What ARRA and the HITECH Act Mean for Covered Entities and Business Associates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

What ARRA and the HITECH Act Mean for Covered Entities and Business Associates

Kevin Henry

HIPAA

July 22, 2024

5 minutes read
Share this article
What ARRA and the HITECH Act Mean for Covered Entities and Business Associates

ARRA’s HITECH Act reshaped HIPAA by accelerating electronic health record adoption and strengthening privacy and security obligations for covered entities and business associates. You must now treat Protected Health Information (PHI), especially electronic PHI, with heightened safeguards, clear breach response, and closer oversight tied to HIPAA Enforcement.

HITECH Act Overview

The HITECH Act, enacted within ARRA, fortified HIPAA’s Privacy, Security, and Enforcement rules to match the realities of digital health. It advanced Security Rule Compliance, created the federal Breach Notification Rule, and extended HIPAA requirements directly to business associates and their subcontractors.

For you, this means tighter governance over how PHI is created, received, maintained, and transmitted. Policies, workforce training, vendor management, and incident response moved from “best practice” to operational necessities with measurable accountability.

Direct Liability of Business Associates

HITECH made business associates directly liable for complying with the HIPAA Security Rule and key Privacy Rule provisions. If you are a business associate, you must implement safeguards, limit uses and disclosures to what your contract permits, and promptly report incidents that involve PHI.

  • Implement administrative, physical, and technical safeguards for ePHI.
  • Use/disclose PHI only as allowed by your Business Associate Agreements and HIPAA.
  • Maintain the minimum necessary standard and support Patient Access Rights when applicable.
  • Report breaches and security incidents to the covered entity without unreasonable delay.
  • Be prepared for investigations and penalties tied to HIPAA Enforcement.

Subcontractor Obligations

HITECH extends obligations downstream. You must execute written agreements with subcontractors that mirror your own responsibilities and ensure their Security Rule Compliance. If a subcontractor mishandles PHI, you can face direct liability alongside them.

Breach Notification Requirements

The Breach Notification Rule requires you to notify affected individuals following a breach of unsecured PHI. Covered entities must notify without unreasonable delay and no later than 60 calendar days after discovery; business associates must notify the covered entity so it can act within that window.

  • Scope: Applies to “unsecured” PHI; strong encryption can offer safe harbor.
  • Risk assessment: Evaluate the nature/extent of PHI, who received it, whether it was actually viewed/acquired, and mitigation.
  • Who to notify: Individuals, HHS, and, for large breaches (500+ in a jurisdiction), prominent media.
  • Content: Describe what happened, types of PHI involved, protective steps for individuals, and remedial measures.

Build incident response plans that streamline detection, investigation, documentation, and timely notification. Test them so you can meet the rule’s deadlines under pressure.

Enhanced Enforcement and Penalties

HITECH strengthened HIPAA Enforcement by introducing tiered civil monetary penalties scaled to violation severity and intent, and by authorizing broader investigations. Willful neglect triggers mandatory investigation, and state attorneys general may bring civil actions on behalf of residents.

Regulators consider factors like the nature and extent of the violation, harm caused, your remediation, cooperation, and the maturity of your security program. Demonstrating recognized security practices and swift corrective action can reduce risk and penalties.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Expansion of Patient Rights

HITECH expanded Patient Access Rights, especially for electronic health records. Patients can obtain electronic copies, direct you to transmit records to a third party, and expect timely, cost-based access without unreasonable barriers.

Patients may also restrict disclosures to a health plan when they pay a provider out of pocket in full. Marketing, fundraising, and sale-of-PHI rules tightened, and individuals must be informed when their unsecured PHI is breached.

Business Associate Agreements

Business Associate Agreements (BAAs) are the compliance backbone for vendor relationships. They formalize allowed uses/disclosures and require security and privacy controls that reflect HITECH’s mandates.

  • Permitted uses/disclosures and prohibition on unauthorized uses.
  • Security Rule Compliance: risk analysis, safeguards, workforce training, and incident response.
  • Breach and security incident reporting duties, with timing and content expectations.
  • Subcontractor Obligations: flow-down terms to all downstream entities handling PHI.
  • Individual rights support: access, amendments, and accounting where applicable.
  • Termination, return/destruction of PHI, and ongoing protections if return is infeasible.

Security Safeguards

Security Rule Compliance hinges on a documented risk analysis and risk management program that evolves with your environment. Treat ePHI as a high-value asset, and align safeguards to likelihood and impact of threats.

  • Administrative: governance, policies, training, vendor due diligence, sanctions, and contingency planning.
  • Physical: facility access controls, workstation security, and device/media controls.
  • Technical: unique user IDs, multi-factor authentication, role-based access, encryption, audit logs, integrity monitoring, and transmission security.
  • Operational excellence: continuous monitoring, timely patching, change management, and practiced incident/breach response.

Conclusion

In short, ARRA’s HITECH Act heightens accountability for how you handle PHI, extends direct liability to business associates, mandates breach notifications, strengthens enforcement, and expands patient rights. Update your BAAs, modernize safeguards, and rehearse breach response to turn compliance into everyday practice.

FAQs

What are the main objectives of the HITECH Act?

The HITECH Act aimed to accelerate EHR adoption, enhance privacy and security for PHI, and energize HIPAA Enforcement. It introduced the Breach Notification Rule, expanded patient rights, and made vendors handling PHI accountable alongside covered entities.

How does the HITECH Act affect business associate liability?

Business associates became directly liable for Security Rule Compliance and certain Privacy Rule duties, including limiting uses/disclosures and reporting breaches. They must flow down obligations to subcontractors and can face investigations and penalties for violations.

What are the breach notification requirements under the HITECH Act?

For breaches of unsecured PHI, individuals must be notified without unreasonable delay and no later than 60 days after discovery, with additional notice to HHS and, for large incidents, the media. Business associates must promptly inform the covered entity and support risk assessment and remediation.

How do enforcement penalties vary by violation severity?

Penalties follow a tiered structure reflecting knowledge, diligence, and willful neglect, with higher tiers carrying larger penalties and mandatory investigation. Regulators weigh harm, mitigation, cooperation, and recognized security practices when determining outcomes.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles