HIPAA Requirements for Medical Billing Companies: Coverage Status and Obligations

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Requirements for Medical Billing Companies: Coverage Status and Obligations

Kevin Henry

HIPAA

January 20, 2025

7 minutes read
Share this article
HIPAA Requirements for Medical Billing Companies: Coverage Status and Obligations

As a medical billing company, you handle protected health information (PHI) every day. This guide clarifies your HIPAA coverage status and the practical obligations you must meet across the Privacy, Security, and Breach Notification Rules—plus what to lock into your business associate agreement and how to sustain compliance through training.

HIPAA Applicability to Medical Billing Companies

Coverage status: business associate by default

Medical billing companies are generally business associates, not covered entities. You become a business associate when a provider, health plan, or other covered entity discloses PHI to you so you can perform billing, collections, or revenue cycle tasks on its behalf. As a business associate, you are directly liable for HIPAA violations tied to the uses, disclosures, and safeguards of PHI.

When a billing company can be a covered entity

If your organization performs health care clearinghouse functions (for example, translating nonstandard data into HIPAA-standard transactions), you may also qualify as a covered entity for those functions. In that case, you must meet both covered entity duties for the clearinghouse role and business associate duties for services you provide to clients.

Core obligations that always apply

  • Execute and honor a business associate agreement (BAA) with each client and applicable subcontractor.
  • Use and disclose PHI only as permitted by the Privacy Rule and your BAA, following the minimum necessary standard.
  • Implement administrative safeguards, physical safeguards, and technical safeguards for ePHI under the Security Rule.
  • Provide breach notification to clients without unreasonable delay and support their downstream notifications.

Privacy Rule Requirements

Permissible uses and the minimum necessary standard

You may use or disclose PHI only to perform contracted services (payment, health care operations) or as otherwise permitted by your BAA and the Privacy Rule. Apply the minimum necessary standard to limit PHI access, queries, and disclosures to what is reasonably needed for the task.

Supporting individual rights

While covered entities respond to patient requests, you must enable them to meet those obligations. On request from a client, you must provide access to PHI you hold, support corrections, and supply information needed for an accounting of disclosures within agreed timeframes.

Policies, safeguards, and incident management

Adopt written privacy policies that govern workforce access to PHI, sanction policy for violations, and procedures to mitigate improper uses or disclosures. Ensure subcontractors who handle PHI agree in writing to the same restrictions and safeguards, including secure communication protocols when exchanging PHI.

Security Rule Requirements

Risk analysis and administrative safeguards

Perform an enterprise-wide risk analysis covering all systems that create, receive, maintain, or transmit ePHI. Use the results to drive risk management, assign security responsibility, control workforce access, train personnel, and evaluate vendors and cloud services handling ePHI.

Technical safeguards that matter day to day

  • Access control: role-based access, unique user IDs, and MFA for remote or privileged access.
  • Audit controls: centralize logs, monitor access to ePHI, and review alerts for anomalous behavior.
  • Integrity: hashing and change monitoring to detect unauthorized alteration of billing records.
  • Transmission security: enforce secure communication protocols (TLS 1.2+ for web/API, S/MIME for email where feasible, VPN or IPSec for site-to-site).

Encryption requirements: “addressable,” not optional

HIPAA treats encryption as an addressable implementation, meaning you must implement encryption at rest and in transit when reasonable and appropriate—or document why an alternative control achieves equivalent risk reduction. In practice, disk/database encryption for servers and laptops, mobile device encryption, and strict key management are expected for ePHI.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Physical safeguards and device/media controls

  • Secure facilities and server rooms; restrict and log access.
  • Establish workstation security baselines, automatic screen locks, and clean desk procedures.
  • Control media: inventory, encrypt, and sanitize or destroy devices before reuse or disposal.

Breach Notification Rule

What constitutes a breach

A breach is an impermissible use or disclosure of unsecured PHI that compromises its privacy or security. You must conduct a four-factor risk assessment (nature of PHI, recipient, whether PHI was actually viewed or acquired, and mitigation) to determine if notification is required.

Timelines and whom to notify

As a business associate, you must notify the affected covered entity without unreasonable delay and no later than 60 calendar days after discovery. Many BAAs set shorter internal timelines; align your incident response plan to meet the strictest contractual requirement.

What your notice should include

  • Brief description of what happened and the discovery date.
  • Types of PHI involved (for example, names, account numbers, diagnoses).
  • Number of affected individuals and whether data was viewed or acquired.
  • Mitigation steps taken, steps individuals should take, and contact details.
  • Documentation to support the covered entity’s individual and regulator notifications.

Business Associate Agreement Obligations

Core provisions to include

  • Permitted uses/disclosures tied to defined services and the minimum necessary standard.
  • Requirements to implement administrative safeguards, physical safeguards, and technical safeguards.
  • Prompt breach notification and incident cooperation duties.
  • Flow-down clauses binding subcontractors to the same protections.
  • Support for access, amendment, and accounting requests.
  • Return or destruction of PHI at termination, if feasible.
  • Right to audit/verify compliance and remedies for non-compliance.

Operational details that reduce risk

  • Encryption requirements for data at rest and in transit and secure communication protocols for all PHI exchanges.
  • Configuration standards (endpoint hardening, patch timelines, logging) and incident response SLAs.
  • Cyber insurance and indemnification aligned to your risk profile and data volumes.

Penalties for Non-Compliance

Civil enforcement

HHS OCR applies a four-tier penalty structure based on culpability—from reasonable cause to willful neglect not corrected. Penalties may include substantial per-violation fines, annual caps, corrective action plans, outside monitoring, and mandated reports.

Criminal exposure

Knowingly obtaining or disclosing PHI in violation of HIPAA can trigger criminal penalties, with increased consequences for false pretenses or intent to sell, transfer, or use PHI for personal gain or malicious harm.

Contractual and reputational impact

Separate from regulators, breaching your BAA can lead to contract termination, indemnity claims, and loss of client trust—often more damaging than the monetary fines themselves.

Training and Awareness Programs

Role-based, risk-based training

Provide onboarding and periodic training tailored to job duties—front-end posters, coding staff, account specialists, and IT administrators need different depth. Emphasize PHI handling, the minimum necessary standard, and incident reporting.

Ongoing awareness and testing

Run regular phishing simulations, reinforce secure communication protocols, and conduct tabletop exercises for breach notification. Update training whenever policies, systems, or regulations change.

Document everything

Maintain training records, attendance logs, updated policies, and evidence of sanctions and remediation. Documentation shows due diligence and materially reduces enforcement risk.

Conclusion

In short, you operate as a business associate and must meet the Privacy, Security, and Breach Notification Rules, reinforced by a robust business associate agreement. Use minimum necessary access, implement strong encryption and other safeguards, standardize secure communication, and sustain compliance through role-based training and thorough documentation.

FAQs.

Is a medical billing company considered a covered entity under HIPAA?

Typically no. A billing company is a business associate of its provider or plan clients. If it performs health care clearinghouse functions, it may also be a covered entity for those specific activities, while still retaining business associate duties for client services.

What are the HIPAA compliance obligations for medical billing companies?

You must follow the Privacy Rule’s permitted uses and the minimum necessary standard, implement Security Rule safeguards for ePHI, execute and honor a business associate agreement, and provide timely breach notification and incident cooperation. You must also support client requests for access, amendments, and accounting.

How do business associate agreements protect PHI?

BAAs authorize specific uses/disclosures, require administrative safeguards and technical controls, set encryption requirements and secure communication protocols, mandate breach notification, bind subcontractors to the same protections, and require PHI return or destruction at contract end.

What penalties apply for HIPAA violations by billing companies?

Penalties range from civil monetary fines under a tiered structure and corrective action plans to potential criminal charges for egregious misconduct. Contractual remedies in your BAA—like indemnification and termination—can add significant financial and reputational consequences.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles