HIPAA Requirements for ACOs: Privacy, Security, and Data Sharing Compliance Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Requirements for ACOs: Privacy, Security, and Data Sharing Compliance Guide

Kevin Henry

HIPAA

March 27, 2026

7 minutes read
Share this article
HIPAA Requirements for ACOs: Privacy, Security, and Data Sharing Compliance Guide

ACO Data Utilization Practices

Permissible uses and the minimum necessary standard

As an Accountable Care Organization (ACO), you rely on data to coordinate care, manage populations, and improve outcomes. Under the HIPAA Privacy Rule, you may use and disclose electronic Protected Health Information (ePHI) for treatment, payment, and healthcare operations, provided each use follows the minimum necessary standard. Keep access purpose‑driven, time‑bound, and role‑based.

Governance and safeguards for ePHI

Establish a data governance program that inventories data sources, maps flows, and documents who can access which datasets and why. Implement technical and administrative safeguards: multifactor authentication, role‑based access controls, encryption in transit and at rest, audit logging, and workforce training. Define Security Incident Reporting procedures that distinguish routine security events from potential breaches and set internal escalation timelines.

Using de‑identified data, limited data sets, and HIE

When possible, use de‑identified data for analytics. If identifiers are needed, consider a limited data set governed by a Data Use Agreement (DUA). For cross‑organization exchange, align your Health Information Exchange participation with HIPAA, documenting permitted uses, redisclosure limits, and participant responsibilities. Maintain retention schedules and regularly review user access to ensure continuing need.

Data Use Agreements with CMS

Purpose and scope of DUAs

CMS Data Use Agreements (DUAs) allow your ACO to receive Medicare claims and other beneficiary data for care coordination, quality improvement, and program administration. The DUA defines permitted uses, data elements, authorized users, and redisclosure restrictions, and it requires strict safeguarding of ePHI.

Core obligations you must operationalize

  • Name a data custodian responsible for access approvals, training, and periodic user recertification.
  • Enforce least‑privilege access, encryption, and secure storage; prohibit unauthorized downloads or transfers.
  • Implement Security Incident Reporting with defined timelines to notify CMS of any suspected or confirmed incidents involving DUA data.
  • Track data lineage and suppress records for beneficiaries who exercise the Medicare Beneficiary Opt-Out for claims data sharing.
  • Document data return or destruction at DUA termination and verify completion.

Coordinating DUAs with BAAs and internal policy

Any vendor handling CMS DUA data is your Business Associate and must sign a Business Associate Agreement (BAA) that mirrors DUA safeguards and redisclosure limits. Align your internal policies so BAA terms, DUA conditions, and workforce procedures do not conflict, and maintain auditable logs of all extractions and disclosures.

Reporting Clinical Quality Measures

Measure submission pathways and data handling

ACOs submit Clinical Quality Measures through CMS‑specified mechanisms such as eCQMs and MIPS CQMs. Because submissions often aggregate data across multiple participants, you must standardize data mapping, patient matching, and attribution rules, and verify that only the minimum necessary patient information is transmitted.

Privacy and security controls for reporting

  • Execute BAAs with EHR vendors, registries, and analytics platforms supporting measure extraction and submission.
  • Encrypt data in transit and at rest, limit access to submission teams, and maintain immutable audit logs.
  • Apply quality checks for completeness, accuracy, and provenance, and document corrections to ensure defensible reporting.
  • Invoke Security Incident Reporting if you detect transmission errors, misdirected files, or unauthorized access.

Retention and audit readiness

Maintain evidence of submissions, measure calculation logic, versioned value sets, and user access logs for the period required by program rules and internal policy. Store artifacts in a secure repository so you can rapidly demonstrate compliance during audits.

Financial Benchmarking Compliance

Using PHI for payment and operations

HIPAA permits using PHI for payment and healthcare operations, which includes actuarial analysis, risk adjustment, and financial benchmarking. Prefer de‑identified or limited data sets for analytics when full identifiers are unnecessary, and document why any identified data is required.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Controls to prevent misuse

  • Segment benchmarking workspaces from marketing or non‑permitted uses; enforce role separation and access reviews.
  • Apply minimum necessary filters to dashboards, suppress small‑cell outputs that could enable reidentification, and log all disclosures.
  • When CMS provides benchmark or claims files under a DUA, honor redisclosure restrictions and beneficiary opt‑out flags.

