HIPAA Contract (Business Associate Agreement) Template: Key Requirements, Clauses & Examples

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Contract (Business Associate Agreement) Template: Key Requirements, Clauses & Examples

Kevin Henry

HIPAA

July 28, 2025

9 minutes read
Share this article
HIPAA Contract (Business Associate Agreement) Template: Key Requirements, Clauses & Examples

When you share Protected Health Information (PHI) with a vendor, you need a HIPAA Contract—commonly called a Business Associate Agreement (BAA). This guide explains what a BAA is, why it matters, which provisions it must contain, how business associates comply, what to do with PHI at termination, and sample clauses you can adapt into a practical template.

Definition of Business Associate Agreement

A Business Associate Agreement is a HIPAA-mandated contract between a covered entity (or another business associate) and a vendor or partner that creates, receives, maintains, or transmits PHI on its behalf. The BAA defines permitted uses and disclosures, security expectations, Breach Notification Procedures, and accountability mechanisms.

Who is a business associate?

A business associate includes service providers such as cloud and data-hosting vendors, billing and collections firms, EHR and telehealth platforms, analytics providers, email or SMS gateways handling ePHI, shredding and disposal vendors, consultants, and legal or accounting firms that access PHI to perform services.

What counts as Protected Health Information?

Protected Health Information is individually identifiable health information in any form or medium (paper, verbal, or electronic). It links a person to health status, care, or payment details through identifiers like names, contact data, medical record numbers, device IDs, or IP addresses.

Purpose of Business Associate Agreement

A BAA allocates responsibilities so PHI is handled lawfully and securely throughout the vendor relationship. It clarifies who may use or disclose PHI and for what purposes, requires Administrative Safeguards, Physical Safeguards, and Technical Safeguards, and establishes Breach Notification Procedures that trigger rapid coordination after a suspected incident.

The agreement also compels Subcontractor Compliance by flowing down the same protections to downstream providers and preserves audit and cooperation rights for Department of Health and Human Services Investigations, helping both parties demonstrate HIPAA diligence.

When a BAA is required

You need a BAA whenever a vendor will create, receive, maintain, or transmit PHI for regulated functions—such as claims processing, data analytics, secure hosting, or patient communications. If no PHI is involved, a BAA is typically not required.

Key Requirements of a Business Associate Agreement

  • Permitted uses and disclosures: Define how the business associate may use or disclose PHI, including for services, management, and legal compliance, and prohibit any other use.
  • Minimum necessary: Limit PHI to the least amount needed for the intended purpose and require role-based access controls to enforce it.
  • Safeguards: Implement and maintain Administrative Safeguards (policies, risk analysis, training), Physical Safeguards (facility, device, and media controls), and Technical Safeguards (access control, encryption, audit logging, transmission security).
  • Breach Notification Procedures: Report security incidents and breaches to the covered entity without unreasonable delay and follow agreed content, timing, and cooperation steps.
  • Subcontractor Compliance: Ensure subcontractors that handle PHI agree in writing to the same restrictions and safeguards as the business associate.
  • Individual rights support: Assist with access, amendment, and accounting of disclosures, and promptly relay any requests directed to the business associate.
  • Mitigation and incident response: Mitigate harmful effects of unauthorized uses or disclosures and maintain a documented response plan.
  • Books and records: Make relevant records available for Department of Health and Human Services Investigations and compliance reviews.
  • Return or destruction of PHI: Upon termination, return or securely destroy PHI, or continue to safeguard it if destruction is infeasible.
  • Documentation and retention: Maintain required policies, procedures, and evidence of compliance for the retention period specified in the BAA and applicable law.

Essential Clauses in a Business Associate Agreement

  • Definitions: Precise definitions for PHI, ePHI, breach, security incident, and subcontractor.
  • Scope of services and permitted uses/disclosures: Confines PHI use to what is necessary to deliver the contracted services.
  • Minimum necessary standard: Affirms least-privilege access and data minimization practices.
  • Safeguards: Requires Administrative Safeguards, Physical Safeguards, and Technical Safeguards aligned to HIPAA’s Security Rule.
  • Breach Notification Procedures: Sets discovery triggers, reporting timelines, required details, cooperation duties, and evidence preservation.
  • Subcontractor Compliance: Mandates downstream BAAs and continuous oversight of vendors and subprocessors.
  • Individual rights assistance: Commits to timely support for access, amendment, and accounting requests.
  • De-identification and aggregation: Allows limited de-identified data use if methods satisfy HIPAA standards.
  • Right to audit and Department of Health and Human Services Investigations: Grants inspection rights and requires cooperation with regulators.
  • Indemnification and insurance: Allocates risk and sets minimum cyber/privacy liability coverage where appropriate.
  • Data retention, return, and destruction: Specifies formats, deadlines, secure deletion, and certificates of destruction.
  • Termination for cause and survival: Enables termination on material breach and lists obligations that survive.

Compliance Obligations for Business Associates

Business associates have direct HIPAA liability. You must implement a comprehensive security program, honor Privacy Rule limits on PHI use and disclosure, follow Breach Notification Procedures, and ensure Subcontractor Compliance. Document everything and be prepared to cooperate with Department of Health and Human Services Investigations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Operational controls to implement

  • Administrative Safeguards: Assign a security official; conduct risk analysis and risk management; train workforce; manage vendors; plan for contingencies; and enforce sanctions.
  • Physical Safeguards: Control facility access; secure workstations; govern device and media movement; and sanitize or destroy media before disposal.
  • Technical Safeguards: Enforce unique user IDs and MFA; use encryption at rest and in transit; implement audit logs and monitoring; preserve data integrity; and secure transmissions.
  • Incident response: Detect, contain, investigate, and document incidents; notify the covered entity without unreasonable delay; and retain evidence.
  • Governance and proof: Maintain policies, risk registers, training records, vendor due diligence, and system inventories to demonstrate compliance.

Handling of Protected Health Information Upon Termination

When the relationship ends, the BAA requires you to return or securely destroy all Protected Health Information in your possession or control. If destruction is infeasible—such as legal holds or immutable backups—you must continue to protect PHI and limit use to those purposes that make retention necessary.

Practical termination steps

  • Inventory all PHI locations (production, backups, logs, test data, support tickets, portable media, and subcontractors).
  • Return PHI in an agreed structured format, then complete verified destruction (secure wipe, shredding, or media destruction) within the BAA’s timelines.
  • Obtain and provide certificates of destruction or detailed attestations, including methods and dates.
  • Revoke user access, rotate credentials, and disable integrations and data feeds.
  • Direct subcontractors to perform parallel return/destruction and collect their attestations for Subcontractor Compliance.
  • Retain only records required by law or contract, continuing safeguards until final destruction is feasible.

Sample Business Associate Agreement Provisions

Permitted uses and disclosures

Sample language:

Business Associate may use and disclose PHI solely to perform the Services for Covered Entity, to manage its own legal compliance, and as required by law. Business Associate shall not use or disclose PHI in a manner that would violate HIPAA if done by Covered Entity.

Safeguards

Sample language:

Business Associate shall implement Administrative Safeguards, Physical Safeguards, and Technical Safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of ePHI, including access controls, encryption, audit logging, workforce training, and contingency planning.

Breach Notification Procedures

Sample language:

Following discovery of a breach of unsecured PHI or a security incident, Business Associate shall notify Covered Entity without unreasonable delay and provide available details, including the nature of the incident, categories of PHI, individuals affected, mitigation steps taken, and corrective actions.

Subcontractor Compliance

Sample language:

Business Associate shall ensure that any subcontractor creating, receiving, maintaining, or transmitting PHI on its behalf agrees in writing to the same restrictions, conditions, and safeguards contained in this Agreement, and shall monitor such subcontractor’s compliance.

Individual rights assistance

Sample language:

Upon request, Business Associate shall promptly assist Covered Entity in responding to requests for access to, amendment of, or an accounting of disclosures of PHI, and shall forward to Covered Entity any such request it receives directly.

Department of Health and Human Services Investigations

Sample language:

Business Associate shall make its internal practices, books, and records relating to the use and disclosure of PHI available to the Department of Health and Human Services for purposes of determining the Parties’ compliance with HIPAA.

Return or destruction upon termination

Sample language:

Upon termination of this Agreement, Business Associate shall return to Covered Entity or, at Covered Entity’s direction, securely destroy all PHI that Business Associate still maintains. If return or destruction is infeasible, Business Associate shall extend the protections of this Agreement and limit further use or disclosure to those purposes that make return or destruction infeasible.

De-identified data

Sample language:

Business Associate may create de-identified information from PHI, provided the de-identification methodology satisfies HIPAA requirements. Business Associate may use and disclose de-identified information for lawful purposes, provided it does not attempt to re-identify the data.

Indemnification and insurance

Sample language:

Business Associate shall indemnify, defend, and hold harmless Covered Entity from losses arising from Business Associate’s material breach of this Agreement or violation of HIPAA, and shall maintain appropriate privacy and network security liability insurance.

Conclusion

A strong HIPAA Contract (Business Associate Agreement) template clarifies permissible PHI uses, enforces robust safeguards, mandates timely breach reporting, compels Subcontractor Compliance, and defines termination handling. With the right clauses and disciplined execution, you reduce risk, speed audits, and protect individuals’ privacy.

FAQs.

What is the purpose of a HIPAA Business Associate Agreement?

A BAA ensures vendors that handle Protected Health Information follow HIPAA by defining permitted uses and disclosures, requiring Administrative, Physical, and Technical Safeguards, establishing Breach Notification Procedures, flowing obligations to subcontractors, and preserving cooperation rights for Department of Health and Human Services Investigations.

What are the key clauses required in a BAA?

Core clauses include permitted uses and disclosures; minimum necessary; safeguards; Breach Notification Procedures; Subcontractor Compliance; assistance with access, amendment, and accounting; right to audit and HHS cooperation; termination and PHI return/destruction; de-identification (if used); and indemnification/insurance where appropriate.

How should PHI be handled when a BAA is terminated?

Return PHI in an agreed format, then securely destroy remaining copies across systems and backups, or, if destruction is infeasible, continue to protect PHI and restrict use to the limited purposes that require retention; document methods and timelines and obtain certificates of destruction.

Who must comply with HIPAA under a Business Associate Agreement?

Both parties have obligations: covered entities must select and oversee vendors appropriately, while business associates—and any subcontractors they engage—are directly responsible for HIPAA-compliant handling of PHI, including safeguards, breach reporting, documentation, and cooperation with investigations.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles