HIPAA Business Associate Agreement Checklist: Core Clauses, Security, and Compliance Steps
A solid HIPAA Business Associate Agreement (BAA) turns regulatory duties into clear, testable obligations. Use this checklist to confirm your agreement covers core clauses, embeds strong security, defines breach notification steps, and enforces Privacy Rule Compliance across subcontractors through monitoring, documentation, and reporting.
Core Clauses in Business Associate Agreements
Permitted Uses and Disclosures
Specify the Permitted Uses and Disclosures of Protected Health Information (PHI) the business associate may perform on behalf of the covered entity. Tie each use to an underlying service and the minimum necessary standard to prevent scope creep.
Privacy Rule Compliance and Minimum Necessary
Require Privacy Rule Compliance where obligations are delegated (for example, responding to access, amendment, or accounting requests the covered entity assigns). Emphasize minimum necessary for all workforce roles and workflows.
Safeguards and Security Rule Alignment
Commit to Administrative Safeguards, physical controls, and technical controls reasonably and appropriately protecting ePHI, consistent with the HIPAA Security Rule. Reference encryption, access control, audit logging, and risk management at a minimum.
Breach and Security Incident Reporting
Define a duty to investigate and report any security incident, and to notify the covered entity of a breach of unsecured PHI without unreasonable delay and no later than 60 calendar days after discovery. Require incident facts, affected records, and mitigation steps.
Subcontractor Compliance
Flow down all BAA obligations to subcontractors that create, receive, maintain, or transmit PHI. Prohibit subcontractor access until a compliant agreement is executed and due diligence is completed.
Access, Amendment, and Accounting
Obligate assistance with individual right-of-access requests, amendments, and accounting of disclosures within agreed timelines. Require processes to find, export, and transmit designated record set data securely.
HHS Access, Audit Rights, and Termination
Authorize the U.S. Department of Health and Human Services to examine practices, books, and records related to PHI. Include covered-entity audit rights, cure periods, termination for cause, and return or destruction of PHI at contract end when feasible.
Additional Protective Terms
Address de-identification (if used), restrictions on sale or marketing of PHI, data retention limits, and documentation duties that support investigations, Risk Assessments, and continuous compliance.
Implementing Security Measures
Administrative Safeguards
Assign a security official, define policies, run periodic Risk Assessments, and maintain a risk management plan with prioritized remediation. Establish a sanction policy, workforce training, and vendor management procedures.
Physical Safeguards
Control facility access, secure workstations, and manage device and media handling from acquisition through disposal. Document chain of custody for portable media and use secure destruction methods.
Technical Safeguards
Enforce unique user IDs, strong authentication (preferably MFA), role-based access, encryption in transit and at rest, and robust audit controls. Implement automated log collection, alerting, and regular review to spot anomalous activity.
Risk Assessments and Ongoing Hardening
Perform formal Risk Assessments to identify threats, vulnerabilities, and likelihood/impact, then track remediation to closure. Include vulnerability scanning, patching, penetration testing, configuration baselines, and change control.
Incident Response Plan and Contingency
Maintain an Incident Response Plan that defines detection, triage, containment, eradication, recovery, and post-incident review. Support continuity with backups, disaster recovery procedures, and periodic tabletop exercises.
Breach Notification Procedures
Determining a Breach
Evaluate incidents against the Breach Notification Rule using a documented risk-of-compromise analysis: the nature of PHI, who accessed it, whether it was actually viewed or acquired, and the extent to which risks were mitigated (for example, rapid retrieval or encryption).
Timelines and Recipients
Notify the covered entity without unreasonable delay and no later than 60 days from discovery. The BAA should set shorter internal targets (for example, 24–72 hours for initial notice) and specify escalation paths and responsible roles.
Notification Content
Provide what happened (including dates), types of PHI involved, known or suspected unauthorized recipients, steps individuals should take, mitigation undertaken, and contact information. Keep an incident log to support follow-up and potential HHS inquiries.
Investigation and Mitigation
Preserve evidence, isolate affected systems, rotate credentials, and apply corrective controls. Document root cause, lessons learned, and updates to the Incident Response Plan and security program.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Compliance Steps for Business Associates
Practical Sequence
- Map PHI data flows, systems, vendors, and locations where PHI and ePHI reside.
- Assign privacy and security leadership and define decision rights.
- Conduct Risk Assessments and gap analyses; build a remediation roadmap.
- Publish policies, train your workforce, and test with real scenarios.
- Implement controls: access management, encryption, logging, backups, and monitoring.
- Stand up an Incident Response Plan and practice it with stakeholders.
- Execute subcontractor due diligence, BAAs, and onboarding checks.
- Measure, audit, and report status to the covered entity at agreed intervals.
Subcontractor Agreement Requirements
Flow-Down Terms and Due Diligence
Extend all relevant BAA obligations to subcontractors, including Permitted Uses and Disclosures, safeguards, breach reporting, and termination rights. Vet security maturity before granting access and repeat reviews annually.
Operational Controls
Define least-privilege access, encryption, secure development and change control, and incident coordination. Require prompt subcontractor breach notice and participation in joint investigations and remediation.
Subcontractor Compliance Monitoring
Use risk-based assessments, security questionnaires, evidence reviews (for example, policies, test results), and, when warranted, onsite or remote audits to validate Subcontractor Compliance.
Monitoring and Auditing Practices
Program-Level Monitoring
Track key indicators like training completion, patch timelines, vulnerability closure rates, and access reviews. Establish metrics that tie back to risks identified in Risk Assessments.
Technical Auditing
Enable detailed logging for authentication, privilege changes, data exports, and admin actions. Review alerts daily, perform periodic audit log analyses, and reconcile exceptions through documented change control.
Independent Validation
Schedule internal audits and periodic third-party assessments to test control effectiveness. Document findings, assign owners, and verify corrective actions to closure.
Documentation and Reporting Obligations
What to Document
Maintain BAAs, policies and procedures, workforce training records, Risk Assessments, remediation plans, system inventories, access reviews, incident reports, and results of audits and monitoring.
Retention and Availability
Retain required documentation for at least six years from creation or last effective date. Keep records organized and readily producible to the covered entity or HHS upon request.
Reporting Cadence
Agree on routine reports to the covered entity, such as training status, audit summaries, risk remediation progress, and incident metrics. Use consistent templates to reduce ambiguity and speed decision-making.
Conclusion
When your BAA codifies core clauses, your security program enforces Administrative Safeguards and technical controls, and your teams rehearse the Incident Response Plan and breach procedures, you convert obligations into everyday practice. Continuous monitoring, Subcontractor Compliance, and disciplined documentation keep you ready for audits and resilient in the face of new risks.
FAQs.
What are the mandatory clauses in a HIPAA Business Associate Agreement?
A BAA must define Permitted Uses and Disclosures; require safeguards aligned to the Security Rule; mandate breach and security incident reporting; impose Subcontractor Compliance via flow-down terms; support individual rights (access, amendment, accounting) when delegated; allow HHS access; and set termination, return or destruction of PHI, and documentation obligations.
How should a business associate report a breach of unsecured PHI?
Notify the covered entity without unreasonable delay and no later than 60 days after discovery. Provide incident facts, types of PHI, scope, mitigation steps, and contacts. Many BAAs add a faster initial notice (for example, 24–72 hours) and require ongoing updates until containment and remediation are complete.
What security measures are required to protect electronic PHI?
Implement Administrative Safeguards (policies, training, Risk Assessments, vendor management), physical protections (facility and device controls), and technical controls (MFA, least privilege, encryption, logging, and monitoring). Maintain backups, test recovery, and operate an Incident Response Plan to manage and learn from events.
How can organizations ensure subcontractor compliance with HIPAA?
Execute BAAs with full flow-down terms before access, conduct risk-based due diligence, verify controls with evidence and periodic audits, enforce least-privilege access, and require rapid subcontractor breach notice and cooperation. Track remediation through measurable plans and renew reviews on a defined cadence.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.