HIPAA Omnibus Rule Requirements: What They Were Meant to Change for Business Associates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Rule Requirements: What They Were Meant to Change for Business Associates

Kevin Henry

HIPAA

August 22, 2024

7 minutes read
Share this article
HIPAA Omnibus Rule Requirements: What They Were Meant to Change for Business Associates

The HIPAA Omnibus Rule transformed business associates from contractors on the sidelines into directly regulated entities. It clarified responsibilities for handling Protected Health Information (PHI), tightened oversight, and expanded who counts as a business associate. If you create, receive, maintain, or transmit PHI for a covered entity, these changes apply to you.

Below, you’ll find what the rule was meant to change, how to operationalize those expectations, and where enforcement and the Breach Notification Rule raise the stakes.

Direct Liability of Business Associates

The Omnibus Rule made you directly liable under HIPAA, not just contractually liable. That means regulators can investigate and penalize your organization even if the covered entity did everything right.

  • Comply with the HIPAA Security Rule Safeguards—administrative, physical, and technical—appropriate to your risks and operations.
  • Use and disclose PHI only as permitted by your Business Associate Agreement and the Privacy Rule, and follow the Minimum Necessary Standard.
  • Provide required assistance to covered entities: individual access to PHI, amendments, and (when applicable) accounting of disclosures.
  • Report breaches of unsecured PHI to covered entities under the Breach Notification Rule and maintain timely incident documentation.
  • Ensure your subcontractors that handle PHI do the same; you are liable for their compliance gaps that you control.
  • Make records available to regulators during investigations and refrain from any improper sale or marketing use of PHI without valid authorization.

Expanded Definition of Business Associates

The rule broadened who qualifies as a business associate beyond traditional billing and claims processors. If you maintain PHI—even if you never view it—you may be covered.

  • Data storage and cloud providers that store or back up PHI are business associates, regardless of encryption or “no-view” claims.
  • Health Information Exchanges, e-prescribing gateways, and certain personal health record vendors operating on behalf of covered entities are included.
  • Subcontractors that create, receive, maintain, or transmit PHI on behalf of a business associate are themselves business associates.
  • The “mere conduit” exception is narrow; simple transmission-only services (for example, postal carriers) may be excluded, but persistent storage usually is not.

Business Associate Agreements Requirements

The Business Associate Agreement (BAA) is your compliance blueprint. It converts rule requirements into enforceable obligations and should align with the covered entity’s Notice of Privacy Practices.

  • State permitted and required uses/disclosures of PHI and prohibit uses not allowed by HIPAA or the BAA.
  • Affirm compliance with the Minimum Necessary Standard and the Privacy Rule limits that apply to you.
  • Require implementation of Security Rule Safeguards and prompt reporting of security incidents.
  • Mandate breach reporting to the covered entity without unreasonable delay and include the information they need to notify affected individuals.
  • Flow down the same restrictions to subcontractors that handle PHI and obtain satisfactory assurances in writing.
  • Support individual rights: access, amendment, and (when applicable) accounting of disclosures.
  • Return or destroy PHI at contract end, or justify why retention is necessary and how it will be protected.
  • Allow regulators access to relevant records and authorize termination for material breach.
  • Prohibit sale of PHI and restrict marketing/fundraising uses unless valid authorization is obtained.

Security Rule Compliance Obligations

Security is no longer optional or delegated. You must implement a risk-based program that protects ePHI end to end while documenting decisions and controls.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Conduct an enterprise-wide risk analysis, address identified risks, and review regularly as systems and threats evolve.
  • Adopt administrative safeguards: policies, workforce training, sanctions, vendor oversight, and contingency planning.
  • Deploy physical safeguards: facility access controls, device/media protections, and secure disposal.
  • Implement technical safeguards: unique user IDs, access controls, audit logging, integrity protections, and transmission security; strong encryption is an industry baseline for safeguarding PHI.
  • Verify that access and disclosures follow the Minimum Necessary Standard and are consistent with the covered entity’s Notice of Privacy Practices.

Breach Notification Procedures

The Omnibus Rule codified a presumption of breach for unauthorized uses or disclosures of unsecured PHI unless you document a low probability of compromise. Your response playbook must be ready before an incident occurs.

  • Detect, contain, and mitigate quickly; preserve logs and evidence.
  • Determine if unsecured PHI was involved; if so, perform the four-factor risk assessment: data sensitivity, recipient, whether PHI was actually viewed/acquired, and mitigation effectiveness.
  • If a breach is confirmed, notify the covered entity without unreasonable delay and no later than 60 calendar days after discovery.
  • Provide the details the covered entity needs: what happened, what information was involved, affected population, mitigation steps, and your contact point for follow-up.
  • Maintain incident records, decisions, and timelines to demonstrate compliance with the Breach Notification Rule.

Enforcement and Penalties Overview

OCR enforces HIPAA through investigations, resolution agreements, corrective action plans, and tiered Civil Monetary Penalties. Willful neglect triggers mandatory penalties, and repeated or prolonged violations can multiply exposure.

  • Penalties scale by culpability and can accrue per violation, per day, and per provision, resulting in significant totals.
  • Resolution agreements often require multi-year monitoring and independent assessments—budget for remediation, not just fines.
  • Contractual liability also matters: BAAs commonly include indemnification and termination rights tied to HIPAA compliance.
  • Serious misconduct may carry criminal exposure, and state enforcement or private litigation risk can follow a breach.

Subcontractor Compliance Responsibilities

The Omnibus Rule closed the vendor gap by making subcontractors that handle PHI subject to HIPAA. You must manage them as an extension of your compliance program.

  • Inventory all subcontractors with PHI access and categorize their services and data flows.
  • Execute BAAs that mirror your obligations and verify implementation of Security Rule Safeguards.
  • Apply due diligence: risk questionnaires, evidence reviews, and security attestations; prioritize higher-risk vendors for deeper reviews.
  • Use least-privilege access, segmentation, secure transfer channels, and ongoing monitoring of logs and alerts.
  • Establish escalation and breach-reporting timelines that let you meet your own notification deadlines.
  • Periodically reassess risks, test incident response, and update controls as systems, threats, and regulations evolve.

Conclusion

The HIPAA Omnibus Rule was meant to make business associates accountable, comprehensive, and coordinated. Direct liability, expanded scope, robust BAAs, concrete Security Rule duties, defined breach procedures, meaningful penalties, and subcontractor oversight together create a complete compliance lifecycle. Treat these requirements as core business protections, not just legal obligations.

FAQs.

What liabilities do business associates have under the Omnibus Rule?

You are directly liable for complying with applicable Privacy, Security, and Breach Notification requirements. That includes limiting uses/disclosures to what the BAA allows, meeting the Minimum Necessary Standard, implementing Security Rule Safeguards, reporting breaches to covered entities, supporting individual rights, ensuring subcontractor compliance, and cooperating with investigations—exposure includes Civil Monetary Penalties.

How does the Omnibus Rule define subcontractors?

Any entity that creates, receives, maintains, or transmits PHI on behalf of a business associate is itself a business associate. Cloud hosts, data processors, and specialized service providers that store or handle PHI fall under this definition, while true “mere conduits” that only transmit data without persistent storage generally do not.

What are the key requirements for Business Associate Agreements?

BAAs must spell out permitted uses/disclosures, require compliance with the Privacy and Security Rules, enforce the Minimum Necessary Standard, mandate prompt breach reporting, flow down the same obligations to subcontractors, support access/amendment/accounting rights, allow regulator access, restrict marketing/sale of PHI without authorization, and require return or destruction of PHI at termination.

When must business associates notify covered entities of a breach?

Notify the covered entity without unreasonable delay and no later than 60 calendar days after discovering a breach of unsecured PHI. Your notice should include what happened, which types of PHI were involved, how many individuals may be affected, mitigation steps taken, and a point of contact for follow-up under the Breach Notification Rule.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles