bmad-plus 0.4.4 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/CHANGELOG.md +54 -0
  2. package/README.md +5 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +76 -12
  8. package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
  9. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
  10. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
  11. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
  12. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
  13. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
  14. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
  15. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
  16. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
  17. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
  18. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
  19. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
  20. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
  21. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
  22. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
  23. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
  24. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
  25. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
  26. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
  27. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
  28. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
  29. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
  30. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
  31. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
  32. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
  33. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
  34. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
  35. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
  36. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
  37. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
  38. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
  39. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
  40. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
  41. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
  42. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
  43. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
  44. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
  45. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
  46. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
  47. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
  48. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
  49. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
  50. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
  51. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
  52. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
  53. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
  54. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
  55. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
  56. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
  57. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
  58. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
  59. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
  60. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
  61. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
  62. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
  63. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
  64. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
  65. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
  66. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
  67. package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
  68. package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
  69. package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
  70. package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
  71. package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
  72. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  73. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  74. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  75. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  76. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  77. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  78. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  79. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  80. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  81. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  82. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  83. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  84. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  85. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  86. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  87. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  88. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  89. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  90. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  91. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  92. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  93. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  94. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  95. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  96. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  97. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  98. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  99. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  100. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  101. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  102. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  103. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  104. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  105. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  106. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  107. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  108. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  109. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  110. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  111. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  112. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  113. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  114. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  115. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  116. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  117. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  118. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  119. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  120. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  121. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  122. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  123. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  124. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  125. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  126. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  127. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  128. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  129. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  130. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  131. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  132. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  133. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  134. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  135. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  136. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  137. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  138. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  139. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  140. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  141. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  142. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  143. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  144. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  145. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  146. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  147. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  148. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  149. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  150. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  151. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  152. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  153. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  154. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  155. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  156. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  157. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  158. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  159. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  160. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  161. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  162. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  163. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  164. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  165. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  166. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  167. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  168. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  169. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  170. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  171. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  172. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  173. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  174. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  175. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  176. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  177. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  178. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  179. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  180. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  181. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  182. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  183. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  184. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  185. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  186. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  187. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  188. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  189. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  190. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  191. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  192. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  193. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  194. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  195. package/tools/cli/commands/install.js +31 -9
  196. package/tools/cli/commands/update.js +4 -2
  197. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,293 @@
1
+ # HIPAA Breach Notification Rule Reference
2
+ ## 45 CFR Part 164, Subpart D (HITECH / 2009)
3
+
4
+ ---
5
+
6
+ ## Table of Contents
7
+ 1. [What is a Breach?](#1-what-is-a-breach)
8
+ 2. [Breach Risk Assessment (4-Factor Test)](#2-breach-risk-assessment-4-factor-test)
9
+ 3. [Notification to Individuals](#3-notification-to-individuals)
10
+ 4. [Notification to HHS](#4-notification-to-hhs)
11
+ 5. [Notification to Media](#5-notification-to-media)
12
+ 6. [Business Associate Obligations](#6-business-associate-obligations)
13
+ 7. [Documentation Requirements](#7-documentation-requirements)
14
+ 8. [Penalties & Enforcement](#8-penalties--enforcement)
15
+ 9. [Breach Response Workflow](#9-breach-response-workflow)
16
+ 10. [Common Breach Scenarios](#10-common-breach-scenarios)
17
+
18
+ ---
19
+
20
+ ## 1. What is a Breach?
21
+
22
+ ### Definition (§164.402):
23
+ A **breach** is the acquisition, access, use, or disclosure of PHI in a manner not permitted under the Privacy Rule that compromises the security or privacy of the PHI.
24
+
25
+ ### Three Exceptions — These Are NOT Breaches:
26
+ 1. **Unintentional access** by workforce member acting in good faith within scope of authority — if no further use/disclosure
27
+ 2. **Inadvertent disclosure** between authorized persons at the CE/BA — if no further use/disclosure
28
+ 3. **Good faith belief** that unauthorized person who received PHI could not have retained it (e.g., misdirected fax that was immediately returned/destroyed)
29
+
30
+ ### Presumption:
31
+ **Assume it's a breach unless the CE/BA demonstrates low probability that PHI has been compromised** using the 4-Factor Risk Assessment.
32
+
33
+ ---
34
+
35
+ ## 2. Breach Risk Assessment (4-Factor Test)
36
+ ### §164.402(2)
37
+
38
+ To rebut the presumption of a breach, document a risk assessment considering:
39
+
40
+ ### Factor 1: Nature and Extent of PHI Involved
41
+ - What types of identifiers were included?
42
+ - Was financial information involved (SSN, credit card, bank account)?
43
+ - Was clinical information included (diagnosis, treatment, medication)?
44
+ - Higher sensitivity = higher likelihood of compromise
45
+
46
+ ### Factor 2: Who Unauthorized Person Was
47
+ - Was it another CE or BA (who would understand privacy obligations)?
48
+ - Was it a member of the public?
49
+ - Was it a malicious actor vs. inadvertent recipient?
50
+ - Known or unknown recipient?
51
+
52
+ ### Factor 3: Whether PHI Was Actually Acquired or Viewed
53
+ - Did the unauthorized person actually access the information?
54
+ - Was the email read? Was the USB drive opened?
55
+ - Technical evidence (email delivery receipts, server logs)?
56
+ - Attestation from recipient that they did not view/retain?
57
+
58
+ ### Factor 4: Extent to Which Risk Has Been Mitigated
59
+ - Was the PHI retrieved/destroyed?
60
+ - Did recipient sign a confidentiality agreement?
61
+ - Did recipient provide credible assurance of destruction?
62
+
63
+ ### Assessment Outcome:
64
+ - **Low probability of compromise** → Not a reportable breach (document your reasoning thoroughly)
65
+ - **Cannot demonstrate low probability** → Treat as reportable breach
66
+
67
+ > **Important**: HHS scrutinizes risk assessments. Document contemporaneously, thoroughly, and honestly. A weak or post-hoc justification is worse than treating the incident as a breach.
68
+
69
+ ### Safe Harbor — Encryption:
70
+ If PHI was **encrypted** using NIST-approved methods AND the encryption key was not also compromised → **Not a reportable breach** (§164.402(2) exception).
71
+ - Acceptable: AES-128+, NIST FIPS 140-2 validated
72
+ - Must maintain documentation of encryption
73
+
74
+ ---
75
+
76
+ ## 3. Notification to Individuals
77
+ ### §164.404
78
+
79
+ ### Timeline:
80
+ **Without unreasonable delay AND within 60 calendar days** of discovery of the breach.
81
+
82
+ Discovery = when CE/BA knew or should have known of the breach (not when investigation concludes).
83
+
84
+ ### Method:
85
+ - **First choice**: Written notice by **first-class mail** to last known address
86
+ - **If email on file and individual agreed to electronic notice**: Email acceptable
87
+ - **If contact info insufficient or out-of-date** (10+ individuals): Substitute notice:
88
+ - Prominent posting on website homepage for 90 days + toll-free number, OR
89
+ - Major print/broadcast media in affected area
90
+ - **Urgent situations** (imminent misuse risk): Phone or other means in addition to written notice
91
+
92
+ ### Required Content of Individual Notice (§164.404(c)):
93
+ 1. Brief description of what happened (date of breach, date of discovery if known)
94
+ 2. Description of types of PHI involved
95
+ 3. Steps individuals should take to protect themselves
96
+ 4. Brief description of what CE is doing to investigate, mitigate, and prevent recurrence
97
+ 5. Contact info (toll-free number, email, website, or postal address)
98
+
99
+ ---
100
+
101
+ ## 4. Notification to HHS
102
+ ### §164.408
103
+
104
+ ### Timeline Depends on Breach Size:
105
+
106
+ | Affected Individuals | HHS Notification Deadline |
107
+ |---------------------|--------------------------|
108
+ | **500 or more** in a state/jurisdiction | **Simultaneously with individual notice** (within 60 days of discovery) |
109
+ | **Fewer than 500** | **Annual log** — submit within 60 days after end of calendar year |
110
+
111
+ ### How to Submit:
112
+ - HHS Breach Reporting Portal: www.hhs.gov/hipaa/for-professionals/breach-notification/
113
+ - Breaches of 500+ are posted on HHS "Wall of Shame" (public)
114
+
115
+ ### Required Information for HHS Report:
116
+ - Name of CE
117
+ - Contact information
118
+ - Type of breach (theft, loss, unauthorized access/disclosure, hacking, improper disposal, other)
119
+ - Location of breached information (laptop, paper, EHR, email, other)
120
+ - Number of individuals affected
121
+ - Date of breach
122
+ - Date of discovery
123
+ - Description of PHI types involved
124
+ - Description of safeguards in place
125
+ - Actions taken in response
126
+
127
+ ---
128
+
129
+ ## 5. Notification to Media
130
+ ### §164.406
131
+
132
+ ### Required When:
133
+ Breach affects **500 or more residents** of a **state or jurisdiction**.
134
+
135
+ ### Timeline:
136
+ Without unreasonable delay and within **60 calendar days** of discovery.
137
+
138
+ ### Method:
139
+ Notify prominent media outlets serving the affected state/jurisdiction (e.g., major newspaper, TV station).
140
+
141
+ ### Content:
142
+ Same as individual notification content.
143
+
144
+ > Note: Media notification is IN ADDITION to individual and HHS notification — not a substitute.
145
+
146
+ ---
147
+
148
+ ## 6. Business Associate Obligations
149
+ ### §164.410
150
+
151
+ ### BA Must Notify CE:
152
+ - **Without unreasonable delay** and within **60 calendar days** of discovery
153
+ - BA discovery = when any employee, officer, or agent of BA knows (or should know)
154
+
155
+ ### What BA Must Provide to CE:
156
+ - Identity of each individual affected (if known)
157
+ - All information needed for CE to provide required notifications
158
+
159
+ ### CE Remains Responsible:
160
+ - The CE must send notifications to individuals, HHS, and media
161
+ - CE's 60-day clock runs from CE's discovery OR BA's notification (whichever is earlier)
162
+ - CE and BA should establish clear breach notification obligations in BAA
163
+
164
+ ### BA-to-Subcontractor:
165
+ - Subcontractors of BAs must notify the BA (same timeline)
166
+ - Chain of notification flows up: Subcontractor → BA → CE
167
+
168
+ ---
169
+
170
+ ## 7. Documentation Requirements
171
+ ### §164.414
172
+
173
+ ### Must Maintain Documentation of:
174
+ - Risk assessments for incidents (justifying breach vs. non-breach determination)
175
+ - All notifications sent (copies)
176
+ - Dates notifications were sent
177
+ - Substitute notice postings
178
+ - HHS reports submitted
179
+ - Media notifications
180
+
181
+ ### Retention: 6 years from creation or last effective date
182
+
183
+ ### Best Practice — Incident Log:
184
+ Maintain a running log of all security incidents (whether or not they rise to reportable breach level). Useful for:
185
+ - Demonstrating Security Rule compliance (§164.308(a)(6))
186
+ - Pattern identification
187
+ - HHS investigations
188
+ - Annual HHS small breach reporting
189
+
190
+ ---
191
+
192
+ ## 8. Penalties & Enforcement
193
+ ### HITECH / §160.404
194
+
195
+ ### Civil Money Penalties (CMPs):
196
+
197
+ | Violation Category | Per Violation | Calendar Year Cap |
198
+ |-------------------|--------------|-------------------|
199
+ | Did not know (reasonable diligence) | $137 – $68,928 | $2,067,813 |
200
+ | Reasonable cause (not willful neglect) | $1,379 – $68,928 | $2,067,813 |
201
+ | Willful neglect — corrected | $13,785 – $68,928 | $2,067,813 |
202
+ | Willful neglect — not corrected | $68,928 – $2,067,813 | $2,067,813 |
203
+
204
+ > Note: Penalty amounts are adjusted annually for inflation (figures above are approximate 2024 levels).
205
+
206
+ ### Criminal Penalties (§1320d-6):
207
+ - Knowingly obtaining/disclosing PHI: Up to $50,000 + 1 year imprisonment
208
+ - Under false pretenses: Up to $100,000 + 5 years
209
+ - With intent to sell/transfer/use for commercial advantage: Up to $250,000 + 10 years
210
+
211
+ ### State Attorneys General:
212
+ - May bring civil actions for HIPAA violations on behalf of state residents
213
+ - May obtain $100/violation, up to $25,000/year per violation category (pre-inflation)
214
+
215
+ ### HHS Enforcement Priorities (Historical):
216
+ - Risk analysis failures (most common)
217
+ - Access control deficiencies
218
+ - Insufficient encryption (not implementing addressable standard)
219
+ - Business Associate Agreement failures
220
+ - Insufficient audit logging
221
+ - Failure to timely notify of breaches
222
+
223
+ ---
224
+
225
+ ## 9. Breach Response Workflow
226
+
227
+ ```
228
+ INCIDENT DETECTED
229
+
230
+
231
+ STEP 1: CONTAINMENT (Immediate)
232
+ - Isolate affected systems
233
+ - Preserve evidence (logs, screenshots)
234
+ - Prevent further unauthorized access
235
+ - Assign incident response team
236
+
237
+
238
+ STEP 2: INVESTIGATION (Days 1-14)
239
+ - What PHI was involved? (types, quantity)
240
+ - When did breach occur? When discovered?
241
+ - Who was affected (individuals)?
242
+ - How did breach occur?
243
+ - Was encryption in place?
244
+
245
+
246
+ STEP 3: RISK ASSESSMENT (Days 1-30)
247
+ - Apply 4-Factor Test (see Section 2)
248
+ - Document analysis contemporaneously
249
+ - Determine: Reportable Breach or Not?
250
+
251
+ ├─ NOT A BREACH ──→ Document findings; close incident; review safeguards
252
+
253
+
254
+ STEP 4: IF REPORTABLE BREACH
255
+
256
+ ├─ Notify INDIVIDUALS within 60 days of discovery
257
+ ├─ Notify HHS:
258
+ │ ├─ 500+ affected: Within 60 days of discovery
259
+ │ └─ <500 affected: Add to annual log; report by Mar 1 of following year
260
+ └─ Notify MEDIA if 500+ residents in a state/jurisdiction
261
+
262
+
263
+ STEP 5: REMEDIATION
264
+ - Address root cause
265
+ - Enhance safeguards
266
+ - Update policies/procedures
267
+ - Retrain workforce
268
+ - Update Risk Analysis
269
+
270
+
271
+ STEP 6: DOCUMENTATION
272
+ - Incident report with all details
273
+ - Risk assessment documentation
274
+ - Copies of all notifications sent
275
+ - Remediation steps taken
276
+ ```
277
+
278
+ ---
279
+
280
+ ## 10. Common Breach Scenarios
281
+
282
+ | Scenario | Breach? | Key Considerations |
283
+ |----------|---------|-------------------|
284
+ | Laptop with unencrypted PHI stolen | **Yes** (unless risk assessment rebuts) | Encryption safe harbor doesn't apply; document risk assessment |
285
+ | Encrypted laptop stolen | **Likely not** | Confirm encryption was FIPS 140-2 compliant; document |
286
+ | Email with PHI sent to wrong patient | **Risk assess** | Did recipient view it? Can they be contacted to confirm deletion? |
287
+ | PHI mailed to wrong address | **Risk assess** | Was it returned unopened? Could recipient have retained it? |
288
+ | Employee snoops on celebrity patient records | **Yes** | Workforce members are authorized users but this is impermissible access |
289
+ | Ransomware encrypts ePHI | **Likely yes** | Access/acquisition occurred; must conduct risk assessment; difficult to rebut |
290
+ | Vendor (BA) has breach | **Yes** | BA must notify CE; CE must notify individuals within 60 days |
291
+ | PHI posted on social media by employee | **Yes** | Impermissible disclosure; high severity |
292
+ | Paper PHI left in unsecured area briefly | **Risk assess** | Was it accessed? By whom? Mitigated? |
293
+ | Verbal disclosure of PHI to wrong party | **Privacy Rule** (not Security Rule) | Breach Notification applies to PHI broadly, not just ePHI |
@@ -0,0 +1,276 @@
1
+ # HIPAA Privacy Rule Reference
2
+ ## 45 CFR Part 164, Subparts A and E
3
+
4
+ ---
5
+
6
+ ## Table of Contents
7
+ 1. [Applicability & Scope](#1-applicability--scope)
8
+ 2. [Uses and Disclosures — General Rules](#2-uses-and-disclosures--general-rules)
9
+ 3. [Permitted Uses Without Authorization](#3-permitted-uses-without-authorization)
10
+ 4. [Patient Rights](#4-patient-rights)
11
+ 5. [Notice of Privacy Practices (NPP)](#5-notice-of-privacy-practices-npp)
12
+ 6. [Minimum Necessary Standard](#6-minimum-necessary-standard)
13
+ 7. [Authorization Requirements](#7-authorization-requirements)
14
+ 8. [Special Categories of PHI](#8-special-categories-of-phi)
15
+ 9. [Administrative Requirements](#9-administrative-requirements)
16
+ 10. [Marketing & Fundraising](#10-marketing--fundraising)
17
+
18
+ ---
19
+
20
+ ## 1. Applicability & Scope
21
+
22
+ **Covered Entities (CEs)** subject to Privacy Rule:
23
+ - Health plans (insurance companies, HMOs, employer-sponsored plans with 50+ participants)
24
+ - Healthcare clearinghouses
25
+ - Healthcare providers who transmit health information electronically
26
+
27
+ **Business Associates (BAs):**
28
+ - Entities that create, receive, maintain, or transmit PHI on behalf of a CE
29
+ - Must sign a **Business Associate Agreement (BAA)** before PHI is shared
30
+ - Subject to Security Rule; portions of Privacy Rule apply via BAA
31
+
32
+ **PHI Definition** (§164.501):
33
+ Protected Health Information = health information that:
34
+ - Is created or received by a CE/BA
35
+ - Relates to past/present/future physical or mental health condition, healthcare provision, or payment
36
+ - Identifies or could reasonably identify the individual
37
+
38
+ **Does NOT apply to:**
39
+ - Employers acting in their employer capacity
40
+ - Life insurers (unless also a health plan)
41
+ - Workers' comp carriers (in most states, not subject to HIPAA directly)
42
+ - Education records (FERPA applies instead)
43
+
44
+ ---
45
+
46
+ ## 2. Uses and Disclosures — General Rules
47
+
48
+ ### General Prohibition (§164.502(a))
49
+ A CE/BA may not use or disclose PHI except as permitted or required by the Privacy Rule.
50
+
51
+ ### Required Disclosures (§164.502(a)(2))
52
+ - To the **individual** (upon request for access or accounting)
53
+ - To **HHS** for compliance investigations/enforcement
54
+
55
+ ### Consent vs. Authorization vs. Agreement
56
+ | Mechanism | When Required | Notes |
57
+ |-----------|--------------|-------|
58
+ | Written Authorization | Uses/disclosures beyond TPO, marketing, sale of PHI | Must meet §164.508 requirements |
59
+ | Opportunity to agree/object | Facility directories, to family/friends involved in care | Informal; oral ok |
60
+ | No permission needed | TPO, public health, law enforcement (limited), etc. | See §164.512 |
61
+
62
+ ---
63
+
64
+ ## 3. Permitted Uses Without Authorization
65
+
66
+ ### Treatment, Payment, Operations (TPO) (§164.506)
67
+ - **Treatment**: Providing, coordinating, managing healthcare
68
+ - **Payment**: Billing, claims processing, utilization review
69
+ - **Operations**: Quality assessment, training, auditing, legal, business planning
70
+
71
+ ### Other Permitted Disclosures (§164.512)
72
+ | Purpose | Requirements |
73
+ |---------|-------------|
74
+ | Public health (§164.512(b)) | To authorized public health authorities |
75
+ | Abuse/neglect reporting (§164.512(c)) | To government authorities authorized to receive |
76
+ | Health oversight (§164.512(d)) | Audits, inspections, licensure by oversight agencies |
77
+ | Judicial/administrative (§164.512(e)) | Court order or subpoena with satisfactory assurance |
78
+ | Law enforcement (§164.512(f)) | Limited; specific conditions apply (e.g., court order, crime on premises) |
79
+ | Research (§164.512(i)) | With IRB/Privacy Board waiver or individual authorization |
80
+ | Serious threat (§164.512(j)) | To prevent imminent serious harm to individual or others |
81
+ | Workers' comp (§164.512(l)) | As authorized by workers' comp laws |
82
+ | Decedents (§164.512(g)) | To coroners, medical examiners, funeral directors |
83
+ | Limited data set (§164.514(e)) | Remove direct identifiers; require Data Use Agreement (DUA) |
84
+
85
+ ### Incidental Disclosures (§164.502(a)(1)(iii))
86
+ Permitted if:
87
+ - Reasonable safeguards are in place
88
+ - Minimum necessary standard is met
89
+ - Example: A patient overhearing another patient's conversation in a waiting room
90
+
91
+ ---
92
+
93
+ ## 4. Patient Rights
94
+
95
+ ### Right of Access (§164.524)
96
+ - Individuals have the right to inspect and obtain a copy of their PHI in a **designated record set**
97
+ - **Timeline**: Provide access within **30 days** (one 30-day extension permitted with written notice)
98
+ - **Format**: Must provide in format requested if readily producible; electronic if requested
99
+ - **Fees**: May charge a reasonable, cost-based fee (labor + supplies + postage only); no retrieval fees
100
+ - **Denials**: Permitted for psychotherapy notes, information compiled for legal proceedings, PHI that could endanger life/safety; some denials are reviewable
101
+
102
+ > **2021 Rule Update**: HHS reinforced that fees must be limited; EHR patient portal access must be free.
103
+
104
+ ### Right to Amend (§164.526)
105
+ - Individual may request amendment to their PHI in a designated record set
106
+ - **Timeline**: 60 days to act (one 60-day extension)
107
+ - May deny if: CE did not create the record; record is accurate and complete; not part of designated record set
108
+
109
+ ### Right to Accounting of Disclosures (§164.528)
110
+ - Right to list of disclosures made in prior 6 years
111
+ - **Excludes**: TPO disclosures, to the individual, authorized disclosures, incidental, national security
112
+ - **Timeline**: 60 days (one 60-day extension)
113
+
114
+ ### Right to Request Restrictions (§164.522(a))
115
+ - Individual may request restrictions on uses/disclosures for TPO or to family/friends
116
+ - CE is **not required** to agree — **except**: must honor restriction on disclosure to health plan for service paid out-of-pocket in full
117
+
118
+ ### Right to Confidential Communications (§164.522(b))
119
+ - Individual may request alternative means or locations for communications
120
+ - CE must accommodate **reasonable requests**; no explanation required from individual
121
+ - Health plans must accommodate if individual states disclosure could endanger them
122
+
123
+ ### Right to Notice (§164.520)
124
+ - Right to receive a Notice of Privacy Practices (see Section 5)
125
+
126
+ ### Right to Opt Out of Fundraising (§164.514(f))
127
+ - Must include opt-out mechanism in every fundraising communication
128
+
129
+ ---
130
+
131
+ ## 5. Notice of Privacy Practices (NPP)
132
+
133
+ ### Required for: All Covered Entities (not BAs)
134
+
135
+ ### Must Be Provided (§164.520(c)):
136
+ - At first service delivery (in-person)
137
+ - On request
138
+ - On CE's website (if one exists)
139
+ - Health plans: at enrollment and every 3 years if material changes
140
+
141
+ ### Required NPP Contents (§164.520(b)):
142
+ 1. **Header**: "THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY."
143
+ 2. Description of how CE may use/disclose PHI (with examples of TPO + other)
144
+ 3. Description of other uses requiring authorization
145
+ 4. Individual rights (access, amendment, accounting, restrictions, confidential comms, opt-out of fundraising)
146
+ 5. CE's duties (maintain privacy, notify of breaches, abide by NPP)
147
+ 6. How to complain (to CE and to HHS; no retaliation)
148
+ 7. Contact person/office for more information
149
+ 8. Effective date
150
+
151
+ ### Electronic NPP:
152
+ - Can be provided electronically if individual agrees
153
+ - Must be in plain language
154
+
155
+ ---
156
+
157
+ ## 6. Minimum Necessary Standard
158
+
159
+ ### Rule (§164.502(b), §164.514(d)):
160
+ When using or disclosing PHI, or requesting from another CE, make reasonable efforts to limit PHI to the **minimum necessary** to accomplish the intended purpose.
161
+
162
+ ### Applies To:
163
+ - Routine disclosures → Establish policies identifying persons who need access + type of PHI
164
+ - Non-routine disclosures → Review on case-by-case basis
165
+ - Requests from others → Limit requests to minimum necessary
166
+
167
+ ### Does NOT Apply To:
168
+ - Disclosures to or requests by a treating provider
169
+ - Disclosures to the individual
170
+ - Pursuant to individual's authorization
171
+ - Required by law
172
+ - For HHS compliance activities
173
+
174
+ ### Practical Implementation:
175
+ - Role-based access controls in EHR systems
176
+ - Need-to-know training for workforce
177
+ - De-identify data where full PHI isn't required
178
+
179
+ ---
180
+
181
+ ## 7. Authorization Requirements
182
+
183
+ ### When Required (§164.508):
184
+ - Most uses/disclosures not covered by TPO or §164.512 permitted disclosures
185
+ - **Always required for**: psychotherapy notes (with limited exceptions), marketing involving financial remuneration, sale of PHI
186
+
187
+ ### Valid Authorization Must Contain (§164.508(c)):
188
+ 1. Description of PHI to be used/disclosed (specific, meaningful)
189
+ 2. Name/class of person(s) authorized to make the disclosure
190
+ 3. Name/class of person(s) to whom disclosure may be made
191
+ 4. Description of each purpose of the use/disclosure
192
+ 5. Expiration date or event
193
+ 6. Individual's signature and date
194
+ 7. If signed by personal representative: description of authority
195
+ 8. Statement that individual may revoke
196
+ 9. Statement about re-disclosure risk (if applicable)
197
+ 10. Conditioning statement (if authorization is conditioned on treatment/payment)
198
+
199
+ ### Defective Authorization (§164.508(b)(2)):
200
+ Authorization is defective if:
201
+ - Expiration date has passed
202
+ - Not filled out completely
203
+ - CE knows it has been revoked
204
+ - Compound authorization (combining with another document) when not permitted
205
+
206
+ ---
207
+
208
+ ## 8. Special Categories of PHI
209
+
210
+ These categories receive **heightened protection** (often under state law as well):
211
+
212
+ | Category | Notes |
213
+ |----------|-------|
214
+ | **Psychotherapy notes** | Stored separately; require specific authorization for almost all uses/disclosures |
215
+ | **HIV/AIDS information** | Most states have additional restrictions beyond HIPAA |
216
+ | **Substance use disorder** (42 CFR Part 2) | Separate federal law with stricter rules than HIPAA |
217
+ | **Mental health records** | State law often adds restrictions |
218
+ | **Reproductive health** | Post-Dobbs guidance; HHS issued rules limiting disclosure for lawful reproductive care |
219
+ | **Genetic information** (GINA) | Cannot be used for underwriting by health plans |
220
+ | **Minors** | Generally parents are personal representatives; exceptions for emancipated minors, sensitive services |
221
+
222
+ > **Important**: State laws can be MORE protective than HIPAA. HIPAA sets a floor. Always check state law.
223
+
224
+ ---
225
+
226
+ ## 9. Administrative Requirements
227
+
228
+ ### Policies & Procedures (§164.530(i)):
229
+ - Must implement written policies and procedures complying with Privacy Rule
230
+ - Must document policies; retain for 6 years from creation or last effective date
231
+
232
+ ### Workforce Training (§164.530(b)):
233
+ - Train all workforce members on privacy policies as necessary for them to carry out their functions
234
+ - Train new members within reasonable time after joining
235
+ - Document training
236
+
237
+ ### Sanctions (§164.530(e)):
238
+ - Apply appropriate sanctions against workforce members who violate privacy policies
239
+ - Document sanctions
240
+
241
+ ### Complaint Process (§164.530(d)):
242
+ - Provide process for individuals to make complaints
243
+ - Document all complaints and their disposition
244
+
245
+ ### Privacy Official (§164.530(a)):
246
+ - Designate a Privacy Official responsible for developing and implementing policies
247
+ - Designate a contact person for receiving complaints
248
+
249
+ ### Retaliation Prohibition (§164.530(g)):
250
+ - May not retaliate against individuals for exercising HIPAA rights
251
+ - May not retaliate against workforce members for filing complaints or participating in investigations
252
+
253
+ ### Waiver Prohibition (§164.530(h)):
254
+ - May not require individuals to waive HIPAA rights as condition of treatment/payment/enrollment
255
+
256
+ ---
257
+
258
+ ## 10. Marketing & Fundraising
259
+
260
+ ### Marketing Definition (§164.501):
261
+ Communication about a product/service that encourages recipients to purchase or use the product/service.
262
+
263
+ ### Marketing Requires Authorization EXCEPT:
264
+ - Face-to-face communication with individual
265
+ - Promotional gifts of nominal value
266
+ - Refill reminders (if financial remuneration is reasonably related to CE's cost)
267
+ - Communications about health-related products/services offered by CE (own services, treatment alternatives, case management) — if no financial remuneration from third party
268
+
269
+ ### Sale of PHI (§164.502(a)(5)(ii)):
270
+ - Generally prohibited without authorization
271
+ - Exceptions: public health, research, treatment, sale/merger of business, BAA, providing individual access
272
+
273
+ ### Fundraising (§164.514(f)):
274
+ - May use demographic info + dates of service without authorization
275
+ - Must include opt-out mechanism in each communication
276
+ - Cannot condition treatment on making a donation