Covered Entities and the Omnibus Rule: Guidance, Examples, Risks, Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Covered Entities and the Omnibus Rule: Guidance, Examples, Risks, Best Practices

Kevin Henry

HIPAA

August 25, 2024

8 minutes read
Share this article
Covered Entities and the Omnibus Rule: Guidance, Examples, Risks, Best Practices

Omnibus Rule Overview

The HIPAA Omnibus Rule consolidated and strengthened privacy, security, and breach notification requirements, with a special focus on how covered entities work with third parties. It clarifies when Business Associate Agreements are required, expands direct liability to business associates and their subcontractors, and tightens Breach Notification Requirements through a consistent risk assessment standard.

For you as a covered entity—health plans, health care providers, and health care clearinghouses—the Rule raises the bar on governance, documentation, and vendor oversight. It also refines rules for marketing and fundraising, and increases exposure to Civil Monetary Penalties when safeguards fail or policies are not followed.

Key changes at a glance

  • Direct liability for business associates and downstream subcontractors that create, receive, maintain, or transmit Protected Health Information (PHI).
  • A presumption of breach unless a documented four-factor risk assessment shows a low probability of compromise.
  • Stricter conditions on marketing, sale of PHI, and fundraising communications.
  • Greater emphasis on written HIPAA Privacy Policies, training, and sanctioning workforce members for violations.

Why this matters

The Rule converts many “shoulds” into “musts.” Regulators expect you to maintain auditable evidence of Risk Assessments, vendor due diligence, and Electronic Protected Health Information Safeguards across your environment and your vendors’. This expectation applies whether PHI is on paper, spoken, or electronic (ePHI).

Definition of Business Associates

A business associate is any non-workforce person or entity that performs functions or services for you involving PHI. If a vendor can create, receive, maintain, or transmit PHI on your behalf—even if the data is encrypted and they never “look” at it—they are a business associate and must sign a Business Associate Agreement.

Common examples

  • Cloud service providers, data centers, and backup vendors that store ePHI.
  • EHR and patient portal vendors; e-prescribing gateways; health information exchanges.
  • Billing, collections, transcription, coding, and claims clearing services.
  • Legal, actuarial, consulting, and analytics firms that access PHI to advise you.
  • Mobile app developers and device vendors that process PHI for your operations.

Subcontractors and the “chain of trust”

Business associates must flow down HIPAA obligations to their subcontractors that handle PHI. Your Business Associate Agreements should require proof of these downstream contracts, ensuring the same or stronger safeguards apply through the entire data supply chain.

Liability for Business Associates' Actions

The Omnibus Rule makes business associates directly liable for Security Rule compliance, certain Privacy Rule provisions, and breach reporting. You are not automatically liable for every business associate misstep, but you can face exposure where you fail to obtain required Business Associate Agreements, exercise reasonable oversight, or continue a relationship after learning of a pattern of noncompliance.

Practical liability triggers

  • Operating without an executed BAA or using outdated terms that omit required protections.
  • Ignoring red flags—such as repeated access control failures—without corrective action.
  • Treating a vendor as an “agent” and directing day-to-day operations that lead to a violation.

Risk management moves

  • Use intake questionnaires to classify vendors and determine BAA necessity before contracting.
  • Embed service-level requirements for audit logs, encryption, incident response, and Breach Notification Requirements in BAAs.
  • Require evidence of training, penetration testing, and third-party certifications where appropriate.
  • Document monitoring and remediation steps; terminate relationships that cannot be brought into compliance.

Breach Notification Standard

The Omnibus Rule presumes a breach has occurred whenever PHI is impermissibly used or disclosed, unless you demonstrate a low probability of compromise through a documented four-factor risk assessment. You must act without unreasonable delay and no later than 60 days from discovery to notify affected individuals, with additional obligations to notify regulators and, for large incidents, the media.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

The four-factor risk assessment

  • Nature and extent of PHI: sensitivity, identifiers present, and likelihood of re-identification.
  • Unauthorized person: who received or accessed the PHI and their obligations to protect it.
  • Whether the PHI was actually acquired or viewed versus merely exposed.
  • Mitigation: prompt steps such as retrieval, secure deletion, or satisfactory assurances.

Notification essentials

  • Written notices to individuals describing what happened, what information was involved, mitigation, and steps they can take.
  • Timely reporting to HHS and, when applicable, to prominent media for breaches affecting 500 or more residents of a state or jurisdiction.
  • Maintenance of an incident register and copies of your Risk Assessments for audit readiness.

Examples

  • Lost unencrypted laptop with patient schedules: presumed breach; notify after assessment unless you can prove a low probability of compromise.
  • Misdirected fax to another covered entity that promptly destroys it: document the assessment and mitigation; notification may not be required.
  • Ransomware encrypts a file server containing ePHI: treat as a security incident triggering breach analysis; preserve logs and involve forensics.

Marketing and Fundraising Restrictions

Marketing uses or disclosures of PHI generally require an individual’s authorization, especially when you receive financial remuneration from a third party. Limited exceptions apply, such as face-to-face communications and nominal promotional gifts. Prescription refill reminders are permitted only when any payment you receive is reasonably related to the cost of the communication.

Fundraising communications must include a clear, simple way to opt out that does not create burdens or affect treatment. You should segregate fundraising lists from clinical records, limit the PHI elements used, and honor opt-outs across all channels.

Common pitfalls to avoid

  • Embedding PHI in targeted ads or remarketing platforms without authorization.
  • Bundling marketing consent with treatment consent forms.
  • Using donation data to influence clinical scheduling or service prioritization.

Enforcement and Penalties

OCR enforces the Rule through investigations, audits, corrective action plans, and Civil Monetary Penalties. Penalties are tiered based on culpability—from reasonable cause to willful neglect—and can reach up to tens of thousands of dollars per violation, with annual caps per violation category that are adjusted for inflation.

In addition to monetary exposure, enforcement often requires multi-year corrective action plans and external monitoring. Repeated failures in areas like right of access, encryption of portable devices, or vendor oversight significantly increase risk.

What drives enforcement

  • Absence of HIPAA Privacy Policies, missing BAAs, or outdated notices of privacy practices.
  • Systemic access control gaps, lack of audit logging, or failure to implement Electronic Protected Health Information Safeguards.
  • Delayed or incomplete breach notifications and poor incident documentation.

Best Practices for Compliance

Strong compliance blends governance, technology, and culture. Start by aligning leadership accountability, resourcing your privacy and security teams, and embedding HIPAA into everyday workflows—especially where vendors and new technologies intersect.

1) Governance and policy management

  • Maintain current, role-based HIPAA Privacy Policies and Security Rule procedures; map them to real systems and data flows.
  • Conduct enterprise Risk Assessments at least annually and after major changes; track findings to closure with owners and dates.
  • Run scenario-based training and document sanctions for violations to reinforce accountability.

2) Vendor lifecycle and Business Associate Agreements

  • Classify vendors by PHI exposure; require BAAs before any PHI is shared or hosted.
  • Hard-code obligations for encryption, key management, audit logs, breach reporting timelines, subcontractor flow-down, and right-to-audit.
  • Review artifacts such as SOC 2 reports, penetration tests, and remediation plans; re-evaluate at renewal.

3) Electronic Protected Health Information Safeguards

  • Encrypt ePHI at rest and in transit; enforce least privilege, MFA, device hardening, and endpoint protection.
  • Centralize audit logging and alerts for anomalous access; retain logs per policy to support investigations.
  • Segment networks and applications; apply data loss prevention to email, cloud storage, and messaging.

4) Incident response and Breach Notification Requirements

  • Adopt a 24/7 incident intake process; define roles, escalation paths, and legal review steps.
  • Use a standard four-factor template for breach analysis and ensure timely notifications.
  • Practice tabletop exercises with key vendors to validate coordination and communications.

5) Data minimization and patient rights

  • Limit PHI collection to what is necessary; de-identify when feasible for analytics and quality improvement.
  • Operationalize right of access, amendments, and restrictions with measurable service levels.

Conclusion

Covered Entities and the Omnibus Rule align privacy, security, and third-party risk into a single accountability framework. By tightening vendor oversight, documenting risk decisions, and hardening technical controls, you reduce breach likelihood, meet regulatory expectations, and protect patients’ trust.

FAQs.

What are the main obligations of covered entities under the Omnibus Rule?

You must maintain up-to-date HIPAA Privacy Policies, perform documented Risk Assessments, implement Electronic Protected Health Information Safeguards, execute and oversee Business Associate Agreements, and meet Breach Notification Requirements. You also need to follow stricter rules for marketing and fundraising, train your workforce, and keep auditable records of decisions and incidents.

How does the Omnibus Rule affect liability for business associates' actions?

Business associates are directly liable for compliance, but you remain responsible for contracting, oversight, and acting when you learn of noncompliance. If you fail to obtain a required BAA, ignore known problems, or direct an agent’s actions that cause a violation, you can share exposure and face Civil Monetary Penalties or corrective action plans.

What are the breach notification requirements under the Omnibus Rule?

Any impermissible use or disclosure of PHI is presumed a breach unless a four-factor assessment shows a low probability of compromise. You must notify affected individuals without unreasonable delay and no later than 60 days from discovery, report to regulators, and for large incidents notify the media. Document your analysis, mitigation, and all communications.

How should covered entities update their compliance programs to align with the Omnibus Rule?

Embed HIPAA into governance and operations: refresh policies, complete enterprise Risk Assessments, modernize technical safeguards for ePHI, and strengthen vendor lifecycle controls through robust Business Associate Agreements. Test incident response, tighten marketing and fundraising workflows, measure performance with audits, and remediate gaps with clear ownership and timelines.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles