Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is the HIPAA Breach Notification Rule?

The HIPAA Breach Notification Rule is a 2009 addition to the original Health Insurance Portability and Accountability Act of 1996 (HIPAA)


The HIPAA Breach Notification Rule requires HIPAA-covered entities and their business associates to provide notification following a breach of unsecured protected health information (PHI). Generally defined, a breach is an impermissible use or disclosure of PHI that compromises its security or privacy. Such use or disclosure of PHI is presumed to be a breach unless the covered entity or business associate demonstrates a low probability of compromised PHI.


The HIPAA Breach Notification Rule was introduced in conjunction with the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009. This Rule requires notification to affected individuals, the U.S. Department of Health and Human Services, and in some cases, the media, in the event of a breach of unsecured PHI.


Covered entities and business associates with access to PHI are obligated to ensure administrative, physical, and technical safeguards are in place to maintain the security of patient data. Additionally, they must have procedures in place should a data breach occur and comply with the HIPAA Privacy Rule.

Additional resources you might like:

Compliance
Event
How to automate ISO 27001 and SOC 2 compliance

Join Vanta’s 45-minute live product demo on 21 May at 11 am BST. Two of our team members will walk you through the platform and answer questions throughout the session.

Compliance
Event
How to automate SOC 2 & ISO 27001 compliance

Join Vanta’s 45-minute live product demo on May 29 at 10 am PST. Two of our team members will walk you through the platform and answer questions throughout the session.

SOC 2
Event
Ask Me (Almost) Anything: Post-Audit Planning and Excellence

Navigate post-audit success with Vanta & A-LIGN. Get expert advice on leveraging findings for growth. Register for access or recording.

Additional resources you might like:

Compliance
Event
How to automate ISO 27001 and SOC 2 compliance

Join Vanta’s 45-minute live product demo on 21 May at 11 am BST. Two of our team members will walk you through the platform and answer questions throughout the session.

Compliance
Event
How to automate SOC 2 & ISO 27001 compliance

Join Vanta’s 45-minute live product demo on May 29 at 10 am PST. Two of our team members will walk you through the platform and answer questions throughout the session.

SOC 2
Event
Ask Me (Almost) Anything: Post-Audit Planning and Excellence

Navigate post-audit success with Vanta & A-LIGN. Get expert advice on leveraging findings for growth. Register for access or recording.

Company news
Blog
Celebrating international momentum at our first-ever VantaCon UK

We’re thrilled to host our first-ever VantaCon UK in London today as we continue to accelerate international momentum and expand our global footprint.

Compliance
Event
How to Automate ISO 27001 & SOC 2 Compliance

Join Vanta’s 45-minute live product demo on 16 May at 1pm AEST. Two of our team members will walk you through the platform and answer questions throughout the session.

Compliance
Event
How to demonstrate secure AI practices with ISO 42001

Join Vanta and A-LIGN for a Coffee and Compliance session on ISO 42001 —what it is, what types of organizations need it, and how it works.

Security
Guide
Growing pains: How to update and automate outdated security processes

Has your business outgrown its security processes? Learn how to update them in this guide.

Company news
Blog
Celebrating 1,000 reviews on G2 and our first-ever Customer Week

With over 1,000 reviews, Vanta has been named the #1 Leader in G2’s Grid® Report for Security Compliance | Spring 2024.

Compliance
Event
Automating your existing compliance program

With Vanta, you get enough flexibility to choose between a wealth of pre-built content and the ability to customize and configure the product to match your program’s needs. Curious to see this in action?

Get compliant and
build trust, fast.

Two wind turbines on a white background.
Get compliant and build trust,
fast.
Get started