Examples and Best Practices: HIPAA Obligations for Covered Entities and Business Associates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Examples and Best Practices: HIPAA Obligations for Covered Entities and Business Associates

Kevin Henry

HIPAA

August 12, 2024

7 minutes read
Share this article
Examples and Best Practices: HIPAA Obligations for Covered Entities and Business Associates

Covered Entities Overview

Who qualifies as a covered entity

Covered entities include health plans, health care clearinghouses, and health care providers that transmit health information electronically in connection with standard transactions. If you bill insurers electronically, process eligibility checks, or submit claims, you likely fall within HIPAA’s scope.

Protected Health Information (PHI) scope

Protected Health Information is individually identifiable health information in any form—paper, oral, or electronic—relating to a person’s health status, care, or payment for care. You must limit uses and disclosures to the minimum necessary to achieve the intended purpose.

Examples and best practices

  • Examples: physician practices, hospitals, pharmacies, dental clinics, employer-sponsored group health plans, and third-party clearinghouses.
  • Best practices: maintain an up-to-date HIPAA inventory of systems containing PHI, document data flows, and apply a role-based access model so staff only see the PHI required for their duties.

Business Associates Roles

Who qualifies and how subcontractors fit

Business associates are vendors or partners who create, receive, maintain, or transmit PHI on your behalf. Subcontractors of business associates that handle PHI are also subject to HIPAA obligations through a downstream agreement.

Core responsibilities

Business associates must implement safeguards aligned to the HIPAA Security Rule, follow the minimum necessary standard, and support your Privacy Rule obligations. They must report incidents and potential breaches promptly and cooperate with investigations.

Examples and oversight best practices

  • Examples: cloud service providers, EHR vendors, billing services, claims processors, analytics firms, transcription services, legal and consulting firms with PHI access.
  • Best practices: perform due diligence before engagement, assess Security Rule controls, require audit logging and encryption at rest/in transit, and review SOC reports or equivalent evidence annually.

Business Associate Agreements Requirements

Required elements

Business Associate Agreements must specify permitted and required uses and disclosures of PHI, mandate appropriate safeguards, and require reporting of breaches and security incidents. They must bind subcontractors, support individual rights (access, amendment, accounting), and require PHI return or destruction at termination.

Example clauses that add clarity

  • Permitted use: de-identification standards and prohibition on marketing without authorization.
  • Security: encryption requirements, Transmission Security for email and APIs, and breach reporting timelines (for example, within 10 business days).
  • Oversight: right to audit, evidence of Administrative Safeguards, and notice of significant control changes.
  • Termination: immediate termination for material breach and cooperation in transition to a new vendor.

Operational best practices

  • Use a standardized BAA template mapped to policy controls; track execution and renewal dates.
  • Map each vendor to data elements handled (PHI types) and risk-tier them to set monitoring frequency.
  • Test incident-notification pathways annually so contacts, escalation steps, and SLAs work in practice.

Administrative Safeguards Implementation

Risk analysis and risk management

Conduct an enterprise-wide risk analysis that inventories systems with PHI, evaluates threats and vulnerabilities, and ranks risks. Use a living risk register with owners, mitigation plans, and target dates; revisit after major changes or incidents.

Workforce management and policies

Train your workforce on Privacy and Security Rule responsibilities at hire and annually. Enforce a sanction policy, run phishing simulations, and verify understanding. Maintain policies for access management, security incident response, contingency planning, and evaluation.

Access governance and contingency planning

Implement least-privilege, unique user IDs, and timely provisioning/deprovisioning tied to HR events. Maintain contingency plans, including data backup, disaster recovery, and emergency mode operations, and test them with tabletop exercises.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Physical Safeguards Measures

Facility and Physical Access Controls

Restrict facility access with badges, visitor logs, and surveillance where PHI systems reside. Define procedures for emergency access and maintenance, and keep server rooms locked with limited authorization.

Workstations, devices, and media

Secure workstations against unauthorized viewing, auto-lock screens, and anchor devices where appropriate. Control device and media lifecycles with check-in/out logs, secure storage, encrypted backups, and documented disposal that renders PHI unreadable.

Practical examples

  • Badge readers and camera coverage at data centers; clean desk policy in clinical areas.
  • Asset tags for laptops handling ePHI; wipe and verify before reuse; shred or degauss retired media.

Technical Safeguards Strategies

Access controls

Use unique user IDs, strong authentication (preferably MFA), session timeouts, and emergency access procedures. Segment networks to isolate systems with ePHI and apply least-privilege across applications and databases.

Audit controls and integrity

Enable detailed logging for authentication, access, changes, and data exports. Protect log integrity, retain logs per policy, and review regularly with automated alerting to spot anomalies and exfiltration attempts.

Encryption and Transmission Security

Encrypt ePHI at rest and in transit using modern protocols. Apply Transmission Security with TLS for web and APIs, secure email gateways or email encryption for PHI, and VPNs or zero-trust tunnels for remote access.

Additional best practices

  • Use application-layer controls (field-level encryption or tokenization) for high-risk data.
  • Employ endpoint protection, patch management, and configuration baselines; validate with regular vulnerability scanning and penetration tests.

Breach Notification Compliance

Risk assessment and safe harbor

Assess incidents against the Breach Notification Rule using factors such as the nature of PHI, who received it, whether it was actually viewed, and mitigation. If PHI was properly encrypted and the key was not compromised, the incident may not constitute a reportable breach.

Notification timelines and recipients

You must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. For breaches affecting 500 or more residents of a state or jurisdiction, notify prominent media and report to the federal regulator within 60 days; for fewer than 500 individuals, report to the regulator no later than 60 days after the end of the calendar year.

Business associate responsibilities

Business associates must notify the covered entity of a breach without unreasonable delay and within the BAA’s specified timeframe. Include all available details so the covered entity can complete required notifications.

Content of notices

Notices should describe what happened, the types of PHI involved, steps individuals can take to protect themselves, what you are doing to investigate and mitigate, and how to contact you for more information. Maintain documentation of the decision-making process and notices sent.

HIPAA Enforcement considerations

Noncompliance can trigger investigations, corrective action plans, and tiered civil penalties. Demonstrable compliance—policies, training, risk analysis, and timely breach response—reduces enforcement risk and supports defensibility.

Conclusion

By aligning Business Associate Agreements, Administrative Safeguards, Physical Access Controls, and Technical Safeguards, you meet essential HIPAA obligations for covered entities and business associates. Consistent risk analysis, strong Transmission Security, and disciplined breach notification practices create resilient protection for Protected Health Information.

FAQs

What entities are classified as covered entities under HIPAA?

Covered entities are health plans, health care clearinghouses, and health care providers that conduct standard electronic transactions (such as claims, eligibility checks, or referrals). If you transmit these transactions electronically, you are a covered entity and must protect PHI accordingly.

How do business associate agreements protect PHI?

Business Associate Agreements define permitted PHI uses and disclosures, require safeguards aligned with HIPAA, mandate incident and breach reporting, bind subcontractors, and ensure PHI is returned or destroyed at contract end. They translate HIPAA requirements into enforceable vendor obligations.

What are the key administrative safeguards required by HIPAA?

Key safeguards include a documented risk analysis and risk management plan, assigned security responsibility, workforce training and sanctions, access management, contingency planning (backup, disaster recovery, emergency operations), security incident procedures, and periodic evaluations of control effectiveness.

When must breach notifications be issued under HIPAA?

Individuals must be notified without unreasonable delay and no later than 60 calendar days after breach discovery. Breaches affecting 500 or more individuals require notification to the regulator and media within the same 60-day window; smaller breaches must be reported to the regulator within 60 days after the end of the calendar year.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles