HIPAA Omnibus Rule for Business Associates: Requirements, Liabilities, and Compliance Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Rule for Business Associates: Requirements, Liabilities, and Compliance Checklist

Kevin Henry

HIPAA

August 24, 2024

9 minutes read
Share this article
HIPAA Omnibus Rule for Business Associates: Requirements, Liabilities, and Compliance Checklist

The HIPAA Omnibus Rule expanded and clarified how business associates must protect Protected Health Information (PHI). It made business associates directly liable for compliance with key Privacy, Security, and Breach Notification Rule provisions. If you create, receive, maintain, or transmit PHI on behalf of a covered entity, this guide explains what you must do and how to prove it.

Below, you will find plain‑language requirements, practical checklists, and risk‑based controls mapped to Administrative Safeguards and Technical Safeguards. Use these sections to strengthen contracts, tighten security, and prepare for audits and investigations.

Business Associate Agreements and Responsibilities

What a Business Associate Agreement (BAA) must cover

A Business Associate Agreement (BAA) defines permitted and required uses and disclosures of PHI and binds you to safeguard it. It must require you to implement Security Rule safeguards, apply the Minimum Necessary standard, and report breaches or security incidents promptly. It also requires you to ensure any subcontractor agrees to the same restrictions and conditions.

Under the Omnibus Rule, you are directly liable for impermissible uses or disclosures of PHI, failure to provide breach notifications to the covered entity, failure to provide access to ePHI when delegated, and failure to maintain required documentation. At contract termination, you must return or securely destroy PHI unless infeasible, in which case you must extend protections.

Operational responsibilities you should expect

  • Documented governance: designate a security lead and define lines of accountability for HIPAA compliance.
  • Data handling terms: specify data flows, storage locations, retention periods, and deletion methods for PHI.
  • Individual rights support: assist covered entities with access, amendment, and accounting of disclosures when required.
  • Audit cooperation: agree to provide records and compliance evidence to the covered entity and to HHS upon request.

Compliance Checklist

  • Verify a current, fully executed BAA exists for each covered entity relationship.
  • Map all PHI data flows and confirm they align with permitted uses and disclosures in the BAA.
  • Embed breach and security incident reporting timelines in the BAA (often shorter than 60 days).
  • Require subcontractor BAAs that mirror your obligations, including breach reporting and safeguards.
  • Define termination assistance, PHI return/destruction procedures, and evidence of completion.

Security Rule Implementation

Risk Assessment and risk management

Conduct an enterprise Risk Assessment to identify threats, vulnerabilities, likelihood, and impact to ePHI. Use the results to drive a prioritized risk management plan with owners, timelines, and acceptance criteria. Reassess after material changes such as new systems, vendors, or mergers.

Administrative, physical, and technical safeguards

Administrative Safeguards include policies, workforce training, sanctions, vendor management, and contingency planning. Physical safeguards should address facility access, device/media controls, and secure disposal. Technical Safeguards include unique user IDs, multi‑factor authentication, role‑based access, audit logs, integrity controls, and transmission security.

Security engineering essentials

  • Encrypt ePHI at rest and in transit; use strong key management and disable legacy protocols.
  • Harden endpoints and servers; patch promptly; conduct vulnerability scanning and penetration testing.
  • Implement SIEM or log aggregation with alerting on anomalous access to PHI.
  • Back up systems; test restores; maintain disaster recovery and emergency mode operations procedures.
  • Define secure SDLC practices if you develop software that processes PHI.

Compliance Checklist

  • Complete and document a current Risk Assessment; track remediation to closure.
  • Appoint a security official and publish Security Rule policies and procedures.
  • Enforce least‑privilege, MFA, and time‑bound access for all PHI systems.
  • Enable audit logging for create/read/update/delete actions on ePHI and review routinely.
  • Maintain contingency plans, tested backups, and incident response playbooks for ransomware.

Breach Notification Procedures

How the Breach Notification Rule applies to you

A breach is an impermissible use or disclosure that compromises the security or privacy of PHI. If unsecured PHI is involved, you must notify the covered entity without unreasonable delay and no later than 60 days after discovery. Your notice must provide the information the covered entity needs to notify affected individuals and regulators.

Risk assessment: “low probability of compromise” test

When an incident occurs, evaluate whether there is a low probability that PHI was compromised by analyzing: the nature and extent of PHI, the unauthorized person who used/received it, whether PHI was actually viewed or acquired, and the extent to which risk was mitigated. Document your analysis and decision for each event.

What to include in your notification to the covered entity

  • Incident timeline, systems affected, and description of the event.
  • Types of PHI involved and preliminary counts of affected individuals.
  • Mitigation steps taken, containment status, and residual risks.
  • Recommendations for individual notices and remediation (e.g., credit monitoring if appropriate).

Compliance Checklist

  • Define “security incident” and “breach” in policies; train staff to escalate promptly.
  • Instrument detection and triage workflows with 24/7 contacts and decision trees.
  • Document the four‑factor Risk Assessment for every incident, even if you determine no breach occurred.
  • Meet BAA reporting timelines; track delivery and acknowledge receipt by the covered entity.
  • Retain incident and notification records for at least six years.

Subcontractor Compliance Management

Make subcontractors HIPAA‑ready before they touch PHI

Subcontractors that create, receive, maintain, or transmit PHI on your behalf are also business associates. You must execute subcontractor BAAs that impose the same restrictions and safeguards you accepted. Build due diligence into onboarding and require continuous assurance, not just point‑in‑time checks.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Oversight practices that work

  • Use security questionnaires, SOC 2 or equivalent reports, and HIPAA control mappings.
  • Evaluate data localization, encryption practices, support access, and breach history.
  • Include right‑to‑audit, breach reporting, and termination/transition clauses in contracts.
  • Limit PHI access to the minimum necessary and segregate environments by client and role.
  • Offboard promptly: revoke access, collect assets, and certify PHI return/destruction.

Compliance Checklist

  • Maintain an inventory of all subcontractors that handle PHI and their BAAs.
  • Assign vendor risk tiers and review high‑risk vendors at least annually.
  • Test subcontractor incident reporting by tabletop exercises and contact drills.
  • Require security addenda covering encryption, logging, and breach support obligations.

Minimum Necessary Standard Enforcement

Applying minimum necessary to your operations

The Minimum Necessary standard requires you to limit PHI uses, disclosures, and requests to what is reasonably necessary to achieve the purpose. Build role‑based access so staff only see the PHI needed for their duties, and strip identifiers when a limited data set or de‑identified data suffices.

Process controls and automation

  • Standardize data request workflows with documented justifications and approvals.
  • Template minimum‑necessary guidelines for common disclosures, including those to subcontractors.
  • Tokenize or mask data in lower environments; prohibit production PHI in development whenever possible.
  • Use DLP and query‑level controls to prevent large or unnecessary extracts of PHI.

Compliance Checklist

  • Publish minimum‑necessary policies and role matrices; review quarterly.
  • Automate least‑privilege provisioning and periodic access recertifications.
  • Prefer de‑identified data or limited data sets with Data Use Agreements when feasible.
  • Audit disclosures for appropriateness; correct over‑disclosures and retrain promptly.

Enforcement Actions and Penalties

How enforcement works for business associates

The Office for Civil Rights (OCR) investigates complaints, breaches, and compliance reviews. Business associates can face Civil Monetary Penalties across four tiers that reflect the level of culpability, plus corrective action plans, monitoring, and settlement agreements. State attorneys general may also bring actions, and contractual damages can add exposure.

Factors that influence outcomes

  • Scope and duration of noncompliance, number of individuals affected, and sensitivity of PHI.
  • Whether you performed a timely Risk Assessment and implemented reasonable safeguards.
  • Cooperation, corrective action speed, and evidence of a mature compliance program.
  • History of similar violations or prior resolution agreements.

Compliance Checklist

  • Maintain comprehensive documentation of policies, training, risk analyses, and remediation.
  • Track and close audit findings; verify control effectiveness with metrics and testing.
  • Escalate material issues to leadership and the covered entity; document decisions.
  • Review penalties and settlement trends to calibrate your risk appetite and controls.

Training Programs and Policy Development

Build a role‑based training program

Provide new‑hire and periodic training tailored to job functions. Emphasize phishing resistance, secure data handling, minimum‑necessary decisions, and reporting of suspected incidents. Capture attendance, comprehension checks, and retraining for observed gaps.

Develop and maintain practical policies

Create concise, task‑oriented policies and procedures that map to the Security Rule and your BAAs. Include change management, remote work, BYOD, encryption, media disposal, data retention, and incident response. Review at least annually and after major changes, and retain documentation for six years.

Program metrics and continuous improvement

  • Track key indicators: completion of Risk Assessment actions, access reviews, and incident MTTR.
  • Run tabletop exercises with covered entities and critical subcontractors.
  • Integrate lessons learned into policy updates, training content, and technical controls.

Conclusion

The HIPAA Omnibus Rule for business associates centers on clear BAAs, robust safeguards, disciplined breach response, and enforceable vendor oversight. By executing the checklists above—and documenting every decision—you reduce risk, demonstrate due diligence, and protect PHI with confidence.

FAQs

What are the key requirements for business associates under the HIPAA Omnibus Rule?

You are directly liable for complying with the Security Rule and certain Privacy Rule provisions, including applying the Minimum Necessary standard and reporting breaches. You must execute and honor Business Associate Agreements (BAAs), perform a documented Risk Assessment, implement Administrative Safeguards and Technical Safeguards, oversee subcontractors, and retain policies, procedures, and incident records for six years.

How must business associates handle breach notifications?

Upon discovering a breach of unsecured PHI, notify the covered entity without unreasonable delay and no later than 60 days. Provide incident details, types of PHI involved, affected counts, mitigation steps, and recommendations. Many BAAs set shorter notice windows and may delegate individual notifications; follow the contract and keep full documentation of your assessment and actions.

What are the penalties for noncompliance with the Omnibus Rule?

OCR can impose Civil Monetary Penalties based on culpability tier, require corrective action plans, and enter resolution agreements with monitoring. Penalty calculations consider scope and duration of noncompliance, harm, and your cooperation and remediation. State enforcement and contractual damages with covered entities can add significant liability.

How should subcontractors be managed to ensure HIPAA compliance?

Treat subcontractors that handle PHI as business associates. Execute subcontractor BAAs mirroring your obligations, conduct due diligence, enforce least‑privilege access, monitor controls, and test breach reporting. Offboard promptly, certify PHI return or destruction, and review high‑risk vendors at least annually to maintain continuous assurance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles