HIPAA Compliance for Business Associate Agreements (BAAs): Requirements and Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Business Associate Agreements (BAAs): Requirements and Checklist

Kevin Henry

HIPAA

March 04, 2026

8 minutes read
Share this article
HIPAA Compliance for Business Associate Agreements (BAAs): Requirements and Checklist

Business Associate Agreements sit at the heart of HIPAA compliance. They define how your vendors and partners handle Protected Health Information (PHI), set the security baseline, and spell out what happens if something goes wrong. Use this guide to clarify who qualifies as a business associate, what your BAA must include, and how to manage the agreement over its lifecycle.

Definition of Business Associates

A business associate is any person or organization (outside your workforce) that creates, receives, maintains, or transmits PHI for or on behalf of a covered entity—or for another business associate. If a vendor needs access to PHI to perform services, it is a business associate and must sign a BAA before work begins. This includes “Downstream Business Associates” engaged by your primary vendor.

By contrast, a “mere conduit” that simply transports information without storing or accessing it (for example, a postal carrier) is typically not a business associate. The distinction hinges on whether the entity has routine access to PHI or maintains it as part of the service.

What counts as PHI?

PHI is any information that relates to an individual’s past, present, or future physical or mental health, healthcare, or payment for care—and that can identify the individual. Names, addresses, dates, contact details, account numbers, device identifiers, and similar data become PHI when linked to health information.

Examples of Business Associates

Business associates span many service categories. Common examples include:

  • Cloud hosting, data centers, backup providers, and managed IT services that store or maintain PHI.
  • Electronic health record (EHR) and practice management vendors, health information exchanges, and API intermediaries.
  • Billing, coding, claims processing, revenue cycle management, and clearinghouses (when acting for a covered entity).
  • Legal, accounting, actuarial, and consulting firms that access PHI to deliver their services.
  • Contact centers, transcription/scribing services, document scanning, printing/mailing, and secure destruction vendors.
  • Analytics, AI/ML, and interoperability vendors that process PHI for reporting, quality, or operational use cases.
  • Cybersecurity, incident response, and digital forensics firms engaged to investigate security events involving PHI.
  • Telehealth platforms, secure messaging, email, and fax providers that transmit or store PHI as part of the service.

If a vendor may encounter PHI in the normal course of work—not just incidentally—treat it as a business associate and require a BAA.

Essential Components of a HIPAA-Compliant BAA

Core contractual requirements

  • Permitted uses and disclosures: Define exactly how the business associate may use and disclose PHI and prohibit any use beyond the agreement and HIPAA’s “minimum necessary” standard.
  • Safeguards: Require implementation of Administrative Safeguards, Technical Safeguards, and Physical Safeguards consistent with the HIPAA Security Rule.
  • Incident and Breach Notification: Mandate prompt reporting of security incidents and Breach Notification to the covered entity without unreasonable delay, with details sufficient to investigate and respond.
  • Subcontractors: Flow down the same restrictions and safeguards to all Downstream Business Associates via written agreements.
  • Individual rights support: Assist the covered entity in meeting Privacy Rule duties, including access to PHI, amendments, and accounting of disclosures.
  • Compliance and oversight: Allow inspections or Cooperation with Compliance Audits and make relevant records available to the Department of Health and Human Services upon request.
  • Mitigation and reporting: Require mitigation of any harmful effects from impermissible uses or disclosures and prompt reporting of violations.
  • Return or destruction: Upon termination, return or destroy PHI; if infeasible, extend protections and limit further uses/disclosures.
  • Documentation and retention: Maintain policies, procedures, and logs that evidence compliance for the required retention period.
  • Indemnification and insurance (recommended): Allocate risk for breaches and require appropriate cyber/privacy liability coverage.

Security controls to reference in the BAA

Operational duties that keep you compliant

  • Define service-level expectations for security monitoring, vulnerability remediation, and change management affecting PHI systems.
  • Require timely cooperation during investigations, risk assessments, and Compliance Audits.
  • Set clear points of contact, escalation paths, and timeframes for incident coordination.

BAA drafting checklist

  • Specify PHI categories and data flows.
  • List permitted uses/disclosures and prohibit marketing, sale, or profiling unless expressly allowed by law and by the covered entity.
  • Detail Administrative, Technical, and Physical Safeguards and evidence requirements.
  • Define Breach Notification triggers, timelines, and required content.
  • Flow down obligations to Downstream Business Associates and require proof of their BAAs.
  • Include cooperation, audit, and remediation terms, plus return/destruction procedures at termination.

Penalties for Non-Compliance

Business associates are directly liable for certain HIPAA violations. Civil penalties can be significant and scale with the level of negligence, with potential caps per year. In egregious cases—such as obtaining or disclosing PHI for malicious purposes—criminal penalties may apply.

Regulators can impose corrective action plans, ongoing monitoring, and reporting. Contractual exposure is also substantial: indemnity obligations, termination for cause, and damages tied to breach response, remediation, and lost business. Reputational harm and operational disruption often exceed the regulatory fines themselves.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Review and Update of BAAs

BAAs are living documents. Review them on a defined cadence and whenever risk, services, or laws change. Align updates with your risk analysis, vendor tiering, and security program maturity.

When to update

  • Scope changes: new data elements, new PHI systems, or expanded service lines.
  • Security changes: architecture shifts (e.g., new cloud regions), tooling, or incident learnings.
  • Legal or regulatory changes impacting HIPAA or state privacy laws.
  • Vendor changes: mergers, subcontractor additions, or ownership changes involving PHI.

How to review

  • Assign an owner in legal or compliance and involve security and procurement.
  • Use a standardized template and a clause library mapped to HIPAA requirements.
  • Verify evidence of safeguards and recent Compliance Audits or certifications where applicable.
  • Track acceptance, effective dates, and renewal cycles in a central repository.

Termination of BAA

Terminate a BAA for cause if the business associate materially breaches its obligations and fails to cure within the agreed timeframe, or if continued performance would violate HIPAA. Plan the offboarding to protect PHI and maintain continuity of care.

Offboarding checklist

  • Disable all access, revoke credentials and keys, and collect or wipe devices as applicable.
  • Return or securely destroy PHI, with certificates of destruction where appropriate.
  • Retrieve logs and evidence needed for ongoing compliance and retention duties.
  • Document what cannot be destroyed, why it is infeasible, and the protections that will survive.

Ensure survival clauses preserve confidentiality, restrictions on further use, and Breach Notification duties for any retained PHI.

Subcontractor Compliance

Your business associate’s subcontractors that handle PHI are also business associates. The BAA must require flow-down terms so all Downstream Business Associates agree to the same restrictions, safeguards, Breach Notification duties, and audit cooperation.

What to require from subcontractors

  • Executed BAAs before PHI access, with identical or stronger protections.
  • Evidence of Administrative, Technical, and Physical Safeguards and recent risk assessments.
  • Right to audit or obtain third-party assessment results relevant to PHI systems.
  • Immediate reporting of incidents and cooperation in investigations and remediation.

Monitoring and enforcement

  • Maintain an inventory of subcontractors with data flows, PHI types, and locations.
  • Review attestations and Compliance Audits on a defined schedule.
  • Use contractual remedies and escalation paths for deficiencies or repeated incidents.

Conclusion

Effective BAAs clarify permissible PHI use, set enforceable safeguards, and require swift, coordinated Breach Notification. Treat BAAs as operational tools—kept current through reviews, audits, and vendor oversight—to reduce risk across your extended ecosystem.

FAQs

What entities qualify as business associates under HIPAA?

Any non-workforce entity that creates, receives, maintains, or transmits PHI for or on behalf of a covered entity—or for another business associate—qualifies. Typical examples include IT hosting and support, EHR and billing vendors, consultants, analytics providers, and service firms that need PHI access to perform contracted duties.

When is a Business Associate Agreement not required?

A BAA is generally not required when a service has no need to access PHI and operates as a “mere conduit,” or when data is de-identified in accordance with HIPAA so no individual can be identified. BAAs are also not required for disclosures between covered entities for treatment purposes, though all parties must still comply with HIPAA.

What are the key elements required in a HIPAA-compliant BAA?

Define permitted uses/disclosures; require Administrative, Technical, and Physical Safeguards; mandate incident reporting and Breach Notification; flow down obligations to Downstream Business Associates; support individual rights (access, amendment, accounting); enable Compliance Audits and cooperation with regulators; and specify PHI return or destruction at termination.

What penalties exist for non-compliance with HIPAA BAAs?

Consequences include civil monetary penalties that scale with negligence, potential criminal penalties for intentional misuse of PHI, corrective action plans with monitoring, contract termination, indemnity exposure, and significant reputational and operational harm.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles