When Attorneys Are HIPAA Business Associates: BAA, PHI, and Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

When Attorneys Are HIPAA Business Associates: BAA, PHI, and Best Practices

Kevin Henry

HIPAA

August 09, 2024

7 minutes read
Share this article
When Attorneys Are HIPAA Business Associates: BAA, PHI, and Best Practices

Attorneys increasingly handle regulated health data while advising hospitals, practices, and health plans. When Attorneys Are HIPAA Business Associates: BAA, PHI, and Best Practices explains when obligations attach, what a compliant agreement requires, and how to operationalize safeguards without slowing your legal work.

By aligning your workflows with the HIPAA Compliance framework and the Minimum Necessary Standard, you can protect Protected Health Information while preserving privilege, responsiveness, and client trust.

Attorneys as Business Associates

When attorneys qualify as business associates

You are a business associate if you create, receive, maintain, or transmit PHI on behalf of a covered entity or another business associate. Legal services qualify when your representation involves the use or disclosure of PHI for functions regulated by HIPAA, such as claims defense, investigations, compliance, or audits.

You are not a business associate when you work with truly de-identified data or represent an individual patient in a matter that does not involve PHI from a covered entity. However, once PHI flows from a covered entity for your work, HIPAA obligations attach.

Common scenarios that make attorneys BAs

  • Litigation defense for a hospital or health plan involving medical records and claims files.
  • Internal investigations, peer review, or incident response using PHI to assess exposure.
  • E-discovery hosting, data processing, or review where PHI is stored or viewed.
  • Contract drafting, compliance reviews, and negotiations requiring access to PHI samples.

In each scenario, apply the Minimum Necessary Standard: access, use, and disclose only the least amount of PHI needed to accomplish the task.

Business Associate Agreements

What a BAA must cover

A Business Associate Agreement is required before you receive PHI. It should define permitted uses and disclosures, require safeguards, and establish accountability. Strong BAAs typically address:

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Permitted and prohibited PHI uses and disclosures, including data de-identification and aggregation.
  • Safeguards aligned to the HIPAA Security Rule and a documented Risk Management Program.
  • Subcontractor compliance with written, flow-down BAAs mirroring your obligations.
  • Access, amendment, and accounting of disclosures support, when the covered entity requests assistance.
  • Breach Notification Procedures, including content, timing, cooperation, and investigation duties.
  • Termination, data return or destruction, and secure archival when destruction is infeasible.
  • Audit and verification rights, including evidence of training, risk analysis, and remediation.

Negotiation pointers for law firms

  • Clarify scope by matter type and data categories to keep obligations proportionate and workable.
  • Include Indemnification Provisions tied to your control of the event, with reasonable caps and exclusions.
  • Align cyber insurance requirements with actual risk (e.g., ransomware, business interruption, privacy liability).
  • Define secure e-discovery standards, retention periods, and approved platforms before data moves.
  • Set practical timelines for cooperation, reporting, and evidence preservation during incidents.

Data Protection Requirements

Administrative safeguards

  • Perform and update a risk analysis; maintain a living Risk Management Program with owners and deadlines.
  • Adopt written policies for access control, device use, media disposal, and remote work.
  • Enforce role-based access and the Minimum Necessary Standard across matters and teams.
  • Require confidentiality agreements and sanction policies for workforce members and contractors.

Technical safeguards

  • Encrypt PHI in transit and at rest; use modern TLS and full-disk encryption on endpoints.
  • Implement multifactor authentication, strong password policies, and least-privilege permissions.
  • Enable audit logs on mail, document management, and e-discovery systems; review them routinely.
  • Deploy endpoint protection, patching, mobile device management, and data loss prevention.
  • Segregate PHI repositories from general matter files; restrict forwarding and external sharing.

Physical safeguards

  • Secure facilities, locked storage, and clean-desk practices for printed PHI.
  • Control device access; use privacy screens and secure printing with release codes.
  • Sanitize and document disposal of media and equipment that stored PHI.
  • Use approved, logged platforms for e-discovery, expert sharing, and co-counsel access.
  • Redact PHI before filings; check exhibits for hidden metadata and version history.
  • Standardize secure client intake, matter opening, and PHI tracking within each case.
  • Test backups and recovery to ensure availability of PHI relevant to active matters.

Subcontractor Compliance

Flow-down responsibilities

If you engage vendors that create, receive, maintain, or transmit PHI—such as e-discovery hosts, expert consultants, or court reporting services—you must execute downstream BAAs. These contracts must impose the same restrictions and safeguards you accepted.

Vendor due diligence

  • Assess security certifications, penetration testing cadence, and incident history.
  • Review encryption, access controls, logging, and segregation of client data.
  • Confirm Breach Notification Procedures, evidence handling, and cooperation commitments.
  • Map data flows, storage locations, and cross-border transfers before onboarding.

Regular Audits and Monitoring

What to audit

  • User access reviews for PHI repositories, including co-counsel and experts.
  • Configuration checks for encryption, MFA, logging, and DLP coverage.
  • Retention, legal hold, and destruction controls for PHI across systems.
  • Subcontractor compliance, including evidence of training and control testing.

How to monitor effectively

  • Set alerts for unusual downloads, forwarding, or mass exports of PHI.
  • Run periodic tabletop exercises for incident response and breach assessment.
  • Track metrics: time to revoke access, patch coverage, and closure of risk items.
  • Document findings and remediation to demonstrate HIPAA Compliance if audited.

Training and Education

Curriculum essentials

  • Annual training on HIPAA basics, PHI handling, and the Minimum Necessary Standard.
  • Role-based modules for litigators, transactional attorneys, and support staff.
  • Secure communications, phishing awareness, and safe use of collaboration tools.
  • Incident spotting, escalation paths, and preservation of evidence.

Delivery and accountability

  • Train during onboarding and before granting PHI access; refresh when policies change.
  • Use short, practical scenarios drawn from matters to reinforce correct behavior.
  • Record attendance, quiz completion, and acknowledgments for audit readiness.

Breach Notification Obligations

Understanding a breach

A breach is an impermissible use or disclosure of unsecured PHI that compromises privacy or security. Conduct the four-factor risk assessment: data sensitivity, unauthorized recipient, whether data was actually acquired or viewed, and mitigation performed.

Notification timing and content

As a business associate, notify the covered entity without unreasonable delay and no later than 60 days after discovery. Provide known details: what happened, types of PHI, number of individuals, mitigation steps, and corrective actions to prevent recurrence.

Operationalizing Breach Notification Procedures

  • Activate your incident response plan, preserve logs, and contain the event quickly.
  • Coordinate draft notices and regulator-facing facts with the covered entity.
  • Document decisions, timelines, and evidence to support the risk assessment.
  • Review lessons learned and update your Risk Management Program accordingly.

Conclusion

Attorneys who handle PHI on behalf of clients are often business associates and must meet HIPAA’s contractual and operational safeguards. A clear Business Associate Agreement, disciplined data protection, and consistent oversight reduce legal exposure and client risk.

Build a right-sized program: apply the Minimum Necessary Standard, validate subcontractors, audit regularly, train your team, and prepare practical Breach Notification Procedures. These habits protect clients and keep your practice resilient.

FAQs

When are attorneys considered HIPAA business associates?

You are a business associate when you create, receive, maintain, or transmit Protected Health Information for a covered entity or another business associate as part of your legal services. Examples include litigation defense, investigations, e-discovery hosting, and compliance reviews. If you work only with de-identified data or represent an individual without PHI from a covered entity, BA status typically does not apply.

What are the key elements of a business associate agreement?

A solid BAA defines permitted uses and disclosures, mandates safeguards tied to a Risk Management Program, requires subcontractor flow-downs, and sets Breach Notification Procedures. It also covers assistance with individual rights, audit rights, termination and data return or destruction, retention limits, and practical Indemnification Provisions and insurance expectations.

How should attorneys protect PHI under HIPAA?

Implement administrative, technical, and physical safeguards: risk analysis, policies, training, encryption in transit and at rest, MFA, logging, DLP, and secure disposal. Enforce least-privilege access, segregate PHI repositories, harden mobile and remote work, and routinely test backups. Apply the Minimum Necessary Standard to every matter.

What are the breach notification requirements for business associates?

Notify the covered entity without unreasonable delay and within 60 days of discovering an incident involving unsecured PHI. Provide what happened, the PHI involved, affected individuals, mitigation, and corrective steps. The covered entity typically notifies individuals, regulators, and media, while you supply facts and ongoing cooperation as set in the BAA.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles