What Is a Business Associate? Definition (General & HIPAA) with Examples

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

What Is a Business Associate? Definition (General & HIPAA) with Examples

Kevin Henry

HIPAA

July 08, 2025

6 minutes read
Share this article
What Is a Business Associate? Definition (General & HIPAA) with Examples

Definition of Business Associate

A business associate, in general terms, is any outside person or organization that performs functions or services for your company under a contract but is not part of your workforce. Think of vendors, consultants, and contractors who access your data or systems to help you operate.

Under the Health Insurance Portability and Accountability Act, a Business Associate (BA) specifically means a person or entity that creates, receives, maintains, or transmits Protected Health Information (PHI) for or on behalf of a HIPAA covered entity. Because PHI is involved, Business Associate Agreement requirements and HIPAA obligations apply.

General vs. HIPAA-Specific Context

  • General: Any contracted helper to your business.
  • HIPAA: A contracted helper that handles PHI for a covered entity, triggering Covered Entity Compliance duties and BA obligations.

HIPAA Privacy and Security Compliance

HIPAA Privacy Rule

The HIPAA Privacy Rule limits how you may use and disclose PHI. As a BA, you may use or disclose PHI only as permitted by your Business Associate Agreement or as required by law, and you must apply the minimum necessary standard to reduce unnecessary exposure.

HIPAA Security Rule

The HIPAA Security Rule applies directly to business associates for electronic PHI (ePHI). You must implement administrative, physical, and technical safeguards such as risk analysis, access controls, encryption, audit logging, workforce training, and contingency planning.

Breach Notification and Incident Response

If you discover a breach of unsecured PHI, you must notify the covered entity without unreasonable delay and follow agreed timelines and processes. Your incident response plan should include containment, investigation, risk assessment, mitigation, and documentation.

Operational Best Practices

  • Perform periodic risk assessments and maintain a risk management plan.
  • Use strong identity and access management, including multi-factor authentication and least-privilege access.
  • Encrypt ePHI in transit and at rest, and monitor systems with audit logs.
  • Vet and bind subcontractors with BAAs; flow down HIPAA Security Rule obligations.
  • Test backups and disaster recovery to ensure PHI availability and integrity.

Examples of Business Associates

Many service providers become BAs because they handle PHI while serving a covered entity. Common examples include:

  • Third-Party Administrator (TPA) processing benefits and claims for a health plan.
  • Medical billing, coding, and claims clearinghouses.
  • Cloud service providers hosting or storing PHI (even if data is encrypted and not viewed).
  • EHR and health IT vendors, data centers, and managed service providers with PHI access.
  • Data analytics, population health, quality reporting, and care management vendors.
  • Legal, accounting, and consulting firms that need PHI to deliver their services.
  • Transcription, medical scribe, and dictation services handling clinical content.
  • Shredding, media disposal, and archival vendors managing PHI records.

Business Associate Agreements

A Business Associate Agreement (BAA) is a contract required whenever a vendor will create, receive, maintain, or transmit PHI on your behalf. It defines permitted uses and disclosures, security expectations, and responsibilities for safeguarding PHI.

What Your BAA Should Cover

  • Permitted and prohibited uses/disclosures of PHI (including minimum necessary).
  • Administrative, physical, and technical safeguards aligned to the HIPAA Security Rule.
  • Breach and security incident reporting timelines and cooperation duties.
  • Subcontractor flow-down: require downstream BAAs and equivalent safeguards.
  • Individual rights support: access, amendment, and accounting of disclosures.
  • Return or destruction of PHI at termination and data retention parameters.
  • Audit, monitoring, and documentation requirements to evidence compliance.
  • Material breach, cure periods, and termination rights; indemnification and insurance where appropriate.

Remember, a BAA supplements your master services agreement and statements of work; it does not replace sound security controls or clear operational responsibilities.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Differentiating Business Associates from Other Service Providers

Ask two questions to classify a vendor: (1) Do they create, receive, maintain, or transmit PHI? (2) Are they acting on behalf of a covered entity (or another BA) rather than for their own treatment, payment, or operations?

Typically Not a Business Associate

  • Conduits that merely transport information (e.g., postal services) with no routine access to PHI content.
  • Vendors interacting only with de-identified data that meets HIPAA’s de-identification standards.
  • Healthcare providers exchanging PHI for treatment purposes between covered entities (no BAA required for that exchange).

Typically a Business Associate

  • Cloud or IT providers that store or can access PHI (not considered simple conduits).
  • Third-Party Administrators, claims processors, and benefits managers handling PHI.
  • Consultants, law firms, or accountants who need PHI to perform contracted services.

Roles and Responsibilities of Business Associates

As a BA, you share accountability for protecting PHI. Your responsibilities extend from governance to day-to-day security and privacy operations.

  • Designate privacy and security leadership and adopt written policies and procedures.
  • Train your workforce on HIPAA obligations and apply sanctions for violations.
  • Limit PHI use and disclosure to what the BAA permits; apply minimum necessary.
  • Implement safeguards for ePHI, maintain audit logs, and monitor for anomalies.
  • Manage subcontractors: due diligence, BAAs, and oversight of their controls.
  • Report breaches and security incidents promptly; support investigations and mitigation.
  • Support individual rights requests and maintain required documentation.
  • Return or securely destroy PHI upon contract termination when feasible.

Importance of Protecting PHI

Protecting PHI preserves patient trust, ensures regulatory compliance, and reduces financial, legal, and reputational risk. Breaches can trigger investigations, remediation costs, and penalties—often amplified by ransomware and supply chain attacks.

Practical Steps You Can Take Now

  • Complete a HIPAA risk analysis and remediate high-risk gaps on a documented timeline.
  • Encrypt devices and databases, enforce MFA, and segment sensitive systems.
  • Test backups and incident response regularly; drill breach notification workflows.
  • Continuously vet vendors and require strong security in your Business Associate Agreements.
  • Measure and review security metrics to drive ongoing improvement.

Conclusion

In short, a business associate is any contracted partner that helps you operate—and in healthcare, it becomes a HIPAA Business Associate when PHI is involved. Clear BAAs, disciplined safeguards under the HIPAA Privacy Rule and HIPAA Security Rule, and vigilant vendor oversight are the foundation of effective, scalable PHI protection.

FAQs

What is a business associate under HIPAA?

Under HIPAA, a business associate is a person or entity that creates, receives, maintains, or transmits Protected Health Information for or on behalf of a covered entity to perform a function or service. Because PHI is involved, the BA must follow applicable HIPAA requirements and the terms of a Business Associate Agreement.

Who qualifies as a business associate?

Any vendor or contractor that handles PHI for a covered entity (or for another BA) qualifies—examples include a Third-Party Administrator, billing company, cloud provider hosting PHI, legal or accounting firm using PHI to deliver services, or an IT managed service provider with PHI access.

What is included in a Business Associate Agreement?

A BAA sets permitted uses and disclosures, mandates HIPAA Security Rule safeguards, requires breach reporting, flows obligations to subcontractors, supports individual rights (access, amendment, accounting), and defines termination, return or destruction of PHI, audit rights, and other compliance terms.

How do business associates protect PHI?

They apply administrative, physical, and technical controls: risk assessments, policies and training, least-privilege access, multi-factor authentication, encryption in transit and at rest, logging and monitoring, vendor oversight with downstream BAAs, tested backups, and rehearsed incident response and breach notification.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles