Preparing Non-Covered Entities for HIPAA: Business Associate Triggers and Obligations

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Preparing Non-Covered Entities for HIPAA: Business Associate Triggers and Obligations

Kevin Henry

HIPAA

January 18, 2025

6 minutes read
Share this article
Preparing Non-Covered Entities for HIPAA: Business Associate Triggers and Obligations

Defining Business Associates

As a non-covered entity, you become a business associate when you create, receive, maintain, or transmit protected health information (PHI) for a covered entity or another business associate. The trigger is the function: if your services involve PHI in a HIPAA-regulated activity—such as claims processing, data analysis, billing, IT hosting, or support—you assume HIPAA responsibilities.

Subcontractors are included. If you delegate tasks involving PHI to another vendor, that subcontractor also becomes a business associate and must meet equivalent obligations. Your workforce members are not business associates, but third parties outside your organization are. This scope applies to both paper PHI and electronic PHI (ePHI), requiring Electronic PHI Protection throughout your operations.

Typical examples include cloud or data center providers, EHR or billing platforms, revenue cycle firms, transcription companies, analytics vendors, and managed security service providers. If your role is purely a conduit—like a postal carrier or telecom that transmits data without routine access—you generally do not trigger business associate status.

Establishing Business Associate Agreements

A Business Associate Agreement (BAA) is the contract that formalizes HIPAA responsibilities between you and the covered entity. It specifies permitted and required uses of PHI, prohibits uses and disclosures beyond the engagement, and requires adherence to the HIPAA Privacy Rule and Security Rule Compliance.

Well-drafted BAAs typically include: minimum necessary practices, breach and incident reporting timelines, cooperation with investigations, flow-down requirements to subcontractors, Protected Health Information Safeguards, and provisions for PHI return or destruction at termination. They also address marketing restrictions, sale of PHI prohibitions, and de-identification terms where appropriate.

Before signing, map data flows and confirm who owns each safeguard, how you will meet PHI Disclosure Limitations, and how you will document compliance. Require subcontractors that touch PHI to execute BAAs with you, mirroring the same protections and obligations.

Implementing Security Rule Safeguards

The Security Rule requires “reasonable and appropriate” administrative, physical, and technical controls for ePHI. Start with a formal risk analysis to identify threats, vulnerabilities, and likelihood/impact, then implement a risk management plan with prioritized remediation and timelines.

  • Administrative: policies, workforce training, access authorization, vendor management, incident response, and contingency planning with tested backups.
  • Physical: facility access controls, workstation security, device/media handling, and secure disposal.
  • Technical: unique user IDs, multi-factor authentication, least-privilege access, encryption in transit and at rest, audit logging and monitoring, integrity controls, and automatic logoff.

Demonstrate ongoing Security Rule Compliance by documenting configurations, change management, vulnerability management, penetration testing, and periodic evaluations. Treat Electronic PHI Protection as a lifecycle: secure design, deployment, operations, and decommissioning.

Limiting Use and Disclosure of PHI

Under the HIPAA Privacy Rule, you may use and disclose PHI only as permitted by your BAA or required by law. Apply the minimum necessary standard: access, use, and share only the PHI needed to perform the contracted function, and nothing more.

Build PHI Disclosure Limitations into workflows: role-based access, data minimization, de-identification where possible, and approval gates for non-routine disclosures. Prohibit marketing or sale of PHI without proper authorization, and ensure any management and administrative disclosures are safeguarded and documented.

Train your workforce on permissible uses, sanctions for violations, and how to recognize and escalate potential privacy incidents quickly. Embed privacy-by-design in product features and customer support processes.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Compliance Audits and Record Access

Be prepared for oversight. HHS Compliance Audits and investigations by the Office for Civil Rights may require you to produce policies, risk analyses, training records, system logs, BAAs, and incident documentation. Keep records organized, current, and easily retrievable.

You must also support covered entities in meeting individual rights. On request, make PHI available for access, amendment, or accounting of disclosures within agreed timelines. Maintain accurate audit trails so you can demonstrate who accessed PHI, when, and why.

Consider contractual audit rights for covered entities, including security assessments and remediation verification. Document corrective actions and track them to closure to show continuous improvement.

PHI Return and Destruction Procedures

At contract termination—or earlier upon request—you must return or destroy PHI as specified in the BAA. Define detailed handoff plans, secure transfer methods, and acceptance criteria so both parties agree when custody has fully shifted.

When destruction is required, use recognized media sanitization methods appropriate to the storage medium, and document the date, method, systems affected, and responsible personnel. Provide a certificate of destruction when feasible.

If secure destruction is infeasible (for example, due to legal retention or immutable backups), you must extend all protections, limit further uses and disclosures, and continue to safeguard PHI until destruction becomes feasible.

Exceptions to Business Associate Requirements

Not every interaction with PHI creates a business associate relationship. Common exceptions include: mere conduits that do not routinely access PHI; a covered entity’s workforce; disclosures for treatment between providers; and financial institutions processing consumer-initiated payments without additional PHI services.

Vendors offering services directly to individuals—without acting on behalf of a covered entity—typically are not business associates for those activities. De-identified data, when created in compliance with HIPAA standards, is not PHI and falls outside business associate requirements, though contract limits may still apply.

Practical takeaway: confirm who you serve, what PHI you handle, why you handle it, and how you protect it. If you act on behalf of a covered entity with access to PHI, prepare as a business associate; if not, validate whether an exception applies and document your analysis.

FAQs

What entities qualify as business associates under HIPAA?

Any non-covered entity that creates, receives, maintains, or transmits PHI on behalf of a covered entity—or another business associate—for a HIPAA-regulated function qualifies. Examples include IT hosting and support providers, billing and collections firms, claims processors, analytics vendors, transcription companies, and managed security providers. Subcontractors that handle PHI also qualify and must meet the same requirements.

When is a business associate agreement required?

A BAA is required whenever your services for a covered entity (or a business associate) involve PHI. The agreement must define permitted uses, prohibit unauthorized disclosures, require Security Rule safeguards, mandate breach reporting, flow down obligations to subcontractors, and address PHI return or destruction. Without a signed BAA, you should not receive PHI.

What are the main HIPAA obligations for business associates?

Core obligations include implementing Security Rule Compliance controls for ePHI, adhering to Privacy Rule limits and minimum necessary, reporting incidents and breaches, ensuring subcontractors sign BAAs and follow equivalent protections, supporting access/amendment/accounting requests, maintaining documentation, and cooperating with HHS Compliance Audits and investigations.

How should PHI be handled upon contract termination?

Follow the BAA: return PHI to the covered entity or securely destroy it and document the method and date. If destruction is infeasible—such as legal holds or immutable backups—you must continue to safeguard PHI, restrict further use and disclosure, and destroy it as soon as feasible. Always confirm completion in writing so both parties have a clear record.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles