How to Identify a HIPAA Business Associate: Examples and a Simple Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Identify a HIPAA Business Associate: Examples and a Simple Checklist

Kevin Henry

HIPAA

September 10, 2025

7 minutes read
Share this article
How to Identify a HIPAA Business Associate: Examples and a Simple Checklist

Understanding HIPAA Business Associate Definition

What a Business Associate is under the HIPAA Privacy Rule

A Business Associate is any person or organization, outside a Covered Entity’s workforce, that creates, receives, maintains, or transmits Protected Health Information (PHI) for functions or services regulated by HIPAA. If a vendor touches PHI to perform work on behalf of a Covered Entity—or on behalf of another Business Associate—it falls within the Business Associate scope.

Covered Entity versus Business Associate

Covered Entities include health plans, most healthcare providers, and healthcare clearinghouses. Business Associates support these entities with services that involve PHI, such as IT hosting or billing. Importantly, a provider disclosing PHI to another provider for treatment is not creating a Business Associate relationship; that disclosure is permitted for treatment purposes under the HIPAA Privacy Rule.

Subcontractors and the “downstream” rule

Any subcontractor of a Business Associate that creates, receives, maintains, or transmits PHI is also a Business Associate. This extends the obligation chain, ensuring PHI receives consistent data safeguarding across every layer that handles it.

When a vendor is not a Business Associate

Not all vendors qualify. Workforce members are not Business Associates. Pure “conduits” that only transport information (like postal or certain telecom services) without routine access to PHI are typically excluded. Vendors working solely with properly de-identified data are also outside the definition.

Common Examples of Business Associates

  • Cloud service providers, data centers, managed service providers, and IT support that host or manage systems containing PHI.
  • Billing, coding, claims processing, revenue cycle vendors, and third-party administrators handling PHI to perform plan or provider operations.
  • Health information exchanges, EHR/EMR vendors, patient portal platforms, telehealth and e-prescribing platforms that store or transmit PHI.
  • Medical transcription, scanning, imaging, and records storage or destruction services managing PHI in any form.
  • Communication vendors sending appointment reminders, secure messaging, or texts/emails that include PHI.
  • Analytics, quality reporting, population health, and data warehousing vendors using PHI for healthcare operations.
  • Professional services—law firms, accountants, auditors, and specialized consultants—when the engagement requires access to PHI.
  • Marketing or outreach vendors only when they receive PHI from a Covered Entity (for example, targeted patient campaigns permitted under HIPAA rules).

Key Criteria for Identification

Decision factors you can apply consistently

  • PHI touchpoint: Will the vendor create, receive, maintain, or transmit PHI—even incidentally—as part of the engagement?
  • “On behalf of” test: Is the vendor performing a function or service for the Covered Entity (or another Business Associate) that is governed by the HIPAA Privacy Rule?
  • Access type and duration: Is access persistent or routine (storage, admin access, backups) versus genuinely incidental or one-time?
  • Purpose of disclosure: If the disclosure is for treatment, the recipient is generally not a Business Associate for that activity.
  • Data state: If the vendor uses only properly de-identified data, it is not a Business Associate for that work.
  • Conduit exception: Simple transmission without access to content typically does not create a Business Associate relationship.
  • Subcontractors: Any downstream party handling PHI for your vendor inherits Business Associate status.
  • Risk Assessment alignment: Evaluate real-world data flows, not just contract language; classification should match how PHI actually moves.

Importance of Business Associate Agreements

What a Business Associate Agreement must accomplish

A Business Associate Agreement (BAA) establishes permissible uses and disclosures of PHI, mandates safeguards, and sets accountability. It is the legal backbone protecting PHI when services extend beyond the Covered Entity.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Define permitted and required uses/disclosures of PHI and prohibit anything not expressly allowed.
  • Require administrative, physical, and technical data safeguarding aligned with the HIPAA Privacy Rule and Security Rule.
  • Mandate breach and security incident reporting timelines and cooperation on investigation and notification.
  • Flow-down: require subcontractors to sign equivalent obligations before they touch PHI.
  • Support individual rights by enabling access, amendment, and accounting of disclosures, as applicable.
  • Specify return or destruction of PHI upon contract termination and allow verification of destruction when feasible.
  • Acknowledge oversight by regulators and identify termination rights for material breach.

Compliance Responsibilities

Covered Entity responsibilities

You must classify vendors correctly, execute BAAs where required, and apply the minimum necessary standard. Perform pre-contract due diligence, validate controls, and maintain an up-to-date inventory of Business Associates with contact points, services, data flows, and review dates.

Business Associate responsibilities

Business Associates must conduct a documented Risk Assessment, implement and monitor safeguards, train their workforce, manage subcontractors, and report incidents promptly. They should maintain policies, audit logs, and evidence that controls operate effectively over time.

Shared duties and program alignment

Both parties should coordinate incident response, test contingency plans, and exchange assurances at reasonable intervals. Map controls to a practical compliance framework to drive consistency and measurable data safeguarding across the relationship.

Implementing the Identification Checklist

Simple identification checklist you can apply today

  1. Describe the service: What function will the vendor perform and for whom (Covered Entity or Business Associate)?
  2. Map PHI flows: Will any PHI be created, received, maintained, or transmitted by the vendor or its tools?
  3. Clarify data state: Is the data identifiable PHI, limited data set, or de-identified?
  4. Assess access type: Storage, admin access, analytics, backups, support tickets, or purely incidental?
  5. Test exceptions: Is this solely a treatment disclosure, or a true conduit with no routine access?
  6. Check subcontractors: Will downstream parties touch PHI? If yes, require flow-down obligations.
  7. Decide classification: If PHI is touched on your behalf, classify as a Business Associate.
  8. Execute a BAA: Use a standardized template with required provisions before any PHI is shared.
  9. Perform due diligence: Review security controls, Risk Assessment results, and key safeguards.
  10. Apply least-necessary PHI: Limit, mask, or de-identify wherever feasible.
  11. Record and track: Enter the vendor, services, PHI elements, and review cadence in your register.
  12. Reassess on change: Reevaluate classification whenever scope, systems, or data flows change.

Documentation to capture

  • Service description, classification decision, and rationale tied to the HIPAA Privacy Rule criteria.
  • Data flow diagram, PHI elements, systems involved, and access types.
  • Executed Business Associate Agreement, due diligence results, and monitoring plan.

Monitoring and Auditing Business Associates

Risk-based oversight model

Tier Business Associates by inherent risk (volume/sensitivity of PHI, access level, criticality). Set review frequencies, evidence requirements, and escalation paths by tier to focus effort where it matters most.

Practical monitoring activities

  • Onboarding checks: verify BAA terms, confirm encryption, access controls, and incident reporting contacts.
  • Periodic reviews: obtain attestations, policy updates, penetration or vulnerability testing summaries, and training metrics.
  • Access oversight: sample admin accounts, review log retention, and validate revocation of terminated users.
  • Event management: rehearse incident response, confirm notification timelines, and share lessons learned.
  • Offboarding: ensure return or certified destruction of PHI and revoke integrations and credentials.

Program improvement

Integrate monitoring results into your Compliance Framework, update your Risk Assessment, and refine BAAs to address recurring issues. Continuous feedback helps keep PHI protections effective as systems and vendors evolve.

Conclusion

To identify a HIPAA Business Associate, focus on whether a vendor handles PHI on your behalf. Use the criteria above, apply the simple checklist, and anchor the relationship with a solid Business Associate Agreement. Ongoing, risk-based oversight keeps Protected Health Information secure and your compliance program resilient.

FAQs.

What qualifies an entity as a HIPAA Business Associate?

An entity qualifies as a Business Associate when, outside a Covered Entity’s workforce, it creates, receives, maintains, or transmits PHI to perform functions or services on the Covered Entity’s behalf (or for another Business Associate). Subcontractors that handle PHI for a Business Associate are also Business Associates.

How does a Business Associate Agreement protect PHI?

A BAA limits permitted uses and disclosures of PHI, requires specific data safeguarding controls, mandates timely incident and breach reporting, and flows those obligations down to subcontractors. It also covers return or destruction of PHI at termination and supports individual rights where applicable.

Are consultants considered HIPAA Business Associates?

Yes—if their engagement requires access to PHI (for example, a security consultant reviewing systems that store PHI or a compliance advisor analyzing sampled records). Consultants who never access PHI, or work solely with de-identified data, are generally not Business Associates.

What are the compliance risks of misidentifying a Business Associate?

Misclassification can lead to unprotected PHI sharing, missing BAAs, delayed breach notifications, regulatory findings, and civil penalties. It also increases operational risk by obscuring who must maintain safeguards, perform reporting, and undergo monitoring.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles