Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is the HIPAA Breach Notification Rule?

The HIPAA Breach Notification Rule is a 2009 addition to the original Health Insurance Portability and Accountability Act of 1996 (HIPAA)


The HIPAA Breach Notification Rule requires HIPAA-covered entities and their business associates to provide notification following a breach of unsecured protected health information (PHI). Generally defined, a breach is an impermissible use or disclosure of PHI that compromises its security or privacy. Such use or disclosure of PHI is presumed to be a breach unless the covered entity or business associate demonstrates a low probability of compromised PHI.


The HIPAA Breach Notification Rule was introduced in conjunction with the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009. This Rule requires notification to affected individuals, the U.S. Department of Health and Human Services, and in some cases, the media, in the event of a breach of unsecured PHI.


Covered entities and business associates with access to PHI are obligated to ensure administrative, physical, and technical safeguards are in place to maintain the security of patient data. Additionally, they must have procedures in place should a data breach occur and comply with the HIPAA Privacy Rule.

Additional resources you might like:

Comparisons and reviews
Blog
The best TPRM software for 2026

Discover the best third-party risk management software solutions for 2026.

Comparisons and reviews
Blog
Top 5 OneTrust alternatives

Check out top OneTrust alternatives for compliance and risk management.

Comparisons and reviews
Blog
Top 4 Secureframe alternatives

Explore features, limitations, and scalable compliance solutions.

Additional resources you might like:

Comparisons and reviews
Blog
The best TPRM software for 2026

Discover the best third-party risk management software solutions for 2026.

Comparisons and reviews
Blog
Top 5 OneTrust alternatives

Check out top OneTrust alternatives for compliance and risk management.

Comparisons and reviews
Blog
Top 4 Secureframe alternatives

Explore features, limitations, and scalable compliance solutions.

Vendor Risk Management
Blog
GDPR, NIS 2, and DORA converge on one problem: Third-party risk

Discover how EU regulations, GDPR, NIS 2, and DORA, make third-party risk a direct, continuous business liability. Find out why most teams still lack visibility.

Product updates
Events
Vanta Delivers: Live from New York

Join us to see new product capabilities and live demos, and learn how Vanta is delivering a unified risk experience for GRC teams.

Vendor Risk Management
Events
AI broke your Third Party Risk Management program. Now what?

Watch on demand to learn where traditional TPRM breaks down in an AI-first world, and how one team rebuilt their program to actually keep up.

Compliance
Events
Learn how to automate compliance for SOC 2, ISO 27001, and more

Watch on demand to learn how Vanta’s Agentic Trust Platform helps fast-moving startups and security teams get audit-ready fast and stay continuously compliant.

Compliance
Blog
How do you perform quarterly access reviews?

Without periodic access reviews, former employees may retain access to sensitive data after termination. Learn how to perform effective quarterly access reviews.

Product updates
Events
Turn Every Promise into Predictable Trust: Customer Commitments in Action

Watch on demand for a demo of Customer Commitments and learn how Vanta turns contracts into structured, actionable intelligence.