HIPAA Business Associate Agreement Requirements: What Your BAA Must Include

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Business Associate Agreement Requirements: What Your BAA Must Include

Kevin Henry

HIPAA

February 24, 2024

8 minutes read
Share this article
HIPAA Business Associate Agreement Requirements: What Your BAA Must Include

Your Business Associate Agreement (BAA) is the contract that defines how a vendor may handle protected health information (PHI) on your behalf. Getting the details right protects patients, reduces legal exposure, and demonstrates Patient Rights Compliance to regulators.

This guide breaks down the HIPAA Business Associate Agreement requirements your contract must cover. For each clause, you will see what to include, why it matters, and how to operationalize it without slowing down your workflows.

Permitted Uses and Disclosures

Your BAA must precisely describe when the business associate (BA) may use or disclose PHI and apply the Minimum Necessary Standard to each purpose. Clear PHI Disclosure Restrictions prevent overbroad use while preserving operational needs.

Allowable purposes

  • Provide the specified services to the covered entity (CE) and only as necessary to perform those services.
  • Use for proper management and administration or legal responsibilities, with safeguards and downstream confidentiality obligations.
  • Disclose as required by law, limited to the minimum necessary and documented.
  • Data aggregation for the CE’s healthcare operations, if expressly authorized.
  • Creation of de-identified data using HIPAA-approved methods; prohibit re-identification unless authorized.

State how the BA will determine and document minimum necessary access, including role-based permissions and approval workflows.

Prohibited Uses and Disclosures

List specific prohibitions to reinforce PHI Disclosure Restrictions and prevent scope creep.

  • No use or disclosure not expressly permitted by the BAA or required by law.
  • No sale of PHI or marketing/paid communications without valid individual authorization.
  • No combining PHI with other data for the BA’s independent product development or analytics unless the BAA allows it and minimum necessary is maintained.
  • No re-identification of de-identified data or attempts to infer identities without written authorization.
  • No further disclosure to third parties except to approved subcontractors bound by equivalent terms.

Safeguards for PHI Protection

Your BAA should require administrative, physical, and technical safeguards consistent with the HIPAA Security Rule for ePHI and reasonable safeguards for all PHI. Specify outcomes and minimum controls to reduce ambiguity.

Administrative safeguards

  • Formal risk analysis and documented risk management plan, reviewed at least annually.
  • Workforce screening, training, and sanction policies aligned to job roles.
  • Vendor and subcontractor oversight, including security due diligence and contract flow-down.
  • Incident response, disaster recovery, and business continuity plans with tested backups.

Technical safeguards

  • Encryption in transit and at rest, strong authentication (e.g., MFA), and role-based access control.
  • Audit logging, log retention, and regular review; alerting for anomalous access.
  • Vulnerability management, timely patching, secure software development practices, and change control.
  • Data loss prevention for email, endpoints, and cloud storage; secure key management.

Physical safeguards

  • Facility access controls, device/media controls, and secure destruction procedures.
  • Mobile/BYOD restrictions, screen privacy, and secure remote work practices.

Reference the Minimum Necessary Standard in access design, ensuring users and systems can only access what is needed for assigned tasks.

Breach Reporting Obligations

Define what the BA must report and by when. Under HIPAA’s Breach Notification Requirements, notifications must occur without unreasonable delay and no later than 60 calendar days after discovery. Your BAA should set a shorter, specific window (e.g., 24–72 hours) for initial notice to the CE.

What to include in a breach or incident report

  • Summary of what happened, discovery date, and whether the incident is ongoing.
  • Types of PHI involved, number of affected individuals, and systems/data touched.
  • Mitigation steps taken/to be taken and likelihood of risk to individuals.
  • Planned notifications to individuals, media, and HHS (CE leads these unless the BAA assigns certain tasks to the BA).
  • Point of contact and timeline for follow-up reports and forensic findings.

Require prompt reporting of security incidents that may not meet the definition of a breach, plus cooperation with investigations, evidence preservation, and remediation planning.

Compliance with Patients' Rights

The BA must help the CE meet Patient Rights Compliance obligations under the Privacy Rule. Your BAA should spell out how requests are routed, verified, and fulfilled within HIPAA timelines.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Access: Provide designated record set PHI to the CE promptly to enable response within 30 days (or faster if state law is stricter).
  • Amendment: Incorporate approved amendments and supply them to downstream recipients as directed by the CE.
  • Accounting of disclosures: Maintain and provide logs of non-routine disclosures for the CE’s accounting obligations.
  • Restrictions and confidential communications: Honor CE-directed restrictions and alternate address/communication preferences.

HHS Audit Access Provisions

Include a clause acknowledging HHS Audit Authority. The BA must make its internal practices, books, and records relating to PHI available to the Secretary of Health and Human Services for determining compliance.

  • Define scope to PHI-related records while preserving other confidential information unrelated to HIPAA compliance.
  • Set procedures for secure, timely access, including points of contact and acceptable formats.
  • Require cooperation during investigations and corrective action plan implementation.

Return or Destruction of PHI

On termination or upon CE request, the BA must return or destroy PHI within a defined timeframe. If return or destruction is infeasible (e.g., legal holds, immutable backups), the BA must continue to protect PHI and limit use to purposes that make retention necessary.

  • Detail acceptable destruction methods and certification of destruction.
  • Specify export formats, delivery method, and verification steps for returning PHI.
  • Require purge from active systems and documented timelines for deletion from backups where feasible.

Subcontractor Obligations

Any subcontractor that creates, receives, maintains, or transmits PHI for the BA must be bound by written terms that impose the same restrictions and conditions as the BAA.

  • Flow-down BAA with equivalent privacy, security, and Breach Notification Requirements.
  • Pre-contract security due diligence and ongoing monitoring proportional to risk.
  • Right to audit/assess subcontractors and require remediation within defined cure periods.
  • Immediate breach and incident reporting from subcontractors to the BA and then to the CE.

Termination Rights

Your BAA should empower the CE to terminate for a material breach that is not cured within a stated period, and allow immediate termination if cure is not possible. The BA should have parallel rights if the CE’s actions prevent compliance.

  • Define “material breach,” cure periods, and notice mechanics.
  • Specify transition assistance, including data return and secure wind-down activities.
  • State survival of obligations for any PHI retained due to infeasibility of destruction.

Enforcement and Liability Clauses

Allocate risk clearly so both parties understand remedies and responsibilities. Strong Indemnification Obligations and insurance requirements reduce uncertainty after an incident.

  • Indemnification for third-party claims, government investigations, and reasonable breach response costs (forensics, notifications, credit monitoring, call center).
  • Insurance minimums (e.g., cyber/privacy liability) with evidence of coverage and notice of material changes.
  • Limitations of liability and carve-outs, as negotiated, for willful misconduct or violation of law.
  • Injunctive relief, choice of law, venue, and dispute resolution procedures.
  • Documentation retention requirements to support enforcement and audits.

Conclusion

A compliant BAA aligns permitted purposes with strict PHI Disclosure Restrictions, enforces Security Rule safeguards, defines Breach Notification Requirements, protects patient rights, and assigns fair, enforceable liability. Use the clauses above to translate legal duties into operational controls your teams and vendors can follow with confidence.

FAQs

What are the essential elements of a HIPAA Business Associate Agreement?

At minimum, your BAA should define permitted and prohibited uses; require Security Rule–aligned safeguards; set Breach Notification Requirements and timelines; detail Patient Rights Compliance support; acknowledge HHS Audit Authority; require PHI return/destruction; impose subcontractor flow-down terms; specify termination rights for material breach; and include enforcement provisions such as Indemnification Obligations, insurance, and limits of liability. Make the Minimum Necessary Standard explicit across access and disclosures.

How often must a BAA be reviewed or updated?

HIPAA does not mandate a fixed schedule, but best practice is to review annually and update upon triggers: service changes, new subcontractors, significant security changes, regulatory updates, audit findings, or after any incident. Treat it as a living document tied to your risk management program.

What are the consequences of not having a proper BAA?

Both the covered entity and business associate can face regulatory enforcement, civil monetary penalties, corrective action plans, contract breaches, litigation, and reputational harm. Operationally, you may also incur unplanned breach response costs and lose the ability to exchange PHI until a compliant BAA is executed.

How should breaches be reported under a BAA?

Require immediate internal escalation and initial notice to the CE within a set window (e.g., 24–72 hours), followed by detailed written reports. Include what happened, data types, affected individuals, containment and mitigation steps, and planned notifications. Cooperate on investigation, forensics, and regulatory reporting, and maintain ongoing status updates until closure.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles