How to Draft a HIPAA-Compliant Business Associate Agreement: Checklist and Common Pitfalls

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Draft a HIPAA-Compliant Business Associate Agreement: Checklist and Common Pitfalls

Kevin Henry

HIPAA

August 09, 2024

7 minutes read
Share this article
How to Draft a HIPAA-Compliant Business Associate Agreement: Checklist and Common Pitfalls

Understanding Business Associate Agreement Requirements

A Business Associate Agreement (BAA) is the contract that allows you to share Protected Health Information with vendors that create, receive, maintain, or transmit it on your behalf. It defines Business Associate Obligations and binds the vendor to HIPAA’s Privacy and Security Rules.

Business associates are directly liable for improper use or disclosure of PHI and for failing to safeguard it. A written BAA is required before PHI moves, even if the vendor only stores encrypted data or provides cloud services.

Checklist: When a BAA is required

  • The vendor will access, store, transmit, or process PHI for your organization.
  • The service isn’t limited to true “conduit” functions (for example, routine transport without access to content).
  • Only de-identified data is not involved; if re-identification is possible, treat it as PHI.
  • Subcontractor Compliance is addressed for any downstream vendors that may handle PHI.

Business Associate Obligations at a glance

  • Use and disclose PHI only as permitted by the BAA and law.
  • Implement safeguards consistent with the Privacy and Security Rules.
  • Report security incidents and breaches promptly and cooperate on remediation.
  • Support access, amendment, and accounting of disclosures for individuals.
  • Return or destroy PHI at termination, unless infeasible, with protections continuing thereafter.

Including Key Provisions in BAAs

Strong BAAs translate legal requirements into operational guardrails. Your language should be clear, specific, and aligned to how services are actually delivered.

Core clauses to include

  • Permitted uses and disclosures: define what the business associate may do with PHI and prohibit anything else.
  • Safeguards: require administrative, physical, and technical controls that meet the Privacy and Security Rules, including risk analysis, access controls, encryption, and logging.
  • Minimum necessary: limit PHI access to what is needed for the service.
  • Subcontractor Compliance: ensure all subcontractors agree to the same restrictions and protections before receiving PHI.
  • Incident and breach reporting: require prompt notice of suspected incidents and formal notification of confirmed breaches, with details necessary for your response.
  • Support for individual rights: assistance with access, amendments, and accounting of disclosures.
  • HHS access and audit cooperation: acknowledge regulators’ right to obtain compliance-related information.
  • Return or destruction of PHI: clear timelines and secure methods at termination or upon request.
  • Documentation and records retention: maintain evidence of compliance and make it available upon request.
  • Security and privacy performance metrics and right-to-audit clauses.
  • Incident response participation, including tabletop exercises and joint coordination.
  • Geographic restrictions to control offshore access to PHI.
  • Cyber insurance requirements proportionate to risk and data volume.
  • Indemnification and liability caps aligned with the sensitivity and scale of PHI handled.

Identifying and Managing Business Associates

Map your data flows to identify every vendor touching PHI. Include consultants, cloud and SaaS providers, transcription and billing services, and any partner that can access PHI, even if access is incidental.

Adopt a risk-based vendor management program. Tier vendors by PHI volume and criticality, and scale due diligence accordingly—light screening for low-risk services, deeper assessments for high-impact vendors.

Vendor due diligence checklist

  • Service description and PHI categories involved, including minimum necessary scope.
  • Security program overview, recent risk assessments, and remediation status.
  • Access controls, encryption practices, logging, and vulnerability management.
  • Incident response capabilities and Breach Notification Procedures.
  • Subcontractor lists and evidence of Subcontractor Compliance.
  • Business continuity and disaster recovery testing cadence and results.

Implementing Compliance and Security Measures

Controls must match the sensitivity of PHI and the service model. Specify safeguards that reflect the Privacy and Security Rules and how your vendor operates in practice.

Security and privacy checklist

  • Governance: named security officer, written policies, and workforce training with sanctions for violations.
  • Identity and access: unique user IDs, multifactor authentication, least privilege, and timely offboarding.
  • Protection: encryption in transit and at rest, endpoint hardening, secure software development, and patching.
  • Monitoring: audit logs, alerting, third-party penetration testing, and vulnerability scanning.
  • Resilience: backups, disaster recovery objectives, and tested restore procedures.
  • Data lifecycle: retention schedules, secure disposal, and verified deletion at contract end.

Document how you will verify these measures. Require periodic attestations, control reports, or targeted assessments for high-risk vendors.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Establishing Breach Notification Procedures

Your BAA should define how incidents are identified, escalated, and communicated. Distinguish between routine security incidents and a reportable breach of unsecured PHI.

Set expectations for timing: immediate awareness notices for suspected incidents and formal breach notices without unreasonable delay and within the outer regulatory limit. Require content sufficient for your legal and operational response.

Breach notification checklist

  • Rapid internal escalation and containment steps at the business associate.
  • Initial notice to you with known facts, affected systems, and interim actions.
  • Formal notice including what happened, PHI involved, number of individuals, mitigation steps, and a point of contact.
  • Coordination on individual notifications, regulator reporting, and media notices when required.
  • Post-incident review, corrective action plans, and evidence of completed remediation.

Avoiding Common Pitfalls in BAAs

Vague terms create risk. Avoid language that allows broad PHI use, silent subcontracting, or undefined “reasonable” security without minimum baselines.

  • Unclear PHI scope or purpose of use.
  • Overlong or undefined reporting timelines that delay your response.
  • Missing Subcontractor Compliance obligations and flow-down requirements.
  • No right to audit or lack of cooperation language for investigations.
  • Data return and secure destruction not specified with verifiable methods.
  • Cross-border access not addressed, creating exposure under state laws and contracts.
  • Liability caps misaligned with potential impact, despite real HIPAA Enforcement Actions risk.

Review indemnities, insurance, and remediation commitments together. Align them with your risk assessment and the volume and sensitivity of PHI involved.

Conducting Regular Compliance Monitoring and Updates

BAAs are living documents. Establish cadence to test controls, confirm training, review incident logs, and validate that services still match the permitted uses and minimum necessary scope.

  • Annual or risk-triggered reassessments of high-impact vendors.
  • Evidence reviews: policies, risk assessments, penetration tests, and remediation artifacts.
  • Tabletop exercises to practice Breach Notification Procedures and decision-making.
  • Regulatory Update Requirements: track rule changes and notable HIPAA Enforcement Actions, then update BAAs and controls.
  • Contract management: verify timely amendments, renewals, and termination tasks, including PHI deletion certification.

In summary, a HIPAA-Compliant Business Associate Agreement hinges on precise scope, enforceable safeguards, rapid and coordinated incident handling, and ongoing oversight. Treat the BAA as both a legal instrument and an operational playbook to protect PHI and reduce risk.

FAQs

What are the essential elements of a HIPAA Business Associate Agreement?

At minimum, a HIPAA Business Associate Agreement should define permitted uses and disclosures of Protected Health Information, required safeguards under HIPAA’s Privacy and Security Rules, Subcontractor Compliance, incident and breach reporting duties, support for individual rights, HHS access and cooperation, and PHI return or destruction at termination. Many organizations also include audit rights, insurance, and indemnification to strengthen Business Associate Obligations.

How often should a BAA be reviewed and updated?

Review BAAs on a defined schedule—at least annually for higher-risk vendors—and whenever services change, a significant incident occurs, or new laws, guidance, or industry practices emerge. Build Regulatory Update Requirements into your vendor management program so contractual language evolves with your risk and compliance posture.

What are the consequences of failing to execute a BAA?

Without a valid BAA, sharing PHI with a vendor is a compliance violation that can trigger investigations, corrective action plans, monetary penalties, and reputational damage. Both covered entities and business associates can face HIPAA Enforcement Actions, alongside contract disputes and loss of customer trust.

How should breach notifications be handled under a BAA?

The BAA should require immediate awareness notification of suspected incidents, followed by formal written notice of confirmed breaches without unreasonable delay and within the regulatory outer limit. It should specify required content, cooperation on investigation and remediation, and coordination on notifying affected individuals, regulators, and, when applicable, the media.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles