HITECH and State Breach Laws: A Guide to Preemption for Small Practices (42 U.S.C. § 1320d–7)
Executive Summary
When a breach of protected health information (PHI) occurs, healthcare providers must navigate a complex web of federal and state laws. The Health Information Technology for Economic and Clinical Health (HITECH) Act which strengthened HIPAA sets clear national standards for breach notification. But each state may also have its own breach laws with different timelines, definitions, and reporting requirements.
The legal concept of preemption determines whether federal or state law takes priority. Under 42 U.S.C. § 1320d–7, HIPAA and HITECH generally preempt state laws that conflict with federal standards, except when state laws are more stringent in protecting patient privacy. For small practices, understanding this balance is essential to avoid legal missteps and ensure timely compliance.
This guide explains how preemption works, how state breach laws interact with HITECH, and what practical steps you can take to manage dual compliance obligations.
Understanding Preemption Under HIPAA and HITECH
42 U.S.C. § 1320d–7 provides that federal HIPAA rules supersede any contrary provision of state law, unless the state law:
-
Provides greater privacy protections for individuals
-
Is necessary for state public health reporting or oversight
-
Addresses controlled substances in a way that requires specific disclosures
This means that if a state’s breach notification rule is more stringent, for example, requiring notice in 30 days instead of 60 your practice must comply with the state requirement.
HITECH builds on HIPAA’s preemption framework by incorporating breach notification obligations into the federal rule set, while still allowing states to impose stricter timelines or broader definitions of personal information.
Federal vs. State Breach Notification Requirements
Under the HIPAA/HITECH breach notification rule:
-
Timeline: Covered entities must notify affected individuals without unreasonable delay, and no later than 60 calendar days after discovery of the breach.
-
Scope: Applies to breaches of unsecured PHI.
-
Content: Notices must include a description of the breach, the types of information involved, and steps individuals should take.
State breach laws, however, often differ in key respects:
-
Shorter timelines: Some states require notice in 30 or even 15 days.
-
Broader definitions: States may define “personal information” to include elements beyond PHI, such as financial account numbers.
-
Additional recipients: Some states require notice to the state attorney general or consumer protection agency.
Real-Life Case Study: A State Law Penalty Despite Federal Compliance
In 2020, a small dental practice in the Southeast experienced a ransomware attack that encrypted its appointment scheduling system. The practice completed a HIPAA-compliant risk assessment, determined the breach involved unsecured PHI, and sent notifications to patients within 55 days, well within the federal 60-day limit.
However, the practice overlooked its state’s stricter requirement to notify the attorney general and affected individuals within 30 days. As a result, the state imposed a $25,000 civil penalty for late notification under state law, even though the practice was fully compliant under HITECH.
Lesson Learned: Compliance with federal law does not guarantee compliance with state law. Practices must check both sets of rules for every breach.
The “More Stringent” Standard
HHS defines “more stringent” as a law that provides greater privacy protection or greater access to individuals’ own health information. When a state requirement is more stringent, it is not preempted by HIPAA/HITECH and must be followed.
Examples of more stringent state provisions include:
-
Faster notification timelines
-
Mandatory notification to state agencies
-
Expanded definitions of what constitutes a breach
-
Broader scope of individuals who must be notified
How to Determine Which Law Applies
When a breach occurs, follow these steps:
-
Identify all applicable jurisdictions: Determine where affected individuals reside, not just where your practice is located.
-
Check state laws: Review the breach notification laws for each relevant state.
-
Compare to federal requirements: Note differences in timelines, scope, and reporting obligations.
-
Apply the stricter standard: If state law is more stringent, follow it in addition to meeting federal requirements.
-
Document your decision-making: Keep a record of your legal analysis in case of an investigation.
Building a Compliance Plan for Dual Obligations
For small practices, preparing for both federal and state requirements means having:
-
A breach notification policy that references both HIPAA/HITECH and relevant state laws
-
Access to a state law reference chart that is updated annually
-
Relationships with legal counsel or compliance consultants who can advise on specific breach scenarios
-
A workflow checklist that accounts for multiple notification timelines
HITECH and State Breach Laws Compliance Checklist
-
Identify all states where affected patients reside after a breach.
-
Review each applicable state’s breach notification laws annually.
-
Compare state breach timelines and requirements against federal HITECH standards.
-
Apply the stricter timeline and notification content between federal and state laws.
-
Confirm whether state laws require additional notifications (e.g., attorney geneal).
-
Update breach notification policies to include federal and state law obligations.
-
Maintain an up-to-date, state-by-state reference guide on breach laws.
-
Document discovery date clearly and base notification deadlines on this date.
-
Train staff annually on breach notification requirements, including multi-state compliance.
-
Prepare workflows for managing different notification deadlines and recipients.
-
Consult legal counsel or compliance experts for complex breaches involving multiple states.
-
Retain detailed records of breach investigations and all notifications sent.
-
Review and update policies yearly to reflect changes in state or federal laws.
HITECH and State Breach Laws Compliance Checklist
Task |
Responsible |
Frequency |
Identify all states where affected patients reside after a breach |
Compliance Officer / Privacy Officer |
Immediately after breach |
Review applicable state breach notification laws annually |
Compliance Officer / Legal Counsel |
Annually |
Compare state breach notification timelines and requirements with federal HITECH standards |
Compliance Officer |
Annually/As needed |
Apply the stricter timeline and notification requirements (state or federal) |
Compliance Officer / Privacy Officer |
Per breach event |
Confirm if state laws require additional notifications (e.g., attorney general) |
Compliance Officer |
Per breach event |
Update breach notification policies to include federal and state law obligations |
Compliance Officer / Policy Manager |
Annually or when laws change |
Maintain an up-to-date state-by-state breach law reference guide |
Compliance Officer |
Annually |
Document the breach discovery date clearly and base notification deadlines on this date |
Privacy Officer / Records Manager |
Per breach event |
Train all staff on federal and relevant state breach notification requirements |
Practice Manager / Compliance Officer |
Annually |
Prepare workflows for managing multi-state notification deadlines and recipients |
Compliance Officer / IT Manager |
Annually or per breach |
Consult legal or compliance experts for complex multi-state breaches |
Compliance Officer / Legal Counsel |
Per breach event |
Retain detailed records of breach investigations and all notifications sent |
Records Manager |
Ongoing |
Review and update breach notification policies to reflect legal changes |
Compliance Officer / Policy Manager |
Annually |
Common Pitfalls and How to Avoid Them
Pitfall 1: Assuming Federal Compliance Is Enough
Many practices make the mistake of following only the HITECH 60-day rule, ignoring stricter state timelines.
How to Avoid It: Always check the breach laws for the states where your patients reside. Maintain a state-by-state quick reference guide.
Pitfall 2: Overlooking State Reporting Recipients
Some states require notice to the attorney general or consumer affairs office in addition to patients. Missing these requirements can lead to penalties.
How to Avoid It: Include all required recipients in your breach response checklist, and assign responsibility for each notification.
Pitfall 3: Ignoring Non-PHI Definitions
State laws may protect categories of personal information beyond PHI, such as driver’s license numbers or payment card data.
How to Avoid It: When a breach involves mixed data, assess all potentially applicable definitions under state law.
Pitfall 4: Misjudging the “Discovery” Date
Both federal and state timelines usually start on the date the breach is discovered. Misinterpreting this date can lead to late notifications.
How to Avoid It: Document the exact discovery date and base all deadlines on that date, not the conclusion of your investigation.
Pitfall 5: Not Considering Multi-State Breaches
If a breach involves patients from several states, you may have to comply with multiple sets of deadlines and content requirements.
How to Avoid It: Default to the shortest applicable timeline and the most comprehensive notification content to ensure full compliance.
Pitfall 6: Lack of Policy Updates
State laws change frequently, and outdated policies can cause compliance failures.
How to Avoid It: Schedule annual policy reviews and update your breach procedures when laws change.
Pitfall 7: Failing to Train Staff on State Law Requirements
Front-line employees may not understand the urgency created by certain state laws.
How to Avoid It: Include state-specific breach notification rules in your annual HIPAA training.
References and Further Reading
Final Thoughts and Recommended Next Steps
For small practices, navigating the intersection of HITECH breach notification rules and state-specific data breach laws can be complex and risky. While federal law establishes a baseline for notification requirements, many states impose stricter timelines, broader definitions of personal information, or additional recipients for breach notifications. These heightened state requirements are not preempted by HITECH, meaning both must be followed.
The safest and most defensible strategy is to consistently apply the most stringent applicable standard in every breach situation. This approach minimizes the chance of missing a deadline or omitting a required notification. It is equally important to ensure that every action taken, whether sending letters, notifying regulators, or documenting investigative steps, is recorded in detail for audit and legal purposes.
Next Steps for Your Practice:
• Create and maintain a state-by-state breach law reference guide.
• Review your breach notification policy to incorporate both federal and state rules.
• Train your workforce on multi-jurisdiction compliance.
• Build relationships with legal and compliance experts.
• Keep meticulous records of all notification decisions and actions.
Boosting compliance resilience requires more than policies alone. A HIPAA compliance automation solution can streamline processes, simplify record-keeping, and deliver continuous risk assessments, helping you stay audit-ready and avoid compliance pitfalls.