HIPAA Business Associate Agreement Checklist: Core Clauses, Security, and Compliance Steps

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Business Associate Agreement Checklist: Core Clauses, Security, and Compliance Steps

Kevin Henry

HIPAA

August 15, 2024

7 minutes read
Share this article
HIPAA Business Associate Agreement Checklist: Core Clauses, Security, and Compliance Steps

A solid HIPAA Business Associate Agreement (BAA) turns regulatory duties into clear, testable obligations. Use this checklist to confirm your agreement covers core clauses, embeds strong security, defines breach notification steps, and enforces Privacy Rule Compliance across subcontractors through monitoring, documentation, and reporting.

Core Clauses in Business Associate Agreements

Permitted Uses and Disclosures

Specify the Permitted Uses and Disclosures of Protected Health Information (PHI) the business associate may perform on behalf of the covered entity. Tie each use to an underlying service and the minimum necessary standard to prevent scope creep.

Privacy Rule Compliance and Minimum Necessary

Require Privacy Rule Compliance where obligations are delegated (for example, responding to access, amendment, or accounting requests the covered entity assigns). Emphasize minimum necessary for all workforce roles and workflows.

Safeguards and Security Rule Alignment

Commit to Administrative Safeguards, physical controls, and technical controls reasonably and appropriately protecting ePHI, consistent with the HIPAA Security Rule. Reference encryption, access control, audit logging, and risk management at a minimum.

Breach and Security Incident Reporting

Define a duty to investigate and report any security incident, and to notify the covered entity of a breach of unsecured PHI without unreasonable delay and no later than 60 calendar days after discovery. Require incident facts, affected records, and mitigation steps.

Subcontractor Compliance

Flow down all BAA obligations to subcontractors that create, receive, maintain, or transmit PHI. Prohibit subcontractor access until a compliant agreement is executed and due diligence is completed.

Access, Amendment, and Accounting

Obligate assistance with individual right-of-access requests, amendments, and accounting of disclosures within agreed timelines. Require processes to find, export, and transmit designated record set data securely.

HHS Access, Audit Rights, and Termination

Authorize the U.S. Department of Health and Human Services to examine practices, books, and records related to PHI. Include covered-entity audit rights, cure periods, termination for cause, and return or destruction of PHI at contract end when feasible.

Additional Protective Terms

Address de-identification (if used), restrictions on sale or marketing of PHI, data retention limits, and documentation duties that support investigations, Risk Assessments, and continuous compliance.

Implementing Security Measures

Administrative Safeguards

Assign a security official, define policies, run periodic Risk Assessments, and maintain a risk management plan with prioritized remediation. Establish a sanction policy, workforce training, and vendor management procedures.

Physical Safeguards

Control facility access, secure workstations, and manage device and media handling from acquisition through disposal. Document chain of custody for portable media and use secure destruction methods.

Technical Safeguards

Enforce unique user IDs, strong authentication (preferably MFA), role-based access, encryption in transit and at rest, and robust audit controls. Implement automated log collection, alerting, and regular review to spot anomalous activity.

Risk Assessments and Ongoing Hardening

Perform formal Risk Assessments to identify threats, vulnerabilities, and likelihood/impact, then track remediation to closure. Include vulnerability scanning, patching, penetration testing, configuration baselines, and change control.

Incident Response Plan and Contingency

Maintain an Incident Response Plan that defines detection, triage, containment, eradication, recovery, and post-incident review. Support continuity with backups, disaster recovery procedures, and periodic tabletop exercises.

Breach Notification Procedures

Determining a Breach

Evaluate incidents against the Breach Notification Rule using a documented risk-of-compromise analysis: the nature of PHI, who accessed it, whether it was actually viewed or acquired, and the extent to which risks were mitigated (for example, rapid retrieval or encryption).

Timelines and Recipients

Notify the covered entity without unreasonable delay and no later than 60 days from discovery. The BAA should set shorter internal targets (for example, 24–72 hours for initial notice) and specify escalation paths and responsible roles.

Notification Content

Provide what happened (including dates), types of PHI involved, known or suspected unauthorized recipients, steps individuals should take, mitigation undertaken, and contact information. Keep an incident log to support follow-up and potential HHS inquiries.

