How the HITECH Act Changes Business Associate Duties: Practical Guidance and Examples
Expansion of Business Associate Definition
The HITECH Act broadened who counts as a business associate by focusing on functions performed with Protected Health Information (PHI). If an organization creates, receives, maintains, or transmits PHI for a covered entity—even without viewing the data—it is generally a business associate.
Entities newly or clearly encompassed include cloud service providers, data hosting or backup vendors, health information exchanges, e-prescribing gateways, analytics and billing vendors, and other data transmission services with routine access. Subcontractors that handle PHI on behalf of a business associate are also business associates, triggering direct HIPAA obligations and liability.
Only true “mere conduits” that transmit PHI transiently without persistent storage or access fall outside the definition. If your service stores PHI (even encrypted) or can access it, you should assume business associate status and implement the required controls.
Requirements for Business Associate Agreements
Business Associate Agreements (BAAs) must be specific, operational, and aligned to the HITECH Act. They should define permitted uses and disclosures, restrict unauthorized sharing, and embed Security Rule Safeguards and Breach Notification Rule duties.
- Permitted use and disclosure: Describe exactly how PHI may be used and shared, applying the minimum necessary standard.
- Security Rule Safeguards: Require administrative, physical, and technical protections appropriate to the risks and the services provided.
- Breach reporting: Mandate prompt reporting of breaches and security incidents, with timelines, required details, and cooperation expectations.
- Individual rights support: Commit to facilitating access, amendments, and accounting of disclosures when requested by the covered entity.
- Subcontractor Compliance: Flow down all BAA obligations to subcontractors that touch PHI, with proof of execution on request.
- Termination: Require return or destruction of PHI when the relationship ends, or continued protections if destruction is infeasible.
- Regulatory access: Permit HHS to review relevant records for HIPAA Enforcement Actions and compliance reviews.
Practical drafting tips
- Map each service to the specific PHI elements involved and the corresponding controls.
- Spell out breach coordination (who notifies whom, by when, and with what content) to avoid delays under the Breach Notification Rule.
- Include audit and monitoring rights to verify ongoing compliance.
Security Rule Compliance Obligations
Under HITECH, business associates are directly responsible for the HIPAA Security Rule. You must design, implement, and document safeguards that match your risk profile, not just what the covered entity requires.
Administrative safeguards
- Risk analysis and risk management: Perform initial and periodic Risk Assessment Procedures; track remediation to closure.
- Policies, training, and sanctions: Define acceptable use, access provisioning, incident response, and workforce training with enforcement.
- Contingency planning: Maintain backups, disaster recovery, and emergency operations plans; test them regularly.
- Vendor oversight: Incorporate Subcontractor Compliance into procurement, contracting, and performance reviews.
Physical safeguards
- Facility and workstation controls: Restrict physical access, secure workstations, and manage device and media disposal.
- Asset protection: Inventory systems that store PHI; apply locked storage, clean desk, and secure shipping/receiving practices.
Technical safeguards
- Access controls: Enforce unique IDs, strong authentication (MFA), role-based access, and timely deprovisioning.
- Audit controls: Log access and administrative actions; enable alerting for anomalous behavior and review logs routinely.
- Integrity and transmission security: Use hashing, backups, and secure channels (TLS); encrypt PHI at rest and in transit.
Document decisions, especially when choosing addressable controls. Clear rationale supports audits and reduces exposure in HIPAA Enforcement Actions.
Breach Notification Responsibilities
The Breach Notification Rule applies directly to business associates. When you discover a breach of unsecured PHI, you must notify the covered entity without unreasonable delay and no later than 60 calendar days from discovery.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Detection and assessment
- Presumption of breach: Assume a breach unless a documented risk assessment shows a low probability that PHI was compromised.
- Four-factor analysis: Evaluate the PHI’s nature and sensitivity, the unauthorized recipient, whether PHI was actually viewed or acquired, and mitigation effectiveness.
- Encryption safe harbor: Properly encrypted PHI is not “unsecured,” which can remove notification obligations for that event.
Notice content and coordination
- Provide the covered entity with the incident timeline, types of PHI, number of affected individuals, known causes, and remediation steps.
- Supply information needed for individual and HHS notices; your BAA can assign responsibility for external notifications.
- Maintain incident logs and post-incident reports to support audits and potential HIPAA Enforcement Actions.
Risk Assessment and Management Practices
Effective Risk Assessment Procedures transform compliance into consistent risk reduction. Perform them at onboarding, after major system changes, and at least annually.
Step-by-step approach
- Scope: Inventory systems, vendors, and data flows that handle PHI; identify where PHI is stored, processed, and transmitted.
- Threats and vulnerabilities: Consider human error, credential abuse, malware, third-party failures, and physical risks.
- Likelihood and impact: Rate inherent risk, then select and document Security Rule Safeguards to lower residual risk.
- Plan and track: Assign owners, deadlines, and budgets; monitor remediation and verify control effectiveness.
- Measure and improve: Use metrics like time-to-detect, time-to-contain, patch latency, and access review completion rates.
Keep executive summaries business-focused, but retain detailed technical evidence for auditors and internal governance.
Subcontractor Compliance Requirements
Because subcontractors that handle PHI are business associates, you must ensure their compliance is real, not assumed. Subcontractor Compliance requires due diligence, contractual flow-down, and ongoing oversight.
Program essentials
- Tier vendors by PHI volume and sensitivity; apply deeper reviews to higher-risk partners.
- Require signed BAAs before PHI flows; verify their Security Rule Safeguards and breach duties mirror your own.
- Assess security maturity through questionnaires, evidence (e.g., policies, diagrams, penetration tests), and independent audits where appropriate.
- Monitor performance with SLAs, security attestations, and periodic access and configuration reviews.
- Pre-negotiate incident cooperation: evidence preservation, forensic access, timelines, and shared communications.
Examples of HITECH Act Implementation
Cloud hosting provider for an EHR vendor
- Status: Business associate due to maintaining PHI, even with a “no-view” model.
- Actions: Execute BAAs, encrypt at rest and in transit, enforce MFA and privileged access controls, and enable audit logging with alerting.
- Breach readiness: Pre-build notification templates and contact trees; test restoration of encrypted backups to meet contingency requirements.
Medical billing company
- Status: Business associate creating and transmitting PHI to payers.
- Actions: Perform a risk analysis, restrict workforce access by role, conduct monthly access reviews, and log disclosures for accounting requests.
- Breach response: Notify the covered entity within contractually agreed timeframes (sooner than 60 days), providing affected counts and mitigation steps.
Telehealth platform
- Status: Business associate processing PHI via video, messaging, and scheduling.
- Actions: Harden APIs, apply rate limiting, segregate environments, and run periodic penetration tests; document Security Rule Safeguards and training.
- Subcontractors: Flow down BAAs to SMS and email providers; validate encryption and data retention controls.
Analytics firm supporting quality improvement
- Status: Business associate receiving de-identified and identifiable datasets for operations.
- Actions: Separate environments for de-identified data, manage re-identification risk, and tightly control data exports with audit trails.
- Governance: Review data minimization quarterly and renew vendor attestations; prepare artifacts for potential HIPAA Enforcement Actions.
Bottom line: Understand whether you handle PHI, lock down controls with Security Rule Safeguards, enforce strong BAAs, prepare for the Breach Notification Rule, and manage Subcontractor Compliance with the same rigor you apply internally. That is how the HITECH Act changes business associate duties in practice—and how you can operationalize compliance with confidence.
FAQs.
What new responsibilities do business associates have under the HITECH Act?
They are directly liable for HIPAA compliance, not just contractually obligated. This includes implementing Security Rule Safeguards, reporting breaches of unsecured PHI under the Breach Notification Rule, cooperating with investigations and HIPAA Enforcement Actions, and ensuring subcontractors that handle PHI meet the same standards.
How must business associate agreements be updated for HITECH compliance?
Update BAAs to define permitted uses/disclosures, require appropriate safeguards, mandate timely breach and incident reporting with specific content, support individual rights, allow HHS access for compliance reviews, flow down obligations to subcontractors, and require return or destruction of PHI at termination.
What are the specific breach notification requirements for business associates?
Notify the covered entity without unreasonable delay and no later than 60 days from discovery of a breach of unsecured PHI. Provide the incident timeline, type of PHI, affected individuals, what happened, mitigation steps, and information needed for the covered entity’s individual and HHS notices. Document the risk assessment supporting your determination.
How can business associates ensure subcontractor compliance with HIPAA?
Conduct risk-based due diligence, execute BAAs before PHI flows, verify controls through evidence and periodic assessments, monitor performance with SLAs and attestations, and predefine incident cooperation, including timelines and forensic access. Treat subcontractors as extensions of your own control environment and enforce the same safeguards.
Table of Contents
- Expansion of Business Associate Definition
- Requirements for Business Associate Agreements
- Security Rule Compliance Obligations
- Breach Notification Responsibilities
- Risk Assessment and Management Practices
- Subcontractor Compliance Requirements
- Examples of HITECH Act Implementation
-
FAQs.
- What new responsibilities do business associates have under the HITECH Act?
- How must business associate agreements be updated for HITECH compliance?
- What are the specific breach notification requirements for business associates?
- How can business associates ensure subcontractor compliance with HIPAA?
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.