HIPAA Business Associate Agreement Requirements: Complete Guide for Covered Entities

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Business Associate Agreement Requirements: Complete Guide for Covered Entities

Kevin Henry

HIPAA

August 15, 2024

8 minutes read
Share this article
HIPAA Business Associate Agreement Requirements: Complete Guide for Covered Entities

Definition of Business Associate

A business associate (BA) is any person or organization that creates, receives, maintains, or transmits Protected Health Information (PHI) to perform services or functions for you as a covered entity. The BA is not part of your workforce and must handle PHI under specific contractual obligations that align with HIPAA.

Common examples include cloud service providers, EHR and billing vendors, claims processors, data destruction firms, consultants, health information exchanges, transcription services, analytics vendors, and managed service providers. Subcontractors that handle PHI on behalf of your BA are also considered business associates and must meet the same standards.

Who is not a BA? Your employees and volunteers acting within the scope of their duties, and narrow “conduits” that only transmit PHI without persistent storage. The conduit exception is limited; most data hosting or storage services qualify as business associates.

Key takeaways

  • Anyone outside your workforce that touches PHI for your operations is likely a BA.
  • Subcontractor compliance is required when downstream vendors access PHI.
  • The BAA makes Privacy Rule compliance and Security Rule safeguards enforceable.

Requirement for Business Associate Agreement

You must have a written Business Associate Agreement (BAA) in place before sharing PHI with a vendor that performs functions or services on your behalf. The BAA documents the BA’s responsibilities, binds both parties to HIPAA’s requirements, and establishes remedies if obligations are not met.

A BAA is required when a vendor will create, receive, maintain, or transmit PHI for services such as claims processing, data hosting, patient communications, or IT support. It is generally not required for disclosures solely for treatment by another provider, or for certain disclosures required by law, unless that entity is performing functions as your BA.

What your BAA should establish

  • Scope of permitted services and permitted uses and disclosures of PHI.
  • Security Rule safeguards, privacy practices, and breach notification requirements.
  • Subcontractor compliance, audit/assessment rights, and documentation duties.
  • Termination provisions, including return or destruction of PHI and survival clauses.
  • Record retention for at least six years for required documentation.

Permitted Uses and Disclosures of PHI

Your BAA must clearly define how the BA may use and disclose PHI. A BA may use PHI to perform contracted services for you, for its own proper management and administration, to meet legal obligations, and to provide data aggregation services for your health care operations.

Minimum necessary should guide every use and disclosure. Your agreement should prohibit uses beyond the contract, including marketing or the sale of PHI without an individual’s valid authorization, and restrict re-identification or secondary use unless expressly allowed.

Typical permitted activities

  • Service delivery aligned to your instructions and the BAA.
  • De-identification of PHI or creation of limited data sets for approved purposes.
  • Disclosures required by law, subject to notice and safeguards.

Prohibited or restricted activities

  • Using PHI for the BA’s independent purposes not specified in the BAA.
  • Marketing or sale of PHI without authorization.
  • Any disclosure that violates Privacy Rule compliance or exceeds minimum necessary.

Safeguards and Security Implementation

BAAs must require BAs to implement Security Rule safeguards—administrative, physical, and technical—to protect electronic PHI and to maintain privacy controls for all PHI. The agreement should also require written policies, workforce training, and ongoing risk management.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Administrative safeguards

  • Documented risk analysis and risk management plan updated regularly.
  • Designated security official, workforce training, and sanction policy.
  • Vendor management for subcontractors, including BAAs and due diligence.
  • Incident response and business continuity/disaster recovery planning.

Physical safeguards

  • Facility access controls and visitor management.
  • Workstation and device security, secure storage, and media disposal.
  • Policies for offsite work, remote access, and equipment reuse or destruction.

Technical safeguards

  • Role-based access, unique user IDs, and multi-factor authentication where feasible.
  • Encryption in transit and at rest (addressable), or documented compensating controls.
  • Audit logging, integrity monitoring, alerting, and regular review of access logs.
  • Transmission security, automatic logoff, and endpoint protection.

Privacy controls that complement security

  • Minimum necessary standard built into workflows and data-sharing rules.
  • Data retention and disposal schedules consistent with contractual obligations.
  • Documented procedures for de-identification and re-identification controls.

Reporting Obligations and Breach Notification

Your BAA must set out how the BA reports security incidents and privacy events, and it must align with HIPAA’s Breach Notification Requirements. The BA should promptly report suspected incidents, investigate, and risk-assess to determine if a breach occurred.

For confirmed breaches, require written notice to you without unreasonable delay and no later than 60 calendar days from discovery. The notice should include a description of the incident, the types of PHI involved, dates of occurrence and discovery, number of affected individuals, mitigation steps taken, and a point of contact.

Practical contract tips

  • Set short internal timelines for initial alerts (for example, 24–72 hours) so you can meet external deadlines.
  • Define “security incident” reporting expectations, distinguishing attempted from successful events.
  • Clarify who handles individual and media notifications and who bears costs.
  • Require subcontractors to notify the BA promptly so you receive timely notice.

Access to PHI and Individual Rights

Your BAA should require the BA to make PHI available to you to satisfy individual rights. These include the right of access to records, the right to request amendments, and the right to an accounting of disclosures, within timeframes that allow you to meet HIPAA deadlines.

For ePHI, require the BA to provide information in the requested form and format if readily producible, or in a readable alternative if not. Specify practical turnaround targets (for example, 5–10 business days) so you can meet statutory windows for access and other requests.

Operational expectations

  • Maintain records of non-routine disclosures to support accounting requests.
  • Cooperate in amendments by appending or providing corrected information.
  • Apply minimum necessary to all disclosures in support of these rights.

Compliance Monitoring and Agreement Termination

While HIPAA does not require you to oversee a BA’s daily operations, your BAA should give you reasonable assurance of compliance and tools to respond if problems arise. Pre-contract due diligence, security questionnaires, evidence of Security Rule safeguards, and right-to-audit clauses are common mechanisms.

Include for-cause termination provisions if you know of a pattern of violation and the BA does not cure it within a specified period. On termination, require the BA to return or securely destroy PHI; if destruction is infeasible, the BA must continue to protect PHI and limit its use to those purposes that make retention necessary.

What strong termination provisions cover

  • Defined cure periods and the right to terminate for cause if violations persist.
  • Return or destruction of PHI within a set timeframe, including at subcontractors.
  • Survival of confidentiality, restrictions on retained PHI, and cooperation in transition.
  • Documentation retention for at least six years to demonstrate compliance.

Conclusion

Effective HIPAA Business Associate Agreement requirements hinge on clarity: define permitted uses, mandate Security Rule safeguards, set precise breach notification and access obligations, enforce subcontractor compliance, and include practical termination provisions. With these elements in place, you strengthen Privacy Rule compliance and reduce risk across your vendor ecosystem.

FAQs

What is a HIPAA Business Associate Agreement?

A HIPAA Business Associate Agreement is a legally binding contract between a covered entity and a vendor that handles PHI on its behalf. It defines permitted uses and disclosures, requires Security Rule safeguards and Privacy Rule compliance, sets breach notification requirements, and obligates subcontractor compliance and documentation.

Why is a BAA required for covered entities?

HIPAA requires a BAA to ensure that any vendor creating, receiving, maintaining, or transmitting PHI for you protects that information. The BAA translates regulatory duties into contractual obligations, giving you remedies if the BA fails to safeguard PHI or violates privacy requirements.

What safeguards must a business associate implement?

A BA must implement administrative, physical, and technical Security Rule safeguards, including risk analysis, training, access controls, audit logging, and transmission security. The BA should also apply minimum necessary, manage data retention and disposal, and ensure subcontractors implement equivalent protections.

When must a business associate report a PHI breach?

The BA must notify you without unreasonable delay and no later than 60 calendar days after discovering a breach. Your BAA should require rapid initial notice (for example, within 24–72 hours) plus a detailed written report with incident facts, affected data, mitigation steps, and a contact for follow-up.

How should PHI be handled upon termination of a BAA?

Upon termination, the BA must return or securely destroy PHI it maintains for you. If destruction is infeasible, the BA must continue to protect the PHI, restrict its use to the reasons retention is necessary, and ensure all subcontractors do the same—all as specified in your termination provisions.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles