What is a Breach?
According to the Department of Defense (DoD), a breach of personal information occurs when the information is lost, disclosed to, accessed by, or potentially exposed to unauthorized individuals, or compromised in a way where the subjects of the information are negatively affected.
Breach Reporting
The Defense Health Agency (DHA) Privacy and Civil Liberties Office (Privacy Office) coordinates breach reporting within the Military Health System (MHS). Email us if you have questions about breaches or breach reporting within the MHS.
Guidance tools for breach reporting:
You also may be interested in...
Form/Template
11/27/2018
This document outlines the DoD reporting and notification requirements for breaches.
Recommended Content:
Breaches of PII and PHI
Policy
This instruction establishes policy and assigns responsibilities for security of individually identifiable health information created, received, maintained, or transmitted in electronic form (referred to in this instruction as “electronic protected health information (ePHI)”).
Policy
This instruction establishes policy and assigns responsibilities for security of individually identifiable health information created, received, maintained, or transmitted in electronic form (referred to in this instruction as “electronic protected health information (ePHI)”).
Form/Template
6/18/2015
This document provides instructions for breach reporting to the United States-Computer Emergency Readiness Team (US-CERT).
Recommended Content:
Breaches of PII and PHI
Policy
This Regulation is reissued under the authority of DoD Directive 5400.11, “DoD Privacy Program,” May 8, 2007. It provides guidance on section 552a of title 5 United States Code (U.S.C.), the Privacy Act of 1974, as amended, and prescribes uniform procedures for implementation of the DoD Privacy Program.
Form/Template
6/6/2014
This template is used to track plans of action and milestones regarding potential breaches.
Recommended Content:
Breaches of PII and PHI
Fact Sheet
5/5/2014
An Information Paper that explains what malicious code is, including the various types, the proper response to a malicious code attack, and steps to take to avoid receiving malicious code on a computer system.
Recommended Content:
Breaches of PII and PHI
Fact Sheet
5/5/2014
An Information Paper that tells what phishing is, how to respond to phishing attacks, and steps to take to avoid becoming a victim of phishing scams.
Recommended Content:
Breaches of PII and PHI
Fact Sheet
5/5/2014
An Information Paper that defines social networking, details the Department of Defense's position on this topic, and discusses the responsible use of social networking and Internet-based capabilities.
Recommended Content:
Breaches of PII and PHI
Form/Template
2/1/2013
This form is used to report and provide information on lost, stolen, or compromised personally identifiable information (PII).
Recommended Content:
Breaches of PII and PHI
Policy
This Memorandum is to help guide Components toward optimal decision-making regarding PII breach risk and notification determinations.
Policy
This Memorandum updates guidelines in Military Health System Chief Information Officer memorandum “Updated Guidelines on Protection of Sensitive Information in Electronic Mail” of
September 19, 2008.
Policy
This Memorandum outlines the procedures for the Services for reporting a breach as defined by the Health Information Technology for Economic and Clinical Health (HITECH) Act provisions of the American Recovery and Reinvestment Act of 2009.
Policy
This Memorandum outlines the procedures for Contractors for reporting a breach as defined by the Health Information Technology for Economic and Clinical Health (HITECH) Act provisions of the American Recovery and Reinvestment Act of 2009.
Showing results 1 - 15
Page 1 of 2