HIPAA Business Associate Agreements

When BAAs are required

A Business Associate Agreement (BAA) is required when a vendor creates, receives, maintains, or transmits ePHI on your behalf. Typical ACO Business Associates include EHR and registry providers, analytics vendors, Health Information Exchange operators, cloud service providers, secure messaging tools, and care management platforms.

Essential BAA terms for ACOs

  • Permitted uses and disclosures, minimum necessary application, and prohibition on unauthorized redisclosure.
  • Administrative, physical, and technical safeguards; encryption expectations; and audit logging requirements.
  • Subcontractor flow‑down obligations so each downstream entity signs equivalent BAAs.
  • Security Incident Reporting and breach notification timeframes, required content, and cooperation duties.
  • Right to audit, corrective action processes, and data return or destruction at termination.

Structuring BAAs across complex ACO networks

ACO participants are typically Covered Entities; the ACO entity or its vendors may act as Business Associates to participants for shared services. Map each data flow and ensure your BAAs, DUAs, and participation agreements align so responsibilities are clear and non‑duplicative.

Beneficiary Data Sharing Rights

Transparency and required notices

Provide clear notices that explain how your ACO uses data for care coordination and quality improvement, how beneficiaries can exercise rights, and whom to contact with questions. Align language with your Notice of Privacy Practices and program requirements.

Medicare Beneficiary Opt-Out for claims data

Medicare beneficiaries may opt out of having their claims data shared with your ACO for care coordination and related operations. You must capture preferences, communicate them to data custodians, and suppress data in CMS requests and internal datasets accordingly. Opt‑out does not restrict disclosures necessary for treatment or payment.

Core HIPAA individual rights

  • Access: beneficiaries can obtain copies of their records in the requested format if readily producible.
  • Amendment: they may request corrections to inaccurate or incomplete information.
  • Accounting: upon request, provide an accounting of certain disclosures.
  • Restrictions and confidential communications: evaluate restriction requests and honor feasible alternatives for communications.

Cloud Service Provider Compliance

BAA and shared responsibility

Cloud platforms that store or process ePHI for your ACO are Business Associates and must sign a BAA. Clarify the shared responsibility model so you know which security controls the provider manages and which you must configure and monitor.

Technical safeguards to require

  • Encryption in transit and at rest, robust key management, and strict identity and access management with multifactor authentication.
  • Network segmentation, vulnerability management, continuous monitoring, and immutable, centrally stored audit logs.
  • Data segregation in multitenant environments, secure APIs, and protections for backups and disaster recovery replicas.
  • Clear Security Incident Reporting processes, including provider notifications and your escalation workflow.

Vendor due diligence and lifecycle controls

Evaluate security attestations, penetration testing summaries, and incident histories, and verify subcontractor oversight. At termination, require verifiable data return or destruction, revoke keys and identities, and document completion to close the chain of custody.

Conclusion

Successful ACO compliance blends the HIPAA Privacy Rule’s minimum necessary standard with disciplined security, precise DUAs and BAAs, and strong beneficiary rights processes. Build controls into daily operations—governance, auditing, and incident response—so data sharing advances quality and value while staying firmly compliant.

FAQs.

What are the HIPAA privacy requirements for ACOs?

You must use and disclose ePHI only for permitted purposes—treatment, payment, and healthcare operations—while applying the minimum necessary standard. Maintain administrative, physical, and technical safeguards, train your workforce, and document Security Incident Reporting and breach notification procedures. Use de‑identified data or limited data sets when identifiers are unnecessary.

How do ACOs manage data use agreements with CMS?

Designate a data custodian, control and log access, and restrict redisclosure to what the DUA permits. Encrypt and securely store CMS files, train authorized users, and suppress records for beneficiaries who exercise the Medicare Beneficiary Opt-Out. Maintain incident response plans that meet DUA notification requirements and document data destruction or return when the agreement ends.

What rights do beneficiaries have regarding data sharing?

Beneficiaries have HIPAA rights to access, request amendment, seek an accounting of certain disclosures, and request restrictions or confidential communications. For ACO programs, they may opt out of claims data sharing used for care coordination and operations; you must record and honor that choice without limiting disclosures necessary for treatment or payment.

How must ACOs ensure cloud provider compliance?

Execute a BAA with each cloud service provider, define the shared responsibility model, and require encryption, robust access controls, continuous monitoring, and immutable logs. Ensure subcontractor flow‑down, formalize Security Incident Reporting, and on termination verify complete data return or destruction with documented evidence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles