Templates Healthcare Medical HIPAA Security Incident Response Plan
Ready to Edit
HIPAA Security Incident Response Plan - Free Editor

HIPAA SECURITY INCIDENT RESPONSE PLAN

Organization Name: [________________________________]
Plan Version: [____]
Effective Date: [__/__/____]
Last Reviewed: [__/__/____]
Plan Owner: [________________________________] (Security Officer)
Classification: Confidential — Internal Use Only


SECTION 1: PURPOSE AND SCOPE

1.1 Purpose

This Security Incident Response Plan ("SIRP" or "Plan") establishes a comprehensive framework for identifying, containing, eradicating, recovering from, and documenting security incidents affecting electronic protected health information ("ePHI") and other information assets. This Plan fulfills the requirements of the HIPAA Security Rule at 45 C.F.R. § 164.308(a)(6)(i), which requires covered entities and business associates to implement policies and procedures to address security incidents, and aligns with the NIST Cybersecurity Framework 2.0 (Govern, Identify, Protect, Detect, Respond, Recover).

1.2 Scope

This Plan applies to:

  • All workforce members (employees, volunteers, trainees, contractors) of [________________________________] ("Organization")
  • All systems, networks, applications, and media that create, receive, maintain, or transmit ePHI
  • All physical locations where ePHI is accessed or stored
  • All business associates and subcontractors with access to Organization ePHI
  • Both on-premises and cloud-based systems containing ePHI

1.3 Regulatory Framework

This Plan is developed in compliance with and references the following authorities:

Authority Description
45 C.F.R. § 164.308(a)(6) Security incident procedures (Administrative Safeguard)
45 C.F.R. § 164.308(a)(1) Security management process / risk analysis
45 C.F.R. §§ 164.400-414 Breach Notification Rule
45 C.F.R. § 164.312(b) Audit controls
45 C.F.R. § 164.530(j) 6-year documentation retention
NIST SP 800-61r3 Computer Security Incident Handling Guide
NIST SP 800-66r2 Implementing the HIPAA Security Rule
NIST CSF 2.0 Cybersecurity Framework (2024)

SECTION 2: DEFINITIONS

Security Incident: The attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system. (45 C.F.R. § 164.304)

Breach: The acquisition, access, use, or disclosure of PHI in a manner not permitted under the HIPAA Privacy Rule which compromises the security or privacy of the PHI. (45 C.F.R. § 164.402)

Unsecured PHI: PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized persons through the use of encryption or destruction methodologies specified by the Secretary. (45 C.F.R. § 164.402)

ePHI: Electronic protected health information created, received, maintained, or transmitted by the Organization.

Covered Entity: A health plan, healthcare clearinghouse, or healthcare provider that transmits health information electronically.

Business Associate: A person or entity that performs functions or activities on behalf of a covered entity that involve the use or disclosure of PHI.

Incident Response Team ("IRT"): The designated group of individuals responsible for coordinating the Organization's response to security incidents.

Forensic Image: A bit-for-bit copy of digital media used for evidentiary analysis.

Indicators of Compromise ("IOC"): Technical artifacts or observable behaviors that suggest a security incident has occurred or is occurring.


SECTION 3: INCIDENT RESPONSE TEAM STRUCTURE

3.1 IRT Composition

Role Name Contact Backup
IRT Lead / Security Officer [________________] [________________] [________________]
Privacy Officer [________________] [________________] [________________]
Legal Counsel [________________] [________________] [________________]
IT Director / CISO [________________] [________________] [________________]
Network/Systems Administrator [________________] [________________] [________________]
Human Resources Representative [________________] [________________] [________________]
Communications / Public Relations [________________] [________________] [________________]
Compliance Officer [________________] [________________] [________________]
Department Manager(s) Affected [________________] [________________] [________________]
External Forensics Vendor [________________] [________________] [________________]

3.2 Role Responsibilities

IRT Lead / Security Officer:
- Serves as overall incident commander
- Activates IRT and assigns responsibilities
- Makes containment and eradication decisions
- Coordinates with external parties (law enforcement, forensics vendors, cyber insurance carrier)
- Ensures documentation and evidence preservation
- Conducts post-incident review

Privacy Officer:
- Determines whether a breach of PHI has occurred
- Conducts or oversees the four-factor risk assessment under 45 C.F.R. § 164.402(2)
- Coordinates breach notification to individuals, HHS, and media as required
- Cross-references the Organization's HIPAA Breach Response Plan
- Ensures individual rights and privacy protections during investigation

Legal Counsel:
- Advises on legal obligations (federal and state breach notification laws)
- Asserts attorney-client privilege over investigation work product where appropriate
- Coordinates with law enforcement regarding potential criminal activity
- Reviews all external communications and breach notification letters
- Advises on regulatory reporting obligations (OCR, state AGs)

IT Director / CISO:
- Leads technical investigation and forensic analysis
- Implements containment and eradication measures
- Coordinates system recovery and validation
- Manages external forensics vendor engagement
- Preserves and analyzes system logs, network traffic, and forensic images

Human Resources Representative:
- Addresses incidents involving workforce members
- Coordinates disciplinary actions for policy violations
- Supports workforce interview processes
- Manages workforce notification and training needs

Communications / Public Relations:
- Drafts external communications, press releases, and media responses
- Manages media inquiries (see HIPAA Breach Notification — Media template)
- Coordinates internal workforce communications
- Monitors social media and public reporting

3.3 External Resources (Pre-Contracted)

Resource Vendor / Contact Contract # Retainer?
Digital Forensics Firm [________________] [________] ☐ Yes ☐ No
Cyber Insurance Carrier [________________] [________] Policy #: [________]
Breach Notification Vendor [________________] [________] ☐ Yes ☐ No
Credit Monitoring Provider [________________] [________] ☐ Yes ☐ No
Outside Legal Counsel [________________] [________] ☐ Yes ☐ No
Law Enforcement Liaison [________________] [________] N/A

SECTION 4: INCIDENT CLASSIFICATION

4.1 Incident Severity Levels

Level 1 — Critical (Emergency Response Required)
- Active ransomware attack encrypting ePHI systems
- Confirmed large-scale exfiltration of ePHI (500+ individuals)
- Complete loss of access to critical ePHI systems
- Nation-state or advanced persistent threat (APT) intrusion confirmed
- Response Time: Immediate (within 1 hour)
- IRT Activation: Full team plus executive leadership
- External Notification: Cyber insurance carrier within policy-required timeframe

Level 2 — High (Urgent Response Required)
- Unauthorized access to ePHI by external threat actor (scope being determined)
- Confirmed malware infection on systems containing ePHI
- Business associate reports breach affecting Organization's ePHI
- Theft or loss of unencrypted device containing ePHI
- Response Time: Within 4 hours
- IRT Activation: Core team (Security Officer, Privacy Officer, IT, Legal)
- External Notification: Cyber insurance carrier as appropriate

Level 3 — Medium (Prompt Response Required)
- Unauthorized internal access to ePHI (e.g., employee snooping)
- Misdirected fax, email, or mail containing PHI
- Phishing attack with potential credential compromise (no confirmed ePHI access)
- Vulnerability identified that could expose ePHI if exploited
- Response Time: Within 24 hours
- IRT Activation: Security Officer, Privacy Officer, IT
- External Notification: As determined by investigation

Level 4 — Low (Routine Response)
- Failed login attempts or port scanning without system compromise
- Spam or phishing email detected and blocked before user interaction
- Minor policy violation with no ePHI exposure
- System anomaly requiring investigation but no confirmed incident
- Response Time: Within 72 hours
- IRT Activation: Security Officer, IT
- External Notification: Generally not required

4.2 Escalation Criteria

Incidents shall be escalated to a higher severity level when:

☐ Additional systems are discovered to be compromised
☐ The number of affected individuals increases significantly
☐ ePHI exfiltration is confirmed or strongly suspected
☐ Media attention or public awareness occurs
☐ Law enforcement involvement is initiated
☐ Threat actor demonstrates persistence or escalation
☐ Business continuity is threatened


SECTION 5: DETECTION AND ANALYSIS

5.1 Detection Sources

The Organization monitors the following detection sources for indicators of security incidents:

Technical Detection:
☐ Intrusion Detection/Prevention System (IDS/IPS) alerts
☐ Security Information and Event Management (SIEM) system
☐ Endpoint Detection and Response (EDR) alerts
☐ Firewall and network traffic analysis
☐ Data Loss Prevention (DLP) alerts
☐ Email security gateway alerts (phishing, malware)
☐ Antivirus/anti-malware alerts
☐ Cloud access security broker (CASB) alerts
☐ Vulnerability scanning results
☐ EHR/application audit log anomalies

Human Detection:
☐ Workforce member reports (internal hotline, email, ticketing system)
☐ Business associate notifications (per BAA requirements)
☐ Patient/individual complaints
☐ Help desk tickets indicating suspicious activity
☐ Physical security reports (unauthorized facility access)

External Detection:
☐ Law enforcement notifications
☐ HHS/OCR notifications
☐ Threat intelligence feeds and advisories (HHS HC3, CISA)
☐ Media reports or public disclosures
☐ Third-party security researcher reports

5.2 Incident Reporting Channels

All workforce members must report suspected security incidents immediately through any of the following channels:

Channel Details
Security Incident Hotline [________________________________]
Email [________________________________]
IT Ticketing System [________________________________]
In Person Report to immediate supervisor or Security Officer
Anonymous Reporting [________________________________]

Reporting Obligation: Under HIPAA, all workforce members are required to report suspected security incidents. Failure to report is a policy violation subject to disciplinary action, up to and including termination. (See 45 C.F.R. § 164.308(a)(6)(ii) — Response and Reporting)

5.3 Initial Analysis Procedures

Upon receiving an incident report, the IRT Lead or designee shall:

  1. Triage — Assign initial severity level based on available information
  2. Validate — Confirm whether a security incident has occurred (vs. false positive)
  3. Scope — Determine initial scope of affected systems, data, and users
  4. Classify — Determine incident type:
    ☐ Hacking / IT incident (external intrusion, malware, ransomware)
    ☐ Unauthorized access/disclosure (internal workforce, business associate)
    ☐ Theft (device, media, records)
    ☐ Loss (device, media, records)
    ☐ Improper disposal (paper, electronic media)
    ☐ Other: [________________________________]
  5. Document — Create incident record with unique tracking number
  6. Notify — Alert appropriate IRT members based on severity level

SECTION 6: CONTAINMENT

6.1 Short-Term Containment (Immediate — Stop the Bleeding)

The goal of short-term containment is to limit the immediate damage and prevent further unauthorized access while preserving evidence.

☐ Isolate affected systems from the network (do NOT power off — preserve volatile data)
☐ Block suspicious IP addresses, domains, or user accounts at the perimeter
☐ Disable compromised user credentials and reset passwords
☐ Redirect network traffic as needed to maintain operations
☐ Enable enhanced logging on affected and adjacent systems
☐ Implement temporary firewall rules to restrict lateral movement
☐ Quarantine affected email accounts if phishing/BEC is involved
☐ Preserve system state (memory dumps, running processes) before any changes
☐ Notify cyber insurance carrier per policy requirements (typically within 24-72 hours)

6.2 Long-Term Containment (Sustained — Prepare for Eradication)

☐ Move affected systems to a contained network segment (VLAN isolation)
☐ Deploy clean replacement systems for critical business operations
☐ Implement additional monitoring on all systems with similar configurations
☐ Conduct enterprise-wide credential reset if credential compromise is widespread
☐ Patch known vulnerabilities that were exploited
☐ Review and restrict business associate remote access
☐ Engage external forensics vendor if internal capabilities are insufficient
☐ Implement additional access controls on ePHI repositories
☐ Review backup integrity (confirm backups are not also compromised)

6.3 Containment Decision Authority

Severity Level Containment Authority Approval Required for System Shutdown
Level 1 — Critical IRT Lead / CISO IRT Lead (immediate authority)
Level 2 — High IRT Lead / IT Director IRT Lead
Level 3 — Medium IT Director Security Officer
Level 4 — Low IT Staff IT Director

SECTION 7: EVIDENCE PRESERVATION AND FORENSIC ANALYSIS

7.1 Evidence Preservation Requirements

All evidence must be preserved in a manner that maintains its integrity and admissibility. The Organization shall maintain a chain of custody for all evidence collected.

Digital Evidence Preservation Checklist:

☐ Create forensic images (bit-for-bit copies) of affected systems before any remediation
☐ Capture volatile data (RAM, running processes, network connections, logged-in users)
☐ Preserve all relevant log files (system, application, network, authentication, audit)
☐ Document hash values (SHA-256) of all forensic images and evidence
☐ Store evidence in a secure, access-controlled location
☐ Maintain chain of custody log for all evidence items
☐ Preserve email communications related to the incident
☐ Capture screenshots of anomalous activity or indicators of compromise
☐ Retain firewall, IDS/IPS, and SIEM logs for the relevant timeframe
☐ Preserve physical evidence (stolen devices, access cards, paper records) in sealed containers

7.2 Chain of Custody Documentation

Item # Description Collected By Date/Time Location Hash Value
[____] [________________________________] [________] [__/__/____] [________] [________________]
[____] [________________________________] [________] [__/__/____] [________] [________________]
[____] [________________________________] [________] [__/__/____] [________] [________________]

7.3 Forensic Analysis Procedures

☐ Analyze forensic images to determine attack vector and timeline
☐ Review authentication logs to identify unauthorized access
☐ Examine network traffic for data exfiltration indicators
☐ Analyze malware samples in a sandbox environment
☐ Correlate findings across multiple data sources
☐ Determine scope of ePHI accessed, acquired, or exfiltrated
☐ Identify all affected individuals (for breach notification purposes)
☐ Document forensic findings in a written report


SECTION 8: ERADICATION AND RECOVERY

8.1 Eradication Procedures

☐ Remove malware, backdoors, and unauthorized accounts from all affected systems
☐ Patch or remediate the vulnerability that was exploited
☐ Rebuild compromised systems from known-good baselines or clean media
☐ Reset all potentially compromised credentials (local and domain accounts)
☐ Revoke and reissue certificates if certificate compromise is suspected
☐ Update firewall rules, IDS/IPS signatures, and endpoint protection
☐ Scan all systems with updated anti-malware tools
☐ Verify eradication through re-scanning and log review
☐ Close unauthorized remote access points

8.2 Recovery Procedures

☐ Restore affected systems from validated clean backups
☐ Verify data integrity post-restoration
☐ Implement enhanced monitoring on restored systems for [30/60/90] days
☐ Gradually return systems to production with increased logging
☐ Validate that all business processes function correctly
☐ Test ePHI access controls and verify appropriate restrictions
☐ Confirm EHR and clinical system integrity
☐ Update system documentation to reflect changes made during recovery
☐ Monitor for recurrence of indicators of compromise

8.3 Recovery Priorities

Priority System / Function RPO RTO
1 [________________________________] [____] [____]
2 [________________________________] [____] [____]
3 [________________________________] [____] [____]
4 [________________________________] [____] [____]

RPO = Recovery Point Objective; RTO = Recovery Time Objective


SECTION 9: RANSOMWARE-SPECIFIC RESPONSE PROCEDURES

9.1 Ransomware Response Protocol

Per OCR guidance, ransomware incidents affecting ePHI are presumed to be breaches requiring notification unless the covered entity can demonstrate a low probability that the PHI was compromised. OCR has clarified that when ePHI is encrypted by ransomware, it constitutes an unauthorized acquisition of PHI because the attacker took control of the data, even if the data was not exfiltrated.

