<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 134 STAT. ?>
<?I98 134 STAT. ?>
<?I99 134 STAT. ?>
<?I50 PUBLIC LAW 116–321—JAN. 5, 2021?>
<?I51 PUBLIC LAW 116–321—JAN. 5, 2021?>
<?I52 PUBLIC LAW 116–321—JAN. 5, 2021?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 116–321: To amend the Health Information Technology for Economic and Clinical Health Act to require the Secretary of Health and Human Services to consider certain recognized security practices of covered entities and business associates when making certain determinations, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>321</docNumber>
<citableAs>Public Law 116–321</citableAs><citableAs>134 Stat. 5072</citableAs>
<approvedDate>2021-01-05</approvedDate>
<dc:date>2021-01-05</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>116</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><centerRunningHead>PUBLIC LAW 116–321—JAN. 5, 2021</centerRunningHead>
<page identifier="/us/stat/134/5072">134 STAT. 5072</page>
<dc:type>Public Law</dc:type><docNumber>116–321</docNumber>
<congress value="116">116th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To amend the Health Information Technology for Economic and Clinical Health Act to require the Secretary of Health and Human Services to consider certain recognized security practices of covered entities and business associates when making certain determinations, and for other purposes.<sidenote><p class="centered fontsize8" id="x8f9b9c31-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2021-01-05">Jan. 5, 2021</approvedDate></p><p class="centered fontsize8" id="x8f9b9c32-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/116/hr/7898">H.R. 7898</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula>
<section id="d174216e85" identifier="/us/pl/116/321/s1" role="instruction" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>RECOGNITION OF SECURITY PRACTICES.</heading><content class="firstIndent0 fontsize10" id="x8f9bc343-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Part 1 of subtitle D of the Health Information Technology for Economic and Clinical Health Act (<ref href="/us/usc/t42/s17931/etseq">42 U.S.C. 17931 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><section class="centered fontsize12" id="y8f9c1164-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658145"><num class="fontsize12" value="13412">“SEC. 13412. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x8f9c1165-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t42/s17941">42 USC 17941</ref>.</p></sidenote><heading class="fontsize12">RECOGNITION OF SECURITY PRACTICES.</heading><subsection class="firstIndent0 fontsize10" id="y8f9c1166-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Consistent with the authority of the Secretary under sections 1176 and 1177 of the Social Security Act, when making determinations relating to fines under such section 1176 (as amended by section 13410) or such section 1177, decreasing the length and extent of an audit under section 13411, or remedies otherwise agreed to by the Secretary, the Secretary shall consider whether the covered entity or business associate has adequately demonstrated that it had, for not less than the previous 12 months, recognized security practices in place that may—</chapeau><paragraph class="fontsize10" id="y8f9c1167-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>mitigate fines under section 1176 of the Social Security Act (as amended by section 13410);</content></paragraph>
<paragraph class="fontsize10" id="y8f9c1168-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>result in the early, favorable termination of an audit under section 13411; and</content></paragraph>
<paragraph class="fontsize10" id="y8f9c1169-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>mitigate the remedies that would otherwise be agreed to in any agreement with respect to resolving potential violations of the HIPAA Security rule (part 160 of title 45 Code of Federal Regulations and subparts A and C of part 164 of such title) between the covered entity or business associate and the Department of Health and Human Services.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y8f9c116a-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Definition and Miscellaneous Provisions</inline>.—</heading><paragraph class="fontsize10" id="y8f9c116b-e821-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">Recognized security practices</inline>.—</heading><content>The term ‘<term>recognized security practices</term>’ means the standards, guidelines, best practices, methodologies, procedures, and processes developed under section 2(c)(15) of the National Institute of Standards and Technology Act, the approaches promulgated under section 405(d) of the Cybersecurity Act of 2015, and other programs and processes that address cybersecurity and that are developed, recognized, or promulgated through regulations under other statutory authorities. Such practices shall be determined by the covered entity or business associate, consistent with <page identifier="/us/stat/134/5073">134 STAT. 5073</page>
the HIPAA Security rule (part 160 of title 45 Code of Federal Regulations and subparts A and C of part 164 of such title).</content></paragraph>
<paragraph class="fontsize10" id="y8f9c116c-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Limitation</inline>.—</heading><content>Nothing in this section shall be construed as providing the Secretary authority to increase fines under section 1176 of the Social Security Act (as amended by section 13410), or the length, extent or quantity of audits under section 13411, due to a lack of compliance with the recognized security practices.</content></paragraph>
<paragraph class="fontsize10" id="y8f9c116d-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">No liability for nonparticipation</inline>.—</heading><content>Subject to paragraph (4), nothing in this section shall be construed to subject a covered entity or business associate to liability for electing not to engage in the recognized security practices defined by this section.</content></paragraph>
<paragraph class="fontsize10" id="y8f9c116e-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><heading class="fontsize10"><inline class="smallCaps">Rule of construction</inline>.—</heading><content>Nothing in this section shall be construed to limit the Secretary’s authority to enforce the HIPAA Security rule (part 160 of title 45 Code of Federal Regulations and subparts A and C of part 164 of such title), or to supersede or conflict with an entity or business associate’s obligations under the HIPAA Security rule.”</content></paragraph>
</subsection>
</section>
</quotedContent>.</content></section>
<section id="d174216e187" identifier="/us/pl/116/321/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><heading>TECHNICAL CORRECTION.</heading><subsection class="firstIndent0 fontsize10" id="y8f9c387f-e821-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/321/s2/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Section 3022(b) of the Public Health Service Act (<ref href="/us/usc/t42/s300jj–52/b">42 U.S.C. 300jj–52(b)</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="fontsize10" id="y8f9c3880-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><heading class="fontsize10"><inline class="smallCaps">Application of authorities under inspector general act of 1978</inline>.—</heading><content>In carrying out this subsection, the Inspector General shall have the same authorities as provided under section 6 of the Inspector General Act of 1978 (<ref href="/us/usc/t5/app">5 U.S.C. App.</ref>).”</content></paragraph>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y8f9c3881-e821-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/321/s2/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x8f9c3882-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t42/s300jj–52">42 USC 300jj–52 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Effective Date</inline>.—</heading><content>The amendment made by subsection (a) shall take effect as if included in the enactment of the 21st Century Cures Act (<ref href="/us/pl/114/255">Public Law 114–255</ref>).</content></subsection>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2021-01-05">January 5, 2021</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/116/hr/7898">H.R. 7898</ref>:</heading>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 166 (2020):</heading>
<p class="indentUp4 firstIndent-1" id="x8f9c3883-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Dec. 9, considered and passed House.</p><p class="indentUp4 firstIndent-1" id="x8f9c3884-e821-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Dec. 19, considered and passed Senate. </p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>