HIPAA Omnibus Rule and BAAs: Templates, Examples, and Required Clauses

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Rule and BAAs: Templates, Examples, and Required Clauses

Kevin Henry

HIPAA

July 14, 2024

8 minutes read
Share this article
HIPAA Omnibus Rule and BAAs: Templates, Examples, and Required Clauses

Expanded Definition of Business Associate

The HIPAA Omnibus Rule broadened who counts as a Business Associate (BA). In addition to traditional vendors like billing and claims processors, it captures any entity that creates, receives, maintains, or transmits Protected Health Information (PHI) for a covered entity. This includes data transmission vendors with routine access, cloud/SaaS providers that store ePHI, health information exchanges, e‑prescribing gateways, and personal health record vendors operating on behalf of a covered entity.

Subcontractors of a BA are also business associates if they handle PHI. If you hire a downstream vendor to host backups, provide analytics, or deliver support that touches PHI, that subcontractor inherits the same obligations. By contrast, true conduits—such as the postal service or an ISP that merely transmits data without persistent storage—fall outside BA status.

Practical examples: a cloud storage provider that maintains ePHI, an MSP with server admin rights, or a transcription service using PHI are BAs. A courier delivering sealed paper records without access is not. Treat gray areas conservatively; if a vendor can access PHI, assume BA status and execute an agreement.

Key Clauses in Business Associate Agreements

A compliant BAA must define what the BA can do with PHI and how it will protect it. Use precise, plain language that aligns with the Privacy Rule and HIPAA Security Rule Compliance requirements.

Core required provisions

  • PHI Use and Disclosure Restrictions: Specify permitted and required uses/disclosures, prohibit uses not authorized by the agreement or law, and incorporate the minimum necessary standard.
  • Safeguards: Require administrative, physical, and technical safeguards appropriate to the risk. Reference encryption, access controls, audit logging, and configuration management for ePHI.
  • Breach and Security Incident Reporting: Define “breach,” require prompt written notice with timelines, content of notices, and ongoing cooperation until containment and remediation are complete.
  • Subcontractor Flow‑Down: Mandate that subcontractors with PHI sign written agreements imposing the same restrictions and safeguards.
  • Individual Rights Support: Commit the BA to help provide access, amendments, and an accounting of disclosures when the covered entity requests it.
  • Availability to HHS: Require the BA to make policies, procedures, and records available to HHS for oversight and enforcement.
  • Return/Destruction of PHI: On termination, the BA must return or securely destroy PHI, or document why that is infeasible and continue protections.
  • Mitigation and Sanctions: Obligate mitigation of harmful effects and enforcement of internal sanctions for workforce violations.

Sample clause language (illustrative)

  • Permitted Uses: “Business Associate may use PHI solely to perform Services described in Statement of Work and for proper management and administration, provided disclosures for management and administration are required by law or made subject to comparable confidentiality obligations.”
  • Security: “Business Associate shall implement and document safeguards reasonably designed to ensure HIPAA Security Rule Compliance, including role‑based access, unique user IDs, encryption in transit and at rest, continuous vulnerability management, and workforce training.”
  • Breach Notice: “Business Associate will notify Covered Entity without unreasonable delay and no later than X calendar days after discovery of a Breach of Unsecured PHI, including the information required for individual notifications.”
  • HHS Access: “Business Associate shall make its internal practices, books, and records relating to the use and disclosure of PHI available to the Secretary of HHS for purposes of determining compliance.”

Subcontractor Obligations under HIPAA

The Omnibus Rule imposes Subcontractor Compliance Obligations identical to those on BAs. If you delegate services involving PHI, you must require your subcontractor to sign a BA‑to‑subcontractor agreement with equivalent safeguards, breach duties, and use/disclosure limits.

Operationalize this with a vendor risk program. Inventory all PHI‑touching vendors; vet security controls; use questionnaires and evidence reviews; and require right‑to‑audit, incident cooperation, and data return/destruction terms. Ensure least‑privilege access, data segmentation, and encryption to reduce spillover risk across multi‑tenant platforms.

For analytics and de‑identification, define whether PHI will be de‑identified using a recognized method and restrict re‑identification. Clarify whether limited data sets will be used and require Data Use Agreements where appropriate.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Sample BAA Templates and Customization

Start with a modular template you can adapt to your specific services. Keep legal terms stable, then tailor operational details (security controls, notification windows, data formats) in schedules or exhibits to simplify updates.

Short‑form structure (overview)

  • Parties and Definitions (PHI, ePHI, breach, security incident, subcontractor).
  • Scope of Services and Permitted Uses/Disclosures.
  • Safeguards and HIPAA Security Rule Compliance statement.
  • Breach Notification and Incident Response cooperation.
  • Subcontractor flow‑down and oversight.
  • Individual rights assistance (access, amendment, accounting).
  • HHS Oversight and Enforcement access provision.
  • Term, Material Breach Termination Clauses, and post‑termination obligations.

Clause customization examples

  • Breach timelines: Healthcare providers often prefer 5–10 business days for initial notice with rolling updates; payers may allow up to 15 calendar days. Pick one, state what “discovery” means, and require interim summaries if facts are evolving.
  • Security appendices: List specific controls (encryption standards, MFA for privileged accounts, quarterly access reviews, annual risk analysis, backup/restore testing). Tie these to measurable outcomes you can audit.
  • Use limitations: For analytics or product improvement, allow de‑identified data use only; prohibit selling PHI or combining PHI with other datasets unless expressly authorized.
  • Data return: Pre‑define the export format (CCD, FHIR bundles, CSV) and secure transfer method for timely data return at termination.

Example “for cause” language

“If Business Associate engages in a pattern of activity or practice that constitutes a material breach, Covered Entity shall provide written notice and an opportunity to cure within X days. If cure is not possible or not effected within the cure period, Covered Entity may terminate this Agreement immediately.”

Compliance Checklist for BAAs

  • Identify all vendors that create, receive, maintain, or transmit PHI; execute BAAs before sharing PHI.
  • Document PHI Use and Disclosure Restrictions and the minimum necessary standard for every service.
  • Verify HIPAA Security Rule Compliance: risk analysis, risk management plan, access controls, encryption, logging, and workforce training.
  • Establish breach/security incident definitions, discovery triggers, notification time frames, and required content.
  • Flow down all requirements to subcontractors; confirm written agreements and ongoing oversight.
  • Require support for access, amendment, and accounting requests within defined SLAs.
  • Include HHS access language and cooperation in investigations and audits.
  • Define Material Breach Termination Clauses with cure periods and offboarding steps.
  • Specify data return/destruction, retention for legal holds, and documentation of infeasibility.
  • Test incident response and data return procedures; keep evidence of tests for audits.

Enforcement and Liability of Business Associates

The Omnibus Rule made Business Associate Liability direct. BAs can face civil and criminal penalties for impermissible uses or disclosures, failure to safeguard ePHI, lack of breach notification, or refusal to cooperate with HHS Oversight and Enforcement. OCR investigations often start with a breach report, a patient complaint, or a referral from a covered entity.

Common pitfalls include storing unencrypted backups accessible to subcontractors, inadequate access reviews, and delayed breach reporting. Mitigate by adopting a written risk management plan, encrypting PHI, segmenting admin access, verifying subcontractor controls, and documenting your investigations and corrective actions.

Remember the “secured PHI” safe harbor: if PHI is properly encrypted or destroyed under recognized methods and a loss occurs, breach notification may not be required. Your BAA should define the standards you and your subcontractors will follow.

Termination Provisions in BAAs

Termination terms protect patients and reduce residual risk. Use clear Material Breach Termination Clauses with defined cure periods and the right to immediate termination if continued performance would cause noncompliance. When termination is infeasible—such as for a critical hosted platform—document why and require heightened safeguards until migration completes.

State exactly how PHI will be returned or destroyed, in what format, and within what time frame. Include obligations to assist with transition, certify destruction, and continue confidentiality for retained PHI subject to legal holds. Survival clauses should preserve privacy, security, cooperation, and indemnity obligations beyond termination.

Offboarding checklist

  • Disable all accounts and credentials; revoke API keys and federated access.
  • Export PHI to the covered entity in the agreed format; validate completeness and integrity.
  • Sanitize media and backups or document infeasibility; set deletion schedules for residual copies.
  • Deliver an attestation of return/destruction and a final incident summary, if any.

Conclusion

The HIPAA Omnibus Rule extends BA status broadly and enforces direct accountability. A strong BAA translates legal duties into operational controls—tight use limits, proven safeguards, subcontractor oversight, clear breach playbooks, and decisive termination terms—so you can handle PHI confidently and compliantly.

FAQs

What is the impact of the HIPAA Omnibus Rule on business associates?

It expanded who is a business associate, made subcontractors subject to the same rules, and imposed direct Business Associate Liability for privacy, security, and breach notification failures. BAs must implement safeguards, report incidents, and cooperate with HHS oversight.

What clauses are required in a compliant Business Associate Agreement?

At minimum: permitted uses/disclosures; safeguards aligning with the Security Rule; breach and security incident reporting; subcontractor flow‑down; support for access, amendment, and accounting; HHS access; and return or destruction of PHI at termination, plus mitigation and minimum necessary obligations.

How must business associates handle subcontractor PHI compliance?

They must execute written BA‑subcontractor agreements with equivalent restrictions, verify controls through due diligence, and maintain oversight. Flow down breach notification, security, and PHI Use and Disclosure Restrictions, and reserve audit and remediation rights.

When can a covered entity terminate a BAA due to violations?

Upon a material breach that is not cured within the agreed period, or immediately if cure is not feasible or continued performance would cause noncompliance. After termination, the BA must return or securely destroy PHI, or document why destruction is infeasible and continue protections.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles