Business Associates and HIPAA Security: Compliance Guide and Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Business Associates and HIPAA Security: Compliance Guide and Best Practices

Kevin Henry

HIPAA

August 10, 2024

8 minutes read
Share this article
Business Associates and HIPAA Security: Compliance Guide and Best Practices

As a business associate handling electronic protected health information (ePHI), you are directly subject to the HIPAA Security Rule and the Breach Notification Rule. This guide translates Business Associates and HIPAA Security obligations into practical steps you can operationalize today.

You will learn how to structure airtight Business Associate Agreements, conduct and document risk analyses, implement administrative, technical, and physical safeguards, oversee vendors and subcontractors, maintain breach notification protocols, train your workforce, and document compliance activities for audit readiness.

Business Associate Agreements

Required elements of a Business Associate Agreement (BAA)

  • Define permitted and required uses/disclosures of PHI/ePHI and prohibit uses not authorized by the agreement or law.
  • Commit to appropriate Administrative Safeguards, Technical Safeguards, and Physical Safeguards to protect ePHI.
  • Require reporting to the covered entity of any impermissible use/disclosure, security incident, or breach, consistent with Breach Notification Requirements.
  • Flow down Subcontractor Compliance Obligations by requiring subcontractors to agree to the same restrictions and conditions.
  • Support the covered entity’s obligations (e.g., access, amendment, and accounting of disclosures when applicable).
  • Make relevant records available to the Secretary of Health and Human Services for compliance review.
  • Return or destroy PHI at termination (or extend protections if destruction is infeasible).
  • Authorize termination if the BAA is materially violated and cure is not feasible.

Drafting and operationalizing tips

  • Standardize your BAA template; escalate exceptions that alter risk (e.g., unusually short notice windows or atypical indemnities).
  • Align promises with reality—only commit to controls (encryption, monitoring, response times) you can consistently deliver and evidence.
  • Define “security incident,” escalation paths, and evidence requirements to avoid ambiguity during events.
  • Set practical timelines for required notifications and ongoing updates; specify points of contact and communication channels.
  • Map minimum necessary access in the BAA to your access control model and data flows.

Action checklist

  • Execute a BAA before any PHI flows; maintain a centralized repository with version control.
  • Review BAAs at least annually and upon material business or regulatory changes.
  • Track subcontractors that touch PHI and verify executed downstream BAAs.

Conduct Risk Assessments

Scope and process

  • Inventory systems, vendors, and workflows that create, receive, maintain, or transmit ePHI; map data flows end-to-end.
  • Identify reasonably anticipated threats and vulnerabilities; evaluate likelihood and impact to confidentiality, integrity, and availability.
  • Rate risks, select controls, and document a remediation plan with owners and due dates.

Risk Analysis Documentation

  • Methodology and scope, with asset and data-flow inventories.
  • Threats, vulnerabilities, existing controls, and residual risk ratings.
  • Risk treatment decisions (mitigate, transfer, accept) with justification and target dates.
  • Executive summary for governance reporting and audit trails for traceability.

Frequency and triggers

  • Perform an initial enterprise-wide risk analysis and refresh it periodically; the rule does not prescribe a fixed cadence.
  • Best practice is at least annual reassessment and whenever significant changes occur (new systems, integrations, locations, M&A, major incidents).

Practical tips

  • Use a consistent risk scoring model and maintain a living risk register.
  • Tie remediation to budgets and sprints; verify closure with evidence (tickets, configs, test results).
  • Feed lessons learned from incidents and audits back into the next assessment cycle.

Implement Security Safeguards

Administrative Safeguards

  • Security management process: risk management plan, sanctions policy, and periodic evaluations.
  • Assign a security official; define roles, least-privilege access, and separation of duties.
  • Security awareness and training, incident response procedures, and contingency planning (backups, disaster recovery, emergency mode operations).
  • Policies and procedures that reflect how your workforce actually handles ePHI.

Technical Safeguards

  • Access controls: unique IDs, multi-factor authentication, least privilege, privileged access management, and automatic logoff.
  • Encryption in transit and at rest for ePHI; where not implemented, document an equivalent alternative and rationale.
  • Audit controls: centralized logging, immutable log retention, alerting, and regular review.
  • Integrity controls and change management to prevent unauthorized alteration of data or systems.
  • Vulnerability management and timely patching across servers, endpoints, and applications; endpoint protection and EDR.
  • Network segmentation, secure remote access, email security, and data loss prevention where risk warrants.

Physical Safeguards

  • Facility access controls, visitor management, and environmental protections.
  • Workstation security and screen privacy for on-site and remote work.
  • Device and media controls: inventory, encryption, secure disposal, and chain-of-custody.

Baseline controls to prioritize

  • MFA everywhere feasible, especially for remote access and privileged accounts.
  • Encryption on portable devices and backups; routinely test restores.
  • Hardened configurations, rapid patching, and continuous monitoring with actionable alerting.

Enforce Vendor Oversight

Build a vendor risk management lifecycle

  • Inventory all vendors; classify data handled and determine business associate status.
  • Perform pre-contract due diligence, execute a BAA where required, and risk-tier vendors by impact on ePHI.
  • Include audit rights, minimum security baselines, breach notice timeframes, and restrictions on subcontracting in contracts.
  • Monitor high-risk vendors with periodic attestations, evidence reviews, and issue remediation tracking.
  • Offboard with verified data return/destruction and access revocation.

Due diligence artifacts to request

  • Security questionnaires aligned to HIPAA Security Rule controls.
  • Independent control reports or certifications, vulnerability management summaries, and incident history.
  • Contingency plans and recent test results relevant to availability of ePHI.

Subcontractor Compliance Obligations

  • Require vendors to flow down BAAs to subcontractors that handle PHI and to maintain equivalent safeguards.
  • Keep an up-to-date inventory of subcontractors; require prior approval for changes.
  • Verify evidence of controls and breach reporting processes across the chain.

Maintain Breach Notification Protocols

Detect, triage, and assess

  • Define and communicate what constitutes a privacy/security incident and who to notify immediately.
  • Conduct the four-factor risk assessment to determine if there is a low probability that PHI was compromised.
  • Preserve evidence, contain the issue, and document every action and decision.

Breach Notification Requirements and timing

  • Notify the covered entity without unreasonable delay and in no case later than 60 days after discovery of a breach, as required by the Breach Notification Rule.
  • Adopt an internal target of 24–72 hours to escalate suspected incidents to the covered entity; many BAAs specify shorter timelines.
  • Provide rolling updates if initial details are incomplete; document law enforcement delays if applicable.

What your notice should include

  • What happened, including dates of breach and discovery and the systems or data involved.
  • The types of PHI affected and the number of individuals impacted.
  • Steps taken to mitigate harm and prevent recurrence, and steps individuals should consider.
  • Current status of investigation, containment, forensics, and recovery.

Prepare and test the process

  • Maintain an incident response plan, call tree, and communication templates.
  • Run tabletop exercises with the covered entity and key vendors; capture improvements.

Conduct Training and Education

Program design

  • Provide onboarding training and annual refreshers focused on practical scenarios and your policies.
  • Deliver role-based modules for IT, developers, customer support, and executives.
  • Cover phishing, secure remote work, password hygiene, data handling, incident reporting, and BAA obligations.

Make it effective

Document Compliance Activities

What to capture

  • Risk Analysis Documentation, risk treatment plans, and evidence of completed remediations.
  • Current policies and procedures, Security Rule evaluations, and contingency plan tests.
  • Executed BAAs, vendor due diligence artifacts, and subcontractor inventories.
  • Training curricula, attendance records, and sanctions where applied.
  • Incident logs, risk assessments for breaches, and communications with covered entities.

Retention and organization

  • Retain required documentation for at least six years from creation or last effective date.
  • Use a controlled repository with versioning, access controls, and audit trails.
  • Map each record to the applicable requirement to speed audits and compliance reviews.

Continuous improvement

  • Provide periodic compliance dashboards to leadership showing risk trends, control coverage, vendor status, and training outcomes.
  • Schedule policy reviews and control testing; fold findings into the next risk analysis cycle.

By executing strong BAAs, performing and documenting enterprise-wide risk analyses, implementing layered safeguards, overseeing vendors and subcontractors, maintaining a tested breach process, training your workforce, and keeping complete records, you establish a resilient, auditable program that meets HIPAA Security Rule expectations and protects patient trust.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

FAQs.

What are the key HIPAA Security Rule requirements for business associates?

You must implement Administrative Safeguards, Technical Safeguards, and Physical Safeguards to ensure the confidentiality, integrity, and availability of ePHI; perform and document a risk analysis with ongoing risk management; designate a security official; train your workforce; establish incident response and contingency planning; enter into and honor a Business Associate Agreement (BAA); and meet Breach Notification Requirements, maintaining documentation for at least six years.

How often must business associates perform risk assessments?

The rule requires an initial, enterprise-wide risk analysis and periodic reviews; it does not mandate a fixed interval. Best practice is at least annually and whenever significant changes occur (new systems, major integrations, incidents, or organizational changes), with updated Risk Analysis Documentation and a tracked remediation plan.

What should be included in a business associate agreement?

Define permitted uses/disclosures; require safeguards aligned to the Security Rule; mandate reporting of incidents and breaches; include Subcontractor Compliance Obligations with downstream BAAs; support access/amendment/accounting as applicable; permit HHS review; require return/destruction of PHI at termination; and allow termination for material breach, with clear timelines, evidence expectations, and audit rights.

How quickly must a business associate notify a covered entity of a breach?

Notify without unreasonable delay and no later than 60 days after discovery. Many BAAs set shorter deadlines, so adopt an internal target of 24–72 hours to escalate to the covered entity and provide rolling updates as facts develop.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles