HIPAA Breach Response Playbook: What To Do in the First 72 Hours

By Ramyar Daneshgar
Security Engineer | USC Viterbi School of Engineering

Looking for a security engineer? Visit SecurityEngineer.com

Disclaimer: This article is for educational purposes only and does not constitute legal advice.


Executive Summary

HIPAA-covered entities and business associates must respond to breaches of protected health information (PHI) within rigid regulatory timelines. The first 72 hours following the discovery of a breach are critical for legal defensibility, OCR compliance, and operational containment. This article provides a deep, step-by-step breakdown of what legal and compliance teams must do—based on regulatory guidance, litigation trends, and breach response best practices.


1. The First 72 Hours: Detailed Step-by-Step Breakdown


Step 1: Activate the Incident Response Plan (Hour 0–1)

Immediately trigger the HIPAA-specific Incident Response Plan (IRP). This should not be a generic IT incident protocol. A compliant IRP must:

  • Identify named individuals responsible for breach reporting under 45 CFR § 164.308(a)(6).
  • Define escalation criteria for potential PHI compromise.
  • Provide a tested, documented procedure for internal notification across legal, security, and executive teams.
  • Specify how to involve outside counsel and forensic support.

OCR audits may request evidence of IRP activation, including logs, call records, or documented meeting minutes.


Step 2: Conduct a Preliminary Breach Assessment (Hour 1–4)

Before a full risk assessment, you must determine whether the event qualifies as a “potential breach” under 45 CFR § 164.402. Ask:

  • Was PHI involved?
  • Was the access, use, or disclosure impermissible under the Privacy Rule?
  • Does the incident fall under a listed exception (unintentional access by a workforce member acting in good faith)?

If these questions confirm exposure or uncertainty, the incident must be escalated to breach response counsel and forensics. Documenting this decision path is crucial for post-incident regulatory defense.


Step 3: Preserve Digital and Physical Evidence (Hour 2–6)

Failure to preserve volatile evidence undermines the accuracy of your risk assessment and weakens legal defense. Immediate steps include:

  • Taking forensic images of impacted endpoints and servers.
  • Exporting system logs, firewall events, DLP records, and cloud access logs.
  • Halting automated log rotations and backup purging policies.
  • Preserving paper records or physical access logs if applicable.

Chain of custody must be documented for every piece of evidence collected. Any evidence used in the risk assessment or disclosed to OCR must be verifiable.


To preserve legal privilege and align breach response with legal standards:

  • Outside counsel—not internal IT—must retain the forensic investigation team.
  • All communications should be labeled as “Privileged and Confidential / Attorney Work Product.”
  • Forensics must be scoped through counsel and not used for operational cleanup until a separate report is created.

Failing to follow this structure, as seen in In re Capital One Data Breach Litigation, can result in privilege being waived and all investigation materials becoming discoverable in litigation or regulatory proceedings.


Step 5: Conduct the HIPAA Four-Factor Risk Assessment (Hour 8–24)

This formal risk assessment is required by law to determine whether the breach meets the threshold for mandatory notification. Each of the following four factors must be assessed and documented:

  1. Nature and extent of PHI involved: Determine whether the data includes financial information, diagnoses, SSNs, or treatment records that increase the risk of identity theft or discrimination.
  2. Unauthorized party involved: Assess whether the PHI was accessed by internal personnel, a third-party vendor, or a known threat actor.
  3. Whether PHI was actually acquired or viewed: Use logs, DLP solutions, and forensic data to determine whether data was accessed or merely exposed.
  4. Extent of mitigation: Document whether data was encrypted at rest or in transit, if access was terminated promptly, or if recipient attested to non-use or return.

If the risk of compromise is more than “low,” notification obligations are triggered under 45 CFR §§ 164.404–408.


Step 6: Engage Privacy and Security Officers (Parallel Step)

Both officers play a dual role during a breach response:

  • Privacy Officer: Coordinates documentation, oversees patient notification, confirms compliance with HIPAA's Privacy Rule.
  • Security Officer: Oversees forensic coordination, validates that security measures were in place as required under 45 CFR § 164.308.

Together, they are responsible for ensuring that all internal documentation—such as risk assessments, BAA verification, and internal logs—is audit-ready for OCR review.


Step 7: Maintain Detailed Documentation (Ongoing)

From the moment of discovery, HIPAA requires documented proof that each decision and action aligns with regulatory standards. Your breach file should include:

  • Discovery timestamp and how the incident was detected.
  • Chronology of communications between legal, forensic, and compliance teams.
  • Copies of internal risk assessments, mitigation logs, and forensic summaries.
  • Documentation of notification preparation and delivery timelines.

OCR has explicitly fined organizations that failed to maintain adequate records, even when no bad faith was involved.


Step 8: Prepare Notification Drafts (Hour 24–48)

While the legal determination of a breach may take time, draft notification templates must be prepared early. These should include:

  • Description of the incident, including dates and how it was discovered.
  • Specifics of the PHI involved, without unnecessary technical jargon.
  • Mitigation efforts, including whether law enforcement was contacted.
  • Contact information, including toll-free hotlines, secure portals, or mailing addresses.

For incidents affecting 500 or more individuals in a single state or jurisdiction, media notification may also be required under 45 CFR § 164.406.


Step 9: Notify HHS and Media as Required (Day 3–60)

Notification to the U.S. Department of Health and Human Services (HHS) must occur via its online portal:

  • For 500+ individuals: Notification must occur “without unreasonable delay,” no later than 60 calendar days from discovery.
  • For fewer than 500 individuals: Notification may be submitted in batch form by the end of the calendar year.

If media notification is required, include:

  • The same core information provided to individuals.
  • A statement to restore public trust and encourage affected individuals to act.

Ensure consistency between what’s submitted to HHS, what’s sent to patients, and what’s shared with media outlets. OCR checks for discrepancies across these communications.


To preserve confidentiality and prepare for litigation or regulatory inquiry:

  • Always have legal counsel retain the forensic firm directly.
  • Keep privileged forensic findings separate from internal operations reports.
  • Use legal memos to summarize risk, not raw technical reports.

When forensic vendors are hired outside legal privilege, all materials they generate—including emails, logs, and draft reports—may become subject to subpoena.


3. OCR Enforcement: Triggers and Timelines

OCR investigations are more likely when:

  • Notifications are delayed beyond 60 days without justification.
  • Risk assessments are undocumented or contain inconsistencies.
  • PHI was accessible through public means (e.g., internet-facing storage).
  • BAAs are missing or fail to specify breach response obligations.

Enforcement Case Summary

Organization Fine Breach Type OCR Findings
Anthem (2018) $16 million Credential compromise, 78.8M records Insufficient monitoring, delayed containment/reporting
Cottage Health $2 million Misconfigured database No risk analysis, PHI exposed online
Presence Health $475,000 Paper breach Notification occurred 41 days beyond the deadline

4. HIPAA-Compliant Notification Letter Template

Subject: Notice of Breach of Protected Health Information

What Happened
On [date], our security systems detected unauthorized access to information stored in our health records environment. We launched an investigation in coordination with legal counsel and cybersecurity professionals.

What Information Was Involved
Information may include your full name, health history, treatment details, health insurance identification, and other identifiers.

What We Are Doing
We have secured the environment, notified federal authorities, and implemented safeguards to prevent future incidents. Credit monitoring and identity protection are available at no cost to affected individuals.

What You Can Do
Monitor your medical statements and insurance accounts. Contact us for support.

Contact Information
Phone: [XXX-XXX-XXXX]
Website: [secure portal link]
Mailing Address: [physical address]

Sincerely,
[Privacy Officer Name]
[Organization Name]
[Title]


Conclusion

A HIPAA breach is not just a technical failure—it is a legal, operational, and reputational crisis. What your organization does in the first 72 hours determines not only regulatory outcomes but also litigation risk, patient trust, and board accountability. Structured response and documentation are your strongest defense.


Looking for a security engineer? Visit SecurityEngineer.com

Need a Cybersecurity Attorney?
Get top legal guidance in breach response, data privacy, and cybersecurity compliance. Connect with attorneys who know how to defend against audits, investigations, and liability.
👉 Hire a Cybersecurity Attorney

Read more

Comprehensive Compliance Guide for Dental Practices in 2025 : HIPAA, CPRA, GDPR, FTC, and Third-Party Risk Management

By Ramyar Daneshgar Security Engineer | USC Viterbi School of Engineering Looking for a security engineer? Visit SecurityEngineer.com Disclaimer: This article is for educational purposes only and does not constitute legal advice. Executive Summary While HIPAA has long served as the bedrock of privacy compliance for healthcare providers, dental practices

By Ramyar Daneshgar