HIPAA Omnibus Rule Mandate Explained: Requirements for Covered Entities and Business Associates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Rule Mandate Explained: Requirements for Covered Entities and Business Associates

Kevin Henry

HIPAA

August 23, 2024

9 minutes read
Share this article
HIPAA Omnibus Rule Mandate Explained: Requirements for Covered Entities and Business Associates

The HIPAA Omnibus Rule strengthened privacy and security protections for Protected Health Information (PHI) and made business associates directly accountable. This explainer translates the mandate into practical steps you can take to achieve Security Rule compliance, maintain airtight Business Associate Agreements, and meet Breach Notification Rule duties.

Definition of Business Associates

A business associate is any person or organization that creates, receives, maintains, or transmits PHI on behalf of a covered entity (health plans, healthcare providers, and healthcare clearinghouses) for regulated functions. Under the Omnibus Rule, business associates are directly liable for compliance—not just contractually bound.

Typical business associates include claims processors, revenue-cycle vendors, data analysts, billing and practice management firms, e-prescribing gateways, cloud service and data center providers, email and file-sharing platforms that store ePHI, Health Information Exchanges, and consultants who access PHI. Subcontractors performing these activities for a business associate are business associates in their own right.

The “conduit exception” is narrow. Mere transmission-only services (for example, a postal service or pure telecommunications carrier that does not access content) are not business associates. If a vendor maintains PHI—even if encrypted and not routinely viewed—it is generally a business associate.

Business Associate Agreements Requirements

Covered entities must execute written Business Associate Agreements (BAAs) with each business associate before PHI is shared. The Omnibus Rule prescribes core clauses that you should verify in every BAA.

Required BAA provisions

  • Permitted uses and disclosures: Define how the business associate may use or disclose PHI, including minimum necessary standards and any specific prohibitions (for example, no use for marketing without authorization).
  • Safeguards and Security Rule compliance: Require administrative, physical, and technical safeguards appropriate to the risk, ongoing risk analysis, and workforce training.
  • Subcontractor flow-down: Mandate that subcontractors who create, receive, maintain, or transmit PHI agree in writing to the same restrictions and conditions.
  • Reporting duties: Obligate prompt reporting of breaches, security incidents, and non-permitted uses or disclosures, including the details you need to fulfill the Breach Notification Rule.
  • Access, amendment, and accounting: Ensure the business associate supports individual rights, including access to PHI, corrections, and accounting of disclosures when applicable.
  • HHS access and audits: Permit the Department of Health and Human Services to examine the business associate’s internal practices, books, and records related to PHI.
  • Return or destruction: Require return or destruction of PHI at termination if feasible; otherwise, extend protections indefinitely.
  • Termination for cause: Authorize termination if the business associate violates material terms and fails to cure.

Practical enhancements

  • Define internal notice timelines (for example, shorter than regulatory maximums), incident escalation paths, and points of contact.
  • Include right-to-audit provisions, documented security controls, and evidence requirements (for example, risk analysis summaries, encryption attestations).
  • Align BAAs with your Notice of Privacy Practices to reflect marketing, sale of PHI, and breach notification commitments.

Subcontractor Compliance Obligations

The Omnibus Rule extends direct liability to subcontractors of business associates. If your vendor relies on downstream vendors, you must ensure the same standards apply throughout the chain.

  • Due diligence: Vet security programs, breach history, and regulatory posture before onboarding. Document risk-based justifications for vendor selection.
  • Contractual “flow-down”: Require subcontractors to sign BAAs mirroring your terms, including Security Rule compliance and Breach Notification Rule obligations.
  • Operational oversight: Establish security reporting cadences, incident playbooks, and audit or evidence-sharing rights to verify ongoing compliance.
  • Data minimization: Limit PHI access to what is strictly necessary; segregate environments and apply least-privilege access controls.
  • Geography and exit: Address data residency, cross-border transfers, and PHI return/destruction procedures at termination.

Security Rule Safeguards Implementation

Both covered entities and business associates must implement Security Rule safeguards for electronic PHI (ePHI). A documented risk analysis and risk management plan are the backbone of Security Rule compliance.

Administrative safeguards

  • Risk analysis and management: Identify threats, vulnerabilities, and likelihood/impact; implement controls and track remediation to closure.
  • Policies and workforce measures: Establish training, sanctions, role-based access, and security incident procedures.
  • Contingency planning: Maintain backups, disaster recovery, and emergency operations plans; test them periodically.

Physical safeguards

  • Facility and device controls: Secure server rooms, manage visitor access, and log hardware movement.
  • Workstation security: Harden endpoints, prevent unauthorized viewing or removal of ePHI, and manage disposal/media re-use.

Technical safeguards

  • Access controls: Unique user IDs, multi-factor authentication where feasible, automatic logoff, and session management.
  • Audit controls and integrity: Centralized logging, immutable logs, and file integrity monitoring to detect inappropriate access or alteration.
  • Transmission and storage security: Strong encryption in transit and at rest, key management, and secure configuration baselines.

Complement Security Rule controls with vendor governance, vulnerability management, penetration testing, and tabletop exercises. Document everything—you will rely on those records during investigations or audits.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Breach Notification Procedures

A breach is presumed when unsecured PHI is compromised unless you demonstrate a low probability of compromise through a documented risk assessment. The assessment considers the nature and extent of PHI, the unauthorized recipient, whether PHI was actually acquired or viewed, and the extent to which the risk was mitigated.

For business associates

  • Discovery triggers the clock: Notify the covered entity without unreasonable delay and no later than 60 calendar days after discovery.
  • Provide details: Include incident facts, types of PHI, number of individuals affected, dates, and mitigation steps; identify involved subcontractors.
  • Cooperate on content: Supply information needed for individual notices, media notices (if required), and reporting to HHS.

For covered entities

  • Individual notice: Without unreasonable delay and within applicable deadlines, using first-class mail or electronic notice where appropriate.
  • Additional notice: If 500 or more residents of a state or jurisdiction are affected, provide media notice; report breaches to HHS as required.
  • Documentation: Preserve risk assessments, decisions, notices, and remediation records to demonstrate Breach Notification Rule compliance.

Enforcement and Penalties Framework

The Office for Civil Rights (OCR) enforces the HIPAA Rules. The Omnibus Rule cemented direct liability for business associates and increased exposure for covered entities that lack effective oversight and controls.

  • Civil Monetary Penalties: OCR applies a four-tier structure based on culpability (from no knowledge to willful neglect not corrected), with per-violation penalties and annual caps. Settlement agreements often include multi-year corrective action plans and monitoring.
  • Criminal liability: Knowingly obtaining or disclosing PHI in violation of HIPAA—and offenses committed under false pretenses or for personal gain—can trigger criminal penalties.
  • Broader enforcement: State attorneys general may bring civil actions; contractual damages and reputational harm frequently exceed regulatory fines.
  • Top issues cited: Missing or outdated risk analyses, insufficient access controls, unencrypted devices, impermissible disclosures, and absent or deficient Business Associate Agreements.

Regulations on Sale and Marketing of PHI

The Omnibus Rule tightened PHI authorization requirements for marketing and the sale of PHI. As a rule of thumb, if financial remuneration from a third party is involved, you likely need a valid authorization before using or disclosing PHI for that purpose.

Sale of PHI

  • Authorization required: You must obtain a written authorization for disclosures where the covered entity or business associate receives direct or indirect remuneration in exchange for PHI.
  • Limited exceptions: Certain public health activities, research with cost-based remuneration, disclosures for treatment/payment/operations with cost-based fees, and entity sale/merger transactions may be permitted without a “sale” authorization.
  • De-identified data: Disclosures of properly de-identified data are not subject to PHI sale restrictions, though contractual and ethical considerations still apply.

Marketing communications

  • When authorization is needed: If a third party pays you to encourage purchase or use of a product or service, obtain the individual’s authorization in advance.
  • Permitted without authorization (with conditions): Face-to-face communications and promotional gifts of nominal value; treatment and care-coordination messages; certain refill reminders where payments are reasonably related to communication costs.
  • Transparency: If any financial remuneration is involved in a permitted communication, disclose it clearly and offer a simple opt-out.

What a valid authorization includes

  • Plain-language description of the information, purpose, authorized recipient, and who may disclose.
  • Expiration date or event, the individual’s signature and date, statements about the right to revoke, and the potential for re-disclosure.

Update your Notice of Privacy Practices to reflect your marketing rules, sale-of-PHI restrictions, breach notification rights, and the right to request restrictions (such as when an individual pays in full out-of-pocket and asks you not to disclose to a health plan).

Conclusion

The HIPAA Omnibus Rule makes both covered entities and business associates directly accountable for protecting PHI. Solid BAAs, rigorous Security Rule safeguards, disciplined breach response, and careful controls on marketing and sale of PHI form the compliance foundation. Treat vendor oversight as an extension of your own program, document decisions, and keep your Notice of Privacy Practices and authorizations current.

FAQs.

What entities qualify as business associates under the HIPAA Omnibus Rule?

Any entity that creates, receives, maintains, or transmits PHI for a covered entity’s regulated functions is a business associate. Examples include billing and revenue-cycle companies, data analytics firms, cloud and data-hosting providers, EHR and e-prescribing vendors, Health Information Exchanges, consultants with PHI access, and subcontractors performing these services for a business associate.

What are the key requirements for business associate agreements?

BAAs must define permitted uses and disclosures, require Security Rule compliance and safeguards, mandate breach and incident reporting, flow down the same terms to subcontractors, enable access/amendment/accounting where applicable, permit HHS review, and ensure PHI is returned or destroyed at termination with termination-for-cause rights if violations occur.

How soon must business associates report a PHI breach?

Business associates must notify the covered entity without unreasonable delay and no later than 60 calendar days after discovery of a breach. Many BAAs set shorter internal reporting windows to ensure the covered entity can meet individual and regulatory notification deadlines.

What penalties apply for HIPAA Omnibus Rule violations?

OCR can impose tiered Civil Monetary Penalties per violation with annual caps, escalating for willful neglect. Resolution agreements may require multi-year corrective action and monitoring. Certain intentional acts can trigger criminal liability, and state attorneys general may also pursue civil actions.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles