How the HIPAA Omnibus Rule Changed Business Associate Agreements: Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How the HIPAA Omnibus Rule Changed Business Associate Agreements: Best Practices

Kevin Henry

HIPAA

August 24, 2024

7 minutes read
Share this article
How the HIPAA Omnibus Rule Changed Business Associate Agreements: Best Practices

Expanded Definition of Business Associate

The HIPAA Omnibus Rule broadened who counts as a business associate, bringing many vendors squarely within HIPAA. Any entity that creates, receives, maintains, or transmits Protected Health Information (PHI) on behalf of a covered entity—or on behalf of another business associate—is now included. This specifically captures subcontractors, not just primary vendors.

Examples now routinely treated as business associates include cloud service providers that “maintain” PHI, data transmission vendors with more than a mere conduit role, health information organizations, e‑prescribing gateways, and personal health record providers when offered on behalf of a covered entity. The narrow “conduit” exception applies only to entities that transport PHI without persistent access.

  • Inventory all third parties and subcontractors that touch PHI, mapping data flows to confirm who has routine or potential access.
  • Classify “mere conduits” conservatively; if a vendor stores or can view PHI, treat it as a business associate.
  • Flow down Business Associate Agreements to subcontractors to align Subcontractor Obligations with your primary contracts.

Direct Liability of Business Associates

Under the Omnibus Rule, business associates are directly liable for compliance—not just contractually accountable to covered entities. They must meet Security Rule Compliance in full and follow specified Privacy Rule Provisions, including minimum necessary, restrictions on uses and disclosures, and breach reporting duties.

Business associates can face HIPAA Enforcement actions for impermissible uses or disclosures, failing to provide breach notifications, not entering into required subcontractor agreements, lacking appropriate safeguards, or failing to provide access, amendment, and accounting support to the covered entity.

  • Designate privacy and security leaders, perform a documented risk analysis, and implement risk management with technical, administrative, and physical safeguards.
  • Train workforce members on permitted uses/disclosures, minimum necessary, and incident response.
  • Establish vendor oversight: due diligence, BAAs with flow‑down clauses, and ongoing monitoring.

Required Provisions in Business Associate Agreements

The Omnibus Rule updated the core terms BAAs must include so obligations mirror statutory requirements and extend downstream. At minimum, your agreements should require the business associate to:

  • Use and disclose PHI only as permitted by the BAA or as required by law, applying the minimum necessary standard.
  • Implement safeguards that satisfy the HIPAA Security Rule and relevant Privacy Rule Provisions.
  • Report any security incident and potential breach without unreasonable delay, including content needed for the covered entity’s notifications.
  • Ensure Subcontractor Obligations by obtaining written assurances that subcontractors will comply with the same restrictions and safeguards.
  • Support individual rights: access, amendment, and accounting of disclosures as applicable.
  • Make internal practices and records available to the Secretary of HHS for compliance reviews.
  • Return or securely destroy PHI at termination, if feasible; otherwise extend protections.
  • Authorize termination for material breach of HIPAA obligations.

Best‑practice clauses often tighten timelines (for example, 5–15 business days for incident reporting), clarify breach risk assessments, add audit rights, document encryption standards, and set cyber insurance expectations—all while avoiding conflicts with the Breach Notification Rule.

Breach Notification Changes

The Omnibus Rule established a presumption that any impermissible use or disclosure of unsecured PHI is a breach unless a documented risk assessment shows a low probability of compromise. That assessment considers four factors: the nature and extent of PHI involved, the unauthorized person, whether the PHI was actually acquired or viewed, and the extent of risk mitigation.

Business associates must notify covered entities without unreasonable delay and no later than 60 calendar days after discovery. Covered entities then notify affected individuals, HHS, and in some cases the media, consistent with the Breach Notification Rule. Encryption and proper disposal provide “safe harbor” by securing PHI, reducing reportable events.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Standardize incident intake and triage, distinguishing security incidents from reportable breaches.
  • Pre‑agree on notification timelines and required data elements (event description, PHI types, affected counts, mitigation, and prevention steps).
  • Adopt strong encryption for data at rest and in transit, and test de‑identification or tokenization where feasible.

Enforcement and Penalties

OCR may bring actions directly against business associates for violations, using a four‑tier penalty framework that escalates from lack of knowledge to willful neglect not corrected. Penalties apply per violation, with annual caps per identical provision; amounts are adjusted for inflation. Contract breaches can also trigger indemnity, termination, and reputational harm beyond regulatory fines.

  • Document your risk analysis, risk management, training, and evaluations—these artifacts are critical in investigations and audits.
  • Conduct periodic technical testing (for example, access reviews, encryption verification, and log monitoring) and keep evidence.
  • Use corrective action plans promptly when gaps are found, and track them to closure.

Updated Privacy Policies

Covered entities and business associates should update privacy and security policies to reflect Omnibus changes that affect Business Associate Agreements. Policies must address marketing and sale of PHI restrictions, fundraising opt‑outs, the right to restrict certain disclosures to health plans when services are paid out of pocket, and enhanced breach processes.

Align your Notice of Privacy Practices, role‑based access, minimum necessary rules, and retention practices with your BAAs. Ensure your vendors’ procedures mirror your own, especially around incident response, patient rights workflows, and data retention and destruction.

  • Map policy requirements to contract clauses so operational steps (access requests, amendments, accounting) are supported end‑to‑end.
  • Train staff and vendors on revised policies and escalate exceptions through defined governance channels.

Compliance Deadlines

The Omnibus Final Rule took effect on March 26, 2013. The general compliance date was September 23, 2013. A transition provision allowed certain existing BAAs executed before January 25, 2013—and not modified between March 26, 2013 and September 23, 2013—to remain in place until the earlier of renewal/modification on or after September 23, 2013, or September 22, 2014.

While these dates have passed, you should retain documentation demonstrating when BAAs were updated, how policies were revised, and how your risk analysis and training aligned with those deadlines. That evidence remains relevant in audits and investigations.

In practice, maintaining an evergreen BAA template, a vendor inventory with renewal dates, and a change‑control log keeps you continuously compliant as regulations, guidance, and technologies evolve.

FAQs

What is the expanded definition of a business associate under the Omnibus Rule?

It includes any entity that creates, receives, maintains, or transmits PHI on behalf of a covered entity or another business associate. Beyond traditional billing or claims vendors, this captures cloud and hosting providers, data transmission services with routine or potential access, health information organizations, e‑prescribing gateways, personal health record vendors operating for covered entities, and all subcontractors performing these functions. Mere conduits that only transport PHI without persistent access are excluded.

How does the Omnibus Rule affect breach notification responsibilities?

It presumes an impermissible use or disclosure of unsecured PHI is a breach unless a documented four‑factor risk assessment shows a low probability of compromise. Business associates must notify the covered entity without unreasonable delay and no later than 60 days after discovery, supplying details needed for individual, HHS, and—when applicable—media notifications under the Breach Notification Rule.

What are the penalty ranges for HIPAA non-compliance under the Omnibus Rule?

The Omnibus framework applies a four‑tier civil penalty structure ranging from $100 up to $50,000 per violation, with annual caps up to $1.5 million per identical provision. Amounts are adjusted periodically for inflation, and penalties escalate for willful neglect and failures not corrected in a timely manner. Business associates are directly subject to these penalties.

When must existing BAAs be updated to comply with the Omnibus Rule?

Most BAAs had to comply by September 23, 2013. A transition provision allowed qualifying BAAs executed before January 25, 2013—and not modified between March 26, 2013 and September 23, 2013—to continue until the earlier of renewal or modification on or after September 23, 2013, or September 22, 2014. After that, all BAAs must reflect Omnibus requirements, including subcontractor flow‑down and breach reporting terms.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles