HIPAA Breach Notification Rules for Websites

When a website security incident involves PHI, HIPAA's Breach Notification Rule creates strict timelines and obligations. Know them before you need them.

Published April 7, 2026 4 min read

What Constitutes a HIPAA Breach

Under the HIPAA Breach Notification Rule (45 CFR Part 164, Subpart D), a breach is an impermissible use or disclosure of PHI that compromises its security or privacy. The rule creates a presumption of breach — any unauthorized access to, acquisition, use, or disclosure of PHI is presumed to be a reportable breach unless the covered entity can demonstrate a low probability that the PHI has been compromised.

For websites, common breach scenarios include:

  • Database containing PHI exposed through a SQL injection attack
  • Tracking pixels transmitting PHI to unauthorized third parties
  • Patient records accessible without authentication due to misconfiguration
  • Form submissions routed to incorrect recipients
  • Unsecured S3 bucket or cloud storage containing patient data discovered by researchers

The Four-Factor Risk Assessment

To determine whether a presumed breach requires notification, organizations must conduct a four-factor risk assessment:

  1. Nature and extent of PHI involved — what types of information were exposed? Data with greater sensitivity (mental health, HIV status, substance abuse) increases breach probability.
  2. Identity of the person who used or received the PHI — was it another covered entity (lower risk) or an unknown external party (higher risk)?
  3. Whether PHI was actually acquired or viewed — mere access to a misconfigured database may differ from confirmed data exfiltration.
  4. Extent to which the risk has been mitigated — did the organization immediately revoke access and recover the data?

This assessment must be documented. If you cannot demonstrate low probability of compromise, notification is required.


Notification Timelines and Requirements

HIPAA's breach notification timeline is strict and non-negotiable:

  • Individual notification: Affected individuals must be notified without unreasonable delay and no later than 60 days after discovery of the breach
  • HHS notification: If the breach affects 500 or more individuals in a single state, HHS must also be notified within 60 days. Breaches affecting fewer than 500 individuals must be reported to HHS annually.
  • Media notification: Breaches affecting 500 or more residents of a state must be reported to prominent media outlets in that state
  • Business associate notification: A BA that discovers a breach must notify the covered entity within 60 days — the BA's timeline starts at discovery, not at the time it notifies the CE

Content of Breach Notifications

Notification to individuals must include specific elements under 45 CFR § 164.404(c):

  • Brief description of what happened, including the date of the breach and date of discovery
  • Description of the types of PHI involved
  • Steps individuals should take to protect themselves (credit monitoring, fraud alerts)
  • Description of what the organization is doing to investigate, mitigate harm, and prevent future breaches
  • Contact information for individuals to ask questions or get assistance

Notifications must be in plain language, not legalese. They are typically sent by first-class mail, though email can be used if the individual has agreed to electronic communication.


Preparing a Breach Response Plan

Every organization handling ePHI must have a breach response plan before an incident occurs. For website-focused organizations, the plan should specifically address:

  • Who is notified first internally when a potential website breach is discovered
  • How to preserve evidence without disrupting operations
  • Procedures for assessing the scope of the breach (log analysis, database queries)
  • Legal counsel engagement trigger points
  • Template notifications ready to be customized and sent
  • Contact list for HHS's Breach Reporting Portal (ocrportal.hhs.gov)

A response plan that exists only on paper has limited value. Conduct tabletop exercises annually where your team walks through a simulated website breach scenario.

Check your site for free — Instant HIPAA compliance scan, no signup required.
Scan Now

Frequently Asked Questions

If a tracking pixel transmitted PHI without patient knowledge, is that a reportable breach?
Yes, in most cases. The OCR's 2022 bulletin on tracking technologies explicitly states that the use of tracking technologies in a manner that results in impermissible disclosures of PHI to third parties is a breach. The four-factor analysis must be applied, but the OCR's guidance strongly implies that tracking pixel incidents involving PHI on patient-facing pages are reportable breaches.
What is the difference between a security incident and a breach?
A security incident is any attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations. A breach is a specific type of security incident — one involving PHI — that meets the legal definition under the Breach Notification Rule. All breaches are security incidents, but not all security incidents are breaches (for example, a failed login attempt is a security incident but not a breach).
Can I self-report a breach and avoid a penalty?
Self-reporting is required by law if a breach occurs, and it does not automatically result in a penalty. The OCR considers good-faith compliance efforts, including prompt self-reporting, rapid remediation, and cooperation with investigators, as mitigating factors in penalty determinations. Organizations that self-report and demonstrate a strong compliance program often resolve investigations without significant penalties. Organizations that attempt to conceal breaches face much more severe consequences.
Does a data breach by a business associate trigger my notification obligations?
Yes. If a business associate suffers a breach of PHI they hold on your behalf, you (the covered entity) are the party responsible for notifying affected individuals and HHS. The BA must notify you within 60 days of discovering the breach, and your 60-day notification clock typically starts when the BA notifies you. This is one reason BAAs must require prompt breach notification from BAs.

Related Articles