Examples and Best Practices: HIPAA Obligations for Covered Entities and Business Associates
Covered Entities Overview
Who qualifies as a covered entity
Covered entities include health plans, health care clearinghouses, and health care providers that transmit health information electronically in connection with standard transactions. If you bill insurers electronically, process eligibility checks, or submit claims, you likely fall within HIPAA’s scope.
Protected Health Information (PHI) scope
Protected Health Information is individually identifiable health information in any form—paper, oral, or electronic—relating to a person’s health status, care, or payment for care. You must limit uses and disclosures to the minimum necessary to achieve the intended purpose.
Examples and best practices
- Examples: physician practices, hospitals, pharmacies, dental clinics, employer-sponsored group health plans, and third-party clearinghouses.
- Best practices: maintain an up-to-date HIPAA inventory of systems containing PHI, document data flows, and apply a role-based access model so staff only see the PHI required for their duties.
Business Associates Roles
Who qualifies and how subcontractors fit
Business associates are vendors or partners who create, receive, maintain, or transmit PHI on your behalf. Subcontractors of business associates that handle PHI are also subject to HIPAA obligations through a downstream agreement.
Core responsibilities
Business associates must implement safeguards aligned to the HIPAA Security Rule, follow the minimum necessary standard, and support your Privacy Rule obligations. They must report incidents and potential breaches promptly and cooperate with investigations.
Examples and oversight best practices
- Examples: cloud service providers, EHR vendors, billing services, claims processors, analytics firms, transcription services, legal and consulting firms with PHI access.
- Best practices: perform due diligence before engagement, assess Security Rule controls, require audit logging and encryption at rest/in transit, and review SOC reports or equivalent evidence annually.
Business Associate Agreements Requirements
Required elements
Business Associate Agreements must specify permitted and required uses and disclosures of PHI, mandate appropriate safeguards, and require reporting of breaches and security incidents. They must bind subcontractors, support individual rights (access, amendment, accounting), and require PHI return or destruction at termination.
Example clauses that add clarity
- Permitted use: de-identification standards and prohibition on marketing without authorization.
- Security: encryption requirements, Transmission Security for email and APIs, and breach reporting timelines (for example, within 10 business days).
- Oversight: right to audit, evidence of Administrative Safeguards, and notice of significant control changes.
- Termination: immediate termination for material breach and cooperation in transition to a new vendor.
Operational best practices
- Use a standardized BAA template mapped to policy controls; track execution and renewal dates.
- Map each vendor to data elements handled (PHI types) and risk-tier them to set monitoring frequency.
- Test incident-notification pathways annually so contacts, escalation steps, and SLAs work in practice.
Administrative Safeguards Implementation
Risk analysis and risk management
Conduct an enterprise-wide risk analysis that inventories systems with PHI, evaluates threats and vulnerabilities, and ranks risks. Use a living risk register with owners, mitigation plans, and target dates; revisit after major changes or incidents.
Workforce management and policies
Train your workforce on Privacy and Security Rule responsibilities at hire and annually. Enforce a sanction policy, run phishing simulations, and verify understanding. Maintain policies for access management, security incident response, contingency planning, and evaluation.
Access governance and contingency planning
Implement least-privilege, unique user IDs, and timely provisioning/deprovisioning tied to HR events. Maintain contingency plans, including data backup, disaster recovery, and emergency mode operations, and test them with tabletop exercises.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Physical Safeguards Measures
Facility and Physical Access Controls
Restrict facility access with badges, visitor logs, and surveillance where PHI systems reside. Define procedures for emergency access and maintenance, and keep server rooms locked with limited authorization.
Workstations, devices, and media
Secure workstations against unauthorized viewing, auto-lock screens, and anchor devices where appropriate. Control device and media lifecycles with check-in/out logs, secure storage, encrypted backups, and documented disposal that renders PHI unreadable.
Practical examples
- Badge readers and camera coverage at data centers; clean desk policy in clinical areas.
- Asset tags for laptops handling ePHI; wipe and verify before reuse; shred or degauss retired media.
Technical Safeguards Strategies
Access controls
Use unique user IDs, strong authentication (preferably MFA), session timeouts, and emergency access procedures. Segment networks to isolate systems with ePHI and apply least-privilege across applications and databases.
Audit controls and integrity
Enable detailed logging for authentication, access, changes, and data exports. Protect log integrity, retain logs per policy, and review regularly with automated alerting to spot anomalies and exfiltration attempts.
Encryption and Transmission Security
Encrypt ePHI at rest and in transit using modern protocols. Apply Transmission Security with TLS for web and APIs, secure email gateways or email encryption for PHI, and VPNs or zero-trust tunnels for remote access.
Additional best practices
- Use application-layer controls (field-level encryption or tokenization) for high-risk data.
- Employ endpoint protection, patch management, and configuration baselines; validate with regular vulnerability scanning and penetration tests.
Breach Notification Compliance
Risk assessment and safe harbor
Assess incidents against the Breach Notification Rule using factors such as the nature of PHI, who received it, whether it was actually viewed, and mitigation. If PHI was properly encrypted and the key was not compromised, the incident may not constitute a reportable breach.
Notification timelines and recipients
You must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. For breaches affecting 500 or more residents of a state or jurisdiction, notify prominent media and report to the federal regulator within 60 days; for fewer than 500 individuals, report to the regulator no later than 60 days after the end of the calendar year.
Business associate responsibilities
Business associates must notify the covered entity of a breach without unreasonable delay and within the BAA’s specified timeframe. Include all available details so the covered entity can complete required notifications.
Content of notices
Notices should describe what happened, the types of PHI involved, steps individuals can take to protect themselves, what you are doing to investigate and mitigate, and how to contact you for more information. Maintain documentation of the decision-making process and notices sent.
HIPAA Enforcement considerations
Noncompliance can trigger investigations, corrective action plans, and tiered civil penalties. Demonstrable compliance—policies, training, risk analysis, and timely breach response—reduces enforcement risk and supports defensibility.
Conclusion
By aligning Business Associate Agreements, Administrative Safeguards, Physical Access Controls, and Technical Safeguards, you meet essential HIPAA obligations for covered entities and business associates. Consistent risk analysis, strong Transmission Security, and disciplined breach notification practices create resilient protection for Protected Health Information.
FAQs
What entities are classified as covered entities under HIPAA?
Covered entities are health plans, health care clearinghouses, and health care providers that conduct standard electronic transactions (such as claims, eligibility checks, or referrals). If you transmit these transactions electronically, you are a covered entity and must protect PHI accordingly.
How do business associate agreements protect PHI?
Business Associate Agreements define permitted PHI uses and disclosures, require safeguards aligned with HIPAA, mandate incident and breach reporting, bind subcontractors, and ensure PHI is returned or destroyed at contract end. They translate HIPAA requirements into enforceable vendor obligations.
What are the key administrative safeguards required by HIPAA?
Key safeguards include a documented risk analysis and risk management plan, assigned security responsibility, workforce training and sanctions, access management, contingency planning (backup, disaster recovery, emergency operations), security incident procedures, and periodic evaluations of control effectiveness.
When must breach notifications be issued under HIPAA?
Individuals must be notified without unreasonable delay and no later than 60 calendar days after breach discovery. Breaches affecting 500 or more individuals require notification to the regulator and media within the same 60-day window; smaller breaches must be reported to the regulator within 60 days after the end of the calendar year.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.