Investigation and Mitigation

Preserve evidence, isolate affected systems, rotate credentials, and apply corrective controls. Document root cause, lessons learned, and updates to the Incident Response Plan and security program.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Compliance Steps for Business Associates

Practical Sequence

  • Map PHI data flows, systems, vendors, and locations where PHI and ePHI reside.
  • Assign privacy and security leadership and define decision rights.
  • Conduct Risk Assessments and gap analyses; build a remediation roadmap.
  • Publish policies, train your workforce, and test with real scenarios.
  • Implement controls: access management, encryption, logging, backups, and monitoring.
  • Stand up an Incident Response Plan and practice it with stakeholders.
  • Execute subcontractor due diligence, BAAs, and onboarding checks.
  • Measure, audit, and report status to the covered entity at agreed intervals.

Subcontractor Agreement Requirements

Flow-Down Terms and Due Diligence

Extend all relevant BAA obligations to subcontractors, including Permitted Uses and Disclosures, safeguards, breach reporting, and termination rights. Vet security maturity before granting access and repeat reviews annually.

Operational Controls

Define least-privilege access, encryption, secure development and change control, and incident coordination. Require prompt subcontractor breach notice and participation in joint investigations and remediation.

Subcontractor Compliance Monitoring

Use risk-based assessments, security questionnaires, evidence reviews (for example, policies, test results), and, when warranted, onsite or remote audits to validate Subcontractor Compliance.

Monitoring and Auditing Practices

Program-Level Monitoring

Track key indicators like training completion, patch timelines, vulnerability closure rates, and access reviews. Establish metrics that tie back to risks identified in Risk Assessments.

Technical Auditing

Enable detailed logging for authentication, privilege changes, data exports, and admin actions. Review alerts daily, perform periodic audit log analyses, and reconcile exceptions through documented change control.

Independent Validation

Schedule internal audits and periodic third-party assessments to test control effectiveness. Document findings, assign owners, and verify corrective actions to closure.

Documentation and Reporting Obligations

What to Document

Maintain BAAs, policies and procedures, workforce training records, Risk Assessments, remediation plans, system inventories, access reviews, incident reports, and results of audits and monitoring.

Retention and Availability

Retain required documentation for at least six years from creation or last effective date. Keep records organized and readily producible to the covered entity or HHS upon request.

Reporting Cadence

Agree on routine reports to the covered entity, such as training status, audit summaries, risk remediation progress, and incident metrics. Use consistent templates to reduce ambiguity and speed decision-making.

Conclusion

When your BAA codifies core clauses, your security program enforces Administrative Safeguards and technical controls, and your teams rehearse the Incident Response Plan and breach procedures, you convert obligations into everyday practice. Continuous monitoring, Subcontractor Compliance, and disciplined documentation keep you ready for audits and resilient in the face of new risks.

FAQs.

What are the mandatory clauses in a HIPAA Business Associate Agreement?

A BAA must define Permitted Uses and Disclosures; require safeguards aligned to the Security Rule; mandate breach and security incident reporting; impose Subcontractor Compliance via flow-down terms; support individual rights (access, amendment, accounting) when delegated; allow HHS access; and set termination, return or destruction of PHI, and documentation obligations.

How should a business associate report a breach of unsecured PHI?

Notify the covered entity without unreasonable delay and no later than 60 days after discovery. Provide incident facts, types of PHI, scope, mitigation steps, and contacts. Many BAAs add a faster initial notice (for example, 24–72 hours) and require ongoing updates until containment and remediation are complete.

What security measures are required to protect electronic PHI?

Implement Administrative Safeguards (policies, training, Risk Assessments, vendor management), physical protections (facility and device controls), and technical controls (MFA, least privilege, encryption, logging, and monitoring). Maintain backups, test recovery, and operate an Incident Response Plan to manage and learn from events.

How can organizations ensure subcontractor compliance with HIPAA?

Execute BAAs with full flow-down terms before access, conduct risk-based due diligence, verify controls with evidence and periodic audits, enforce least-privilege access, and require rapid subcontractor breach notice and cooperation. Track remediation through measurable plans and renew reviews on a defined cadence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles