A Business Associate's Guide to Notifying a Covered Entity of a Breach (45 CFR 164.410)
Executive Summary
Business associates (BAs) play a critical role in healthcare operations, managing everything from billing and IT services to cloud storage and data analytics. But with access to protected health information (PHI) comes serious legal responsibility. Under HIPAA’s Breach Notification Rule, section 164.410 specifically requires business associates to promptly notify covered entities (CEs) when a breach of unsecured PHI occurs. This guide offers a clear, actionable roadmap for BAs particularly small and midsize vendors on how to comply with 164.410, avoid regulatory penalties, and maintain trusted partnerships with covered entities.
Introduction
When a healthcare-related data breach happens, the focus is often on the provider. But in today’s digital ecosystem, many breaches originate from business associates: third-party vendors entrusted with PHI. HIPAA recognizes this reality and imposes direct
obligations on BAs under the Health Information Technology for Economic and Clinical Health (HITECH) Act and HIPAA’s implementing rules.
Specifically, 45 CFR 164.410 mandates that a business associate must notify its covered entity client whenever there is a breach of unsecured PHI. This responsibility is time-sensitive and legally binding. Failure
to act quickly and appropriately not only damages relationships but also triggers regulatory scrutiny, fines, and reputational harm.
This article demystifies 164.410 and outlines step-by-step procedures for breach reporting, tailored to BAs of all sizes.
Understanding the Business Associate Breach Notification Requirement (164.410)
HIPAA defines a business associate as any entity that performs activities or functions on behalf of a covered entity involving the use or disclosure of PHI. This includes:
- Billing companies
- IT service providers
- Cloud storage vendors
- EHR contractors
- Medical transcription services
- Legal, accounting, or data analytics firms
Under 45 CFR 164.410, business associates are required to:
“…notify the covered entity of the breach without unreasonable delay, and in no case later than 60 calendar days after discovery of the breach.”
Discovery occurs on the first day the breach is known (or should have been known) by the BA or its workforce through reasonable diligence.
What qualifies as a Breach?
A breach is generally any unauthorized acquisition, access, use, or disclosure of unsecured PHI that compromises the privacy or security of the data.
Unsecured PHI refers to PHI that has not been made unusable, unreadable, or indecipherable to unauthorized individuals, typically via encryption or destruction as defined by HHS guidance.
A breach does not include:
- Unintentional access by a workforce member acting in good faith and within the scope of authority
- Inadvertent disclosures between authorized individuals at the same organization
- When the recipient could not reasonably retain the information
Nonetheless, when in doubt, the BA should err on the side of notification and conduct a proper breach risk assessment.
The Four Key Elements of Breach Notification Under 164.410
When notifying the covered entity, a business associate must include the following elements to the extent possible:
-
Identification of Individuals
- A list (or the number) of affected individuals
- Sufficient detail to allow the covered entity to carry out its own notification obligations
-
Description of Breach Circumstances
- What happened (e.g., malware attack, lost laptop, email misdirected)
- When it happened
- When it was discovered
-
Types of PHI Involved
- Whether names, Social Security numbers, date of birth, diagnoses, medications, etc. were included
- Whether the PHI was encrypted or otherwise secured
-
Mitigation Efforts and Response
- What steps were taken to contain the breach
- Efforts to mitigate harm to affected individuals
- Preventative steps implemented to avoid recurrence
If all the information is not available immediately, the BA must provide details as they become available without unreasonable delay.
A Step-by-Step Guide for Business Associates
Step 1: Detect and Contain the Incident
- Activate your internal incident response protocol immediately upon suspicion
- Isolate affected systems (e.g., disconnect from network, quarantine files)
- Begin documenting the event from the moment of discovery
Step 2: Conduct a Breach Risk Assessment
Use the four factors from the Breach Notification Rule to determine whether an incident qualifies as a reportable breach:
- Nature and extent of PHI involved
- Unauthorized person who accessed or received the PHI
- Whether PHI was actually acquired or viewed
- Mitigation measures taken
If there’s more than a low probability of compromise, a breach notification is required.
Step 3: Notify the Covered Entity
- Notify the covered entity in writing (usually email and/or formal letter per the Business Associate Agreement)
- Provide the four required elements listed above
- Notify as soon as possible, but no later than 60 calendar days after discovery
Tip: Don’t wait for the full investigation to conclude before notifying. Initial notification can be followed by updates as more details become available.
Step 4: Cooperate in the Covered Entity’s Notification Duties
Under 164.404, the covered entity is responsible for notifying:
- Affected individuals
- HHS (via the Breach Portal)
- Media (if more than 500 residents are affected in one jurisdiction)
But the BA is expected to support the process, providing:
- Full details for the individual notifications
- Evidence of mitigation efforts
- Technical guidance on the breach origin and impact
Common Pitfalls and How to Avoid Them
| Pitfall | Risk | How to Avoid |
|---|---|---|
| Waiting too long to notify | HIPAA violation, fines | Notify as soon as breach is discovered, even if full details aren't known |
| Incomplete documentation | Failed audits | Maintain clear incident logs and evidence trail |
| Assuming encryption = no breach | False assumption | Validate encryption meets HHS guidelines |
| Failing to report near misses | Missed mitigation opportunity | Document all suspicious incidents and consult legal/compliance if uncertain |
| No incident response plan | Disorganized response | Establish and test a response protocol annually |
Sample Breach Notification Timeline
| Task | Responsible | Deadline |
|---|---|---|
| Detect and contain the breach | IT/Operations | Immediately upon incident |
| Conduct breach risk assessment | Compliance Officer | Within 5–10 days |
| Initial notification to covered entity | Compliance Officer | No later than 60 days from discovery |
| Provide supplemental details as needed | Compliance Officer / Legal | Ongoing, as new info arises |
| Document and retain records | Compliance / HR | Minimum of 6 years |
Case Study: Breach Due to Email Error
In 2022, a small billing company acting as a business associate for a rural health clinic inadvertently emailed a PHI spreadsheet to the wrong insurance provider. The file contained names, dates of birth, and CPT codes. The error was discovered the same
day, and the recipient confirmed the deletion. However, the BA waited 3 weeks to notify the clinic due to internal confusion over whether the breach was reportable.
Upon OCR audit, the covered entity was cited for late notification, and both organizations had to enter corrective action plans. The root cause? The business associate did not have a formal breach notification workflow or
training.
Lesson: Time is of the essence — early notification protects both the BA and the covered entity.
Compliance Tools and Best Practices for Business Associates
- Implement a written Breach Response Plan
- Maintain a log of all incidents (even non-reportable ones)
- Train staff annually on HIPAA breach awareness
- Use role-based access controls and audit logs
- Sign and review Business Associate Agreements (BAAs) annually
- Work closely with legal counsel and the CE’s compliance team during incidents
Regulatory and Trusted Sources
Final Thoughts and Takeaways
Business associates are no longer behind-the-scenes players in HIPAA compliance, they are fully accountable for protecting PHI and reporting breaches. Section 164.410 places a clear and enforceable obligation on BAs to notify covered entities promptly and thoroughly.
The best way to comply isn’t to memorize regulations, but to build a reliable workflow, train your team, and document every step. Doing so not only helps you avoid fines, but positions your organization
as a trusted, security-conscious partner in the healthcare ecosystem.
If you’re a BA without a formal breach notification policy in place, the time to act is now. Your covered entities and your reputation depend on it.