Protocol for Responding to Breaches of Protected Health Information (PHI)

Title

University of North Carolina at Chapel Hill Protocol for Responding to Breaches of Protected Health Information (PHI)

I. Purpose

The Health Insurance Portability and Accountability Act of 1996, as modified by the Health Information Technology for Economic and Clinical Health Act of 2009 ("HIPAA") established Federal standards for safeguarding the privacy of individually identifiable health information. HIPAA mandates rigorous compliance with the requirements for the use and/or disclosure of protected health information ("PHI"). In strict compliance with the requirements of HIPAA, The University of North Carolina at Chapel Hill ("University") is required, following the discovery of a breach of unsecured PHI, to notify each individual whose unsecured PHI has been, or is reasonably believed to have been accessed, acquired, used or disclosed as a result of the breach. The University must maintain records of any instances of breach and report these to the U.S. Secretary of Health and Human Services on an annual basis. The following protocol sets forth the University's process for full compliance with these requirements.

II. Protocol for Responding to Suspected or Actual Breaches

A. Definitions

  1. Breach – The unauthorized and/or impermissible acquisition, access, use, or disclosure of PHI which compromises the security or privacy of such information. The term "Breach" does not include:
    1. any unintentional acquisition, access, or use of PHI by an employee or individual acting with authorization if –
      1. such acquisition, access, or use was made in good faith and within the course and scope of the employment or other professional relationship of such employee or individual, respectively, with the covered University unit or Business Associate; and
      2. such information is not further acquired, accessed, used, or disclosed by any person; or
    2. any inadvertent disclosure from an individual who is otherwise authorized to access PHI at a facility operated by a covered entity or Business Associate to another similarly situated individual at the same facility; and
    3. any such information received as a result of such disclosure is not further acquired, accessed, used, or disclosed without authorization by any person.
    4. any disclosure of PHI where a covered University unit or Business Associate has a good faith belief that the unauthorized person to whom the information was disclosed would not reasonably be able to retain such information.
  2. Business Associate – A Business Associate is an individual or company with whom a covered University unit enters into a contract in order to perform a service that involves the creation, maintenance, transmission, management, or disclosure of PHI on behalf of the covered University unit. HIPAA requires that all Business Associates provide appropriate safeguards and procedures to ensure the privacy and security of PHI entrusted to them under a contract with a covered University unit. Business Associates are directly liable for impermissible uses and disclosures of PHI and must report any instances of breach to the covered University unit.
  3. Covered University Entity – A University unit that is designated by the University Privacy Officer as a "Covered University Unit" and performs the functions of a health care provider, employs health care providers, and transmits health information in electronic and conventional form in association with financial or administrative transactions.
  4. Protected Health Information ("PHI") – Information that is created or received by a health care provider, health plan, employer, or health care clearinghouse that identifies an individual or provides a reasonable basis to believe the information can be used to identify the individual and that relates to:
    1. the past, present, or future physical or mental health or condition of an individual;
    2. the provision of health care to an individual; or
    3. the past, present, or future payment for the provision of health care to an individual.
  5. Unsecured PHI – PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals under standards issued by the U.S. Secretary of Health and Human Services as determined by the University's Security Officer. Note that data contained in an "encrypted" format is deemed secured, even if lost or stolen

B. Breaches and Notification

The University is committed to the prevention of breaches with respect to PHI, as defined above. All incidents involving unsecured PHI will be investigated by the University Privacy and/or Security Officer and other appropriate University units (including, for example, the Office of University Counsel, ITS Security, the Internal Audit Department and the Department of Public Safety). Every incident investigation must include a risk analysis assessing the following factors to determine whether the PHI at issue has been compromised:

  • The nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification;
  • The unauthorized person who used the PHI or to whom the disclosure was made; Whether PHI was actually acquired or viewed; and
  • The extent to which the risk to the PHI has been mitigated

The results of the incident investigation will determine the actions to be taken.

1. Internal Notification (for Assessment and Response)

Any University employee or student who becomes aware of a suspected or actual impermissible use or disclosure of PHI must immediately notify his or her supervisor and one of the following officials:

  • HIPAA Privacy Officer
  • HIPAA Security Officer
  • Information Security Officer
  • Office of University Counsel
  • HIPAA Privacy Liaison

2. Breach by Business Associate

In the event that a Business Associate becomes aware of an impermissible use or disclosure of PHI, the Business Associate must immediately notify the covered University unit with whom it has a Business Associate Agreement per the terms. The contacted covered University unit must then immediately notify the University Privacy Officer, the HIPAA Security Officer, or the Office of University Counsel.

3. External Notification

a. Required Notification to Affected Individuals

In the event of a breach of unsecured PHI, the University shall notify each individual whose unsecured PHI has been or is reasonably believed to have been accessed, acquired or disclosed as a result of the breach. Without unreasonable delay, but in no case later than 60 calendar days after discovery of a breach, the University, through the appropriate office, shall take the following actions:

  1. Notify affected individuals (or next of kin if deceased) in writing via first class mail at the last known address of the affected individual (or via electronic communication if so indicated by the individual as the preferred method of communication) of the following information:
    1. A brief description of the breach including date of the breach and date of discovery;
    2. A description of the types of PHI that were involved in the breach; note, that if Social Security numbers are contained in a breached data set, notification shall be in compliance with the requirements of the North Carolina Identity Theft Protection Act
    3. Steps that individuals should take to protect themselves from potential harm resulting from the breach;
    4. A brief description of the University's remedial measures in response to the breach including investigations, mitigation of losses and protection against further breaches; and
    5. Contact information for the University or its designated agent, including, as appropriate, a toll-free telephone number, e-mail address, website, or postal address where individuals can obtain additional information and make inquiries.
  2. If there is insufficient or up-to-date contact information precluding direct written communication to an individual, then a substitute form of notice shall be provided.

    If there is insufficient or out-of-date contact information of ten (10) or more individuals, the University shall provide a toll-free telephone number where individuals can learn if they have been affected by the Breach by:
    1. Posting a notice of the breach on the University's website as specified by the U.S. Department of Health and Human Services; or
    2. Placing a notice in major print or broadcast media in geographic areas where the affected individuals are likely to reside.
  3. If the University Privacy Officer or the Office of University Counsel deems that a breach notification is urgent based on the possibility of imminent misuse of the unsecured PHI, notice by telephone or other means is permitted, as appropriate.
b. Required Notification to Media

Notice of a breach shall be provided to prominent media outlets serving a state, if the unsecured PHI of more than 500 residents of such state has been or is reasonably believed to have been accessed, acquired, or disclosed as a result of a breach.

c. Required Recordkeeping and Notification to the U.S. Secretary of Health and Human Services

Notice shall be provided to the Secretary of unsecured PHI that has been acquired or disclosed in a Breach.

  1. If the Breach involved the data of 500 or more individuals, the University Privacy Officer or Office of University Counsel shall provide such notice immediately.
  2. Breaches that involve the data of fewer than 500 individuals will be maintained in a log and submitted annually to the Secretary.
d. Delayed Notification

Notice shall be delayed if law enforcement informs the University that disclosure of a breach would impede a criminal investigation or jeopardize national security. A request for delayed notification must be made in writing or documented contemporaneously by the University in writing, including the name of the law enforcement officer making the request and the officer's agency engaged in the investigation. The required notice shall be provided without unreasonable delay after the law enforcement agency communicates to the University its determination that notice will no longer impede the investigation or jeopardize national or homeland security.

III. Institutional Actions

At least annually, the University's HIPAA Steering Committee will review all incidents of suspected or actual security breaches and may make recommendations to the Chancellor for institutional improvements.

IV. Effective Date

This protocol is effective January 1, 2010, revised September 2013

100% helpful - 1 review

Details

Article ID: 132088
Created
Thu 4/8/21 9:23 PM
Modified
Thu 5/5/22 8:26 PM
Effective Date
If the date on which this document became/becomes enforceable differs from the Origination or Last Revision, this attribute reflects the date on which it is/was enforcable.
07/14/2020 4:39 PM
Issuing Officer
Name of the document Issuing Officer. This is the individual whose organizational authority covers the policy scope and who is primarily responsible for the policy.
Issuing Officer Title
Title of the person who is primarily responsible for issuing this policy.
Chief Privacy Officer and Associate University Counsel
Last Review
Date on which the most recent document review was completed.
07/14/2020 4:39 PM
Last Revised
Date on which the most recent changes to this document were approved.
09/01/2013 12:00 AM
Next Review
Date on which the next document review is due.
09/30/2021 12:00 AM
Origination
Date on which the original version of this document was first made official.
01/01/2010 12:00 AM
Responsible Unit
School, Department, or other organizational unit issuing this document.
Institutional Privacy Office