Covered Entities vs Business Associates: Responsibilities, Agreements, and Best Practices
Understanding how covered entities and business associates interact is central to HIPAA compliance and the protection of protected health information. This guide clarifies roles, outlines essential business associate agreement clauses, and provides practical controls you can apply to reduce risk across your vendor ecosystem.
Definitions of Covered Entities and Business Associates
Covered entities
Covered entities include health plans, health care clearinghouses, and health care providers who transmit certain transactions electronically. They originate or steward protected health information (PHI) in the course of treatment, payment, and health care operations.
Business associates
Business associates are persons or organizations that create, receive, maintain, or transmit PHI on behalf of a covered entity. Typical examples include billing vendors, cloud and data hosting providers, EHR add‑ons, consultants, revenue cycle firms, and analytics partners.
Key distinction in practice
Covered entities decide how PHI is used for care and operations, while business associates support those activities under contract. When a third party touches PHI for services to a covered entity, it is a business associate and must meet specific HIPAA obligations via a written agreement.
Business Associate Agreement Requirements
A business associate agreement (BAA) establishes the legal guardrails for PHI handling. Strong BAAs pair regulatory minimums with operational clarity so both sides can meet HIPAA compliance consistently.
Required business associate agreement clauses
- Permitted and required uses and disclosures: Define how the business associate may use or disclose PHI, including the minimum necessary standard.
- Safeguards: Require administrative, physical, and technical safeguards appropriate to the risk to ensure HIPAA compliance and prevent unauthorized use or disclosure.
- Unauthorized disclosure reporting: Mandate prompt reporting of any incident involving PHI, including breach notification obligations and cooperation in investigation and mitigation.
- Subcontractor HIPAA obligations: Require downstream subcontractors that handle PHI to agree to the same restrictions, conditions, and safeguards.
- Individual rights support: Ensure the business associate helps the covered entity respond to requests for access, amendments, and an accounting of disclosures.
- Regulatory access: Commit to making internal practices, books, and records related to PHI available to the Secretary of HHS for compliance review.
- Return or destruction: On termination, require return or destruction of PHI if feasible, and continued protections if not.
- Material breach termination: Authorize termination if the business associate materially breaches the BAA and fails to cure within the specified period.
Recommended enhancements
- Security specifics: Encryption standards, key management expectations, multi‑factor authentication, logging and monitoring, and vulnerability management cadence.
- Incident timelines: Clear definitions for initial notice, ongoing updates, and final reports for unauthorized disclosure reporting and breach response.
- Assurances and attestations: Periodic security attestations (for example, SOC 2 or HITRUST), and notice of significant control changes.
- Indemnification and insurance: Risk allocation terms and minimum cyber liability insurance limits aligned to data volume and criticality.
- Data handling details: Data location, backups, retention periods, de‑identification rules, and secure disposal procedures.
Compliance Obligations and Liability
Under HIPAA, business associates are directly responsible for meeting applicable requirements of the Security Rule and for Privacy Rule provisions adopted in the BAA. Failure to comply can create liability under HIPAA for both contractual breaches and regulatory violations.
Obligations for covered entities
- Execute BAAs before sharing PHI and disclose only the minimum necessary PHI to enable the service.
- Maintain policies, workforce training, and safeguards that protect PHI throughout the vendor lifecycle.
- Respond to incidents, coordinate breach determinations, and notify affected individuals and regulators as required.
Obligations for business associates
- Implement risk‑based administrative, physical, and technical safeguards, including access controls, encryption, and audit logging.
- Use and disclose PHI only as permitted by the BAA or as required by law; refrain from unauthorized secondary use.
- Report incidents, cooperate with investigations, and flow down all relevant terms to subcontractors.
Liability under HIPAA
Business associates can face civil and criminal penalties for noncompliance, and covered entities may be liable for lapses in vendor selection, oversight, or BAA deficiencies. Contractual indemnities, while not required by HIPAA, can shift financial exposure but do not eliminate regulatory accountability.
Subcontractor Agreement Mandates
Whenever a business associate engages a subcontractor that will create, receive, maintain, or transmit PHI, the business associate must execute a written agreement imposing the same HIPAA and BAA terms. These flow‑down requirements ensure subcontractor HIPAA obligations mirror those at the prime level.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Practical flow‑down controls
- Prohibit PHI access by any subcontractor until a signed agreement is in place.
- Mirror breach notification, security safeguards, and minimum necessary standards in downstream contracts.
- Require transparency about further subcontracting and obtain prior written approval for high‑risk services.
- Mandate prompt termination or remediation if a subcontractor cannot meet requirements.
Oversight and Monitoring Responsibilities
Signing a BAA is not the finish line. Ongoing oversight confirms that controls work as designed and that unauthorized disclosure reporting is timely and complete.
For covered entities
- Risk‑based vendor due diligence: Assess service criticality, PHI volume, and threat exposure before onboarding.
- Evidence reviews: Request security attestations, penetration test summaries, or risk assessment results at regular intervals.
- Right‑to‑audit and assessments: Exercise contract rights to conduct site visits or remote assessments when risk indicators arise.
- Performance and incident metrics: Track ticket volumes, SLA adherence, patch timelines, and incident response quality.
- Inventory and access governance: Maintain an accurate roster of business associates, approved PHI data flows, and access entitlements.
For business associates
- Continuous monitoring: Log aggregation, anomaly detection, and vulnerability scanning aligned to the threat landscape.
- Subcontractor oversight: Validate that downstream parties meet subcontractor HIPAA obligations and report issues promptly.
- Testing and training: Tabletop exercises for breach response and role‑based privacy and security training for staff.
Best Practices for Risk Management
Effective risk management turns policy into practice. The following steps reduce exposure while supporting reliable operations.
- Perform and update risk analyses; track remediation to completion with risk acceptance criteria and deadlines.
- Apply least‑privilege access, multi‑factor authentication, network segmentation, and encryption in transit and at rest.
- Harden endpoints and servers, enforce secure configuration baselines, and patch within defined SLAs.
- Use data loss prevention, immutable backups, and tested disaster recovery to protect PHI availability and integrity.
- Establish clear incident response runbooks with roles, escalation paths, and external communications procedures.
- Embed privacy by design in projects to minimize PHI collection, retention, and sharing wherever feasible.
- Align insurance coverage and contractual terms (including material breach termination and indemnities) to risk.
Termination Provisions in BAAs
Termination clauses should anticipate both routine service wind‑downs and urgent exits after noncompliance. Clarity at signing time prevents confusion when timelines are tight.
Core termination mechanics
- Triggers: Include material breach termination with defined cure periods and notice mechanics.
- PHI handling: Specify return or certified destruction of PHI, including media types, formats, and verification steps.
- Infeasibility: If destruction is not feasible, require continued protections and prohibit further use or disclosure.
- Transition assistance: Outline cooperation to transfer PHI back to the covered entity or to a successor vendor.
- Survival: Ensure confidentiality, indemnity, and audit clauses survive as appropriate.
Conclusion
Covered entities set the purpose for PHI use; business associates operationalize it under a BAA. Clear clauses, disciplined oversight, and risk‑based controls create defensible HIPAA compliance while safeguarding individuals’ protected health information across the full vendor chain.
FAQs
What differentiates a covered entity from a business associate?
A covered entity delivers or pays for care and directly manages PHI for treatment, payment, and operations. A business associate supports those functions for the covered entity and handles PHI only as permitted by the BAA and HIPAA. In short, covered entities decide how PHI is used; business associates carry out services involving that PHI under contractual limits.
What are the key elements required in a business associate agreement?
Essential business associate agreement clauses include permitted uses and disclosures, required safeguards, unauthorized disclosure reporting, support for individual rights requests, regulatory access, subcontractor HIPAA obligations, return or destruction of PHI at termination, and material breach termination rights. Many organizations also add insurance, security specifics, and audit rights.
How are business associates held liable under HIPAA?
Business associates have direct liability under HIPAA for Security Rule compliance and for Privacy Rule provisions adopted in the BAA. They can face civil and criminal penalties for violations, and contract terms may impose indemnification or other remedies. Covered entities may also be accountable for inadequate oversight or deficient BAAs.
What steps should covered entities take to monitor business associate compliance?
Use risk‑based due diligence, require periodic security attestations, enforce right‑to‑audit provisions, review incident and performance metrics, verify subcontractor controls, and maintain accurate inventories of PHI access. These oversight practices help surface issues early and strengthen overall HIPAA compliance.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.