................
Breaches ....................................................................................
Affected Individuals ....................................................................
.....................................................................................................
.....................................................................................................
500 or More* ...............................................................................
Total Number of Breaches .........................................................
Total Sum of Total Affected .......................................................
14
1,772
56
2,887,032
107
2,888,804
erowe on DSK5CLS3C1PROD with RULES_2
* Data for 2008 is adjusted to remove one outlier breach of 2.2 million records.
As Table 3 demonstrates, the number
of breaches and the number affected
individuals are substantially smaller
than the numbers we would generate
using the FTC approach: 2.9 million
affected individuals and 106 breaches.
There are nevertheless, shortcomings
associated with the data displayed in
the table. As discussed previously, the
meaning of ‘‘Total Affected’’ is not clear.
Without examining each table data
entry, it is impossible to know precisely
if the numbers in the cells represent
individuals, records, or both. In looking
at a small sample of the descriptive
detail for actual database entries, we
found evidence for both individuals and
records. We assume that in the cases
where the number of records breached
was reported, that the number
corresponds roughly to the number of
individuals—that each record represents
an individual. Yet, because an
individual may have more than one
record in data that was improperly
accessed, our estimate of the affected
number of individuals may be
overstated. We invite public comment
on this point.
Another concern we have is the table
does not show any affected individuals
or records for the ‘‘under ten’’ grouping.
Because ‘‘Unknown’’ in the database is
blank, the default value is zero.
However, it would be improper to
assume that the actual value of the
reported ‘‘Total Affected’’ was zero.
There is evidence, on the other hand,
that the ‘‘Total Affected’’ in this group
is less than 500 based on information
we were able to obtain from the
California Department of Public Health.
For the first six months of this year (the
first year that California’s law requiring
notification of data breaches involving
protected health information went into
effect), of the 196 cases that have been
examined to date, none of the cases has
involved more than 499 affected
individuals. We interpret this fact as
pointing to the likelihood that the
number of individuals or records
affected where the number is unknown
is likely to be less than 500 and a
majority of cases may fall into the under
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
ten category. Because of the gap in the
data for breaches involving fewer than
ten individuals, our estimate for this
group may be understated. We invite
public comment on this point.
The third limitation is the way
information finds its way into the
database. Since the database is privately
maintained and operated and is not
responsible to either a state or federal
agency for regulating its content, the
completeness and accuracy of
information posted on the Web site is
unknown. Generally, the information
posted on the Web site is gleaned from
published sources or individuals with
knowledge of the breaches submitting
information. Nevertheless, we cannot be
completely confident in the reliability of
the information obtained from this
source. Therefore, as is evident from the
lack of affected records or individuals in
the ‘‘under ten’’ grouping, it is highly
likely that a certain number of breaches
never reach the database, thus resulting
in an undercount of the total number of
breaches and the total number of
individuals or records affected. We
invite public comment on this point.
(3) Estimating the Costs
(a) Baseline
Approximately 45 States have laws
that to varying degrees contain breach
notification provisions similar to the
Act. These 45 States require notification
of individuals whose information was in
some manner compromised as a result
of inappropriate access to their
information. Several States also link
their requirements to federal
notification requirements. Thus while
all the States with breach laws require
some form of notification to affected
individuals, those States whose laws
conform to the Federal requirements
need only develop procedures to
conform to their State laws in addition
to the interim final rule. The entities in
those States, thus, will have a small
compliance burden compared to the
entities in other states.
Because not all states have a
notification requirement, in our
estimation of the costs of the interim
PO 00000
Frm 00024
Fmt 4701
Sfmt 4700
final rule, we will assume that no State
has a notification requirement. Yet,
clearly this would significantly
overstate the burden imposed on HIPAA
covered entities because HIPAA covered
entities have trained their staffs and
have prepared procedures to follow
when a breach occurs to comply with
existing requirements of most of the
states. To ameliorate the overstatement
of our cost estimate somewhat, we will
assume the costs for training personnel
and for developing procedures have
already been expended and are therefore
in the baseline and we did not estimate
these costs in our analysis. We invite
public comment on these assumptions.
(b) Estimation of Costs
In its notice of proposed rulemaking,
the FTC identified the cost elements
that an entity will encounter when
complying with the interim final rule.
We examine the cost of notifying
affected individuals by first class mail,
issuing a substitute notice in major
media or on a Web site along with a tollfree phone number, notifying prominent
media in the event of a breach involving
500 or more individuals, and notifying
the Secretary of a breach, as well as the
costs of investigating breaches.
Cost of Notifying Affected Individuals
by First Class Mail or E-Mail
Section 164.404 requires all covered
entities to notify an individual whose
unsecured protected health information
is believed to have been breached as
defined in the interim final rule, either
by first class mail, or if the individual
has agreed, by e-mail. In its analysis, the
FTC assumed that 90 percent of the
notices to affected individuals will be emailed and only 10 percent will be sent
by regular first class mail. Since the
firms that the FTC is addressing are
primarily web-based, assuming that the
vast majority of communications would
be conducted through e-mail is a
reasonable assumption. For HIPAA
covered entities, 90 percent of which are
small businesses or nonprofit
organizations, that engage the entire
U.S. population in providing health care
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
services, we believe that notification
through e-mail will be much more
limited than in the case of the entities
the FTC regulates. Most physicians
appear concerned with the lack of
confidentiality associated with e-mail
use, and many older patients may be
uncomfortable with and/or do not have
access to e-mail. We, therefore, assume
that only 50 percent of individuals
affected as a result of a breach of
unsecured protected health information
will receive e-mail notices.
There will be certain costs that both
e-mail and first-class mail
communication will share. The cost of
preparing the notice and preparing a
draft will apply to both forms. The
median hourly wage for a healthcare
practitioner and technical worker in
2008 was $27.15 Doubling the amount to
account for fringe benefits equals $54. If
we assume 30 minutes per breach for
composing the letter, the cost equals
$27. We assume that it will take 30
minutes per breach for an
administrative assistant to draft the
letter in either e-mail or printed formats
and to document the letter to comply
with §§ 164.414(a) and 164.530(j). The
median hourly wage for office and
administrative support staff is $14.32
per hour. Accounting for benefits, the
hourly costs is $29. For the 30 minutes,
we estimate $15 per breach. The
combined cost for composing and
preparing the document is
approximately $42 per breach. Half of
the cost will be allocated to the mailing
of the first-class letter and the other half
to the sending of e-mails.
Although computer costs for sending
e-mail will be insignificant, it will take
staff time to select the e-mail address
from the entity’s mailing list. We
assume that a staff person could process
and send 200 e-mails per hour at a cost
of $30 per hour. For each mailed notice
we assume $0.06 for paper and envelope
and $0.44 for a first class stamp, totaling
$0.50 per letter. We estimate another
$30 per hour to prepare the mailing by
hand at a rate of 100 letters per hour.
Using the data from Table 3 above for
2008 (the latest year for which we have
a complete year of data), there were a
total of 106 breach events reported
including those of an unknown number
of affected records or individuals.
Multiplying the number of breaches by
the cost of composing and drafting a
42763
notice (106 × $42) equals $4,346.
Allocating half the costs to e-mailing
and the same amount to regular mail
yields $2,173 to each category.
For 2008, there were 2,888,804
reported affected individuals. Splitting
this number evenly between e-mail and
regular mail gives us 1,444,402 affected
individuals for each notice category. For
e-mails we divide affected individuals
by the number of addressed envelopes
processed in an hour (200) and multiply
by the hourly cost of $30. To this
number we add the $2,173 giving us an
estimated cost for e-mail notices of
$218,833.
We follow the same method for
estimating the cost of mailing notices
using postal mail plus the cost of
postage and supplies. Dividing 100
letters per hour into 1,444,402 yields
14,444 hours which is then multiplied
by $30 plus postage and supplies of plus
the costs of composing and drafting
equals $ 1,157,695. Summing the cost of
e-mail and postal mail notices equals
$1,376,528. Table 4 presents the results
of our analysis. We invite public
comment on this analysis and our
assumptions.
TABLE 4—COST OF E-MAIL AND FIRST CLASS MAIL TO AFFECTED INDIVIDUALS
Composing
and drafting
Breaches
Composing
and drafting
costs
Affected
individuals
or records
Hours to
prepare
mailing
Cost to
prepare
mailing
Postage
and supplies
Total
21
21
106
106
$2,173
2,173
1,444,402
1,444,402
14,444
7,222
$433,321
216,660
$722,201
....................
$1,157,695
218,833
Total ..........................
erowe on DSK5CLS3C1PROD with RULES_2
Mail ...................................
E-mail ...............................
....................
....................
4,346
2,888,804
....................
....................
....................
1,376,528
Cost of Substitute Notice
In the event that a HIPAA covered
entity is not able to contact an affected
individual through e-mail or postal
mail, it must attempt to contact the
person through some other means. If the
number of individuals who cannot be
reached through the mailings is less
than ten, the entity may attempt to reach
them by some other written means, or
by telephone. We do not know how
many breaches occurred with fewer
than ten affected individuals and
therefore cannot estimate a cost for
contacting them. We believe, however,
that the costs would be very small and
as a result we have not attempted to
estimate the costs of contacting them.
In the event that the covered entity is
unable to contact 10 or more affected
individuals through e-mail or postal
mail, the interim final rule requires the
entity to (1) publish a notice in the
media (newspaper, television, or radio)
containing the information contained in
the mailed notice or post a notice on its
Web site, and (2) set up a toll-free
number. The toll-free number is to be
included in the public notice and Web
site.
Based on the cost for publishing a
public notice in the two leading
newspapers, in the Washington, DC
area, rates range between $2.91 and
$15.23 per line. Based on these
numbers, we estimate the cost of a
public notice will cost between $80 and
$400. Taking the mean of the range, we
estimate an average price of $240 per
notice. If we assume that a provider will
publish two notices, the cost will be
$480. Multiplying this amount by the
number of breaches reported in 2008 for
the 10 to 499 and 500 or more groupings
(70), yields $33,600.
It is conceivable that some breaches
involving more than 10 but fewer than
500 individuals may require notices in
several states or jurisdictions. The
probability of this event occurring,
however, we believe, is low and we did
not attempt to estimate the costs of such
an event.
If a HIPAA covered entity has a Web
site, we assume there will be no cost to
post the notice to the Web site.
The cost of setting up a toll-free
phone number is a straight forward
process of contacting any one of a
number of service providers who offer
toll-free service. In checking the
internet, we found prices for toll-free
service ranging from $0.027 per minute
for a basic mail box arrangement to
$0.07 per minute. Some require a
15 Department of Labor, Occupational
Employment Statistics; Healthcare Practitioner and
Technical Occupations. https://www.bls.gov/oes/.
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
PO 00000
Frm 00025
Fmt 4701
Sfmt 4700
E:\FR\FM\24AUR2.SGM
24AUR2
42764
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
monthly fee ranging from $10 to $15 per
month. A major, national phone service
company offers toll-free service for $15
per month per toll-free number and per
minute charge of $0.07. There is a onetime charge of $15. For purposes of our
analysis, we will use the costs of $15
per month plus $15 activation fee and
$0.07 per minute.
Since the regulation requires
providers to maintain a toll-free number
for three months, the monthly charge
plus initial fee per breach will be $60.
To estimate the number of calls to the
toll-free number we assumed that more
individuals than those who did not
receive a notice or who are not affected
by the breach would call out of concern
that their protected health information
might have been compromised. The
calls from individuals who are not
affected will make up for the affected
individuals who will not call the
number either because they did not
learn of the breach or are not concerned.
In its proposed rule, the FTC
estimated that 5,000 people would call
within the first month and then decline
to an average of 1,000 calls per month.
Since most HIPAA covered entities do
not serve that many patients, we
decided to use the mean number of
affected individuals for each of the two
groups, 10–499 and 500 or more affected
individuals. For breaches with 10–499
affected individuals, the mean is 127
and for 500 or more, the mean equals
51,554 individuals. Since multiplying
the mean times the number of breaches
equals the total number of affected
individuals, we assume that breaches
affecting between 10 and 500
individuals will generate 1,772 calls.
Similarly, for breaches affecting 500 or
more individuals, we assume 2,887,032
calls. Assuming that a call averages five
minutes at $0.07 per minute, we
estimate the total cost for all calls to
equal $1,011,084. Added to this is
$4,200 that represents the monthly fee
per breach (70 breaches) for three
months plus the one-time fee (totaling
$60 per breach). This brings the total
cost of toll-free lines to $1,015,284.
To this cost, we must also include the
office staff time to answer the incoming
calls at $30 per hour. Based on an
average of five minutes per call, a staff
person could handle 12 calls per hour.
Dividing 12 into 2,888,804 equals
240,734 hours and then multiplied by
$30 equals $7,222,025. Summing all
cost elements yields a total cost of
$8,237,309.
To the degree that firms already
maintain toll-free phone lines, our
estimate overstates the costs of setting
up a toll-free line as required under the
rule. Table 5 presents our cost analysis.
TABLE 5—COST FOR SETTING UP A TOLL-FREE LINE FOR THREE MONTHS
Number of
breaches
11–499
(14)
Number of
breaches
500 +
(56)
Number of call
11–499
(1772)
Number of call
500 +
(2,887,032)
Total
Monthly Charges for 3 months + 1-time Charge ($60/
breach) .............................................................................
Direct Calling Charges @ $.07/min × 5 minutes .................
Labor cost @ $30/hr × 5 min per call ..................................
$840
........................
........................
$3,360
........................
........................
........................
622
4,445
........................
1,010,461
7,217,580
$4,200
1,011,084
7,222,025
Total ..............................................................................
erowe on DSK5CLS3C1PROD with RULES_2
Costs
840
3,360
5,067
8,228,041
8,237,309
In addition to the cost of the toll-free
number and staff time answering calls,
we also imputed a cost to the time
individuals will spend calling the tollfree number. In estimating the time
involved, we assumed that a person will
spend five minutes per call. However,
the person may not get through the first
time and thus may have to call back a
second time which could add another 5
minutes. Taking the average between 5
and 10 minutes, we used an average call
time of 7.5 minutes.
For purposes of imputing cost to an
individual’s time, we took the mean
compensation amount from the Bureau
of Labor Statistics of $20.32 for all
occupations at https://www.bls.gov/oes/
current/oes_nat.htm. Dividing 60 by 7.5
minutes yields 8 calls per hour.
Dividing the number of calls per hour
into 2,888,804 calls and then
multiplying by $20, gives us a cost of
$7,222,010. We invite the public to
comment on our analysis and
assumptions.
Cost of Breaches Involving 500 or More
Individuals
If a covered HIPAA entity experiences
a data breach of protected health
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
information affecting 500 or more
individuals, § 164.406 of the interim
final rule requires the entity to notify
the media in the jurisdiction or State in
which 500 or more individuals reside.
Also, § 164.408 requires the entity to
submit a report to the Secretary at the
same time it notifies the media. The
covered entity must take these steps in
addition to undertaking efforts to
directly notify affected individuals by
first-class mail or e-mail and through
alternative means of notification if it
cannot contact 10 or more individuals.
We anticipate that, when a covered
entity must notify the media under the
interim final rule, it will issue a press
release. The tasks involved in issuing
the press release will be the drafting of
the statement and clearing it through the
organization. We assume that drafting a
one-page statement will contain
essentially the same information
provided in the notice to affected
individuals and will take 1 hour of an
equivalent to a GS–12 Federal
employee, earning $29 per hour.
Multiplying the amount by two to
account for benefits equals $58.
Approval of the release involves reading
the document. We expect this activity to
PO 00000
Frm 00026
Fmt 4701
Sfmt 4700
take 15 minutes. The average hourly rate
for a public relations manager is
approximately $49 in 2008. Doubling
the amount for benefits equals $98.
Rounding up to $100, one quarter of an
hour equals $25 for approving the
release. The total cost of the release
equals $75, and multiplying this amount
by the number of breaches affecting 500
or more individuals (56) equals $4,200.
It should be noted that this amount may
overstate the actual costs of issuing a
notice to the media. The regulation
requires a release only in the
jurisdiction or State where 500 or more
individuals are affected. As the example
in the discussion of § 164.406 discussed
above in Section IV illustrates, a breach
may affect a total of 500 or more
individuals but may affect fewer than
500 persons in each State or jurisdiction
where the affected individuals reside. In
that case, the covered entity does not
have to issue a notice to the media, but
must take all the other steps required of
a breach of that size.
There is the possibility that a breach
may affect 500 or more individuals in
several States or jurisdictions. In such
situations, the covered entity has the
choice of notifying the media in each of
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
erowe on DSK5CLS3C1PROD with RULES_2
the several States or jurisdictions; or it
may choose to notify the national media
with the expectation that the local
media in each jurisdiction will pick up
the information. We expect the covered
entity to select the most efficient means
for informing the media.
The report to the Secretary of HHS
that must be sent contemporaneously to
the sending of the notices to the affected
individuals will contain essentially the
same information as the notice sent to
the affected individuals: (a) Information
regarding the nature and cause of the
data breach, (b) the number and
contents of the records breached, (c) the
number of individuals affected, (d) steps
the entity took to notify affected
individuals and the degree of success it
had in reaching affected individuals,
and (e) steps taken to improve data
security.
We anticipate the time and cost to
prepare the report will be the same as
that required for issuing a notice to the
media. The cost for reporting the 56
breaches affecting 500 or more
individuals based on the 2008 data is
$4,200.
loss of laptops and other data bearing
equipment accounted for almost 50
percent of data losses. For these reasons,
we believe that estimating the average
time and cost for breach investigation as
being half the amount FTC estimated is
a reasonable assumption. Multiplying
our cost estimate by the number of
breaches of 500 or more individuals
protected health information yields us
$128,800.
Cost of Investigating a Breach
As a prerequisite to issuing a notice
to individuals or to the media and the
report to the Secretary when a breach
occurs, the covered entity will need to
conduct some form of investigation to
determine the nature and cause of the
breach. We anticipate that most
breaches involving fewer than 500
records or individuals will be relatively
easy to investigate and may involve a
day of investigation to determine the
cause and the extent of the breach. An
office manager’s time at $50 per hour
multiplied by 8 hours equals $400 and
multiplied by the number of breaches
affecting fewer than 500 individuals is
$20,000. We note that this estimate
includes the time required to produce
the documentation required by
§ 164.414(a).
For breaches involving 500 or more
individuals, the breach investigation
may take considerably longer and
involve significantly greater costs. The
FTC, in its proposed rule (74 FR 17921
and footnote 27) estimated 100 hours at
a cost of $4,652. We accept this cost for
investigating a breach as an upper
bound, but we expect that the average
investigation will take half the time and
cost approximately $2,300. Based on the
Ponemon report cited above, the most
frequent cause for data breaches was a
lost laptop computer accounting for 35
percent of all data breaches. While
system failure was the second most
frequently cited cause of data breaches
accounting for 33 percent, the combined
3. Benefits
We were not able to identify any
studies that pointed to quantitative
benefits arising from the notification of
health data breaches. On an intuitive
level, however, it seems that notifying
affected individuals of compromises to
their protected health information
would help in two ways. It would alert
them to the possibility of identity theft
resulting from the exposure of
identifiers such as credit card numbers,
date of birth, and social security
numbers associated with the
individual’s name. The other benefit of
notification is enabling an affected
individual to mitigate harm to his or her
personal reputation that may result from
the exposure of sensitive medical
information.
With respect to the mitigation of
financial loss, in the study cited
previously 16 Turner presents evidence
suggesting that 69 percent of individuals
who were able to take action within 6
months of the breach to their financial
information to mitigate damages
suffered no out-of-pocket expenses. This
compares to 40 percent who took action
after 6 months. In cases where affected
individuals who were able to take action
within 5 months of the breach such as
monitor their credit card statement and
notify credit bureaus, the value of the
fraud exceeded $5,000 only in 11
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
Cost of Submitting the Annual Breach
Summary to HHS
Under § 464.408, covered entities
must maintain a log of all breach events.
Once per year a covered entity that has
experienced a breach must submit a
summary of its log to the Department.
Since the material for the submission
has already been gathered and organized
for the issuance of the notices to the
affected individuals, we expect
submitting the log summary to the
Department will require at most an hour
of office staff time once per year. At $30
per hour multiplied by the total number
of breaches reported for 2008 (106)
equals $3,180.
16 ‘‘Towards A Rational Breach Notification
Regime’’ by Michael Turner; Information Policy
Institute.
PO 00000
Frm 00027
Fmt 4701
Sfmt 4700
42765
percent of the cases. For those who did
not take steps to mitigate the damage for
6 months or longer, the amount of fraud
exceeded $5,000 in 44 percent of the
cases. From this evidence, it appears
that there are some tangible benefits to
notifying individuals as soon as possible
after a breach of protected health
information occurs. We did not,
however, find a clear connection
between the breach of protected health
information and the amount of financial
loss or its frequency.
The harm to a person’s reputation or
standing in the community resulting
from the release of protected health
information could be substantial and
could have financial and economic
consequences. We lack data on the
frequency and extent of damages from
the inappropriate release of sensitive
medical information. Notifying a person
of unauthorized access can, however,
enable a person to take measures to
reduce the damage. Notification can
enable them to prepare psychologically
and take actions to prepare for the
consequences. The individual also may
take steps to prepare others for the
possible consequences.
Benefits to the HIPAA covered entity
will rest with the actions it takes to
prevent data breaches. As our analysis
demonstrates, the costs of notification
for an entity may be significant,
although in the aggregate in terms of
overall health care costs, they are
extremely small. Nevertheless, we
believe that the costs of the interim final
rule are avoidable if either before a
covered entity experiences a breach or
following one, the entity adopts
measures to strengthen its data security.
As pointed out, the most frequent form
of data loss is the result of lost or stolen
laptops and data bearing media such as
hard drives. If the data on these devices
is encrypted, then under the interim
final rule definition of a breach, the
event would not require the covered
entity or the business associate to notify
affected individuals.
Because much of the harm resulting
from breaches of protected health
information may come from the pain
and suffering individuals’ may sustain
to their reputations and standing in
their communities, the benefits that
reductions in the number of breaches
and number of individuals affected is
hard to quantify while the costs of the
rule are identifiable and specific. For
these reasons, we are unable to estimate
the net benefits of the rule. Yet we
believe by providing an incentive to
reduce the number of breaches of
unsecured protected health information,
the rule will help increase confidence
among members of the public in the
E:\FR\FM\24AUR2.SGM
24AUR2
42766
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
security of their protected health
information. To whatever extent greater
trust can be fostered between patients
and health care providers, the better the
communication and the higher the
quality of health care delivered.
D. Regulatory Flexibility Analysis
The RFA requires agencies to analyze
options for regulatory relief of small
businesses if a rule has a significant
impact on a substantial number of small
entities. We are implementing this
interim final rule as required by section
13402 of Public Law 111–5. The
objective of the rule is to establish
uniform requirements for HIPAA
covered entities and their business
associates to notify individuals whose
unsecured protected health information
may have been improperly accessed or
used.
In Table 2 above, we identified the
type and number of HIPAA covered
entities to which the interim regulation
applies. For purposes of our regulatory
flexibility analysis, it is our practice to
assume that all health care providers
and suppliers meet the definition of a
small entity. Ninety percent of small
entities either meet the Small Business
Administration size standard for a small
business or are nonprofit organizations.
Approximately 71 percent of health
insurance carriers and third party
administrators meet the SBA’s small
business size standard. Although we do
not have separate revenue data for
health insurance carriers and third party
administrators, we believe that the
majority of the third party
administrators meet the SBA standard.
Approximately 22 percent of
pharmacies meet the SBA standard for
a small business.
Based on the analysis of data breaches
for 2008, we do not expect the interim
final rule to have a significant impact on
a substantial number of small entities.
We estimate that the average cost per
breach will cost $160.616. Second, the
rule will apply to entities that, in many
information collections must be directed
to the OS Paperwork Clearance Officer
at the above e-mail address within 14
days.
Abstract: The Health Information
Technology for Economic and Clinical
Health (HITECH) Act, Title XIII of
Division A and Title IV of Division B of
the American Recovery and
Reinvestment Act of 2009 (ARRA) (Pub.
L. 111–5) requires the Office for Civil
Rights to collect information regarding
breaches discovered by covered entities
and their business associates. ARRA
was enacted on February 17, 2009. The
HITECH Act (the Act) at section 13402
requires the Department of Health and
Human Services (HHS) to issue interim
final regulations within 180 days of
enactment to require HIPAA covered
entities and their business associates to
notify affected individuals and the
Secretary of breaches of unsecured
protected health information. Section
164.404 of this interim final regulation
requires HIPAA covered entities to
notify affected individuals of a breach of
their unsecured protected health
information without reasonable delay
and in any case within 60 days of
discovery of the breach, and, in some
cases, to notify the media of such
breaches pursuant to § 164.406. Section
164.408 requires covered entities to
provide the Secretary with immediate
notice of all breaches of unsecured
protected health information involving
more than 500 individuals.
Additionally, the Act requires covered
entities to provide the Secretary with an
annual log of all breaches of unsecured
protected health information that
involve less than 500 individuals.
Finally, covered entities must maintain
appropriate documentation under
§ 164.530(j) to comply with their burden
of proof under § 164.414.
The estimated annualized burden
table below was developed using the
same estimates and workload
assumptions in the impact statement in
section V, above.
instances, already have obligations to
provide notification of data breaches
under most State laws covering medical
breaches. Therefore, the Secretary
certifies that the rule will not have a
significant impact on a substantial
number of small entities.
VI. Paperwork Reduction Act
Information Collection
In compliance with the requirement
of section 3506(c)(2)(A) of the
Paperwork Reduction Act of 1995, the
Office of the Secretary (OS), Department
of Health and Human Services, is
publishing the following summary of a
proposed information collection request
for public comment.
Because this rule will go into effect 30
days following publication, we have
submitted a request to OMB for review
of these information collection
requirements on an emergency basis,
pursuant to 5 CFR 1320.13. We are
providing an abbreviated comment
period of 14 days. Interested persons are
invited to send comments by September
8, 2009 regarding this burden estimate
or any other aspect of this collection of
information, including any of the
following subjects: (1) The necessity and
utility of the proposed information
collection for the proper performance of
the agency’s functions; (2) the accuracy
of the estimated burden; (3) ways to
enhance the quality, utility, and clarity
of the information to be collected; and
(4) the use of automated collection
techniques or other forms of information
technology to minimize the information
collection burden.
To comment on this collection of
information or to obtain copies of the
supporting statement and any related
forms for the proposed paperwork
collections referenced above, e-mail
your comment or request, including
your address and phone number to
Sherette.funncoleman@hhs.gov, or call
the Reports Clearance Office on (202)
690–6162. Written comments and
recommendations for the proposed
ESTIMATED ANNUALIZED BURDEN TABLE
Number of
respondents
erowe on DSK5CLS3C1PROD with RULES_2
Type of respondent
Individual Notice—Written and E-mail Notice (investigation; drafting, preparing, and documenting notification; and sending notification) ..................
Individual Notice—Substitute Notice (posting or publishing notice and tollfree number) .................................................................................................
Media Notice ....................................................................................................
Notice to Secretary (Notice for breaches affecting 500 or more individuals
and annual notice) .......................................................................................
Total ..........................................................................................................
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
PO 00000
Frm 00028
Fmt 4701
Average
number of
responses per
respondent
Average
burden hours
per response
Total burden
hours
106
27,253
1/60
48,147
70
56
1
1
668
1
46,760
56
106
1
22/60
39
........................
........................
........................
95,002
Sfmt 4700
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
List of Subjects
§ 160.534
45 CFR Part 160
*
Administrative practice and
procedure, Computer technology,
Electronic information system,
Electronic transactions, Employer
benefit plan, Health, Health care, Health
facilities, Health insurance, Health
records, Hospitals, Investigations,
Medicaid, Medical research, Medicare,
Penalties, Privacy, Reporting and
recordkeeping requirements, Security.
45 CFR Part 164
Administrative practice and
procedure, Computer technology,
Electronic information system,
Electronic transactions, Employer
benefit plan, Health, Health care, Health
facilities, Health insurance, Health
records, Hospitals, Medicaid, Medical
research, Medicare, Privacy, Reporting
and recordkeeping requirements,
Security.
For the reasons set forth in the
preamble, the Department proposes to
revise 45 CFR subtitle A, subchapter C,
parts 160 and 164, as follows:
■
PART 160—GENERAL
ADMINISTRATIVE REQUIREMENTS
1. The authority citation for part 160
is revised to read as follows:
■
Authority: 42 U.S.C. 1302(a); 42 U.S.C.
1320d–1320d–8; sec. 264, Public Law 104–
191, 110 Stat. 2033–2034 (42 U.S.C. 1320d–
2 (note)); 5 U.S.C. 552; and secs. 13400 and
13402, Public Law 111–5, 123 Stat. 258–263.
■
2. Revise § 160.101 to read as follows:
§ 160.101
§ 160.202
Definitions.
erowe on DSK5CLS3C1PROD with RULES_2
*
*
*
*
*
Contrary * * *
(2) The provision of State law stands
as an obstacle to the accomplishment
and execution of the full purposes and
objectives of part C of title XI of the Act,
section 264 of Public Law 104–191, or
section 13402 of Public Law 111–5, as
applicable.
*
*
*
*
*
■ 4. In § 160.534 add paragraph
(b)(1)(iv), and revise (b)(2) to read as
follows:
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
used in this subpart, not as used in
subparts D or E of this part.)
*
*
*
*
*
■ 9. Add a new subpart D to part 164
to read as follows:
PART 164—SECURITY AND PRIVACY
Subpart D—Notification in the Case of
Breach of Unsecured Protected Health
Information
Sec.
164.400 Applicability.
164.402 Definitions.
164.404 Notification to individuals.
164.406 Notification to the media.
164.408 Notification to the Secretary.
164.410 Notification by a business
associate.
164.412 Law enforcement delay.
164.414 Administrative requirements and
burden of proof.
■
5. The authority citation for part 164
is revised to read as follows:
Authority: Secs. 13400 and 13402, Pub. L.
111–5, 123 Stat. 258–263.
Authority: 42 U.S.C. 1320d–1320d–8; sec.
264, Public Law 104–191, 110 Stat. 2033–
2034 (42 U.S.C. 1320–2 (note)); secs. 13400
and 13402, Public Law 111–5, 123 Stat. 258–
263.
Subpart D—Notification in the Case of
Breach of Unsecured Protected Health
Information
6. Revise § 164.102 to read as follows:
The requirements of this subpart shall
apply with respect to breaches of
protected health information occurring
on or after September 23, 2009.
■
§ 164.102
Statutory basis.
The provisions of this part are
adopted pursuant to the Secretary’s
authority to prescribe standards,
requirements, and implementation
specifications under part C of title XI of
the Act, section 264 of Public Law 104–
191, and section 13402 of Public Law
111–5.
■ 7. In § 164.103, add in alphabetical
order the definition of ‘‘Law
enforcement official’’ to read as follows:
§ 164.103
Statutory basis and purpose.
The requirements of this subchapter
implement sections 1171 through 1179
of the Social Security Act (the Act), as
added by section 262 of Public Law
104–191, section 264 of Public Law
104–191, and section 13402 of Public
Law 111–5.
■ 3. In § 160.202, revise the second
paragraph of the definition ‘‘Contrary’’
to read as follows:
The hearing.
*
*
*
*
(b)(1) * * *
(iv) Compliance with subpart D of
part 164, as provided under
§ 164.414(b).
(2) The Secretary has the burden of
going forward and the burden of
persuasion with respect to all other
issues, including issues of liability other
than with respect to subpart D of part
164, and the existence of any factors
considered aggravating factors in
determining the amount of the proposed
penalty.
*
*
*
*
*
42767
Definitions.
*
*
*
*
*
Law enforcement official means an
officer or employee of any agency or
authority of the United States, a State,
a territory, a political subdivision of a
State or territory, or an Indian tribe, who
is empowered by law to:
(1) Investigate or conduct an official
inquiry into a potential violation of law;
or
(2) Prosecute or otherwise conduct a
criminal, civil, or administrative
proceeding arising from an alleged
violation of law.
*
*
*
*
*
■ 8. In § 164.304, revise the definition of
‘‘Access’’ to read as follows:
§ 164.304
Definitions.
*
*
*
*
*
Access means the ability or the means
necessary to read, write, modify, or
communicate data/information or
otherwise use any system resource.
(This definition applies to ‘‘access’’ as
PO 00000
Frm 00029
Fmt 4701
Sfmt 4700
§ 164.400
§ 164.402
Applicability.
Definitions.
As used in this subpart, the following
terms have the following meanings:
Breach means the acquisition, access,
use, or disclosure of protected health
information in a manner not permitted
under subpart E of this part which
compromises the security or privacy of
the protected health information.
(1)(i) For purposes of this definition,
compromises the security or privacy of
the protected health information means
poses a significant risk of financial,
reputational, or other harm to the
individual.
(ii) A use or disclosure of protected
health information that does not include
the identifiers listed at § 164.514(e)(2),
date of birth, and zip code does not
compromise the security or privacy of
the protected health information.
(2) Breach excludes:
(i) Any unintentional acquisition,
access, or use of protected health
information by a workforce member or
person acting under the authority of a
covered entity or a business associate, if
such acquisition, access, or use was
made in good faith and within the scope
of authority and does not result in
further use or disclosure in a manner
not permitted under subpart E of this
part.
(ii) Any inadvertent disclosure by a
person who is authorized to access
protected health information at a
covered entity or business associate to
E:\FR\FM\24AUR2.SGM
24AUR2
42768
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
another person authorized to access
protected health information at the same
covered entity or business associate, or
organized health care arrangement in
which the covered entity participates,
and the information received as a result
of such disclosure is not further used or
disclosed in a manner not permitted
under subpart E of this part.
(iii) A disclosure of protected health
information where a covered entity or
business associate has a good faith belief
that an unauthorized person to whom
the disclosure was made would not
reasonably have been able to retain such
information.
Unsecured protected health
information means protected health
information that is not rendered
unusable, unreadable, or indecipherable
to unauthorized individuals through the
use of a technology or methodology
specified by the Secretary in the
guidance issued under section
13402(h)(2) of Public Law 111–5 on the
HHS Web site.
erowe on DSK5CLS3C1PROD with RULES_2
§ 164.404
Notification to individuals.
(a) Standard—(1) General rule. A
covered entity shall, following the
discovery of a breach of unsecured
protected health information, notify
each individual whose unsecured
protected health information has been,
or is reasonably believed by the covered
entity to have been, accessed, acquired,
used, or disclosed as a result of such
breach.
(2) Breaches treated as discovered.
For purposes of paragraph (a)(1) of this
section, §§ 164.406(a), and 164.408(a), a
breach shall be treated as discovered by
a covered entity as of the first day on
which such breach is known to the
covered entity, or, by exercising
reasonable diligence would have been
known to the covered entity. A covered
entity shall be deemed to have
knowledge of a breach if such breach is
known, or by exercising reasonable
diligence would have been known, to
any person, other than the person
committing the breach, who is a
workforce member or agent of the
covered entity (determined in
accordance with the federal common
law of agency).
(b) Implementation specification:
Timeliness of notification. Except as
provided in § 164.412, a covered entity
shall provide the notification required
by paragraph (a) of this section without
unreasonable delay and in no case later
than 60 calendar days after discovery of
a breach.
(c) Implementation specifications:
Content of notification—(1) Elements.
The notification required by paragraph
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
(a) of this section shall include, to the
extent possible:
(A) A brief description of what
happened, including the date of the
breach and the date of the discovery of
the breach, if known;
(B) A description of the types of
unsecured protected health information
that were involved in the breach (such
as whether full name, social security
number, date of birth, home address,
account number, diagnosis, disability
code, or other types of information were
involved);
(C) Any steps individuals should take
to protect themselves from potential
harm resulting from the breach;
(D) A brief description of what the
covered entity involved is doing to
investigate the breach, to mitigate harm
to individuals, and to protect against
any further breaches; and
(E) Contact procedures for individuals
to ask questions or learn additional
information, which shall include a tollfree telephone number, an e-mail
address, Web site, or postal address.
(2) Plain language requirement. The
notification required by paragraph (a) of
this section shall be written in plain
language.
(d) Implementation specifications:
Methods of individual notification. The
notification required by paragraph (a) of
this section shall be provided in the
following form:
(1) Written notice. (i) Written
notification by first-class mail to the
individual at the last known address of
the individual or, if the individual
agrees to electronic notice and such
agreement has not been withdrawn, by
electronic mail. The notification may be
provided in one or more mailings as
information is available.
(ii) If the covered entity knows the
individual is deceased and has the
address of the next of kin or personal
representative of the individual (as
specified under § 164.502(g)(4) of
subpart E), written notification by firstclass mail to either the next of kin or
personal representative of the
individual. The notification may be
provided in one or more mailings as
information is available.
(2) Substitute notice. In the case in
which there is insufficient or out-of-date
contact information that precludes
written notification to the individual
under paragraph (d)(1)(i) of this section,
a substitute form of notice reasonably
calculated to reach the individual shall
be provided. Substitute notice need not
be provided in the case in which there
is insufficient or out-of-date contact
information that precludes written
notification to the next of kin or
PO 00000
Frm 00030
Fmt 4701
Sfmt 4700
personal representative of the
individual under paragraph (d)(1)(ii).
(i) In the case in which there is
insufficient or out-of-date contact
information for fewer than 10
individuals, then such substitute notice
may be provided by an alternative form
of written notice, telephone, or other
means.
(ii) In the case in which there is
insufficient or out-of-date contact
information for 10 or more individuals,
then such substitute notice shall:
(A) Be in the form of either a
conspicuous posting for a period of 90
days on the home page of the Web site
of the covered entity involved, or
conspicuous notice in major print or
broadcast media in geographic areas
where the individuals affected by the
breach likely reside; and
(B) Include a toll-free phone number
that remains active for at least 90 days
where an individual can learn whether
the individual’s unsecured protected
health information may be included in
the breach.
(3) Additional notice in urgent
situations. In any case deemed by the
covered entity to require urgency
because of possible imminent misuse of
unsecured protected health information,
the covered entity may provide
information to individuals by telephone
or other means, as appropriate, in
addition to notice provided under
paragraph (d)(1) of this section.
§ 164.406
Notification to the media.
(a) Standard. For a breach of
unsecured protected health information
involving more than 500 residents of a
State or jurisdiction, a covered entity
shall, following the discovery of the
breach as provided in § 164.404(a)(2),
notify prominent media outlets serving
the State or jurisdiction. For purposes of
this section, State includes American
Samoa and the Northern Mariana
Islands.
(b) Implementation specification:
Timeliness of notification. Except as
provided in § 164.412, a covered entity
shall provide the notification required
by paragraph (a) of this section without
unreasonable delay and in no case later
than 60 calendar days after discovery of
a breach.
(c) Implementation specifications:
Content of notification. The notification
required by paragraph (a) of this section
shall meet the requirements of
§ 164.404(c).
§ 164.408
Notification to the Secretary.
(a) Standard. A covered entity shall,
following the discovery of a breach of
unsecured protected health information
E:\FR\FM\24AUR2.SGM
24AUR2
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
as provided in § 164.404(a)(2), notify the
Secretary.
(b) Implementation specifications:
Breaches involving 500 or more
individuals. For breaches of unsecured
protected health information involving
500 or more individuals, a covered
entity shall, except as provided in
§ 164.412, provide the notification
required by paragraph (a) of this section
contemporaneously with the notice
required by § 164.404(a) and in the
manner specified on the HHS Web site.
(c) Implementation specifications:
Breaches involving less than 500
individuals. For breaches of unsecured
protected health information involving
less than 500 individuals, a covered
entity shall maintain a log or other
documentation of such breaches and,
not later than 60 days after the end of
each calendar year, provide the
notification required by paragraph (a) of
this section for breaches occurring
during the preceding calendar year, in
the manner specified on the HHS Web
site.
erowe on DSK5CLS3C1PROD with RULES_2
§ 164.410 Notification by a business
associate.
(a) Standard. (1) A business associate
shall, following the discovery of a
breach of unsecured protected health
information, notify the covered entity of
such breach.
(2) Breaches treated as discovered.
For purposes of paragraph (1) of this
section, a breach shall be treated as
discovered by a business associate as of
the first day on which such breach is
known to the business associate or, by
exercising reasonable diligence, would
have been known to the business
associate. A business associate shall be
deemed to have knowledge of a breach
if the breach is known, or by exercising
reasonable diligence would have been
known, to any person, other than the
person committing the breach, who is
an employee, officer, or other agent of
the business associate (determined in
accordance with the federal common
law of agency).
(b) Implementation specifications:
Timeliness of notification. Except as
provided in § 164.412, a business
associate shall provide the notification
required by paragraph (a) of this section
without unreasonable delay and in no
case later than 60 calendar days after
discovery of a breach.
(c) Implementation specifications:
Content of notification. (1) The
notification required by paragraph (a) of
this section shall include, to the extent
possible, the identification of each
individual whose unsecured protected
health information has been, or is
reasonably believed by the business
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
associate to have been, accessed,
acquired, used, or disclosed during the
breach.
(2) A business associate shall provide
the covered entity with any other
available information that the covered
entity is required to include in
notification to the individual under
§ 164.404(c) at the time of the
notification required by paragraph (a) of
this section or promptly thereafter as
information becomes available.
§ 164.412
Law enforcement delay.
If a law enforcement official states to
a covered entity or business associate
that a notification, notice, or posting
required under this subpart would
impede a criminal investigation or cause
damage to national security, a covered
entity or business associate shall:
(a) If the statement is in writing and
specifies the time for which a delay is
required, delay such notification, notice,
or posting for the time period specified
by the official; or
(b) If the statement is made orally,
document the statement, including the
identity of the official making the
statement, and delay the notification,
notice, or posting temporarily and no
longer than 30 days from the date of the
oral statement, unless a written
statement as described in paragraph (a)
of this section is submitted during that
time.
§ 164.414 Administrative requirements and
burden of proof.
(a) Administrative requirements. A
covered entity is required to comply
with the administrative requirements of
§ 164.530(b), (d), (e), (g), (h), (i), and (j)
with respect to the requirements of this
subpart.
(b) Burden of proof. In the event of a
use or disclosure in violation of subpart
E, the covered entity or business
associate, as applicable, shall have the
burden of demonstrating that all
notifications were made as required by
this subpart or that the use or disclosure
did not constitute a breach, as defined
at § 164.402.
§ 164.501
[Amended]
10. In § 164.501, remove the definition
‘‘Law enforcement official.’’
■ 11. In § 164.530, revise paragraphs
(b)(1), (b)(2)(i)(C), (d)(1), the first
sentence of paragraph (e)(1), (g)(1), (h),
the first sentence of paragraph (i)(1),
(i)(2)(i) and add paragraph (j)(1)(iv) to
read as follows:
■
§ 164.530
Administrative requirements.
*
*
*
*
*
(b)(1) Standard: Training. A covered
entity must train all members of its
workforce on the policies and
PO 00000
Frm 00031
Fmt 4701
Sfmt 4700
42769
procedures with respect to protected
health information required by this
subpart and subpart D of this part, as
necessary and appropriate for the
members of the workforce to carry out
their functions within the covered
entity.
(2) * * * (i) * * *
(C) To each member of the covered
entity’s workforce whose functions are
affected by a material change in the
policies or procedures required by this
subpart or subpart D of this part, within
a reasonable period of time after the
material change becomes effective in
accordance with paragraph (i) of this
section.
*
*
*
*
*
(d)(1) Standard: Complaints to the
covered entity. A covered entity must
provide a process for individuals to
make complaints concerning the
covered entity’s policies and procedures
required by this subpart and subpart D
of this part or its compliance with such
policies and procedures or the
requirements of this subpart or subpart
D of this part.
*
*
*
*
*
(e)(1) Standard: Sanctions. A covered
entity must have and apply appropriate
sanctions against members of its
workforce who fail to comply with the
privacy policies and procedures of the
covered entity or the requirements of
this subpart or subpart D of this
part.* * *
*
*
*
*
*
(g) Standard: Refraining from
intimidating or retaliatory acts. A
covered entity—
(1) May not intimidate, threaten,
coerce, discriminate against, or take
other retaliatory action against any
individual for the exercise by the
individual of any right established, or
for participation in any process
provided for, by this subpart or subpart
D of this part, including the filing of a
complaint under this section; and
*
*
*
*
*
(h) Standard: Waiver of rights. A
covered entity may not require
individuals to waive their rights under
§ 160.306 of this subchapter, this
subpart, or subpart D of this part, as a
condition of the provision of treatment,
payment, enrollment in a health plan, or
eligibility for benefits.
(i)(1) Standard: Policies and
procedures. A covered entity must
implement policies and procedures with
respect to protected health information
that are designed to comply with the
standards, implementation
specifications, or other requirements of
this subpart and subpart D of this part.
* * *
E:\FR\FM\24AUR2.SGM
24AUR2
42770
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules and Regulations
erowe on DSK5CLS3C1PROD with RULES_2
(2) Standard: Changes to policies and
procedures.
(i) A covered entity must change its
policies and procedures as necessary
and appropriate to comply with changes
in the law, including the standards,
requirements, and implementation
VerDate Nov<24>2008
15:01 Aug 21, 2009
Jkt 217001
specifications of this subpart or subpart
D of this part.
*
*
*
*
*
(j)(1) * * *
(iv) Maintain documentation
sufficient to meet its burden of proof
under § 164.414(b).
*
*
*
*
*
PO 00000
Frm 00032
Fmt 4701
Sfmt 4700
Dated: August 6, 2009.
Kathleen Sebelius,
Secretary.
[FR Doc. E9–20169 Filed 8–19–09; 4:15 pm]
BILLING CODE 4153–01–P
E:\FR\FM\24AUR2.SGM
24AUR2
Agencies
[Federal Register Volume 74, Number 162 (Monday, August 24, 2009)]
[Rules and Regulations]
[Pages 42740-42770]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E9-20169]
[[Page 42739]]
-----------------------------------------------------------------------
Part II
Department of Health and Human Services
-----------------------------------------------------------------------
45 CFR Parts 160 and 164
Breach Notification for Unsecured Protected Health Information; Interim
Final Rule
Federal Register / Vol. 74, No. 162 / Monday, August 24, 2009 / Rules
and Regulations
[[Page 42740]]
-----------------------------------------------------------------------
DEPARTMENT OF HEALTH AND HUMAN SERVICES
Office of the Secretary
45 CFR Parts 160 and 164
RIN 0991-AB56
Breach Notification for Unsecured Protected Health Information
AGENCY: Office for Civil Rights, Department of Health and Human
Services.
ACTION: Interim final rule with request for comments.
-----------------------------------------------------------------------
SUMMARY: The Department of Health and Human Services (HHS) is issuing
this interim final rule with a request for comments to require
notification of breaches of unsecured protected health information.
Section 13402 of the Health Information Technology for Economic and
Clinical Health (HITECH) Act, part of the American Recovery and
Reinvestment Act of 2009 (ARRA) that was enacted on February 17, 2009,
requires HHS to issue interim final regulations within 180 days to
require covered entities under the Health Insurance Portability and
Accountability Act of 1996 (HIPAA) and their business associates to
provide notification in the case of breaches of unsecured protected
health information. For purposes of determining what information is
``unsecured protected health information,'' in this document HHS is
also issuing an update to its guidance specifying the technologies and
methodologies that render protected health information unusable,
unreadable, or indecipherable to unauthorized individuals.
DATES: Effective Date: This interim final rule is effective September
23, 2009.
Comment Date: Comments on the provisions of this interim final rule
are due on or before October 23, 2009. Comments on the information
collection requirements associated with this rule are due on or before
September 8, 2009.
ADDRESSES: You may submit comments, identified by RIN 0991-AB56, by any
of the following methods (please do not submit duplicate comments):
Federal eRulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments. Attachments should be
in Microsoft Word, WordPerfect, or Excel; however, we prefer Microsoft
Word.
Regular, Express, or Overnight Mail: U.S. Department of
Health and Human Services, Office for Civil Rights, Attention: HITECH
Breach Notification, Hubert H. Humphrey Building, Room 509F, 200
Independence Avenue, SW., Washington, DC 20201. Please submit one
original and two copies.
Hand Delivery or Courier: Office for Civil Rights,
Attention: HITECH Breach Notification, Hubert H. Humphrey Building,
Room 509F, 200 Independence Avenue, SW., Washington, DC 20201. Please
submit one original and two copies. (Because access to the interior of
the Hubert H. Humphrey Building is not readily available to persons
without federal government identification, commenters are encouraged to
leave their comments in the mail drop slots located in the main lobby
of the building.)
Inspection of Public Comments: All comments received before the
close of the comment period will be available for public inspection,
including any personally identifiable or confidential business
information that is included in a comment. We will post all comments
received before the close of the comment period at https://www.regulations.gov. Because comments will be made public, they should
not include any sensitive personal information, such as a person's
social security number; date of birth; driver's license number, state
identification number or foreign country equivalent; passport number;
financial account number; or credit or debit card number. Comments also
should not include any sensitive health information, such as medical
records or other individually identifiable health information.
Docket: For access to the docket to read background documents or
comments received, go to https://www.regulations.gov or U.S. Department
of Health and Human Services, Office for Civil Rights, 200 Independence
Avenue, SW., Washington, DC 20201 (call ahead to the contact listed
below to arrange for inspection).
FOR FURTHER INFORMATION CONTACT: Andra Wicks, 202-205-2292.
SUPPLEMENTARY INFORMATION:
I. Background
The Health Information Technology for Economic and Clinical Health
(HITECH) Act, Title XIII of Division A and Title IV of Division B of
the American Recovery and Reinvestment Act of 2009 (ARRA) (Pub. L. 111-
5), was enacted on February 17, 2009. Subtitle D of Division A of the
HITECH Act (the Act), entitled ``Privacy,'' among other provisions,
requires the Department of Health and Human Services (HHS or the
Department) to issue interim final regulations for breach notification
by covered entities subject to the Administrative Simplification
provisions of the Health Insurance Portability and Accountability Act
of 1996 (HIPAA) (Pub. L. 104-191) and their business associates.
These breach notification provisions are found in section 13402 of
the Act and apply to HIPAA covered entities and their business
associates that access, maintain, retain, modify, record, store,
destroy, or otherwise hold, use, or disclose unsecured protected health
information. The Act incorporates the definitions of ``covered
entity,'' ``business associate,'' and ``protected health information''
used in the HIPAA Administrative Simplification regulations (45 CFR
parts 160, 162, and 164) (HIPAA Rules) at Sec. 160.103. Under the
HIPAA Rules, a covered entity is a health plan, health care
clearinghouse, or health care provider that transmits any health
information electronically in connection with a covered transaction,
such as submitting health care claims to a health plan. Business
associate, as defined in the HIPAA Rules, means a person who performs
functions or activities on behalf of, or certain services for, a
covered entity that involve the use or disclosure of individually
identifiable health information. Examples of business associates
include third party administrators or pharmacy benefit managers for
health plans, claims processing or billing companies, transcription
companies, and persons who perform legal, actuarial, accounting,
management, or administrative services for covered entities and who
require access to protected health information. The HIPAA Rules define
``protected health information'' as the individually identifiable
health information held or transmitted in any form or medium by these
HIPAA covered entities and business associates, subject to certain
limited exceptions.
The Act requires HIPAA covered entities to provide notification to
affected individuals and to the Secretary of HHS following the
discovery of a breach of unsecured protected health information. In
addition, in some cases, the Act requires covered entities to provide
notification to the media of breaches. In the case of a breach of
unsecured protected health information at or by a business associate of
a covered entity, the Act requires the business associate to notify the
covered entity of the breach. Finally, the Act requires the Secretary
to post on an HHS Web site a list of covered entities that experience
breaches of unsecured protected health information involving more than
500 individuals.
[[Page 42741]]
Section 13400(1) of the Act defines ``breach'' to mean, generally,
the unauthorized acquisition, access, use, or disclosure of protected
health information which compromises the security or privacy of such
information. The Act provides exceptions to this definition to
encompass disclosures where the recipient of the information would not
reasonably have been able to retain the information, certain
unintentional acquisition, access, or use of information by employees
or persons acting under the authority of a covered entity or business
associate, as well as certain inadvertent disclosures among persons
similarly authorized to access protected health information at a
business associate or covered entity.
Further, section 13402(h) of the Act defines ``unsecured protected
health information'' as ``protected health information that is not
secured through the use of a technology or methodology specified by the
Secretary in guidance'' and provides that the guidance specify the
technologies and methodologies that render protected health information
unusable, unreadable, or indecipherable to unauthorized individuals.
Covered entities and business associates that implement the specified
technologies and methodologies with respect to protected health
information are not required to provide notifications in the event of a
breach of such information--that is, the information is not considered
``unsecured'' in such cases. As required by the Act, the Secretary
initially issued this guidance on April 17, 2009 (it was subsequently
published in the Federal Register at 74 FR 19006 on April 27, 2009).
The guidance listed and described encryption and destruction as the two
technologies and methodologies for rendering protected health
information unusable, unreadable, or indecipherable to unauthorized
individuals.
In cases in which notification is required, the Act at section
13402 prescribes the timeliness, content, and methods of providing the
breach notifications. We discuss these and the above statutory
provisions in more detail below where we describe section-by-section
how these new regulations implement the breach notification provisions
at section 13402 of the Act.
In addition to the breach notification provisions for HIPAA covered
entities and business associates at section 13402, section 13407 of the
Act, which is to be implemented and enforced by the Federal Trade
Commission (FTC), imposes similar breach notification requirements upon
vendors of personal health records (PHRs) and their third party service
providers following the discovery of a breach of security of unsecured
PHR identifiable health information.\1\ As with the definition of
``unsecured protected health information,'' the provisions at section
13407(f)(3) define ``unsecured PHR identifiable health information'' as
PHR identifiable health information that is not protected through the
use of a technology or methodology specified by the Secretary of HHS in
guidance. Thus, entities subject to the FTC breach notification rules
must also use the Secretary's guidance to determine whether the
information subject to a breach was ``unsecured'' and, therefore,
whether breach notification is required.
---------------------------------------------------------------------------
\1\ The FTC issued a notice of proposed rulemaking to implement
section 13407 of the Act on April 20, 2009 (74 FR 17914).
---------------------------------------------------------------------------
When HHS issued the guidance, HHS also published in the same
document a request for information (RFI), inviting public comment both
on the guidance itself, as well as on the breach provisions of section
13402 of the Act generally. After considering the public comment, we
are issuing an updated version of the guidance in Section II below. In
addition, we discuss public comment received on the Act's breach
notification provisions where relevant below in the section-by-section
description of the interim final rule.
We have concluded that we have good cause, under 5 U.S.C.
553(b)(B), to waive the notice-and-comment requirements of the
Administrative Procedure Act and to proceed with this interim final
rule. Section 13402(j) explicitly required us to issue these
regulations as ``interim final regulations'' and to do so within 180
days. Based on this statutory directive and limited time frame, we
concluded that notice-and-comment rulemaking was impracticable and
contrary to public policy. Nevertheless, we sought comments in the RFI
referenced above and considered those comments when drafting this rule.
In addition, we provide the public with a 60-day period following
publication of this document to submit comments on the interim final
rule.
II. Guidance Specifying the Technologies and Methodologies That Render
Protected Health Information Unusable, Unreadable, or Indecipherable to
Unauthorized Individuals
A. Background
As discussed above, section 13402 of the Act requires breach
notification following the discovery of a breach of unsecured protected
health information. Section 13402(h) of the Act defines ``unsecured
protected health information'' as ``protected health information that
is not secured through the use of a technology or methodology specified
by the Secretary in guidance'' and requires the Secretary to specify in
the guidance the technologies and methodologies that render protected
health information unusable, unreadable, or indecipherable to
unauthorized individuals. As required by the Act, this guidance was
issued on April 17, 2009, and later published in the Federal Register
on April 27, 2009 (74 FR 19006). The guidance specified encryption and
destruction as the technologies and methodologies for rendering
protected health information, as well as PHR identifiable health
information under section 13407 of the Act and the FTC's implementing
regulation, unusable, unreadable, or indecipherable to unauthorized
individuals such that breach notification is not required. The RFI
asked for general comment on this guidance as well as for specific
comment on the technologies and methodologies to render protected
health information unusable, unreadable, or indecipherable to
unauthorized individuals.
Many commenters expressed concern and confusion regarding the
purpose of the guidance and its impact on a covered entity's
responsibilities under the HIPAA Security Rule (45 CFR part 164,
subparts A and C). We emphasize that this guidance does nothing to
modify a covered entity's responsibilities with respect to the Security
Rule nor does it impose any new requirements upon covered entities to
encrypt all protected health information. The Security Rule requires
covered entities to safeguard electronic protected health information
and permits covered entities to use any security measures that allow
them to reasonably and appropriately implement all safeguard
requirements. Under 45 CFR 164.312(a)(2)(iv) and (e)(2)(ii), a covered
entity must consider implementing encryption as a method for
safeguarding electronic protected health information; however, because
these are addressable implementation specifications, a covered entity
may be in compliance with the Security Rule even if it reasonably
decides not to encrypt electronic protected health information and
instead uses a comparable method to safeguard the information.
Therefore, if a covered entity chooses to encrypt protected health
information to comply with the Security Rule, does so pursuant to this
guidance, and subsequently discovers a breach of that
[[Page 42742]]
encrypted information, the covered entity will not be required to
provide breach notification because the information is not considered
``unsecured protected health information'' as it has been rendered
unusable, unreadable, or indecipherable to unauthorized individuals. On
the other hand, if a covered entity has decided to use a method other
than encryption or an encryption algorithm that is not specified in
this guidance to safeguard protected health information, then although
that covered entity may be in compliance with the Security Rule,
following a breach of this information, the covered entity would have
to provide breach notification to affected individuals. For example, a
covered entity that has a large database of protected health
information may choose, based on their risk assessment under the
Security Rule, to rely on firewalls and other access controls to make
the information inaccessible, as opposed to encrypting the information.
While the Security Rule permits the use of firewalls and access
controls as reasonable and appropriate safeguards, a covered entity
that seeks to ensure breach notification is not required in the event
of a breach of the information in the database would need to encrypt
the information pursuant to the guidance.
We also received several comments asking for clarification and
additional detail regarding the forms of information and the specific
devices and protocols described in the guidance. As a result, we
provide clarification regarding the forms of information addressed in
the National Institute of Standards and Technology (NIST) publications
referenced in the guidance. We clarify that ``data in motion'' includes
data that is moving through a network, including wireless transmission,
whether by e-mail or structured electronic interchange, while ``data at
rest'' includes data that resides in databases, file systems, flash
drives, memory, and any other structured storage method. ``Data in
use'' includes data in the process of being created, retrieved,
updated, or deleted, and ``data disposed'' includes discarded paper
records or recycled electronic media.
Additionally, many commenters suggested that access controls be
included in the guidance as a method for rendering protected health
information unusable, unreadable, or indecipherable to unauthorized
individuals. We recognize that access controls, as well as other
security methods such as firewalls, are important tools for
safeguarding protected health information. While we believe access
controls may render information inaccessible to unauthorized
individuals, we do not believe that access controls meet the statutory
standard of rendering protected health information unusable,
unreadable, or indecipherable to unauthorized individuals. If access
controls are compromised, the underlying information may still be
usable, readable, or decipherable to an unauthorized individual, and
thus, constitute unsecured protected health information for which
breach notification is required. Therefore, we have not included access
controls in the guidance; however, we do emphasize the benefit of
strong access controls, which may function to prevent breaches of
unsecured protected health information from occurring in the first
place.
Other commenters suggested that the guidance include redaction of
paper records as an alternative to destruction. Because redaction is
not a standardized methodology with proven capabilities to destroy or
render the underlying information unusable, unreadable or
indecipherable, we do not believe that redaction is an accepted
alternative method to secure paper-based protected health information.
Therefore, we have clarified in this guidance that only destruction of
paper protected health information, and not redaction, will satisfy the
requirements to relieve a covered entity or business associate from
breach notification. We note, however, that covered entities and
business associates may continue to create limited data sets or de-
identify protected health information through redaction if the removal
of identifiers results in the information satisfying the criteria of 45
CFR 164.514(e)(2) or 164.514(b), respectively. Further, a loss or theft
of information that has been redacted appropriately may not require
notification under these rules either because the information is not
protected health information (as in the case of de-identified
information) or because the unredacted information does not compromise
the security or privacy of the information and thus, does not
constitute a breach as described in Section IV below.
In response to comments received, we also make two additional
clarifications in the guidance. First, for purposes of the guidance
below and ensuring encryption keys are not breached, we clarify that
covered entities and business associates should keep encryption keys on
a separate device from the data that they encrypt or decrypt. Second,
we also include in the guidance below a note regarding roadmap guidance
activities on the part of the NIST pertaining to data storage on
enterprise-level storage devices, such as RAID (redundant array of
inexpensive disks), or SAN (storage-attached network) systems.
For ease of reference, we have published this updated guidance in
this document below; however, it will also be available on the HHS Web
site at https://www.hhs.gov/ocr/privacy/. Any further comments regarding
this guidance received in response to the interim final rule will be
addressed in the first annual update to the guidance, to be issued in
April 2010.
B. Guidance Specifying the Technologies and Methodologies that Render
Protected Health Information Unusable, Unreadable, or Indecipherable to
Unauthorized Individuals
Protected health information (PHI) is rendered unusable,
unreadable, or indecipherable to unauthorized individuals if one or
more of the following applies:
(a) Electronic PHI has been encrypted as specified in the HIPAA
Security Rule by ``the use of an algorithmic process to transform data
into a form in which there is a low probability of assigning meaning
without use of a confidential process or key'' \2\ and such
confidential process or key that might enable decryption has not been
breached. To avoid a breach of the confidential process or key, these
decryption tools should be stored on a device or at a location separate
from the data they are used to encrypt or decrypt. The encryption
processes identified below have been tested by the National Institute
of Standards and Technology (NIST) and judged to meet this standard.
---------------------------------------------------------------------------
\2\ 45 CFR 164.304, definition of ``encryption.''
---------------------------------------------------------------------------
(i) Valid encryption processes for data at rest are consistent with
NIST Special Publication 800-111, Guide to Storage Encryption
Technologies for End User Devices.3 4
---------------------------------------------------------------------------
\3\ NIST Roadmap plans include the development of security
guidelines for enterprise-level storage devices, and such guidelines
will be considered in updates to this guidance, when available.
\4\ Available at https://www.csrc.nist.gov/.
---------------------------------------------------------------------------
(ii) Valid encryption processes for data in motion are those which
comply, as appropriate, with NIST Special Publications 800-52,
Guidelines for the Selection and Use of Transport Layer Security (TLS)
Implementations; 800-77, Guide to IPsec VPNs; or 800-113, Guide to SSL
VPNs, or others which are Federal Information Processing Standards
(FIPS) 140-2 validated.\5\
---------------------------------------------------------------------------
\5\ Available at https://www.csrc.nist.gov/.
---------------------------------------------------------------------------
[[Page 42743]]
(b) The media on which the PHI is stored or recorded have been
destroyed in one of the following ways:
(i) Paper, film, or other hard copy media have been shredded or
destroyed such that the PHI cannot be read or otherwise cannot be
reconstructed. Redaction is specifically excluded as a means of data
destruction.
(ii) Electronic media have been cleared, purged, or destroyed
consistent with NIST Special Publication 800-88, Guidelines for Media
Sanitization,\6\ such that the PHI cannot be retrieved.
---------------------------------------------------------------------------
\6\ Available at https://www.csrc.nist.gov/.
---------------------------------------------------------------------------
III. Overview of Interim Final Rule
We are adding a new subpart D to part 164 of title 45 of the Code
of Federal Regulations (CFR) to implement the breach notification
provisions in section 13402 of the Act. These provisions apply to HIPAA
covered entities and their business associates and set forth the
requirements for notification to affected individuals, the media, and
the Secretary of HHS following a breach of unsecured protected health
information. In drafting this interim final regulation, we considered
the public comments received in response to the RFI described above.
In addition, we consulted closely with the FTC in the development
of these regulations. Commenters in response to both the RFI as well as
the FTC's notice of proposed rulemaking urged HHS and the FTC to work
together to ensure that the regulated entities know with which rule
they must comply and that those entities that are subject to both rules
because they may operate in different roles are not subject to two
completely different and inconsistent regulatory schemes. In addition,
commenters were concerned that individuals could receive multiple
notices of the same breach if the HHS and the FTC regulations
overlapped. Thus, HHS coordinated with the FTC to ensure these issues
were addressed in the respective rulemakings. First, the rules make
clear that entities operating as HIPAA covered entities and business
associates are subject to HHS', and not the FTC's, breach notification
rule. Second, in those limited cases where an entity may be subject to
both HHS' and the FTC's rules, such as a vendor that offers PHRs to
customers of a HIPAA covered entity as a business associate and also
offers PHRs directly to the public, we worked with the FTC to ensure
both sets of regulations were harmonized by including the same or
similar requirements, within the constraints of the statutory language.
See Section IV.F. below for a more detailed discussion and an example
of our harmonization efforts.
IV. Section-by-Section Description of Interim Final Rule
The following discussion describes the provisions of the interim
final rule section by section. Those interested in commenting on the
interim final rule can assist the Department by preceding discussion of
any particular provision or topic with a citation to the section of the
interim final rule being discussed.
A. Applicability--Section 164.400
Section 164.400 of the interim final rule provides that this breach
notification rule is applicable to breaches occurring on or after 30
days from the date of publication of this interim final rule. See
Section IV.K. Effective/Compliance Date of this rule for further
discussion.
B. Definitions--Section 164.402
Section 164.402 of the interim final rule adopts definitions for
the terms ``breach'' and ``unsecured protected health information.''
1. Breach
Section 13402 of the Act and this interim final rule require
covered entities and business associates to provide notification
following a breach of unsecured protected health information. Section
13400(1)(A) of the Act defines ``breach'' as the ``unauthorized
acquisition, access, use, or disclosure of protected health information
which compromises the security or privacy of the protected health
information, except where an unauthorized person to whom such
information is disclosed would not reasonably have been able to retain
such information.'' Section 13400(1)(B) of the Act provides several
exceptions to the definition of ``breach.'' Based on section
13400(1)(A), we have defined ``breach'' at Sec. 164.402 of the interim
final rule as ``the acquisition, access, use, or disclosure of
protected health information in a manner not permitted under subpart E
of this part which compromises the security or privacy of the protected
health information.'' We have added paragraph (1) to the definition to
clarify when the security or privacy of information is considered to be
compromised. Paragraph (2) of the definition then includes the
statutory exceptions, including the exception within section
13400(1)(A) that refers to whether the recipient would reasonably have
been able to retain the information.
Protected Health Information
We note that the definition of ``breach'' is limited to protected
health information. With respect to a covered entity or business
associate of a covered entity, protected health information is
individually identifiable health information that is transmitted or
maintained in any form or medium, including electronic information. 45
CFR 160.103. If information is de-identified in accordance with 45 CFR
164.514(b), it is not protected health information, and thus, any
inadvertent or unauthorized use or disclosure of such information will
not be considered a breach for purposes of this subpart. Additionally,
Sec. 160.103 excludes certain types of individually identifiable
health information from the definition of ``protected health
information,'' such as employment records held by a covered entity in
its role as employer. If individually identifiable health information
that is not protected health information is used or disclosed in an
unauthorized manner, it would not qualify as a breach for purposes of
this subpart--although the covered entity should consider whether it
has notification requirements under other laws. Further, we note that
although the definition of ``breach'' applies to protected health
information generally, covered entities and business associates are
required to provide the breach notifications required by the Act and
this interim final rule (discussed below) only upon a breach of
unsecured protected health information. See also Section II of this
document for a list of the technologies and methodologies that render
protected health information secure such that notification is not
required in the event of a breach.
Unauthorized Acquisition, Access, Use, or Disclosure
The statute defines a ``breach'' as the ``unauthorized''
acquisition, access, use, or disclosure of protected health
information. Several commenters asked that we define ``unauthorized''
or that we clarify its meaning. We clarify that ``unauthorized'' is an
impermissible use or disclosure of protected health information under
the HIPAA Privacy Rule (subpart E of 45 CFR part 164). Accordingly, the
definition of ``breach'' at Sec. 160.402 of the interim final rule
interprets the ``unauthorized acquisition, access, use, or disclosure
of protected health information'' as ``the acquisition, access, use, or
disclosure of protected health information in a manner not permitted
under subpart E of this part.'' We emphasize that not all violations of
the Privacy Rule will be
[[Page 42744]]
breaches under this subpart, and therefore, covered entities and
business associates need not provide breach notification in all cases
of impermissible uses and disclosures. We also note that the HIPAA
Security Rule provides for administrative, physical, and technical
safeguards and organizational requirements for electronic protected
health information, but does not govern uses and disclosures of
protected health information. Accordingly, a violation of the Security
Rule does not itself constitute a potential breach under this subpart,
although such a violation may lead to a use or disclosure of protected
health information that is not permitted under the Privacy Rule and
thus, may potentially be a breach under this subpart.
The Act does not define the terms ``acquisition'' and ``access.''
Several commenters asked that we define or identify the differences
between acquisition, access, use, and disclosure of protected health
information, for purposes of the definition of ``breach.'' We interpret
``acquisition'' and ``access'' to information based on their plain
meanings and believe that both terms are encompassed within the current
definitions of ``use'' and ``disclosure'' in the HIPAA Rules.
Accordingly, we have not added separate definitions for these terms. We
have retained the statutory terms in the regulation in order to
maintain consistency with the statute. In addition, we note that while
the HIPAA Security Rule at Sec. 164.304 includes a definition of the
term ``access,'' such definition is limited to the ability to use
``system resources'' and not to access to information more generally
and thus, we have revised that definition to make clear that it does
not apply for purposes of these breach notification rules.
For an acquisition, access, use, or disclosure of protected health
information to constitute a breach, it must constitute a violation of
the Privacy Rule. Therefore, one of the first steps in determining
whether notification is necessary under this subpart is to determine
whether a use or disclosure violates the Privacy Rule. We note that
uses or disclosures that impermissibly involve more than the minimum
necessary information, in violation of Sec. Sec. 164.502(b) and
164.514(d), may qualify as breaches under this subpart. In contrast, a
use or disclosure of protected health information that is incident to
an otherwise permissible use or disclosure and occurs despite
reasonable safeguards and proper minimum necessary procedures would not
be a violation of the Privacy Rule pursuant to 45 CFR
164.502(a)(1)(iii) and, therefore, would not qualify as a potential
breach. Finally, violations of administrative requirements, such as a
lack of reasonable safeguards or a lack of training, do not themselves
qualify as potential breaches under this subpart (although such
violations certainly may lead to impermissible uses or disclosures that
qualify as breaches).
Compromises the Security or Privacy of Protected Health Information
The Act and regulation next limit the definition of ``breach'' to a
use or disclosure that ``compromises the security or privacy'' of the
protected health information. Accordingly, once it is established that
a use or disclosure violates the Privacy Rule, the covered entity must
determine whether the violation compromises the security or privacy of
the protected health information.
For the purposes of the definition of ``breach,'' many commenters
suggested that we add a harm threshold such that an unauthorized use or
disclosure of protected health information is considered a breach only
if the use or disclosure poses some harm to the individual. These
commenters noted that the ``compromises the security or privacy''
language in section 13400(1)(A) of the Act contemplates that covered
entities will perform some type of risk assessment to determine if
there is a risk of harm to the individual, and therefore, if a breach
has occurred. Commenters urged that the addition of a harm threshold to
the definition would also align this regulation with many State breach
notification laws that require entities to reach similar harm
thresholds before providing notification. Finally, some commenters
noted that failure to include a harm threshold for requiring breach
notification may diminish the impact of notifications received by
individuals, as individuals may be flooded with notifications for
breaches that pose no threat to the security or privacy of their
protected health information or, alternatively, may cause unwarranted
panic in individuals, and the expenditure of undue costs and other
resources by individuals in remedial action.
We agree that the statutory language encompasses a harm threshold
and have clarified in paragraph (1) of the definition that
``compromises the security or privacy of the protected health
information'' means ``poses a significant risk of financial,
reputational, or other harm to the individual.'' This ensures better
consistency and alignment with State breach notification laws, as well
as existing obligations on Federal agencies (some of which also must
comply with these rules as HIPAA covered entities) pursuant to OMB
Memorandum M-07-16 to have in place breach notification policies for
personally identifiable information that take into account the likely
risk of harm caused by a breach in determining whether breach
notification is required. Thus, to determine if an impermissible use or
disclosure of protected health information constitutes a breach,
covered entities and business associates will need to perform a risk
assessment to determine if there is a significant risk of harm to the
individual as a result of the impermissible use or disclosure. In
performing the risk assessment, covered entities and business
associates may need to consider a number or combination of factors,
some of which are described below.\7\
---------------------------------------------------------------------------
\7\ Covered entities may also wish to review OMB Memorandum M-
07-16 for examples of the types of factors that may need to be taken
into account in determining whether an impermissible use or
disclosure presents a significant risk of harm to the individual.
---------------------------------------------------------------------------
Covered entities and business associates should consider who
impermissibly used or to whom the information was impermissibly
disclosed when evaluating the risk of harm to individuals. If, for
example, protected health information is impermissibly disclosed to
another entity governed by the HIPAA Privacy and Security Rules or to a
Federal agency that is obligated to comply with the Privacy Act of 1974
(5 U.S.C. 552a) and the Federal Information Security Management Act of
2002 (44 U.S.C. 3541 et seq.), there may be less risk of harm to the
individual, since the recipient entity is obligated to protect the
privacy and security of the information it received in the same or
similar manner as the entity that disclosed the information. In
contrast, if protected health information is impermissibly disclosed to
any entity or person that does not have similar obligations to maintain
the privacy and security of the information, the risk of harm to the
individual is much greater.
We expect that there may be circumstances where a covered entity
takes immediate steps to mitigate an impermissible use or disclosure,
such as by obtaining the recipient's satisfactory assurances that the
information will not be further used or disclosed (through a
confidentiality agreement or similar means) or will be destroyed. If
such steps eliminate or reduce the risk of harm to the individual to a
less than ``significant risk,'' then we interpret that the security and
privacy of the
[[Page 42745]]
information has not been compromised and, therefore, no breach has
occurred.
In addition, there may be circumstances where impermissibly
disclosed protected health information is returned prior to it being
accessed for an improper purpose. For example, if a laptop is lost or
stolen and then recovered, and a forensic analysis of the computer
shows that its information was not opened, altered, transferred, or
otherwise compromised, such a breach may not pose a significant risk of
harm to the individuals whose information was on the laptop. Note,
however, that if a computer is lost or stolen, we do not consider it
reasonable to delay breach notification based on the hope that the
computer will be recovered.
In performing a risk assessment, covered entities and business
associates should also consider the type and amount of protected health
information involved in the impermissible use or disclosure. If the
nature of the protected health information does not pose a significant
risk of financial, reputational, or other harm, then the violation is
not a breach. For example, if a covered entity improperly discloses
protected health information that merely included the name of an
individual and the fact that he received services from a hospital, then
this would constitute a violation of the Privacy Rule, but it may not
constitute a significant risk of financial or reputational harm to the
individual. In contrast, if the information indicates the type of
services that the individual received (such as oncology services), that
the individual received services from a specialized facility (such as a
substance abuse treatment program \8\), or if the protected health
information includes information that increases the risk of identity
theft (such as a social security number, account number, or mother's
maiden name), then there is a higher likelihood that the impermissible
use or disclosure compromised the security and privacy of the
information. The risk assessment should be fact specific, and the
covered entity or business associate should keep in mind that many
forms of health information, not just information about sexually
transmitted diseases or mental health, should be considered sensitive
for purposes of the risk of reputational harm--especially in light of
fears about employment discrimination.
---------------------------------------------------------------------------
\8\ Note that an impermissible disclosure that indicates that an
individual has received services from a substance abuse treatment
program may also constitute a violation of 42 U.S.C. 290dd-2 and the
implementing regulations at 42 CFR part 2. These provisions require
the confidentiality of substance abuse patient records.
---------------------------------------------------------------------------
We also address impermissible uses and disclosures involving
limited data sets (as the term is used at 45 CFR 164.514(e) of the
Privacy Rule), in paragraph (1) of the definition of ``breach'' at
Sec. 164.402 of the interim final rule. In the RFI discussed above, we
asked for public comment on whether limited data sets should be
considered unusable, unreadable, or indecipherable and included as a
methodology in the guidance. A limited data set is created by removing
the 16 direct identifiers listed in Sec. 164.514(e)(2) from the
protected health information.\9\ These direct identifiers include the
name, address, social security number, and account number of an
individual or the individual's relative, employer, or household member.
When these 16 direct identifiers are removed from the protected health
information, the information is not completely de-identified pursuant
to 45 CFR 164.514(b). In particular, the elements of dates, such as
dates of birth, and zip codes, are allowed to remain within the limited
data set, which increase the potential for re-identification of the
information. Because there is a risk of re-identification of the
information within a limited data set, the Privacy Rule treats this
information as protected health information that may only be used or
disclosed as permitted by the Privacy Rule.
---------------------------------------------------------------------------
\9\ A limited data set is protected health information that
excludes the following direct identifiers of the individual or of
relatives, employers, or household members of the individual: (1)
Names; (2) postal address information, other than town or city,
State, and zip code; (3) telephone numbers; (4) fax numbers; (5) e-
mail addresses; (6) social security numbers; (7) medical record
numbers; (8) health plan beneficiary numbers; (9) account numbers;
(10) certificate/license plate numbers; (11) vehicle identifiers and
serial numbers; (12) device identifiers and serial numbers; (13) Web
URLs; (14) Internet Protocol (IP) address numbers; (15) biometric
identifiers, including finger and voice prints; and (16) full face
photographic images and any comparable images.
---------------------------------------------------------------------------
Several commenters suggested that the limited data set should not
be included in the guidance as a method to render protected health
information unusable, unreadable, or indecipherable to unauthorized
individuals such that breach notification is not required. These
commenters cited concerns about the risk of re-identification of
protected health information in a limited data set and noted that, as
more data exists in electronic form and as more data becomes public, it
will be easier to combine these various sources to re-establish the
identity of the individual. Furthermore, due to the risk of re-
identification, these commenters stated that creating a limited data
set was not comparable to encrypting information, and therefore, should
not be included as a method to render protected health information
unusable, unreadable, or indecipherable to unauthorized individuals.
The majority of commenters, however, did support the inclusion of
the limited data set in the guidance. These commenters stated that it
would be impractical to require covered entities and business
associates to notify individuals of a breach of information within a
limited data set because, by definition, such information excludes the
very identifiers that would enable covered entities and business
associates, without undue burden, to identify the affected individuals
and comply with the breach notification requirements. Additionally,
these commenters cited contractual concerns regarding the data use
agreement, which prohibits the recipient of a limited data set from re-
identifying the information and therefore, may pose problems with
complying with the notification requirements of section 13402(b) of the
Act.
These commenters also noted that the decision to exclude the
limited data set from the guidance, such that a breach of a limited
data set would require breach notification, would reduce the likelihood
that covered entities would continue to create and share limited data
sets. This, in turn, would have a chilling effect on the research and
public health communities, which rely on receiving information from
covered entities in limited data set form.
Finally, commenters noted that the removal of the 16 direct
identifiers in the limited data set presents a minimal risk of serious
harm to the individual by limiting the possibility that the information
could be used for an illicit purpose if breached. These commenters also
suggested that the inclusion of the limited data set in the guidance
would align with most state breach notification laws, which, as a
general matter, only require notification when certain identifiers are
exposed and when there is a likelihood that the breach will result in
harm to the individual.
We also asked commenters if they believed that the removal of an
individual's date of birth or zip code, in addition to the 16 direct
identifiers in 45 CFR 164.514(e)(2), would reduce the risk of re-
identification of the information such that it could be included in the
guidance. Several commenters responded to this question. While some
stated that the removal of these data elements would render the
[[Page 42746]]
information useless to the research and public health communities,
which may, for example, require zip codes for many population based
studies, many commenters did acknowledge that the removal of these
additional identifiers would reduce the risk of re-identification of
the information.
After considering these comments, we decided against including the
limited data set in the guidance as a method for rendering protected
health information unusable, unreadable, or indecipherable to
unauthorized individuals due to the potential risk of re-identification
of this information. However, we address breaches of limited data sets
in the definition of ``breach'' as follows.
Under the definition of ``breach'' at Sec. 164.402, in order to
determine whether a covered entity's or business associate's
impermissible use or disclosure of protected health information
constitutes a breach, the covered entity or business associate will
need to perform the risk assessment discussed above. This applies to
impermissible uses or disclosures of protected health information that
constitute a limited data set, unless, as discussed below, the
protected health information also does not include zip codes or dates
of birth. In performing the risk assessment to determine the likely
risk of harm caused by an impermissible use or disclosure of a limited
data set, the covered entity or business associate should take into
consideration the risk of re-identification of the protected health
information contained in the limited data set.
Through a risk assessment, a covered entity or business associate
may determine that the risk of identifying a particular individual is
so small that the use or disclosure poses no significant risk of harm
to any individuals. For example, it may be determined that an
impermissible use or disclosures of a limited data set that includes
zip codes, based on the population features of those zip codes, does
not create a significant risk that a particular individual can be
identified. Therefore, there would be no significant risk of harm to
the individual. If there is no significant risk of harm to the
individual, then no breach has occurred and no notification is
required. If, however, the covered entity or business associate
determines that the individual can be identified based on the
information disclosed, and there is otherwise a significant risk of
harm to the individual, then breach notification is required, unless
one of the other exceptions discussed below applies.
We have provided a narrow, explicit exception to what compromises
the privacy or security of protected health information for a use or
disclosure of protected health information that excludes the 16 direct
identifiers listed at 45 CFR 164.514(e)(2) as well as dates of birth
and zip codes. Thus, we deem an impermissible use or disclosure of this
information to not compromise the security or privacy of the protected
health information, because we believe that impermissible uses or
disclosures of this information--if subjected to the type of risk
assessment described above--would pose a low level of risk. We
emphasize that this is a narrow exception. If, for example, the
information does not contain birth dates but does contain zip code
information or contains both birth dates and zip code information, then
this narrow exception would not apply, and the covered entity or
business associate would be required to perform a risk assessment to
determine if the risk of re-identification poses a significant risk of
harm to the individual. We invite comments on this narrow exception. We
do not believe that this narrow exception will have the unintended
consequence of discouraging the use of encryption and other methods for
rendering protected health information unusable, unreadable, or
indecipherable; however, we invite comments on this issue as well.
Finally, we note that this narrow exception should not be construed as
encouraging or permitting the use or disclosure of more than the
minimum necessary information, in violation of Sec. Sec. 164.502(b)
and 164.514(d).
We do not intend to interfere with research or public health
activities that rely on dates of birth or zip codes. Uses and
disclosures of limited data sets that include this information continue
to be permissible under the Privacy Rule if the applicable
requirements, such as a data use agreement, are satisfied. Further, we
note that a covered entity or business associate is not responsible for
a breach by a third party to whom it permissibly disclosed protected
health information, including limited data sets, unless the third party
received the information in its role as an agent of the covered entity
or business associate. To the extent that a third party recipient of
the information is itself a covered entity, and the information is
breached while at the third party (i.e., used or disclosed in an
impermissible manner and in a manner determined to compromise the
privacy or security of the information), then the third party will be
responsible for complying with the provisions of this interim final
rule. In cases where a covered entity is the recipient of a limited
data set pursuant to Sec. 164.514(e) of the Privacy Rule and it is
unable to re-identify the individuals after a breach occurs, it may
satisfy the requirements of Sec. 164.404 without re-identifying the
information, by providing substitute notice to the individuals as
required by paragraph (d)(2) of that section.
We note that the discussion above regarding ``limited data sets''
applies to any protected health information that excludes the 16 direct
identifiers listed at Sec. 164.514(e)(2), regardless of whether the
information is used for health care operations, public health, or
research purposes (see Sec. 164.514(e)(3)(i)), and is subject to a
data use agreement under Sec. 164.514(e) of the Privacy Rule. Thus,
for example, a covered entity that impermissibly uses or discloses data
that is stripped of the 16 direct identifiers described above, zip
codes, and dates of birth, may take advantage of the exception to what
is a breach, regardless of the intended purpose of the use or
disclosure or whether a data use agreement was in place.
With respect to any type of protected health information, we note
that Sec. 164.414, discussed below, gives covered entities and
business associates the burden of demonstrating that no breach has
occurred because the impermissible use or disclosure did not pose a
significant risk of harm to the individual. Covered entities and
business associates must document their risk assessments, so that they
can demonstrate, if necessary, that no breach notification was required
following an impermissible use or disclosure of protected health
information. For impermissible uses or disclosures of protected health
information that fall under the narrow exception at paragraph (1)(ii)
of this definition, which do not qualify as breaches because the
protected health information is a limited data set that does not
include zip codes or dates of birth, documentation that demonstrates
that the lost information did not include these identifiers will
suffice.
Exceptions to Breach
Section 13400(1) of the Act also includes three exceptions to the
definition of ``breach'' that encompass situations Congress clearly
intended to not constitute breaches: (1) Unintentional acquisition,
access, or use of protected health information by an employee or
individual acting under the authority of a covered entity or business
associate (section 13400(1)(B)(i)); (2) inadvertent disclosure of
protected health information from one person
[[Page 42747]]
authorized to access protected health information at a covered entity
or business associate to another person authorized to access protected
health information at the covered entity or business associate (section
13400(1)(B)(ii) and (iii)); and (3) unauthorized disclosures in which
an unauthorized person to whom protected health information is
disclosed would not reasonably have been able to retain the information
(section 13400(1)(A)). We have included these three exceptions as
paragraphs (2)(i), (ii), and (iii), respectively.
The first regulatory exception at paragraph (2)(i) of this
definition, for unintentional acquisition, access, or use of protected
health information, generally mirrors the exception in section
13400(1)(B)(i) of the Act. This statutory section excepts from the
definition of ``breach'' the unintentional acquisition, access, or use
of protected health information by an employee or individual acting
under the authority of a covered entity or a business associate, if the
acquisition, access, or use was made in good faith, within the course
and scope of employment or other professional relationship, and does
not result in further use or disclosure.
We modified the statutory language to use ``workforce members''
instead of employees. Workforce member is a defined term in 45 CFR
160.103 and means ``employees, volunteers, trainees, and other persons
whose conduct, in the performance of work for a covered entity, is
under the direct control of such entity, whether or not they are paid
by the covered entity.''
A person is acting under the authority of a covered entity or
business associate if he or she is acting on its behalf. This may
include a workforce member of a covered entity, an employee of a
business associate, or even a business associate of a covered entity.
Similarly, to determine whether the access, acquisition, or use was
made ``within the scope of authority,'' the covered entity or business
associate should consider whether the person was acting on its behalf
at the time of the inadvertent acquisition, access, or use.
Additionally, while the statutory language provides that this
exception applies where the recipient does not further use or disclose
the information, we have interpreted this exception as encompassing
circumstances where the recipient does not further use or disclose the
information in a manner not permitted under the Privacy Rule. In
circumstances where any further use or disclosure of the information is
permissible under the Privacy Rule, we interpret that there is no
breach because the security and privacy of the information has not been
compromised by any such permissible use or disclosure.
To illustrate this exception, we offer the following example. A
billing employee receives and opens an e-mail containing protected
health information about a patient which a nurse mistakenly sent to the
billing employee. The billing employee notices that he is not the
intended recipient, alerts the nurse of the misdirected e-mail, and
then deletes it. The billing employee unintentionally accessed
protected health information to which he was not authorized to have
access. However, the billing employee's use of the information was done
in good faith and within the scope of authority, and therefore, would
not constitute a breach and notification would not be required,
provided the employee did not further use or disclose the information
accessed in a manner not permitted by the Privacy Rule.
In contrast, a receptionist at a covered entity who is not
authorized to access protected health information decides to look
through patient files in order to learn of a friend's treatment. In
this case, the impermissible access to protected health information
would not fall within this exception to breach because such access was
neither unintentional, done in good faith, nor within the scope of
authority.
The second regulatory exception, at paragraph (2)(ii) of this
definition, covers inadvertent disclosures and generally mirrors the
exception provided in section 13400(1)(B)(ii) and (iii) of the Act,
with slight modifications. The statute excepts from the definition of
``breach'' inadvertent disclosures from an individual who is otherwise
authorized to access protected health information at a facility
operated by a covered entity or business associate to another similarly
situated individual at the same facility if the information is not
further used or disclosed without authorization. We have modified the
statutory language slightly to except from breach inadvertent
disclosures of protected health information from a person who is
authorized to access protected health information at a covered entity
or business associate to another person authorized to access protected
health information at the same covered entity, business associate, or
organized health care arrangement in which the covered entity
participates. Organized health care arrangement is defined by the HIPAA
Rules to mean, among other things, a clinically integrated care setting
in which individuals typically receive health care from more than one
health care provider.\10\ See 45 CFR 160.103. This includes, for
example, a covered entity, such as a hospital, and the health care
providers who have staff privileges at the hospital.
---------------------------------------------------------------------------
\10\ 45 CFR 160.103 also defines ``organized health care
arrangement'' to include ``an organized system of health care in
which more than one covered entity participates'' and in which the
participating covered entities engage in certain joint utilization
review, quality assessment and improvement, or payment activities.
In addition, the definition encompasses certain relationships
between group health plans and health insurance issuers or health
maintenance organizations (HMO), as well as relationships among
group health plans which are maintained by the same plan sponsor.
---------------------------------------------------------------------------
We received several comments with respect to this exception, and
many commenters asked that we clarify and explain the statutory
language regarding what it means to be a ``similarly situated
individual'' and what constitutes the ``same facility'' for purposes of
this exception. We believe that a ``similarly situated individual,''
for purposes of the statute, means an individual who is authorized to
access protected health information, and thus, for clarity, we have
substituted this language for the statutory language in the regulation.
Thus, a person who is authorized to access protected health information
is similarly situated, for purposes of this regulation, to another
person at the covered entity, business associate of the covered entity,
or organized health care arrangement in which the covered entity
participates, who is also authorized to access protected health
information (even if the two persons may not be authorized to access
the same types of protected health information). For example, a
physician who has authority to use or disclose protected health
information at a hospital by virtue of participating in an organized
health care arrangement with the hospital is similarly situated to a
nurse or billing employee at the hospital. In contrast, the physician
is not similarly situated to an employee at the hospital who is not
authorized to access protected health information.
Additionally, we have interpreted ``same facility'' to mean the
same covered entity, business associate, or organized health care
arrangement in which the covered entity participates and have
substituted this language in the regulation. By focusing on the legal
entity or status of the entities as an organized health care
arrangement when interpreting ``same facility,'' we believe we have
more clearly captured the intent of the statute and have also
alleviated commenter concerns that the term ``facility'' was too
narrow. Therefore, the size of the covered entity,
[[Page 42748]]
business associate, or organized health care arrangement will dictate
the scope of this exception. If a covered entity has a single location,
then the exception will apply to disclosures between a workforce member
and, e.g., a physician with staff privileges at that single location.
However, if a covered entity has multiple locations across the country,
the same exception will apply even if the workforce member makes the
disclosure to a physician with staff privileges at a facility located
in another state.
We interpret the statutory limitation that the information not be
``further acquired, accessed, used, or disclosed without
authorization'' as meaning that the information is not further used or
disclosed in a manner not permitted by the Privacy Rule. Thus, this
exception encompasses circumstances in which a person who is authorized
to use or disclose protected health information within a covered
entity, business associate, or organized health care arrangement
inadvertently discloses that information to another person who is
authorized to use or disclose protected health information within the
same covered entity, business associate, or organized health care
arrangement, as long as the recipient does not further use or disclose
the information in violation of the Privacy Rule.
The final regulatory exception to breach at paragraph (2)(iii) of
this definition mirrors the exception found in section 13400(1)(A) of
the Act. The statute excepts from the definition of ``breach