What Is a Business Associate? Definition for Business and HIPAA Compliance

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

What Is a Business Associate? Definition for Business and HIPAA Compliance

Kevin Henry

HIPAA

April 01, 2024

7 minutes read
Share this article
What Is a Business Associate? Definition for Business and HIPAA Compliance

Definition of Business Associate

A business associate is any person or organization that creates, receives, maintains, or transmits Protected Health Information (PHI)—including Electronic PHI (ePHI)—for or on behalf of a covered entity. Under the HIPAA Rules, this includes vendors that provide services such as claims processing, IT support, cloud hosting, analytics, or legal and financial services when PHI is involved.

Covered entities include health care providers, health plans, and health care clearinghouses. Subcontractors of a business associate are also business associates if they handle PHI. The “mere conduit” exception is narrow; routine custodians of data (like cloud providers) that store or process ePHI are business associates even if they do not view the data.

Examples of Business Associates

  • Cloud service and data center providers that host or back up ePHI.
  • Billing companies, clearinghouses, revenue cycle and claims processors.
  • EHR, practice management, and telehealth vendors; managed service providers and help desk providers with system access.
  • Analytics firms, quality reporting vendors, registries, and utilization review services.
  • Transcription, medical scribe, dictation, and translation services handling PHI.
  • Law firms, accountants, consultants, and TPAs that receive PHI to perform contracted tasks.
  • HIEs, data integration vendors, and secure messaging platforms that transmit or maintain ePHI.
  • Device servicing, biomedical maintenance, and copy/scan vendors accessing PHI on equipment.

Entities that simply transport paper records without routine access to PHI (true “mere conduits”) typically are not business associates; however, most digital service providers that store or process ePHI are.

Roles and Responsibilities in HIPAA

Core obligations

Business associates must use and disclose PHI only as allowed by the Business Associate Agreement (BAA) and applicable HIPAA Rules. You must apply the minimum necessary standard, restrict workforce access to job needs, and support the covered entity’s obligations—such as enabling access, amendment, and accounting of disclosures where specified in the BAA.

Security Rule compliance

Security Rule compliance requires administrative, physical, and technical safeguards for ePHI. You must perform a risk analysis, implement risk management, maintain policies and procedures, train your workforce, and monitor system activity. Access controls, authentication, encryption, audit logging, integrity controls, and incident response are central expectations.

Breach Notification responsibilities

If unsecured PHI is compromised, you must notify the covered entity without unreasonable delay and within BAA-defined timelines, providing the details needed for downstream notifications and mitigation. You also must flow down relevant obligations to subcontractors that create, receive, maintain, or transmit PHI for you.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Before handling PHI, execute a Business Associate Agreement with each covered entity and with any subcontractor that will handle PHI on your behalf. Maintain written policies, designate a security official, train your workforce, and apply sanctions for violations. Keep required documentation for at least six years.

Conduct periodic risk analyses, update safeguards, and manage vendor risk. Understand how state privacy and security laws may impose stricter requirements than HIPAA. Noncompliance can result in civil monetary penalties and corrective action plans, so proactive governance is essential.

Safeguarding Protected Health Information

Administrative safeguards

  • Perform and document a current risk analysis; update it whenever your systems or threats change.
  • Adopt data governance that maps PHI flows, defines role-based access, and enforces minimum necessary use.
  • Train staff on HIPAA Rules, phishing risks, incident reporting, and secure handling of PHI.
  • Establish contingency and disaster recovery plans, including tested backups of ePHI.

Technical safeguards

  • Enforce unique IDs, least-privilege access, MFA, session timeouts, and strong password policies.
  • Encrypt ePHI in transit and at rest; manage keys securely and segregate environments.
  • Enable audit logs and alerts for anomalous access; review and retain logs per policy.
  • Harden endpoints and servers; patch promptly; apply secure configuration baselines.

Physical safeguards

  • Control facility access; secure server rooms and networking gear.
  • Protect devices and media; track, reuse, and dispose of them securely to prevent data leakage.

Data lifecycle practices

  • Limit retention; de-identify data where possible and practical.
  • Use data loss prevention, tokenization, or pseudonymization for higher-risk workflows.

Business Associate Agreements

What a BAA must include

  • Permitted and required uses and disclosures of PHI by the business associate.
  • Security Rule safeguards and processes to ensure Security Rule compliance for ePHI.
  • Obligation to report breaches, incidents, and non-permitted uses or disclosures.
  • Flow-down of equivalent obligations to subcontractors handling PHI.
  • Support for access, amendment, and accounting requests as directed by the covered entity.
  • Termination for cause and the return or destruction of PHI at contract end, if feasible.

Operational best practices

  • Inventory all BAAs; align them with your actual services and data flows.
  • Set practical breach reporting timelines (often 24–10 days in BAAs) while respecting HIPAA’s outer limits.
  • Define notification content requirements so you can respond quickly and completely.
  • Review BAAs at renewal or after material changes to systems, vendors, or regulations.

Reporting and Breach Notification Processes

Identify and assess

On detecting an incident, contain it immediately and preserve evidence. Determine whether there was an impermissible use or disclosure of unsecured PHI and complete the risk assessment considering: the type and quantity of PHI, who used or received it, whether it was actually viewed or acquired, and the extent of mitigation.

Timelines and escalation

Report confirmed breaches to the covered entity without unreasonable delay and no later than 60 calendar days from discovery unless your BAA requires a shorter deadline. Provide ongoing updates as facts develop, especially if law enforcement requests a delay in notifications.

Notification content

Supply the covered entity with what happened, dates, discovery details, types of PHI involved, the number of affected individuals, mitigation steps, recommended protections for individuals, and your corrective actions. Maintain records of the incident, assessment, and notifications.

After-action improvements

Remediate root causes, update policies and technical controls, retrain staff, and re-run risk analysis. Use lessons learned to strengthen monitoring, access controls, and vendor oversight to prevent recurrence.

Conclusion

In short, a business associate is any vendor or partner that touches PHI for a covered entity. Achieving Security Rule compliance, executing strong BAAs, safeguarding PHI across people, processes, and technology, and executing timely breach notification are the pillars of HIPAA-ready operations.

FAQs.

What functions qualify an entity as a business associate?

You qualify when you create, receive, maintain, or transmit PHI for or on behalf of a covered entity, or you provide services—such as billing, IT, cloud hosting, analytics, legal, or consulting—in which access to PHI is necessary. Subcontractors that handle PHI for a business associate also qualify.

How does HIPAA define business associate responsibilities?

HIPAA requires you to use or disclose PHI only as permitted by the BAA and the HIPAA Rules, apply the minimum necessary standard, implement administrative, physical, and technical safeguards for ePHI, support certain Privacy Rule obligations of the covered entity, manage compliant subcontractors, and report breaches and security incidents promptly.

What are business associate agreement requirements?

A BAA must specify permitted uses and disclosures, require safeguards meeting Security Rule compliance, mandate breach reporting, flow down obligations to subcontractors, support individual rights as directed by the covered entity, allow termination for cause, and address return or destruction of PHI at the end of the engagement.

When must a business associate report a breach?

You must notify the covered entity without unreasonable delay and no later than 60 calendar days after discovering a breach of unsecured PHI, unless your BAA sets a shorter timeframe. Your notice should include what happened, when it happened, the PHI involved, individuals affected, mitigation steps, and corrective actions.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles