FIPA vs HIPAA: Florida Healthcare Data Breach Obligations Compared (with Real‑World Patterns)
When I sit down with CISOs and privacy officers in Florida hospitals and health systems, the same question comes up again and again, usually right after we finish walking through an incident tabletop:
“Okay, but after a breach, who do we really answer to first? HIPAA or FIPA?”
You can feel the tension under that question. On one side, the HIPAA Breach Notification Rule with its 60‑day outside limit. On the other, Florida’s Information Protection Act (FIPA) with a 30‑day requirement that feels like a sprint from day one.
The short version, something I repeat a lot, is:
In Florida healthcare, you don’t get to choose. You have to satisfy both HIPAA and FIPA. The only way that feels sane is if you truly understand where your data lives, what kind of data it is, and who it belongs to before anything goes wrong.
Let me unpack that.
Two overlapping worlds: HIPAA and FIPA
First, a quick refresher on what each law is trying to do.
HIPAA’s Breach Notification Rule
HIPAA is a federal law. For healthcare entities, the Breach Notification Rule says that when you have a breach of unsecured PHI (protected health information), you must notify:
- Affected individuals
- The U.S. Department of Health and Human Services (HHS), and
- Sometimes the media (if >500 individuals in a state or jurisdiction are affected)
…without unreasonable delay and no later than 60 days after discovering the breach, unless an exception applies.
The rule expects you to perform a risk assessment: look at what PHI was involved, who accessed it, whether it was actually viewed or acquired, and how much risk there is that the information has been compromised. If the probability of compromise is low, it might not be a reportable HIPAA breach; if it’s not low, it is.
The University of Florida’s privacy office has a nice summary of how HIPAA’s Privacy Rule interacts with state law—they point out that where state law is more protective, it can effectively sit “on top of” HIPAA. That’s exactly what FIPA does in Florida.
FIPA: Florida’s Information Protection Act
FIPA, codified at Fla. Stat. § 501.171, is a state law that doesn’t just apply to healthcare—it applies broadly to businesses and government entities handling Floridians’ personal information.
A few key points that matter for hospitals and plans:
- It defines “personal information” more broadly than just PHI: medical data, health insurance identifiers, financial data, and even login credentials (username + password or security Q&A) for online accounts are all in scope.
- It requires notice to affected Florida residents within 30 days of determining a breach occurred, with a narrow 15‑day extension if the Attorney General agrees you have good cause.
- If 500 or more Florida residents are affected, you also have to notify the Florida Attorney General’s Office within that same 30‑day window.
- If 1,000+ are affected, you must notify credit reporting agencies as well.
Florida’s own Attorney General and university guidance spell out just how wide this net is: FIPA is about data security and rapid transparency when Floridians’ personal information—not just PHI—has been exposed.
Where HIPAA and FIPA overlap—and where they don’t
In most of the scenarios I see in Florida healthcare, HIPAA and FIPA are not competing—they’re stacked.
Here’s how that usually looks in practice.
Same incident, two definitions
Say you have an intrusion into a cloud backup that holds:
- Clinical notes and lab results (PHI)
- Insurance subscriber IDs and plan information
- Patient portal usernames and hashed passwords
- Billing data with partial account numbers
From HIPAA’s point of view, you’re asking:
- Was unsecured PHI involved?
- Did unauthorized individuals access, use, or acquire it?
- Does the risk assessment show a low probability of compromise or not?
From FIPA’s point of view, you’re asking:
- Did unauthorized access of data in electronic form containing “personal information” occur?
- Does that personal information match FIPA’s definitions—medical history, health condition, diagnosis, health insurance IDs, financial data, credentials?
- Was it unsecured (unencrypted or otherwise usable), and is there a realistic risk of harm?
Most of the time, the answer is “yes” on both sides. You’ve got PHI, and you’ve got FIPA‑personal information sitting right next to it.
Two clocks, one reality
If you accept that both laws apply, you’re now staring at:
- HIPAA’s 60‑day maximum, and
- FIPA’s 30‑day maximum for Florida residents and potentially the Attorney General.
In conversations, I try to be blunt about this: you don’t get to “pick” the friendlier timeline. The conservative, and frankly safest, approach is to treat the stricter FIPA 30‑day clock as your governing SLA for Florida residents, and then layer HIPAA and HHS reporting on top.
The University of Florida’s guidance on HIPAA vs state law makes the same point in more formal language: where state law is more protective, that’s the bar you have to hit.
Real‑world patterns I see in Florida healthcare
I won’t name organizations, but I can share the kinds of incidents and questions I see over and over.
1. The “multi‑system PHI + PII” breach
A compromised account or misconfigured service touches more than just the EHR. It hits:
- The EHR or clinical data warehouse
- The revenue cycle system with bank and card info
- A file share holding scanned IDs and insurance cards
- An S3 bucket or Azure Blob used for data science
Suddenly, the incident isn’t “just a HIPAA issue.” It’s HIPAA + FIPA + maybe PCI + maybe GLBA. Teams realize they don’t have an accurate, current inventory of what’s actually stored in each of those places, or how many Florida residents show up in each dataset.
2. Portal and credential‑driven incidents
FIPA’s inclusion of usernames and email addresses with passwords or security Q&A as personal information is a big deal for patient portals and mobile apps.
When I walk through credential stuffing or phishing scenarios with Florida teams, the question isn’t just, “Did PHI get accessed?” It’s also, “Did we expose enough to let someone log in as this person and see their PHI or transact in their name?”
From FIPA’s perspective, a stash of valid portal credentials is personal information, even before a single clinical note is viewed.
3. The “is this a breach under one but not the other?” corner case
Occasionally, we run into situations where the HIPAA risk assessment suggests a low probability of compromise (for example, strong encryption and good evidence no data left the environment), but the team is still queasy about Florida’s expectations under FIPA.
In those moments, I’ve seen the best outcomes when organizations lean on data‑driven evidence: encryption posture, key management details, access logs, and a clear map of what data was in the blast radius. That’s what convinces AGs and regulators, not vague assurances.
Why a data‑centric view matters more than ever
The common thread in all of this: you can’t make good HIPAA or FIPA decisions if you don’t really know your data.
Over and over, I see the same pain points:
- PHI and FIPA‑personal information spread across EHR, billing, imaging, analytics platforms, M365, Google Workspace, and niche SaaS apps.
- Multiple copies of the same sensitive datasets in test and dev, created in a hurry and then forgotten.
- No single, up‑to‑date view of which systems contain medical info, insurance IDs, financial data, and credentials for Florida residents.
That’s why I keep steering the conversation toward data‑centric security and Data Security Posture Management (DSPM) instead of just more perimeter tools.
A DSPM platform like Sentra continuously:
- Discovers and classifies sensitive data across cloud, SaaS, and on‑prem, including PHI, FIPA‑personal information, PCI, and other regulated data.
- Builds a live inventory of where that data lives and how it’s protected (encryption, masking, labels, retention).
- Shows who and what can access it—doctors, nurses, back‑office staff, vendors, AI assistants, service accounts.
So when you’re faced with a potential breach, you’re not scrambling to reconstruct all of that from scratch. You already know:
- Which systems in the incident path actually hold PHI and FIPA‑personal information
- How many Florida residents are likely involved
- Whether the data was truly secured or not
Sentra customers in healthcare, like Valenz Health, have used this approach to scale PHI protection post‑merger, as highlighted in Sentra’s case studies and industry pages. The specifics of their story are different from yours, but the underlying move is the same: get out of the spreadsheet business and into continuous, factual visibility.
How I suggest Florida healthcare teams think about HIPAA + FIPA
When we build joint playbooks with Florida customers, the conversation usually ends up here:
- Treat HIPAA and FIPA as a combined requirement, not two separate worlds.
- Use DSPM to create a single, accurate view of PHI + FIPA‑personal information across all your environments.
- Let that data intelligence drive both your breach risk assessments and your notification decisions.
- Anchor your timelines to the stricter FIPA 30‑day deadline for Florida residents, and then layer HIPAA/HHS obligations on top.
Once you do that, the question, “HIPAA or FIPA first?” stops being so theoretical. You’ve got the evidence to satisfy both.
Call to action
If you’re in Florida healthcare and you’re not sure how you’d really perform under a combined HIPAA + FIPA breach scenario, now’s the time to find out—before the clock starts.
Let’s take a look at where your PHI and FIPA‑personal information really live today, and how Sentra’s DSPM can help you move from guesswork to defensible, data‑driven decisions.

