Does the HIPAA Privacy Rule Apply to Business Associates? Yes—Requirements and Responsibilities Explained

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Does the HIPAA Privacy Rule Apply to Business Associates? Yes—Requirements and Responsibilities Explained

Kevin Henry

HIPAA

February 22, 2024

7 minutes read
Share this article
Does the HIPAA Privacy Rule Apply to Business Associates? Yes—Requirements and Responsibilities Explained

Yes. The HIPAA Privacy Rule applies to business associates (BAs) when they create, receive, maintain, or transmit protected health information (PHI) for or on behalf of a covered entity. That means BAs have direct obligations for privacy rule compliance and security safeguards, not just contractual duties. This article explains who is a BA, how responsibilities are shared, and what effective risk management looks like in practice.

Definition of Business Associates

Who qualifies as a business associate

A business associate is any person or organization that performs services or functions for a covered entity involving PHI. The role—not the job title—determines BA status. If your services require access to PHI, you are likely a BA and subject to HIPAA’s rules.

Common examples

  • Revenue cycle, billing, and claims processing vendors.
  • IT service providers and cloud hosting that store or process ePHI.
  • Data analytics, quality improvement, and population health firms.
  • EHR and practice management vendors, e‑fax and e‑prescribing gateways.
  • Legal, actuarial, accreditation, and consulting services handling PHI.

Subcontractors and role-based status

Any subcontractor a BA uses that will handle PHI is itself a business associate and must sign a downstream agreement with equivalent protections. An entity can be a BA for one client and not for another, depending on whether PHI is involved in the specific engagement.

Borderline cases

True “conduits” that merely transmit PHI without persistent storage (for example, a postal service) are generally not BAs. By contrast, cloud services that store encrypted PHI are BAs even if they cannot view its contents. De‑identified information is not PHI, but the process of de‑identifying PHI is a permitted BA function when authorized.

Covered Entities and Their Obligations

Who are covered entities

Covered entities include health plans, most health care providers that conduct standard electronic transactions, and health care clearinghouses. They remain accountable for how PHI is used and disclosed, even when work is delegated to a BA.

Covered entity responsibilities

Covered entity responsibilities include limiting disclosures to the minimum necessary, maintaining notices of privacy practices, honoring individual rights, and ensuring a HIPAA business associate agreement is in place before sharing PHI. When aware of a BA’s material noncompliance, covered entities must take reasonable steps to cure it, terminate the relationship if uncorrected, or escalate to regulators when termination is infeasible.

Business Associate Agreements

What a BAA must include

A Business Associate Agreement (BAA)—often titled “HIPAA business associate agreement”—is a written contract that sets the rules for PHI. It must specify permitted and required uses and disclosures; require appropriate PHI safeguards; mandate prompt breach notification; ensure subcontractors are bound by the same restrictions; support individual rights (access, amendment, accounting, as applicable); and require return or destruction of PHI at termination if feasible.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Practical drafting tips

  • Define breach and security incident handling steps, with clear timeframes for notice to the covered entity (often sooner than HIPAA’s outer deadline).
  • Spell out security expectations (encryption at rest/in transit, access controls, audit logging, backups, and disaster recovery).
  • Include rights to assess controls, request evidence, and require corrective actions.
  • Address data retention, return/secure deletion methods, and ongoing obligations if destruction is infeasible.
  • Require BAs to flow down the same terms to all PHI‑handling subcontractors.

Safeguarding Protected Health Information

Administrative safeguards

  • Conduct a documented risk analysis and implement a risk management plan tailored to your environment.
  • Adopt written policies, assign privacy and security leadership, and train your workforce regularly.
  • Apply the minimum necessary standard and role‑based access across workflows.

Physical safeguards

  • Control facility access, secure server rooms, and protect workstations and portable devices.
  • Use device/media controls for issuance, movement, reuse, and secure disposal of hardware.

Technical safeguards

  • Unique user IDs, multi‑factor authentication, and least‑privilege access.
  • Encryption of ePHI in transit and at rest; strong key management.
  • Audit logs, monitoring, and alerting for anomalous access and data exfiltration.
  • Integrity protections, patch management, vulnerability management, and secure configuration baselines.

Operational practices that strengthen PHI safeguards

  • Data inventory and classification so you know where PHI resides and flows.
  • Network segmentation and zero‑trust principles to limit blast radius.
  • Backups with periodic restore testing and ransomware readiness.
  • Secure email, DLP, and mobile device management for remote and hybrid teams.

Compliance Requirements for Business Associates

Core obligations under HIPAA

  • Comply with every applicable provision of the Security Rule and relevant parts of the Privacy Rule.
  • Use and disclose PHI only as permitted by the BAA or as required by law; apply minimum necessary.
  • Maintain written policies, procedures, and documentation for at least six years.
  • Train workforce members and enforce sanctions for violations.
  • Enter into BAAs with all PHI‑handling subcontractors and verify their controls.
  • Provide access to PHI (through the covered entity or as directed) and support amendments or accountings, when applicable.
  • Report breaches and certain security incidents to the covered entity without unreasonable delay and no later than HIPAA’s deadline, consistent with the BAA.
  • Cooperate with investigations and make records available to regulators when required.

Program elements that demonstrate privacy rule compliance

  • Governance: named privacy and security officers, cross‑functional oversight, and executive reporting.
  • Risk management: periodic risk analyses, remediation tracking, and evidence of control effectiveness.
  • Continuous improvement: audits, tabletop exercises, and lessons learned after incidents.

Enforcement and Penalties

How enforcement works

The HHS Office for Civil Rights (OCR) investigates complaints, breach reports, and referrals, and it conducts audits. Outcomes range from technical assistance and corrective action plans to settlements or civil monetary penalties. State attorneys general and, for egregious misconduct, the Department of Justice may also take action.

What penalties look like

Penalties are tiered by culpability (from lack of knowledge to willful neglect) and scale with factors such as the number of affected individuals, the duration of noncompliance, and the effectiveness of PHI safeguards. For large or prolonged violations, total financial exposure can reach into the millions of dollars, alongside onerous reporting and monitoring obligations.

Reducing enforcement risk

  • Maintain a current, documented risk analysis and execute on remediation plans.
  • Adopt recognized security practices and keep evidence of implementation.
  • Meet breach notification timelines, cooperate with investigators, and demonstrate good‑faith corrective action.

Best Practices for HIPAA Compliance

Build a right‑sized, repeatable program

  • Establish governance and clear lines of accountability for privacy and security.
  • Map PHI data flows; design processes around the minimum necessary principle.
  • Require strong access management: unique IDs, MFA, timely off‑boarding, and periodic access reviews.
  • Encrypt everywhere feasible; harden endpoints; manage vulnerabilities and patches on a schedule.
  • Implement logging, continuous monitoring, and regular audits; keep evidence organized for a HIPAA enforcement action.
  • Vet vendors, sign robust BAAs, and verify controls—trust, but verify.
  • Prepare for incidents: an tested IR plan, breach risk assessments, and clear notification playbooks.
  • Train your workforce with role‑specific content; reinforce with phishing simulations and policy attestation.

Bottom line: the Privacy Rule absolutely applies to business associates. By understanding covered entity responsibilities, executing strong BAAs, and operationalizing PHI safeguards through disciplined risk management, you can meet obligations confidently and reduce legal, financial, and reputational risk.

FAQs.

What is a business associate under HIPAA?

A business associate is any person or entity that performs services or functions for a covered entity that involve creating, receiving, maintaining, or transmitting PHI. Examples include billing firms, IT and cloud providers, data analytics companies, and consultants who need PHI to deliver their services.

How do business associate agreements protect PHI?

A BAA contractually limits how a BA may use and disclose PHI, requires specific PHI safeguards, mandates breach reporting, and compels subcontractors to follow the same rules. It also addresses access, return or destruction of PHI, and cooperation with oversight, making it the backbone of PHI protection between parties.

Are business associates directly liable under HIPAA?

Yes. Business associates are directly liable for complying with the Security Rule and for key Privacy Rule obligations, including limiting uses and disclosures, supporting individual rights where applicable, reporting breaches to the covered entity, and executing compliant agreements with subcontractors.

What are the consequences of non-compliance for business associates?

Consequences range from corrective action plans and monitoring to civil monetary penalties and settlements. Non-compliance can also trigger state actions, contract termination, litigation, and reputational damage. In cases of knowing misuse of PHI, criminal enforcement is possible.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles