The 60-day time frame refers to how long HIPAA covered organizations have to report a breach. According to the Congressional Research Services, “The HIPAA breach notification program was established in 2009, pursuant to the HITECH Act. Under the program, covered entities and their business associates must notify all individuals affected by a breach of unsecured ePHI without unreasonable delay, but no later than 60 days after discovering the breach.” The discovery of the breach, in this case, is defined as the first day on which the breaches are known to the covered entity or business associate or when it would have been known had reasonable diligence been exercised.
The 60-day timeframe protects individuals from the potential harm delays in a breach might cause. This ensures that they are informed in the face of threats like identity theft, which can impact individuals after a breach. The timeframe also helps the organization heighten awareness while allowing reasonable time to investigate the breach and prepare notifications.
The compressed timeframe provided by the Breach Notification Rule sets the requirements that healthcare organizations should follow in their response plan. Healthcare organizations have to set procedures in place to maintain both incident response and risk assessments, which require an investment of resources.
Failure to adequately provide notice could also lead to penalties and legal action, as it could be considered a HIPAA violation.
Related: HIPAA Compliant Email: The Definitive Guide
When a breach impacts more than 500 individuals, the covered entity must notify the HHS and a prominent media outlet serving the state or jurisdiction where the breach occurred.
In the case of breaches impacting fewer than 500 individuals, HIPAA breach notification requirements are for notifications to be issued to the HHS within 60 days of the end of the calendar year in which the breach was discovered.
Notification is not required if PHI is secured through encryption, provided the encryption keys are kept on a separate device from the data they encrypt or decrypt.