HIPAA Business Associate Requirements and Risks: Compliance Checklist for Organizations

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Business Associate Requirements and Risks: Compliance Checklist for Organizations

Kevin Henry

HIPAA

August 12, 2024

7 minutes read
Share this article
HIPAA Business Associate Requirements and Risks: Compliance Checklist for Organizations

If you create, receive, maintain, or transmit Protected Health Information (PHI) for a covered entity, you are a HIPAA business associate. Use this compliance checklist to operationalize the HIPAA Security Rule and Breach Notification Rule with practical Administrative Safeguards and Technical Safeguards that reduce risk while supporting your services.

Business Associate Agreements

A Business Associate Agreement (BAA) is the contract that permits your access to PHI and binds you to HIPAA obligations. It must define permitted uses and disclosures, required safeguards, reporting duties, flow-down terms for subcontractors, and what happens to PHI at contract end. Execute the BAA before any PHI is exchanged.

Checklist

  • Sign a Business Associate Agreement before handling PHI; ensure scope covers all services and data flows.
  • Define permitted uses/disclosures and enforce the minimum necessary standard for PHI.
  • Commit to implementing safeguards aligned to the HIPAA Security Rule (administrative, physical, and technical).
  • Specify security incident and breach reporting timelines (without unreasonable delay, and no later than 60 days from discovery unless a shorter period is agreed).
  • Clarify responsibilities under the Breach Notification Rule, including content and method of notices if delegated.
  • Require subcontractor “downstream” BAAs with the same restrictions and conditions that apply to you.
  • Include rights to audit/assess, documentation retention (at least six years), and termination with return or destruction of PHI.
  • Address encryption/key management, data location, transmission methods, and secure disposal obligations.

Risk Analysis and Management

You must perform an organization-wide risk analysis and run a Risk Management Framework to identify threats and vulnerabilities to ePHI, evaluate likelihood and impact, and implement appropriate controls. Treat risk management as a living program, not a one-time task.

Checklist

  • Inventory assets that create, receive, maintain, or transmit ePHI; map data flows and storage locations.
  • Conduct a formal risk analysis; rate risks and record them in a risk register with owners and due dates.
  • Select risk treatments (avoid, mitigate, transfer, accept) and document rationale and compensating controls.
  • Perform vulnerability scanning, patch management, and change-driven risk reviews.
  • Reassess at least annually and after material changes (new systems, mergers, cloud migrations, incidents).
  • Report risk metrics to leadership and the covered entity when contractually required.

Policies and Procedures

Written, enforceable policies and procedures operationalize Administrative Safeguards and support consistent behavior across teams. Keep documentation current, train to it, and retain it for at least six years from creation or last effective date.

Checklist

  • Establish access management, authentication, and authorization policies (role-based access, least privilege, periodic reviews).
  • Adopt data classification and handling standards for PHI across storage, transmission, and disposal.
  • Set encryption requirements for ePHI in transit and at rest; if not implemented, document the risk-based justification and alternatives.
  • Define BYOD/remote work, workstation security, and mobile device controls.
  • Document change management, secure software development, and third-party management procedures.
  • Maintain sanction policies for violations and a process for policy exceptions and approvals.
  • Include contingency planning: backups, disaster recovery, and emergency mode operations.

Training and Awareness

Train your workforce to recognize PHI, follow policy, and respond to security events. Provide role-based, practical training at hire and periodically thereafter, and reinforce it with awareness activities to reduce human risk.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Checklist

  • Deliver onboarding and annual HIPAA training with emphasis on the HIPAA Security Rule and privacy basics.
  • Run role-specific training for engineers, support, sales, and executives handling PHI.
  • Conduct phishing and social engineering simulations with targeted coaching.
  • Track attendance, comprehension, and acknowledgments; retain records for at least six years.
  • Provide just-in-time reminders, job aids, and update training after major policy or system changes.

Incident Response and Reporting

Prepare for security incidents with a tested plan that enables rapid detection, containment, investigation, and recovery. Evaluate incidents for breach status under the Breach Notification Rule and meet contractual and regulatory timelines.

Checklist

  • Define incident categories, escalation paths, and 24/7 reporting channels for employees and vendors.
  • Capture logs and evidence; preserve chain of custody for forensic analysis.
  • Use the four-factor risk assessment (nature/extent of PHI, unauthorized person, whether PHI was actually acquired/viewed, and mitigation) to determine breach likelihood.
  • Notify the covered entity without unreasonable delay and no later than 60 days after discovery, including scope, types of PHI, affected individuals (if known), and mitigation steps.
  • Coordinate with the covered entity on individual, regulator, and media notifications if delegated by the BAA.
  • Perform post-incident reviews; update controls, playbooks, and training based on lessons learned.

Subcontractor Compliance

Any subcontractor that creates, receives, maintains, or transmits PHI for you is also a business associate. You must ensure they implement equivalent safeguards and sign a downstream BAA that mirrors your obligations.

Checklist

  • Perform due diligence (security questionnaires, certifications, penetration testing summaries) before onboarding.
  • Execute downstream BAAs with clear security, reporting, and breach-notice requirements.
  • Limit PHI sharing to the minimum necessary; enforce least-privilege access and data segmentation.
  • Monitor performance with periodic assessments, SLAs, and the right to audit when appropriate.
  • Control data location, encryption, subcontracting chains, and termination/return or destruction of PHI.
  • Flow down incident response expectations and require prompt notification of suspected or confirmed incidents.

Security Safeguards

Implement layered controls that balance usability and risk reduction. Align your program with Administrative Safeguards and Technical Safeguards, and include physical controls to protect facilities and devices handling ePHI.

Administrative Safeguards

  • Security management process: risk analysis, risk management, and sanction policy.
  • Workforce security and information access management with periodic access reviews.
  • Security awareness and training, including phishing defense and secure data handling.
  • Security incident procedures and a tested contingency plan (backups, disaster recovery, emergency mode operations).
  • Evaluation and continuous improvement; governance with documented roles and accountability.

Technical Safeguards

  • Access controls: unique IDs, multifactor authentication, session timeouts, and least privilege.
  • Encryption of ePHI in transit and at rest; robust key management and segregation of duties.
  • Audit controls: centralized logging, tamper resistance, and regular log review.
  • Integrity controls: hashing, code signing, and configuration baselines.
  • Transmission security: TLS for network traffic, secure email and file transfer, and data loss prevention.
  • Endpoint and cloud protections: hardening, EDR, vulnerability management, and network segmentation.

Physical Safeguards

  • Facility access controls, visitor management, and environmental protections.
  • Workstation security and screen privacy; secure locations for servers and networking gear.
  • Device and media controls: inventory, encryption, reuse procedures, and certified destruction.

Conclusion

Compliance for business associates hinges on a solid BAA, a rigorous Risk Management Framework, clear policies, trained people, effective incident response, subcontractor oversight, and layered safeguards. Treat HIPAA as an ongoing program that protects PHI while enabling your organization to deliver reliable services.

FAQs.

What defines a HIPAA business associate?

A HIPAA business associate is any person or organization that performs functions or provides services for a covered entity and, in doing so, creates, receives, maintains, or transmits PHI. Examples include cloud providers, billing services, analytics vendors, and consultants who can access PHI—even if they use a “no-view” configuration.

What are the key compliance requirements for business associates?

Execute a Business Associate Agreement; conduct risk analysis and run a Risk Management Framework; implement Administrative Safeguards and Technical Safeguards under the HIPAA Security Rule; maintain written policies, training, and documentation; manage subcontractor compliance with downstream BAAs; and meet Breach Notification Rule obligations and timelines.

How should business associates handle subcontractor compliance?

Perform security due diligence, execute downstream BAAs with equivalent restrictions, limit PHI to the minimum necessary, monitor controls and performance, require prompt incident reporting, govern data location and encryption, and ensure secure return or destruction of PHI at termination.

What are the breach notification obligations under HIPAA?

Upon discovering a breach of unsecured PHI, a business associate must notify the covered entity without unreasonable delay and no later than 60 days, providing details on scope, data involved, and mitigation. The covered entity typically notifies affected individuals, HHS, and (for large breaches) the media, unless the BAA assigns these tasks to the business associate.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles