HIPAA Breach Risk Assessment
Use this HIPAA Breach Risk Assessment template to document the four-factor analysis for a suspected PHI incident and decide whether breach notification is required. It keeps the review defensible, consistent, and ready for privacy officer sign-off.
Trusted by frontline teams 15 years of frontline software AI customization in seconds
Built for: Hospitals And Health Systems · Physician Practices · Behavioral Health Clinics · Dental Offices · Home Health And Hospice
Overview
This HIPAA Breach Risk Assessment template documents the four-factor review used after a suspected unauthorized use or disclosure of PHI. It gives privacy, compliance, and legal teams a structured way to record the incident facts, assess the nature of the PHI, evaluate the recipient, confirm whether the information was actually acquired or viewed, and determine whether breach notification is required.
Use it when an incident involves PHI and the organization needs a defensible decision on whether the event rises to a reportable breach. It works well for misdirected emails, paper record exposure, lost devices, unauthorized access, fax errors, and vendor-related disclosures. The template is also useful when facts are still developing, because it separates the incident narrative from the factor-by-factor analysis and the final approval.
Do not use it for routine operational issues that do not involve PHI, or for incidents that are already fully resolved with no privacy impact. It is also not a substitute for legal advice when state breach laws, contractual notice obligations, or business associate responsibilities may apply. The strongest use of this template is as a single record that captures the facts, the mitigation steps, the notification deadline, and the reviewer’s rationale in one place.
Standards & compliance context
- This template supports HIPAA privacy breach assessment workflows by organizing the facts needed to evaluate whether an unauthorized use or disclosure of PHI is a reportable breach.
- It aligns with common healthcare privacy governance practices that require documented review, mitigation, and approval before notification decisions are finalized.
- If your organization follows state breach notification laws, the same record can help support parallel notification analysis and deadline tracking.
- When business associates are involved, the template helps document recipient status, contractual obligations, and downstream disclosure risk.
- The structure also supports audit trails expected in formal compliance programs and corrective action systems.
General regulatory context for orientation only — verify current requirements with counsel or the relevant agency before relying on this template for compliance.
What's inside this template
Incident Overview
This section captures the core facts of the event so the rest of the assessment is anchored to a clear incident record.
-
Incident date and time recorded
Document when the unauthorized use or disclosure occurred or was discovered.
-
Incident type identified
Classify the event as unauthorized use, unauthorized disclosure, loss, theft, misdirected communication, improper access, or other.
-
PHI involved confirmed
Confirm whether the incident involved protected health information.
-
Incident summary documented
Provide a concise factual summary of what happened, including systems, documents, or communications involved.
-
Discovery source identified
Identify how the incident was discovered.
-
Incident report reference number
Enter the internal case, ticket, or incident reference number.
Factor 1: Nature and Extent of PHI
This section measures how sensitive, identifiable, and extensive the PHI exposure was, which is central to the breach analysis.
-
PHI identifiers included
Select the types of identifiers present in the disclosed or accessed information.
-
Minimum necessary standard applied
Determine whether the PHI involved was limited to the minimum necessary information for the intended purpose.
-
Sensitivity of PHI assessed
Rate the sensitivity and potential harm associated with the PHI involved.
-
Volume of PHI involved
Enter the approximate number of records, files, or data subjects affected.
-
Likelihood of re-identification evaluated
Assess whether the information could reasonably be used to identify the individual if not fully de-identified.
-
PHI was encrypted or otherwise secured
Indicate whether the PHI was secured using an approved encryption or equivalent protection method at the time of the incident.
Factor 2: Unauthorized Person
This section focuses on who received the PHI and whether that person was actually permitted to have it or likely to keep it confidential.
-
Recipient identity determined
Identify the unauthorized person or entity that received or accessed the PHI.
-
Recipient had authorization to receive PHI
Confirm whether the recipient was authorized under policy, contract, or role to receive the PHI.
-
Recipient relationship to covered entity assessed
Describe the recipient's role, contractual relationship, or other relevant connection to the covered entity or business associate.
-
Recipient confidentiality obligations confirmed
Determine whether the recipient is bound by confidentiality obligations, privacy agreements, or legal restrictions.
-
Potential for further disclosure assessed
Rate the likelihood that the recipient could further use or disclose the PHI inappropriately.
Factor 3: Actual Acquisition or Viewing
This section tests whether the PHI was truly accessed or seen, rather than merely exposed in theory.
-
Evidence of access reviewed
Review logs, email tracking, access records, or other evidence to determine whether the PHI was accessed.
-
Actual viewing confirmed
Confirm whether the PHI was actually viewed or acquired by the unauthorized person.
-
Evidence source documented
Select the evidence used to support the determination.
-
Time to containment documented
Enter the approximate number of hours from discovery to containment or access restriction.
-
Access successfully terminated or restricted
Confirm whether access was terminated, revoked, or otherwise restricted after discovery.
Factor 4: Mitigation and Notification Determination
This section records what was done to reduce risk and whether the remaining risk still requires breach notification.
-
Mitigation steps completed
Select all mitigation actions taken to reduce the risk of compromise.
-
Residual risk after mitigation assessed
Rate the remaining risk after mitigation actions were completed.
-
Breach notification required determination
Document the final determination based on the four-factor assessment.
-
Notification deadline calculated
If notification is required, record the deadline for required notifications.
-
Corrective action plan initiated
Confirm whether a corrective action plan, policy update, or retraining plan has been initiated.
Review, Approval, and References
This section closes the loop with accountability, legal review, and source documentation for audit readiness.
-
Privacy officer or compliance reviewer approval
Signature of the privacy officer, compliance officer, or designated reviewer approving the assessment.
-
Legal counsel consulted
Indicate whether legal counsel was consulted for the final determination.
-
Reference document
Record the applicable HIPAA breach risk assessment policy, incident response SOP, or legal memo reference.
How to use this template
- 1. Record the incident overview immediately, including date, time, discovery source, incident type, PHI involved, and the internal report reference number.
- 2. Complete Factor 1 by listing the PHI identifiers, the volume and sensitivity of the data, whether the minimum necessary standard was met, and whether the PHI was encrypted or otherwise secured.
- 3. Complete Factor 2 by identifying the unauthorized recipient, confirming whether they were authorized to receive the PHI, and documenting any confidentiality obligations or disclosure risks.
- 4. Complete Factor 3 by reviewing logs, emails, witness statements, or device evidence to determine whether the PHI was actually acquired or viewed and when access was contained.
- 5. Complete Factor 4 by documenting mitigation steps, assessing residual risk, calculating any notification deadline, and assigning corrective actions before routing the assessment for approval.
- 6. Obtain privacy officer, compliance, and legal review as needed, then attach supporting evidence and finalize the reference record for audit readiness.
Best practices
- Document the facts as soon as the incident is discovered, before memory fades or logs roll over.
- Describe the PHI specifically, such as diagnosis, account numbers, or treatment details, rather than writing only "patient information."
- Use objective evidence for actual viewing or acquisition, including system logs, email headers, access records, or witness statements.
- Treat encryption status as a key decision point and record whether the data was secured at rest or in transit.
- Calculate the notification deadline from the date the incident was discovered, not the date it occurred, and record the basis for the calculation.
- Separate mitigation actions from the breach decision so the reviewer can see what changed the residual risk.
- Escalate uncertain cases to privacy counsel when the recipient, access evidence, or notification trigger is unclear.
What this template typically catches
Issues teams running this template most often surface in practice:
Common use cases
Frequently asked questions
What incidents should this template be used for?
Use it for suspected unauthorized use or disclosure of PHI, including misdirected emails, lost devices, improper access, paper record exposure, or accidental disclosures to the wrong recipient. It is designed for incidents that need a documented breach risk assessment, not routine privacy complaints or general security audits. If the event involves PHI and there is uncertainty about breach status, this template helps you record the facts and decision path.
Does this template determine whether a HIPAA breach occurred?
It supports the breach risk assessment process by organizing the facts needed to make that determination. The template does not replace legal review, but it captures the four factors commonly used to evaluate the likelihood that PHI was compromised. That makes the final decision easier to defend if regulators, patients, or auditors ask how it was reached.
Who should complete the assessment?
A privacy officer, compliance lead, or designated incident reviewer should complete it, with input from IT, security, operations, and legal as needed. The person filling it out should be able to verify the incident timeline, the PHI involved, who received it, and what containment steps were taken. Final approval is typically best handled by the privacy officer or another accountable reviewer.
How often is this template used?
It is used each time a reportable or potentially reportable PHI incident occurs. In practice, that means every suspected breach gets its own completed assessment, even if the outcome is that notification is not required. Reusing the same form across incidents helps create a consistent record for trend review and corrective action.
What regulations or standards does it align with?
The template is aligned to HIPAA privacy and breach assessment workflows and supports documentation expected under healthcare compliance programs. It also fits broader privacy governance practices used in ISO 9001-style corrective action systems and formal incident review processes. If your organization also follows state breach laws, the same record can help support those notification decisions too.
What are the most common mistakes when using it?
The biggest mistake is treating the assessment like a yes/no checklist without documenting the facts behind each factor. Another common issue is failing to record containment timing, which makes the residual-risk analysis weaker. Teams also sometimes skip legal review when notification deadlines may apply, or they leave the PHI description too vague to support the decision.
Can this template be customized for different incident types?
Yes. You can tailor the incident overview and factor prompts for email misdelivery, lost laptops, paper chart exposure, fax errors, portal access issues, or vendor incidents. The four-factor structure should stay intact, but the evidence fields and corrective actions can be adjusted to match your workflow and escalation path.
How does this compare with an ad hoc incident memo?
An ad hoc memo often captures the story of the incident but misses the structured analysis needed for a breach decision. This template forces the reviewer to address the nature of the PHI, the recipient, whether actual access occurred, and what mitigation changed the risk. That makes the result easier to audit, approve, and revisit later if new facts emerge.
What should be attached to the completed assessment?
Attach the incident report, screenshots or logs, email headers, access records, witness statements, mitigation evidence, and any legal or privacy review notes. If notification is required, include the deadline calculation and the final approval record. Those attachments make the assessment more than a summary and help show how the conclusion was reached.
Related templates
Ready to use this template?
Get started with MangoApps and use HIPAA Breach Risk Assessment with your team — pricing built for small business.