Can a Business Associate Use PHI for Their Personal Needs? No—Here’s What HIPAA Says

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Can a Business Associate Use PHI for Their Personal Needs? No—Here’s What HIPAA Says

Kevin Henry

HIPAA

September 14, 2025

7 minutes read
Share this article
Can a Business Associate Use PHI for Their Personal Needs? No—Here’s What HIPAA Says

Business Associate Agreement Requirements

A Business Associate Agreement (BAA) is the contract that allows a covered entity to disclose protected health information (PHI) to a business associate while defining strict boundaries. Without a signed BAA, a business associate should not create, receive, maintain, or transmit PHI.

Core elements of a BAA

  • Define the scope: specify the services and the Permitted Uses of PHI tied to those services.
  • Require safeguards: administrative, physical, and technical measures consistent with the HIPAA Security Rule.
  • Flow down obligations: ensure subcontractors that handle PHI sign their own BAAs and follow the same rules.
  • Incident management: require prompt reporting of security incidents and breaches to the covered entity.
  • Support individual rights: assist the covered entity with access, amendment, and accounting requests when applicable.
  • Minimum necessary: commit to limiting PHI use and disclosure to the Minimum Necessary Standard.
  • Termination and return/destruction: outline how PHI will be returned or securely destroyed when the engagement ends.
  • Documentation and oversight: maintain policies, risk assessments, and make them available to regulators upon request.

Signing a BAA doesn’t grant blanket permission to use PHI. It narrows use to what’s necessary for the contracted work and to what HIPAA Compliance allows.

Permitted Uses of PHI

Business associates may use or disclose PHI only as the BAA permits or as required by law. Every use must tie directly to a covered entity’s delegated task and observe the Minimum Necessary Standard.

Permitted uses at a glance

  • Performing contracted services (for example, claims administration, IT hosting, EHR support, billing, analytics for operations).
  • Data aggregation for the covered entity’s healthcare operations when expressly authorized in the BAA.
  • De-Identification of PHI, if the BAA allows, using an accepted HIPAA method.
  • Management and administration of the business associate’s organization, but only if allowed by the BAA and with legal basis and safeguards.
  • Disclosures required by law (e.g., responding to a valid legal process), limited to what the law compels.

If a contemplated use is not in the BAA and not otherwise permitted by HIPAA, you must obtain a valid, written authorization from the individual before proceeding—or you must not use the PHI.

Prohibited Uses of PHI

Using PHI for personal gain, curiosity, or convenience is never allowed. Prohibited Uses of PHI include any action outside the BAA’s scope or HIPAA’s rules.

What business associates must not do

  • Use PHI for personal purposes (for example, checking a neighbor’s records or leveraging data for a side project).
  • Engage in marketing or sale of PHI without valid authorization and specific permission under the BAA.
  • “Data mine” PHI for unrelated analytics, product development, or competitive intelligence.
  • Disclose PHI to third parties or subcontractors without a lawful basis and a signed BAA where required.
  • Access more PHI than necessary to perform the task at hand.
  • Re-identify de-identified data or attempt to link it back to individuals unless expressly permitted and safeguarded.
  • Retain PHI after contract termination contrary to BAA terms or legal requirements.

When in doubt, treat any unapproved use as prohibited and seek guidance from the covered entity before acting.

De-Identification of PHI

De-Identification of PHI removes the data from HIPAA’s scope, allowing broader use for analytics or research. A business associate may de-identify PHI only if the BAA permits and appropriate controls are in place to prevent re-identification.

Two de-identification pathways

  • Safe Harbor: remove specified identifiers (e.g., names, full addresses, direct contact information, full-face photos, and other unique numbers or codes) and have no actual knowledge that remaining data could identify a person.
  • Expert Determination: a qualified expert applies accepted statistical or scientific methods and documents that the risk of re-identification is very small.

Practical considerations

  • Document the chosen method and maintain the expert’s report or field list of removed identifiers.
  • Protect any re-identification keys separately and restrict who can access them.
  • Prohibit downstream recipients from attempting re-identification unless expressly authorized.

Remember: de-identification is a Permitted Use of PHI only when the BAA or a written instruction from the covered entity authorizes it.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Consequences of PHI Misuse

Misusing PHI can trigger contractual, regulatory, and legal exposure. The fallout often exceeds the initial incident, affecting reputation and revenue.

Common consequences

  • Contract remedies: suspension or termination of the BAA, indemnification, and recovery of remediation costs.
  • Regulatory enforcement: investigations by regulators, civil monetary penalties, and mandated corrective action plans.
  • Breach notification: obligations to notify the covered entity, impacted individuals, and regulators, with ensuing scrutiny.
  • Civil Liability for PHI Misuse: lawsuits under state privacy, negligence, or consumer protection laws.
  • Criminal exposure: willful misuse or improper acquisition of PHI can result in criminal penalties.
  • Business impact: loss of client trust, higher cyber insurance premiums, and disruption to operations.

Strong governance, rapid incident response, and transparent coordination with the covered entity materially reduce risk and penalties.

Minimum Necessary Standard for PHI Use

The Minimum Necessary Standard requires you to limit PHI to the smallest amount needed to accomplish a defined purpose. It applies to routine uses, disclosures, and requests by business associates unless a recognized exception applies.

Putting minimum necessary into practice

  • Define the purpose first; then specify the exact data elements required.
  • Use role-based access, least-privilege permissions, and just-in-time provisioning.
  • Mask, truncate, or tokenize data when full identifiers are not essential.
  • Log access and disclosures, review anomalies, and remediate promptly.
  • Set retention limits and dispose of PHI securely when no longer needed.

Notable exceptions

  • Disclosures to or requests by healthcare providers for treatment.
  • Disclosures to the individual who is the subject of the information.
  • Uses or disclosures made pursuant to a valid authorization.
  • Disclosures to regulators for compliance oversight or when required by law.

Even when an exception might apply, default to collecting and sharing less—then justify any need for more.

Business associates have direct HIPAA obligations. You must implement Security Rule safeguards, observe applicable Privacy Rule provisions, provide breach notification to covered entities, and ensure subcontractors comply through BAAs.

Operational expectations for HIPAA Compliance

  • Conduct risk analysis and risk management tailored to your systems and workflows.
  • Adopt written policies and procedures; train your workforce and document completion.
  • Prepare and test incident response and breach notification playbooks.
  • Manage vendors: verify BAAs, security controls, and data flows for all subcontractors.
  • Maintain audit logs, access reviews, and change management for systems handling PHI.
  • Plan for continuity: backups, disaster recovery, and timely restoration of ePHI.
  • Review and update controls regularly as services, threats, and laws evolve.

Key takeaway

No—business associates cannot use PHI for personal needs. Your authority to handle PHI exists only within the BAA and HIPAA’s guardrails, with strict limits such as the Minimum Necessary Standard and explicit prohibitions on unrelated uses like marketing or sales without authorization. Build your program so compliance is the default, not an exception.

FAQs.

Can a business associate use PHI for marketing purposes?

Generally no. Marketing with PHI typically requires the individual’s written authorization and must be permitted by the BAA. Limited communications that qualify as healthcare operations may be allowed when performed strictly on behalf of the covered entity and under defined safeguards.

What happens if a business associate misuses PHI?

Expect contract termination or sanctions, mandatory breach notifications, regulatory investigations, civil monetary penalties, potential civil lawsuits under state law, and—in egregious cases—criminal exposure. Corrective action plans and ongoing monitoring are common outcomes.

Are business associates allowed to de-identify PHI?

Yes, if the BAA authorizes it. De-identification must follow HIPAA’s Safe Harbor method or an Expert Determination showing very low re-identification risk. Keys used for re-identification must be protected, and re-identification is prohibited unless expressly permitted.

What does the minimum necessary standard require for PHI use?

It requires you to limit PHI to only what’s needed for a defined purpose, apply least-privilege access, and avoid collecting or sharing superfluous identifiers. The standard doesn’t apply in certain scenarios (e.g., treatment, disclosures to the individual, valid authorizations, or required-by-law disclosures), but you should still default to using less whenever possible.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles