HIPAA Business Associate Agreement: Requirements, Examples, and Compliance Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Business Associate Agreement: Requirements, Examples, and Compliance Best Practices

Kevin Henry

HIPAA

August 08, 2024

8 minutes read
Share this article
HIPAA Business Associate Agreement: Requirements, Examples, and Compliance Best Practices

Definition of Business Associate

A business associate is any person or organization that performs functions or services for a HIPAA covered entity and, in doing so, creates, receives, maintains, or transmits protected health information (PHI). If you handle PHI on behalf of a provider, health plan, or another business associate, you are within HIPAA’s scope.

Business associates are directly responsible for protecting PHI, meeting the Security Rule for electronic PHI (ePHI), and following the permitted uses of PHI set in contract. Subcontractors that access PHI on a business associate’s behalf take on the same obligations and must sign downstream agreements mirroring the original terms.

Who is not a business associate

Vendors that act only as true conduits with no routine access or storage of PHI (for example, one-time routing without persistence) are generally not business associates. Likewise, parties handling properly de-identified data are outside HIPAA, though the de-identification process itself may require a BAA if PHI is used to achieve it.

Examples of Business Associates

Operational and administrative services

  • Medical billing companies, revenue cycle firms, and collection agencies.
  • Third-party administrators for health plans and benefits administration platforms.
  • Transcription, medical scribing, coding, and document management providers.

Technology and data services

  • Cloud service providers, data centers, backup vendors, email or messaging platforms that store ePHI.
  • Electronic health record and practice management vendors.
  • Analytics, AI, and reporting tools that process PHI for quality, utilization, or research support.

Professional and support services

  • Law firms, accounting firms, consulting and auditing firms engaged with PHI.
  • Shredding, scanning, mail-house, and printing vendors handling PHI documents.
  • Telehealth platforms, remote monitoring services, and patient engagement tools.

Requirement for Business Associate Agreement

You must execute a written Business Associate Agreement (BAA) before disclosing any PHI to a vendor that will create, receive, maintain, or transmit it. The BAA defines the vendor’s permitted uses of PHI, requires safeguards for PHI, and sets breach notification requirements and other core obligations.

When a BAA is required

  • If the service involves more than incidental contact with PHI or any persistent storage or processing of PHI.
  • When a business associate hires a subcontractor that touches PHI; subcontractor obligations must be flowed down in a signed agreement.
  • Not required for true conduits or for disclosures limited to de-identified information; however, validate that access truly excludes PHI.

Direct liability

Business associates are directly liable for compliance with the Security Rule, for using or disclosing PHI beyond what the BAA allows, and for timely reporting of incidents and breaches to the covered entity. Failure to meet these obligations can trigger investigations, penalties, and contractual remedies.

Essential Components of a BAA

A well-drafted HIPAA Business Associate Agreement should, at minimum, include the following elements to satisfy regulatory requirements and manage risk.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Permitted uses and disclosures: Define the specific purposes and strict permitted uses of PHI, require minimum necessary, and prohibit unauthorized secondary uses such as marketing or data resale.
  • Safeguards for PHI: Mandate administrative, physical, and technical controls for ePHI, including access management, encryption in transit and at rest where feasible, logging, vulnerability management, and workforce training.
  • Breach notification requirements: Require prompt reporting of security incidents and notification of breaches to the covered entity without unreasonable delay and within defined deadlines, including content, timelines, and cooperation duties.
  • Subcontractor obligations: Require business associate to obtain written, equivalent obligations from any subcontractor that will create, receive, maintain, or transmit PHI.
  • Access and individual rights support: Compel timely assistance with access, amendment, and accounting of disclosures requests, as applicable.
  • HHS audit access: Require the business associate to make relevant records and practices available for review by the Department of Health and Human Services to determine compliance.
  • Compliance monitoring: Grant audit rights, regular reporting, or attestation mechanisms, and require prompt remediation of identified gaps.
  • Termination clauses: Allow termination for cause upon material breach, require cure periods where appropriate, and address suspension of PHI sharing during unresolved violations.
  • Return or destruction of PHI: On termination, require return or secure destruction of PHI; if destruction is infeasible, extend all protections and limit further use.
  • Incident cooperation and forensics: Define evidence preservation, root-cause analysis, corrective action plans, and communication protocols.
  • Insurance and indemnification: Set coverage expectations and indemnity for violations or data incidents, aligned with the vendor’s risk profile.

Compliance Best Practices

Governance and inventory

Maintain a current inventory of all vendors and subcontractors that touch PHI, including data flow maps showing where PHI is created, stored, and transmitted. Assign executive ownership and define roles for procurement, privacy, security, and legal.

Due diligence and onboarding

Screen vendors before contract execution using questionnaires, evidence reviews, and risk ratings. Confirm security certifications, test key controls, and verify that services align with permitted uses of PHI defined in the BAA.

Contract lifecycle and compliance monitoring

Centralize BAAs, track renewal dates, and monitor contractual obligations. Use periodic attestations, control testing, and issue tracking to demonstrate ongoing compliance monitoring and prompt remediation.

Technical safeguards for ePHI

Enforce least privilege, multi-factor authentication, encryption, endpoint protection, log collection, and continuous monitoring. Require secure software development practices, vulnerability scans, and timely patching for systems that handle ePHI.

Workforce and training

Ensure vendor and internal teams complete role-based HIPAA and security training. Include confidentiality agreements, background checks for sensitive roles, and clear sanctions for violations.

Change and offboarding controls

Reassess risk when services or data scope change. On exit, verify PHI return or destruction, revoke access, and collect attestations that obligations such as subcontractor flow-downs were honored.

Risk Management Strategies

Risk assessment and segmentation

Perform a formal risk analysis for each vendor relationship and segment vendors by PHI volume, data criticality, and access level. Apply stricter controls and oversight to high-risk categories.

Zero trust and data minimization

Limit network trust, isolate vendor systems, and use just-in-time access. Minimize PHI shared with vendors to the minimum necessary and prefer de-identified or aggregated datasets when feasible.

Incident readiness and response

Build joint incident response procedures with defined service-level expectations for detection, notification, and containment. Conduct tabletop exercises and ensure forensics and legal support can meet breach notification requirements.

Resilience and continuity

Require tested backups, disaster recovery objectives, and redundancy appropriate to clinical or operational impact. Validate that vendors can restore ePHI quickly without compromising integrity.

Continuous oversight and metrics

Track metrics such as time-to-notify, vulnerability remediation cycles, audit findings, and training completion. Use these to drive remediation plans and to inform executive reporting.

Subcontractor chain visibility

Map downstream providers, require disclosure of subcontractor obligations, and ensure contracts permit you to review evidence of their controls. Escalate controls as the chain lengthens.

Enforcement and Penalties

Investigations and audits

HHS may request documentation and systems evidence under its audit and investigation authority. Your BAA should ensure HHS audit access and that vendors can quickly produce policies, logs, and reports demonstrating compliance.

Civil penalties and corrective action

Violations can lead to tiered civil monetary penalties that scale with culpability, from lack of knowledge to willful neglect, plus mandated corrective action plans and multi-year monitoring. Settlements often include reporting duties and ongoing compliance attestations.

Contractual remedies

Separate from regulatory exposure, BAAs typically include termination clauses, suspension of data sharing, indemnification, and cost recovery for incident response and notification. Clear remedies encourage rapid correction and transparent cooperation.

State and other enforcement

State attorneys general and consumer protection authorities may pursue actions based on privacy, security, or deceptive practices. Contractual and reputational consequences can exceed regulatory fines, especially after large-scale breaches.

Conclusion

A strong HIPAA Business Associate Agreement translates legal requirements into operational controls: narrow the permitted uses of PHI, mandate safeguards for PHI, ensure subcontractor obligations, define breach notification requirements, preserve HHS audit access, and enforce termination clauses and monitoring. When paired with disciplined oversight, BAAs reduce risk and help you demonstrate accountable, durable compliance.

FAQs

What is a business associate under HIPAA?

A business associate is any third party (including subcontractors) that creates, receives, maintains, or transmits PHI for a covered entity’s functions or services. They must protect PHI, use it only as permitted, and meet HIPAA’s security and privacy obligations defined in the BAA.

When is a Business Associate Agreement required?

A BAA is required before a vendor handles PHI in a non-incidental way—whether storing, processing, analyzing, or accessing it. It is not required for true conduits or for work limited to de-identified data, but you must verify that PHI is not accessible in those scenarios.

What are the key elements of a HIPAA BAA?

Core elements include permitted uses of PHI; safeguards for PHI; breach notification requirements; subcontractor obligations; support for individual rights; HHS audit access; compliance monitoring and audit rights; termination clauses; and PHI return or destruction, plus incident cooperation and appropriate insurance or indemnification.

How can organizations ensure ongoing BAA compliance?

Maintain a vendor inventory and data maps, perform due diligence and periodic reviews, test security controls, require attestations, monitor metrics, and rehearse incident response. Update BAAs as services or data scope change, and verify downstream compliance among subcontractors.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles