Breach Assessment1 min read Advanced Security TopicsBreach AssessmentDetermine if PHI was involvedAssess if exception applies:Encrypted dataUnintentional accessGood faith accessNo retention← Previous: HIPAA Breach Response Requirements Next: Notification Requirements →