Identify Covered Entity or Business Associate: HIPAA Decision Tool and Checklist

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Identify Covered Entity or Business Associate: HIPAA Decision Tool and Checklist

Kevin Henry

HIPAA

January 14, 2025

9 minutes read
Share this article
Identify Covered Entity or Business Associate: HIPAA Decision Tool and Checklist

Use this HIPAA decision tool and checklist to quickly determine whether you are a covered entity or a business associate and what that means for your obligations. You will learn how to apply the HIPAA Privacy Rule, HIPAA Security Rule, and Breach Notification Rule in practical steps.

Start by classifying your role, then adopt the appropriate safeguards, agreements, and breach processes. Throughout, treat Protected Health Information (PHI) with the minimum necessary standard and document every decision that affects risk.

Assessing Covered Entity Status

You are a HIPAA covered entity if you are a health plan, a healthcare clearinghouse, or a health care provider who transmits health information electronically in connection with standard transactions (such as claims, eligibility, or remittance). If none of these apply, evaluate whether you instead act as a business associate.

Quick status checks

  • Do you operate a health plan (group health plan, insurer, HMO, Medicare, Medicaid, etc.)? If yes, you are a covered entity and must meet Health Plan Compliance obligations.
  • Do you provide medical or health services and bill or conduct standard electronic transactions? If yes, you are a covered entity provider.
  • Do you convert nonstandard data to standard formats or process transactions for others? If yes, you meet Healthcare Clearinghouse Requirements and are a covered entity.
  • Are you a hybrid organization? If so, formally designate covered health care components and apply HIPAA to those components.

Health Plan Compliance

Health plans must maintain a Notice of Privacy Practices, apply minimum necessary, manage member rights (access, amendment, restriction requests), oversee vendors with Business Associate Agreements, and implement Security Rule safeguards across enrollment, claims, and customer service systems.

Healthcare Clearinghouse Requirements

Clearinghouses must safeguard PHI they create, receive, maintain, or transmit while transforming transactions. Apply robust access controls, encryption, integrity monitoring, and audit logging to data translation environments and any persistent message stores.

Utilizing Business Associate Decision Trees

A business associate is a person or entity that performs services or functions for a covered entity (or another business associate) that involve creating, receiving, maintaining, or transmitting PHI. Subcontractors that handle PHI are business associates, too.

Business associate decision flow

  • Are you providing a service to a covered entity or its business associate? If no, BA status is unlikely; continue only if you handle PHI for them.
  • Will you create, receive, maintain, or transmit PHI to perform the service? If yes, you are a business associate.
  • Are you part of the covered entity’s workforce? If yes, you are not a BA; HIPAA applies through the employer.
  • Are you a mere conduit with no persistent storage (e.g., postal carrier)? If yes, you are generally not a BA; persistent storage or managed services make you a BA.
  • Do you store ePHI in the cloud (even if encrypted and you lack the key)? If yes, you are a BA and must sign a Business Associate Agreement.

Common examples and non-examples

  • Examples: billing and coding firms, claims processors, EHR and PMS vendors, cloud hosting providers, data analytics firms, law firms handling PHI, call centers supporting patient scheduling.
  • Non-examples: workforce members, courier services without storage, telecom carriers transmitting data without access to content.

Implementing Compliance Checklists

Governance and accountability

  • Designate a Privacy Officer and a Security Officer with defined accountability.
  • Perform an enterprise risk analysis and implement a risk management plan that tracks remediation to closure.
  • Adopt written policies for the HIPAA Privacy Rule, HIPAA Security Rule, and Breach Notification Rule; review annually.
  • Train workforce upon hire and at least annually; maintain attendance, curricula, and sanctions records.

Privacy Rule operations

  • Publish and distribute a Notice of Privacy Practices (covered entities).
  • Apply minimum necessary and role-based access to PHI in all workflows.
  • Manage authorizations for uses/disclosures beyond treatment, payment, and health care operations.
  • Support individual rights: access within required timeframes, amendment, restrictions, confidential communications, and accounting of disclosures.

Security Rule essentials

  • Administrative: risk analysis, workforce security, information access management, security incident response, contingency and disaster recovery planning, evaluation.
  • Physical: facility access controls, workstation security, device/media controls (including secure disposal and reuse).
  • Technical: unique user IDs, strong authentication, automatic logoff, encryption in transit and at rest, integrity controls, and audit logging with regular review.

Documentation and oversight

  • Inventory vendors; execute and manage Business Associate Agreements; verify downstream subcontractor compliance.
  • Retain required HIPAA documentation for at least six years from the date of creation or last effective date.
  • Test incident response and disaster recovery plans; record lessons learned and updates.

Understanding PHI Handling Obligations

Protected Health Information is individually identifiable health information in any form held by a covered entity or business associate. De-identified information is not PHI; you may remove identifiers using the Safe Harbor method or rely on expert determination.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Permitted uses and disclosures

  • Treatment, payment, and health care operations without authorization, subject to minimum necessary.
  • Public health, law enforcement, and other specific exceptions as permitted by the HIPAA Privacy Rule.
  • All other uses require a valid, revocable authorization.

Data minimization and alternatives

  • Use limited data sets with a Data Use Agreement when full PHI is not required.
  • Apply role-based access and masking to restrict identifiers beyond what users need.

Individual rights and timelines

  • Provide access to designated record sets within required timeframes and formats requested if readily producible.
  • Process amendments and disclosure accountings; track denials with rationale and appeal rights.

Secure handling lifecycle

  • Label and handle PHI consistently across creation, storage, transmission, archival, and disposal.
  • Sanitize media before reuse and destroy PHI securely at end of retention.

Executing Business Associate Agreements

A Business Associate Agreement is required whenever a vendor or subcontractor will create, receive, maintain, or transmit PHI on your behalf. Execute BAAs before sharing PHI and keep a current inventory.

Core clauses to include

  • Permitted and required uses/disclosures of PHI, minimum necessary, and prohibition on unauthorized uses.
  • Safeguards meeting the HIPAA Security Rule and reasonable Privacy Rule protections.
  • Prompt reporting of incidents, breaches, and security events with cooperation in investigations.
  • Subcontractor flow-down: require the same restrictions and conditions.
  • Individual rights support (access, amendment) when held by the BA.
  • Accounting of disclosures, audit rights, and performance of risk assessments upon request.
  • Return or destruction of PHI at termination and continued protections if destruction is infeasible.
  • Termination rights for material breach.

Practical tips

  • Map data flows before signing to align scope and minimum necessary.
  • Address encryption, backup locations, subcontractors, and breach notification timelines explicitly.
  • Ensure BA security and privacy points of contact are named with escalation paths.

Ensuring HIPAA Privacy Safeguards

The HIPAA Privacy Rule requires reasonable safeguards to prevent uses or disclosures not permitted by the rule. Pair these with Security Rule controls for ePHI to create defense in depth.

Practical safeguards you can implement now

  • Role-based access with documented job duties and routine access reviews.
  • Multi-factor authentication for all remote and privileged access.
  • Encryption of data in transit and at rest, including mobile devices and backups.
  • Workstation privacy practices: clean desk, screen locking, and privacy screens in public areas.
  • Vendor oversight: security questionnaires, attestations, and periodic reassessments.
  • Ongoing training tied to real scenarios (misdirected email, phishing, overheard conversations).

Managing Breach Notification Procedures

A breach is an impermissible use or disclosure of unsecured PHI that compromises security or privacy. Unless you document a low probability of compromise through a risk assessment, you must notify affected parties promptly.

Risk assessment factors

  • Nature and extent of PHI involved (identifiers, sensitivity, and likelihood of re-identification).
  • Unauthorized person who used or received the PHI.
  • Whether the PHI was actually acquired or viewed.
  • Mitigation steps taken (e.g., data recovery, satisfactory assurances, or encryption).

Notifications and timelines

  • Individuals: without unreasonable delay and no later than 60 calendar days after discovery.
  • HHS: for 500+ affected in a state or jurisdiction, within 60 days of discovery; for fewer than 500, no later than 60 days after the end of the calendar year.
  • Media: for incidents affecting 500+ residents of a state or jurisdiction.
  • Business associates: notify the covered entity without unreasonable delay with details needed for notices.

Content of notices

  • What happened, including dates; types of PHI involved; steps individuals should take; what you are doing; and contact methods.
  • Use first-class mail or agreed electronic delivery; provide substitute notice if contact info is insufficient.

Documentation and readiness

  • Maintain an incident log, investigation records, and determinations supporting low probability findings.
  • Run tabletop exercises, test contact lists, and prepare templates in advance.

Conclusion

Correctly classifying yourself as a covered entity or business associate guides every HIPAA responsibility that follows. Use the decision trees and checklists above to apply the Privacy, Security, and Breach Notification Rules with confidence. Document decisions, manage vendors with strong Business Associate Agreements, and review safeguards regularly.

FAQs.

What criteria determine a HIPAA covered entity?

You are a covered entity if you are a health plan, a healthcare clearinghouse, or a health care provider who transmits health information electronically in connection with standard transactions. Providers become covered entities when they conduct standard claims, eligibility, referral authorization, or remittance transactions.

How is a business associate defined under HIPAA?

A business associate is any person or organization that performs services or functions for a covered entity (or another BA) that involve creating, receiving, maintaining, or transmitting PHI. Subcontractors handling PHI are also business associates; workforce members are not.

What are the key components of a HIPAA compliance checklist?

Appoint privacy and security officers, perform risk analysis and management, adopt Privacy Rule and Security Rule policies, train staff, enforce minimum necessary, manage individual rights, inventory vendors and execute Business Associate Agreements, implement technical/physical safeguards, and retain documentation for at least six years.

How should organizations handle breach notifications under HIPAA?

Assess the incident using the four-factor risk test; if a breach of unsecured PHI is likely, notify affected individuals without unreasonable delay and within 60 days, notify HHS per threshold rules, and notify media if 500+ residents are affected. Business associates must promptly inform the covered entity and provide the details needed for notices.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles