Back to BlogHIPAA

HIPAA Breach Risk Assessment: The 4-Factor Test Explained

By GuardWell Compliance Team·February 11, 2026·8 min read

When a medical practice discovers an impermissible use or disclosure of protected health information (PHI), the immediate question is whether the incident constitutes a breach that triggers notification obligations. Under the Breach Notification Rule (45 CFR 164.400-414), a breach is presumed unless the covered entity can demonstrate through a documented risk assessment that there is a low probability that the PHI has been compromised. This assessment is based on four specific factors defined in the regulation. Understanding and correctly applying this four-factor test is critical — the difference between a low-probability finding and a reportable breach can mean the difference between an internal remediation and a public notification process involving patients, HHS, and potentially the media.

The Presumption of Breach

The 2013 Omnibus Rule replaced the previous "significant risk of harm" standard with a more objective framework. Under the current rule, every impermissible use or disclosure of PHI is presumed to be a breach. The burden falls on the covered entity to overcome this presumption by demonstrating, through a documented risk assessment, that there is a low probability that PHI was compromised. This is an important shift — the default outcome is that the incident is a breach unless your analysis proves otherwise. Practices that skip the risk assessment or conduct a cursory review are exposed to enforcement risk even if the incident would have qualified for an exception under a proper analysis.

Factor 1: The Nature and Extent of PHI Involved

The first factor examines what types of PHI were involved and how much. Consider the identifiers present in the disclosed information — did it include names, Social Security numbers, dates of birth, addresses, diagnoses, treatment information, or financial data? The more sensitive and identifiable the information, the higher the risk of compromise. A disclosure of a patient's name and appointment date presents a different risk profile than a disclosure that includes diagnosis codes, treatment notes, and Social Security numbers. Also consider the volume of records involved. A single misdirected fax affects one patient, while a lost laptop may affect thousands. Document specifically what data elements were involved and how many individuals were affected.

Factor 2: The Unauthorized Person Who Used or Received the PHI

The second factor asks who actually received or accessed the PHI. Was it another covered entity or healthcare provider who is independently obligated to protect PHI? Was it a member of the general public? Was it someone with malicious intent, such as a hacker or identity thief? A misdirected fax sent to another physician's office presents a lower risk than the same fax sent to a random number. A database accessed by a research institution with its own HIPAA obligations is different from a database accessed by an unknown attacker. Identify the recipient, assess their obligations and likely intent, and determine whether they have the ability to re-identify any de-identified information.

Factor 3: Whether PHI Was Actually Acquired or Viewed

The third factor examines whether the PHI was actually accessed or merely had the opportunity to be accessed. This distinction matters. A laptop stolen from a locked car that is recovered within hours with forensic evidence showing it was never powered on presents a different risk than a laptop stolen and never recovered. A misdirected email to a wrong address that bounced back as undeliverable is different from one that was opened and read. Where possible, investigate whether the unauthorized recipient actually viewed the information. Server access logs, email read receipts, forensic analysis of recovered devices, and attestations from recipients can all inform this factor. If you cannot determine whether PHI was viewed, the analysis should generally lean toward a finding of higher risk.

Factor 4: The Extent to Which Risk Has Been Mitigated

The fourth factor considers what steps have been taken to reduce the risk of harm after the incident. Did you obtain the recipient's written assurance that the PHI was destroyed and not retained or further disclosed? Did you recover the lost device? Did you receive confirmation from the recipient (who happens to be a fellow healthcare provider) that the information was not accessed beyond the initial inadvertent receipt? Effective mitigation can tip the overall analysis toward a low-probability finding. However, mitigation must be real and documented — a verbal assurance that a recipient deleted a misdirected email, without written confirmation, may not be sufficient. Document every mitigation step taken and the evidence supporting its effectiveness.

Documenting Your Analysis

Regardless of the outcome, your risk assessment must be documented. If you determine there is a low probability of compromise, your documentation is your defense in the event OCR investigates. Record the date the incident was discovered, the facts of the incident, your analysis of each of the four factors with supporting evidence, and your conclusion. If you conclude the incident is not a reportable breach, maintain this documentation for at least six years. If your analysis concludes the incident is a breach (or is inconclusive), you must proceed with breach notification — to affected individuals within 60 days of discovery, to HHS (immediately for breaches affecting 500 or more, or within 60 days of year-end for smaller breaches), and to prominent media outlets if the breach affects more than 500 residents of a state or jurisdiction.

When the Four-Factor Test Does Not Apply

There are three narrow exceptions where an impermissible use or disclosure does not require even the four-factor analysis. First, unintentional access by a workforce member acting in good faith within the scope of their authority, where the information is not further disclosed. Second, inadvertent disclosure from one authorized person to another authorized person at the same covered entity or BA. Third, a disclosure where the covered entity has a good-faith belief that the unauthorized recipient would not reasonably be able to retain the information. These exceptions are interpreted narrowly — when in doubt, conduct the full four-factor assessment.

How GuardWell Compliance Helps

GuardWell's incident management module includes a guided breach risk assessment workflow that walks your practice through the four-factor test for every potential breach. The platform prompts you to document the PHI involved, the recipient, evidence of access, and mitigation steps. It generates a timestamped risk assessment report that serves as your compliance documentation. When an incident does rise to the level of a reportable breach, GuardWell tracks notification deadlines and helps ensure your practice meets the 60-day notification window. Having a structured process in place before an incident occurs is the best way to ensure your practice responds correctly when one does.

HIPAA breach notificationfour factor testbreach risk assessmentPHI disclosureOCR enforcementbreach determinationincident response

Ready to simplify compliance?

GuardWell brings HIPAA, OSHA, OIG, and 7 more compliance modules into one affordable platform built for medical practices.

Start Free Trial

Start your compliance journey today

Join practices using GuardWell Compliance to stay ahead of HIPAA audits, OCR enforcement, and state regulatory inspections — $199/month with annual billing. Try free for 7 days.

No setup fees · No contracts · Cancel anytime

GuardWell

Healthcare Compliance Assistant

Hi! I'm GuardWell's sales assistant.

I can answer questions about our healthcare compliance platform, pricing, and features. How can I help?

Powered by GuardWell AI