Immediate Actions:
☐ Isolate affected systems immediately — disconnect from network but do NOT power off
☐ Do NOT pay ransom without legal counsel and law enforcement consultation
☐ Preserve ransom note (screenshot) and all related communications
☐ Contact cyber insurance carrier immediately (most policies have specific ransomware provisions)
☐ Contact FBI (IC3 at ic3.gov) and/or local FBI field office
☐ Contact CISA (cisa.gov/report) for technical assistance
☐ Determine if data was exfiltrated (double extortion) or only encrypted

9.2 Ransomware Breach Analysis

Factor Analysis
Was ePHI encrypted by the ransomware? ☐ Yes ☐ No ☐ Unknown
Was ePHI exfiltrated prior to encryption? ☐ Yes ☐ No ☐ Unknown
Was the ePHI encrypted (per HIPAA standards) before the ransomware attack? ☐ Yes ☐ No
Was the encryption key also compromised? ☐ Yes ☐ No ☐ Unknown
Can the Organization demonstrate low probability of compromise? ☐ Yes ☐ No

OCR Position: If ePHI was encrypted consistent with NIST standards prior to the ransomware attack and the encryption key was not compromised, the encryption safe harbor under 45 C.F.R. § 164.402(2) may apply, and the incident may not constitute a breach. However, if the attacker also exfiltrated the data, the safe harbor does not apply to the exfiltrated copy.

9.3 Ransom Payment Considerations

Legal counsel must be consulted before any ransom payment decision. Factors include:

☐ OFAC sanctions screening (payment to sanctioned entities may violate federal law)
☐ Cyber insurance coverage and carrier approval requirements
☐ Law enforcement recommendations
☐ Availability and integrity of backup systems
☐ Impact on patient safety and care delivery
☐ No guarantee that payment will result in decryption or prevent data publication


SECTION 10: COMMUNICATION PLAN

10.1 Internal Communications

Audience Responsible Party Timing Method
Executive Leadership IRT Lead Within 2 hours of Level 1-2 Phone / In-person
Board of Directors Executive Leadership Within 24 hours of Level 1 Secure briefing
Affected Department(s) Department Manager As directed by IRT Lead In-person meeting
All Workforce Members HR / Communications As directed by IRT Lead Secure email / intranet

10.2 External Communications

Audience Responsible Party Timing Method
Cyber Insurance Carrier IRT Lead / Legal Per policy (typically 24-72 hrs) Phone + written notice
Law Enforcement (FBI, local) IRT Lead / Legal As warranted Phone / IC3 report
HHS/OCR Privacy Officer Per Breach Notification Rule HHS Breach Portal
Affected Individuals Privacy Officer Within 60 days of discovery Written notice
Media (if >500 in state) Communications Within 60 days of discovery Press release
State Attorneys General Legal Counsel Per state law requirements Written notice
Business Associates Privacy Officer As needed for coordination Written notice

10.3 Law Enforcement Coordination

☐ Determine whether law enforcement notification is warranted
☐ Coordinate with legal counsel before contacting law enforcement
☐ If law enforcement requests a delay in breach notification under 45 C.F.R. § 164.412, obtain written request and document the delay period
☐ A law enforcement delay does not extend the 60-day notification clock permanently — notification must occur upon conclusion of the delay
☐ Report cybercrime to FBI's Internet Crime Complaint Center (IC3) at ic3.gov
☐ Report ransomware and critical incidents to CISA at cisa.gov/report


SECTION 11: BUSINESS ASSOCIATE INCIDENT COORDINATION

11.1 Business Associate Obligations

Under 45 C.F.R. § 164.410, business associates must notify covered entities of breaches of unsecured PHI without unreasonable delay and no later than 60 days after discovery (or sooner if the BAA specifies a shorter timeframe).

11.2 BAA Incident Reporting Requirements

☐ Review all Business Associate Agreements for incident reporting timeframes
☐ Maintain current contact information for all BAs with ePHI access
☐ Document BA-reported incidents using the same tracking system
☐ Verify BA's containment and remediation actions
☐ Obtain BA's forensic investigation report
☐ Determine whether the Organization (as covered entity) has independent notification obligations
☐ Coordinate notification timing with the BA

11.3 Business Associate Contact Registry

Business Associate Service ePHI Access Incident Contact BAA Reporting Period
[________________] [________________] [________________] [________________] [____] days
[________________] [________________] [________________] [________________] [____] days
[________________] [________________] [________________] [________________] [____] days

SECTION 12: BREACH NOTIFICATION INTEGRATION

12.1 Transition to Breach Response

When a security incident involves potential unauthorized access, use, or disclosure of unsecured PHI, the IRT Lead shall:

  1. Notify the Privacy Officer immediately
  2. Initiate the HIPAA Breach Risk Assessment Worksheet (four-factor analysis per 45 C.F.R. § 164.402(2))
  3. If breach is confirmed (or cannot be demonstrated to be low probability of compromise), activate the HIPAA Breach Response Plan
  4. Coordinate individual, HHS, and media notifications as required
  5. Maintain parallel documentation for both the security incident and breach response

12.2 Cross-Reference to Related Templates

This Security Incident Response Plan works in conjunction with the following Organization documents:

  • HIPAA Breach Response Plan — Comprehensive breach response procedures
  • HIPAA Breach Risk Assessment Worksheet — Four-factor risk assessment documentation
  • HIPAA Breach Notification — HHS — HHS breach portal submission guide
  • HIPAA Breach Notification — Media — Media notification and press release template
  • HIPAA Breach Notification Call Script — Individual notification call procedures

SECTION 13: POST-INCIDENT REVIEW AND LESSONS LEARNED

13.1 Post-Incident Review Meeting

A post-incident review ("lessons learned") meeting shall be conducted within [____] days of incident closure. All IRT members who participated in the response shall attend.

Meeting Agenda:

☐ Incident timeline reconstruction (from detection through recovery)
☐ What worked well in the response
☐ What could be improved
☐ Root cause analysis
☐ Effectiveness of detection mechanisms
☐ Timeliness and adequacy of containment
☐ Communication effectiveness (internal and external)
☐ Documentation completeness
☐ Policy and procedure gaps identified
☐ Recommended corrective actions and responsible parties
☐ Training needs identified

13.2 Post-Incident Report

The IRT Lead shall prepare a written Post-Incident Report within [____] days of the review meeting, documenting:

  • Executive summary
  • Complete incident timeline
  • Root cause analysis
  • Impact assessment (systems, data, individuals affected)
  • Response actions taken and their effectiveness
  • Breach determination (if applicable) and notification actions
  • Corrective actions recommended with implementation deadlines
  • Resource requirements for remediation
  • Lessons learned

13.3 Corrective Action Tracking

Action Item Owner Deadline Status
[________________________________] [________________] [__/__/____] ☐ Open ☐ In Progress ☐ Complete
[________________________________] [________________] [__/__/____] ☐ Open ☐ In Progress ☐ Complete
[________________________________] [________________] [__/__/____] ☐ Open ☐ In Progress ☐ Complete
[________________________________] [________________] [__/__/____] ☐ Open ☐ In Progress ☐ Complete

SECTION 14: TESTING AND EXERCISES

14.1 Exercise Schedule

The Organization shall conduct regular exercises to test this Plan and ensure readiness:

Exercise Type Frequency Description Participants
Tabletop Exercise Annually (minimum) Discussion-based walkthrough of incident scenarios Full IRT
Functional Exercise Every 2 years Hands-on simulation with technical response actions IT, Security, Privacy
Full-Scale Exercise Every 3 years Comprehensive simulation including external parties IRT + external vendors
Phishing Simulation Quarterly Simulated phishing campaigns to test workforce awareness All workforce
Backup Restoration Test Semi-annually Validate ability to restore ePHI from backups IT

14.2 Tabletop Exercise Scenarios

The following scenarios should be included in the exercise rotation:

☐ Ransomware attack encrypting EHR system and demanding payment
☐ Business associate data breach affecting Organization's patients
☐ Insider threat — workforce member accessing celebrity/VIP patient records
☐ Lost/stolen unencrypted laptop containing ePHI
☐ Phishing attack leading to credential compromise and ePHI access
☐ Physical break-in with theft of paper records and computer equipment
☐ Misdirected email containing ePHI sent to large distribution list
☐ Third-party vendor vulnerability exploited (supply chain attack)

14.3 Exercise Documentation

Each exercise shall be documented, including:

☐ Date, time, and duration
☐ Participants and roles
☐ Scenario description
☐ Observations and findings
☐ Action items for improvement
☐ Plan updates resulting from the exercise


SECTION 15: DOCUMENTATION AND RETENTION

15.1 Documentation Requirements

The following documentation must be created and retained for each security incident:

☐ Initial incident report (who, what, when, where, how discovered)
☐ Incident tracking log with status updates
☐ IRT activation records and communications
☐ Forensic analysis reports
☐ Evidence inventory and chain of custody logs
☐ Containment and eradication action logs
☐ Recovery and validation records
☐ Breach risk assessment worksheet (if PHI involved)
☐ Notification records (individuals, HHS, media, state AGs)
☐ Post-incident review report
☐ Corrective action plans and completion records

15.2 Retention Requirements

Per 45 C.F.R. § 164.530(j), all documentation related to HIPAA compliance, including incident response documentation, must be retained for a minimum of six (6) years from the date of creation or the date when it was last in effect, whichever is later.

Note: State law, litigation hold obligations, and cyber insurance policy terms may require longer retention. Consult legal counsel regarding applicable retention requirements.

15.3 Incident Log

Incident # Date Discovered Classification PHI Involved? Breach? Status Closed Date
[________] [__/__/____] Level [____] ☐ Yes ☐ No ☐ Yes ☐ No [________] [__/__/____]
[________] [__/__/____] Level [____] ☐ Yes ☐ No ☐ Yes ☐ No [________] [__/__/____]
[________] [__/__/____] Level [____] ☐ Yes ☐ No ☐ Yes ☐ No [________] [__/__/____]

SECTION 16: CYBER INSURANCE NOTIFICATION

16.1 Policy Information

Item Details
Insurance Carrier [________________________________]
Policy Number [________________________________]
Policy Period [__/__/____] to [__/__/____]
Claims Hotline [________________________________]
Claims Email [________________________________]
Broker Contact [________________________________]
Notification Deadline [____] hours from discovery of incident

16.2 Notification Requirements

☐ Review cyber insurance policy for specific notification requirements and timeframes
☐ Notify carrier before engaging external forensics, legal counsel, or breach notification vendors (many policies require pre-approval or use of panel vendors)
☐ Document all communications with the carrier
☐ Retain all invoices and expense documentation for potential claims
☐ Confirm coverage for: forensic investigation, breach notification costs, credit monitoring, legal defense, regulatory fines/penalties, business interruption


SECTION 17: PLAN MAINTENANCE

17.1 Review Schedule

This Plan shall be reviewed and updated:

☐ Annually (at minimum)
☐ After every significant security incident
☐ After every tabletop or functional exercise
☐ When significant changes occur to the Organization's IT infrastructure
☐ When significant changes occur to HIPAA regulations or OCR guidance
☐ When business associate relationships change materially
☐ When there are changes in IRT membership

17.2 Version History

Version Date Author Changes
[____] [__/__/____] [________________] [________________________________]
[____] [__/__/____] [________________] [________________________________]
[____] [__/__/____] [________________] [________________________________]

SECTION 18: PLAN APPROVAL

This Security Incident Response Plan has been reviewed and approved by the following individuals:

Security Officer:
Name: [________________________________]
Signature: ______________________________
Date: [__/__/____]

Privacy Officer:
Name: [________________________________]
Signature: ______________________________
Date: [__/__/____]

Legal Counsel:
Name: [________________________________]
Signature: ______________________________
Date: [__/__/____]

Executive Leadership:
Name: [________________________________]
Title: [________________________________]
Signature: ______________________________
Date: [__/__/____]


SOURCES AND REFERENCES

  1. 45 C.F.R. § 164.308(a)(6) — Security Incident Procedures (HIPAA Security Rule Administrative Safeguard)
  2. 45 C.F.R. §§ 164.400-414 — Breach Notification Rule
  3. 45 C.F.R. § 164.530(j) — Documentation Retention Requirements (6 Years)
  4. NIST SP 800-61r3 — Computer Security Incident Handling Guide (2024)
  5. NIST SP 800-66r2 — Implementing the HIPAA Security Rule: A Cybersecurity Resource Guide (2024)
  6. NIST Cybersecurity Framework 2.0 (February 2024)
  7. HHS OCR — Guidance on Ransomware and HIPAA (2016, updated guidance through 2025)
  8. HHS OCR — Breach Notification Rule (https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html)
  9. CISA — Ransomware Guide (https://www.cisa.gov/stopransomware)
  10. FBI IC3 — Internet Crime Complaint Center (https://www.ic3.gov)
  11. HHS HC3 — Health Sector Cybersecurity Coordination Center (threat advisories)

This template is provided for informational purposes only and does not constitute legal advice. Organizations should have this plan reviewed and customized by qualified legal counsel and cybersecurity professionals before implementation. HIPAA compliance requirements are subject to change based on OCR guidance and regulatory updates.

For use on ezel.ai — a legal template platform for solo practitioners and small firms.

AI Legal Assistant
$49 one-time

Need help customizing this document?

Get 3 days of intelligent editing. Tailor every section to your specific case.

See how AI customizes your document (DEMO)

HIPAA Security Incident Res...
All changes saved
Save
Export
Export as DOCX
Export as PDF
Generating PDF...
hipaa_security_incident_response_plan_universal.pdf
Ready to export as PDF or Word
AI is editing...

HIPAA SECURITY INCIDENT RESPONSE PLAN

GENERAL TEMPLATE


Effective Date: [DATE]
Party A: [PARTY A NAME]
Address: [PARTY A ADDRESS]
Party B: [PARTY B NAME]
Address: [PARTY B ADDRESS]
Governing Law: [GOVERNING STATE]

This document is entered into by and between [PARTY A NAME] and [PARTY B NAME], effective as of the date set forth above, subject to the terms and conditions outlined herein and the laws of [GOVERNING STATE].
Chat
Review

Customize this document with Ezel

$49 one-time · No subscription

  • AI-Powered Editing
    Tell the AI what to change and watch it edit your document in real time.
  • 3 Days of Access
    Revise as many times as you need. Download as Word or PDF.
  • State-Specific Law
    AI understands your jurisdiction's legal requirements.
Secure checkout via Stripe
Need to customize this document?

Do more with Ezel

This free template is just the beginning. See how Ezel helps legal teams draft, research, and collaborate faster.

AI Document Editor

AI that drafts while you watch

Tell the AI what you need and watch your document transform in real-time. No more copy-pasting between tools or manually formatting changes.

  • Natural language commands: "Add a force majeure clause"
  • Context-aware suggestions based on document type
  • Real-time streaming shows edits as they happen
  • Milestone tracking and version comparison
Learn more about the Editor
AI Chat for legal research
AI Chat Workspace

Research and draft in one conversation

Ask questions, attach documents, and get answers grounded in case law. Link chats to matters so the AI remembers your context.

  • Pull statutes, case law, and secondary sources
  • Attach and analyze contracts mid-conversation
  • Link chats to matters for automatic context
  • Your data never trains AI models
Learn more about AI Chat
Case law search interface
Case Law Search

Search like you think

Describe your legal question in plain English. Filter by jurisdiction, date, and court level. Read full opinions without leaving Ezel.

  • All 50 states plus federal courts
  • Natural language queries - no boolean syntax
  • Citation analysis and network exploration
  • Copy quotes with automatic citation generation
Learn more about Case Law Search

Ready to transform your legal workflow?

Join legal teams using Ezel to draft documents, research case law, and organize matters — all in one workspace.

Request a Demo