HIPAA Incident Classification Tree
A structured decision tree for classifying security and privacy incidents under HIPAA. Covers the security vs. privacy distinction, PHI involvement, breach vs. impermissible disclosure vs. near-miss, the three breach exceptions, the four-factor risk assessment, and required notification actions with timelines. Designed for front-line staff and Privacy Officers.
Short answer
A decision tree for classifying HIPAA incidents: security or privacy, PHI involved, breach or near-miss, which of the three breach exceptions applies, the four-factor risk assessment, and which notification actions are required — with regulatory citations at each node.
What is inside
- Security vs. privacy incident triage: the first decision node distinguishes between a security incident under the Security Rule and a privacy incident under the Privacy Rule — the response procedures differ and both may apply simultaneously
- PHI involvement determination: structured questions for determining whether PHI was involved in the incident, including the commonly missed categories (scheduling data with identifiers, paper records, voicemail with patient information)
- The three breach exceptions under 45 CFR § 164.402: unintentional workforce acquisition, inadvertent disclosure to authorized workforce, and inability of unauthorized person to retain — explained with practical examples of when each does and does not apply
- The four-factor risk assessment: a structured walkthrough of the four factors HHS requires to support a low probability of compromise finding — nature and extent of PHI, unauthorized person's identity, whether PHI was acquired or viewed, and mitigation extent
- Notification decision output: based on the tree outcome, clear guidance on which notification actions are required (internal only, individual notification, HHS, media) and on what timeline
We publish the same practical templates and decision tools that clinics use to structure recurring HIPAA work. No enterprise gate. No resource-library gimmicks. Just practical material delivered quickly.
Editorial details
Written by: Angel Campa
Reviewed by: PHIGuard Compliance Research
Updated: April 28, 2026
Best next step: Open the matching product path
Sources