HIPAA Omnibus Rule Requirements: Stronger Business Associate Liability and Safeguards

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Rule Requirements: Stronger Business Associate Liability and Safeguards

Kevin Henry

HIPAA

August 25, 2024

6 minutes read
Share this article
HIPAA Omnibus Rule Requirements: Stronger Business Associate Liability and Safeguards

The HIPAA Omnibus Rule tightened oversight of how business associates handle protected health information (PHI) and strengthened safeguards across the data lifecycle. You now face direct obligations, stricter breach notification standards, and clearer accountability that flows to subcontractors. Strong Business Associate Agreements (BAAs), HIPAA Privacy Rule compliance, and robust electronic PHI security are no longer optional—they are core requirements.

Direct Liability of Business Associates

The Omnibus Rule makes business associates directly liable for complying with key HIPAA provisions. You must limit uses and disclosures of PHI to what your BAA and the Privacy Rule permit and apply the Minimum Necessary Standard to every use, disclosure, and request. Impermissible uses or disclosures can trigger civil and, in egregious cases, criminal penalties.

Business associates are also directly responsible for Security Rule safeguards. That includes risk analysis, workforce training, access controls, audit logging, and incident response for electronic PHI security. If a breach occurs, you must follow the Breach Notification Rule and notify the covered entity without unreasonable delay.

What direct liability means in practice

  • Use and disclose PHI only as allowed by the BAA and Privacy Rule.
  • Apply the Minimum Necessary Standard to reduce risk exposure.
  • Maintain required policies, procedures, and documentation to demonstrate HIPAA Privacy Rule compliance.
  • Support covered entities in providing individuals access, amendments, and accounting of disclosures when your systems hold the PHI.

Subcontractor Compliance

Omnibus extends HIPAA obligations down the chain. Any subcontractor that creates, receives, maintains, or transmits PHI on your behalf is a business associate and must sign a written BAA mirroring your obligations. You are expected to vet, contractually bind, and oversee these vendors to ensure equivalent safeguards.

Building a compliant vendor program

  • Use standardized BAAs with security, privacy, and breach-notification clauses.
  • Require prompt incident reporting, cooperation in investigations, and flow-down of requirements to further subcontractors.
  • Conduct risk-based due diligence and periodic reviews of controls and performance.
  • Document oversight activities to evidence compliance.

Expanded Definition of Business Associates

The Omnibus Rule broadens who counts as a business associate. Cloud service providers that store encrypted ePHI, data storage vendors, health information exchanges, e-prescribing gateways, analytics and billing vendors, and legal or consulting firms that handle PHI generally fall within scope. “Mere conduits” that transmit data without persistent storage or routine access are not business associates, but most modern service providers are.

If you maintain PHI for a covered entity—even if you do not routinely view it—you likely meet the business associate definition. Plan accordingly with BAAs, controls aligned to the Security Rule, and procedures that uphold the Minimum Necessary Standard.

Covered Entity Liability

Covered entities remain responsible for overall HIPAA compliance and must execute and manage Business Associate Agreements that set permitted uses, safeguards, and breach-notification duties. If a business associate acts as an agent and violates HIPAA within the scope of that agency, the covered entity may face liability alongside the associate.

Practical oversight includes onboarding due diligence, clear performance metrics, and responsive remediation when you learn of a pattern of noncompliance. Covered entities should ensure associates can support individual rights—access, amendments, and accounting—so Privacy Rule obligations are met on time.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Breach Notification Requirements

The Omnibus Rule adopts a presumption of breach unless a documented risk assessment shows a low probability that PHI was compromised. Assess at least four factors: the nature and extent of PHI involved, the unauthorized person who used or received it, whether the PHI was actually acquired or viewed, and the extent of mitigation performed.

Business associates must notify the covered entity without unreasonable delay and no later than 60 days after discovery. Notices should include what happened, what information was involved, the number of affected individuals, steps taken to mitigate harm, and recommended protections. Proper encryption and strong key management can prevent many incidents from becoming reportable under the Breach Notification Rule.

Enforcement and Penalties

The HHS Office for Civil Rights (OCR) enforces the HIPAA Omnibus Rule through complaints, investigations, compliance reviews, and audits. Civil monetary penalties follow tiered levels based on culpability—from reasonable cause to willful neglect—with higher exposure when violations persist uncorrected. Resolution agreements often include multi‑year corrective action plans and monitoring.

Serious misconduct may be referred for criminal enforcement, leading to fines and potential imprisonment for knowingly obtaining or disclosing PHI in violation of HIPAA. Repeated or widespread failures—especially involving sensitive data elements—can increase both civil and criminal penalties and invite broader scrutiny.

Security Rule Compliance

Security Rule compliance is the operational backbone of Omnibus. You must perform an enterprise risk analysis, implement risk management, and maintain administrative, physical, and technical safeguards tailored to your environment. Controls should include access management, multi‑factor authentication, audit logs, encryption at rest and in transit, device and media controls, and a tested incident response plan.

Because electronic PHI security and Privacy Rule principles reinforce each other, align access controls to the Minimum Necessary Standard and monitor usage for anomalies. Regular workforce training, vendor oversight, and continuous improvement keep your security posture aligned with evolving threats and your contractual BAA commitments.

Conclusion and next steps

The HIPAA Omnibus Rule raises the bar for business associates and covered entities alike: stronger direct liability, broader scope, rigorous breach response, and disciplined security. Treat BAAs as living documents, tighten vendor controls, and operationalize risk management to sustain compliance and reduce exposure.

FAQs

What new liabilities do business associates have under the Omnibus Rule?

Business associates are directly liable for impermissible uses and disclosures of PHI, compliance with applicable Privacy Rule provisions (including the Minimum Necessary Standard), full Security Rule safeguards for ePHI, and timely breach notification to covered entities. They must also maintain required documentation and support covered entities in fulfilling individual rights.

How does the Omnibus Rule affect subcontractor compliance?

Subcontractors that handle PHI for a business associate are themselves business associates. You must execute Business Associate Agreements with them, flow down HIPAA requirements, verify controls through due diligence, and monitor performance. Liability effectively extends through the vendor chain, so oversight and contract terms are critical.

What are the breach notification requirements for business associates?

You must notify the covered entity without unreasonable delay and no later than 60 days after discovering a breach. Conduct a four‑factor risk assessment, document findings, and provide incident details, scope, mitigation steps, and recommendations. Strong encryption and rapid containment can limit impact and, in some cases, avert reportable breaches.

What penalties apply for noncompliance under the Omnibus Rule?

OCR can impose tiered civil monetary penalties that scale with the level of culpability and corrective action taken, often accompanied by corrective action plans and monitoring. Severe or intentional misconduct may trigger criminal enforcement, leading to fines and possible imprisonment. Repeated or uncorrected violations and large‑scale incidents increase penalty exposure.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles