Data Breach Notification,
Data Security,
Healthcare
Challenges in Timely and Accurate Data Breach Reporting

A brokerage firm based in Illinois, Alera Group, is notifying approximately 156,000 individuals that their protected health information (PHI) has been compromised due to a data breach that occurred over a year ago. This substantial delay in notification raises significant questions about the organization’s breach reporting practices.
In the spotlight, this incident highlights ongoing challenges faced by organizations governed by the Health Insurance Portability and Accountability Act (HIPAA) in adhering to regulatory notification and reporting deadlines. Regulatory attorney Aleksandra Vold from BakerHostetler noted that some organizations can take an excessive amount of time—up to a year—reviewing breached documents, reducing their ability to promptly notify victims. Such delays not only waste resources but also increase the risk of regulatory scrutiny and public backlash.
Alera Group confirmed it became aware of unauthorized access to its IT systems in August 2024 and initiated an investigation to ascertain the nature of the compromised data. By April 28, 2025, the company determined that personal information, possibly including names, addresses, Social Security numbers, and medical records, may have been taken from its network during a breach occurring between July 19 and August 4, 2024.
The granularity of the compromised information varies by individual, potentially involving financial data, medical histories, and other sensitive identifiers. Alera Group submitted a report of the incident as a HIPAA breach to the U.S. Department of Health and Human Services (HHS) on July 29, 2025, roughly a year after first learning of the unauthorized activity.
Under HIPAA regulations, organizations must inform both HHS and affected individuals of breaches impacting 500 or more people “without unreasonable delay” and no later than 60 days following notification. Interestingly, some states like Washington set even shorter deadlines for data breach reporting, yet many permit exemptions for HIPAA-bound organizations, often reducing the applicability of these expedited timelines to incidents involving protected health information.
With two discovery timelines at play, it becomes complex when a business associate like Alera experiences a breach. The reporting dates for Alera and the covered entities impacted may differ, creating potential confusion surrounding compliance timelines.
As organizations face increased scrutiny from regulators at both state and federal levels over delayed reporting, it becomes crucial for entities to have robust incident response plans in place. The MITRE ATT&CK framework illustrates various tactics and techniques that could apply in scenarios such as this, particularly regarding initial access protocols and methods for ensuring compliance with breach notification regulations.
In light of growing regulatory pressures, Alera Group’s situation serves as a critical case study for organizations looking to improve their breach response strategies. With multiple lawsuits emerging related to this breach, stakeholders must prioritize effective communication and swift action to mitigate risks associated with data breaches.
Overall, the narrative reinforces the need for timely and thorough data breach notifications, balancing the imperative for accuracy against the essential requirement for speed. As organizations grapple with the complexities of managing sensitive information, a proactive approach to cybersecurity and regulatory compliance is vital to safeguard against similar incidents in the future.