HIPAA for business associates, what's in a BAA and what's not
What a Business Associate Agreement actually commits a vendor to, where the common misreadings surface and how a BA should build the program the BAA promises.
· Atticus Rowan
A business associate agreement arrives in the mail from a healthcare client. It is 12 to 20 pages of dense contractual language, it references HIPAA sections by number and it asks the vendor to sign within 30 days. The vendor signs it. Six months later, a security incident occurs and the BAA language surfaces as a contract the vendor did not fully understand.
This is the common shape of how HIPAA responsibilities land on a business associate. The BAA is the contractual mechanism through which HIPAA obligations flow from a covered entity to its downstream vendors. Understanding what the BAA actually commits a vendor to, and what it does not, is the difference between a compliant business-associate practice and a legal exposure.
Here is a working read of what is in a modern BAA, what is not and what the business-associate operational reality actually looks like.
The legal framing, compressed
HIPAA’s regulatory structure distinguishes between covered entities (health plans, healthcare providers, healthcare clearinghouses) and business associates (vendors that create, receive, maintain or transmit protected health information on behalf of a covered entity). The Privacy Rule and the Security Rule apply to both, but with slightly different emphases.
The BAA is the contract that bridges a covered entity to a business associate. Its statutory requirements are listed in 45 CFR 164.504(e). Every BAA must include certain provisions. Some BAAs include more.
What every compliant BAA contains
The minimum required provisions under the Privacy Rule.
- Permitted uses and disclosures of PHI. The BA can only use or disclose PHI as permitted by the BAA or as required by law.
- Safeguard obligation. The BA must implement appropriate safeguards to prevent unauthorized use or disclosure, and those safeguards must meet the Security Rule standards for electronic PHI.
- Incident reporting. The BA must report any unauthorized use or disclosure to the covered entity, including any breach of unsecured PHI.
- Subcontractor flow-down. If the BA engages a subcontractor that handles PHI, the subcontractor must agree to the same restrictions.
- Covered entity access to PHI. The BA must make PHI available to the covered entity for compliance obligations (access requests, amendments, accountings of disclosures).
- HHS access. The BA must make its internal practices, books and records available to HHS for compliance determinations.
- Return or destruction at termination. On contract termination, the BA must return or destroy all PHI it holds.
- Breach notification requirements. Under the Breach Notification Rule, the BA must notify the covered entity of any breach of unsecured PHI without unreasonable delay and no later than 60 days from discovery.
A BAA without these provisions is not compliant. A BAA that includes these provisions is compliant, even if it is only 4 or 5 pages long.
What most BAAs add beyond the minimum
Modern BAAs often include additional provisions that are not federally required but that covered entities use to strengthen their position.
- Shorter breach notification timelines. 24 to 72 hours instead of 60 days. Increasingly common.
- Specific security control requirements. Named encryption standards, access control practices, logging retention periods.
- Indemnification clauses. The BA indemnifies the covered entity for breach-related costs.
- Insurance requirements. Specific cyber insurance policy minimums, usually $1 million to $5 million at the low end, $10 million or more for larger engagements.
- Audit rights. The covered entity reserves the right to audit the BA’s compliance, with defined notice and scope.
- Data localization. PHI must remain in specified geographies (the United States, or specific states).
- Security assessment obligations. Annual SOC 2 Type II, annual penetration test, annual HIPAA risk assessment, submitted to the covered entity on request.
These are contract terms, not HIPAA requirements. A BA should read them carefully before signing, because the obligations can be material.
What a BAA is not
Two misreadings surface frequently.
First, a BAA is not a HIPAA compliance program. Signing a BAA commits the BA to comply with HIPAA obligations, but it does not create compliance on its own. The underlying security program has to exist.
Second, a BAA is not a substitute for due diligence on the covered entity’s side. The covered entity remains responsible for HIPAA compliance regardless of what is in the BAA. If a BA has a breach, both parties can face regulatory scrutiny.
What a BA’s underlying program actually has to do
HIPAA’s Security Rule applies to business associates in essentially the same way it applies to covered entities. The Security Rule requires administrative, physical and technical safeguards for electronic PHI.
At the operating level, a working BA program includes:
- Risk analysis. An annual documented assessment of risks to PHI confidentiality, integrity and availability.
- Risk management plan. A documented plan to address identified risks.
- Written policies and procedures. Covering access control, workforce training, incident response, contingency planning, device and media controls, audit controls.
- Workforce training. HIPAA-specific training at hire and annually thereafter.
- Access controls. Role-based access to PHI, unique user identification, automatic session timeout, encryption of PHI at rest and in transit.
- Audit controls. Logging of access to systems handling PHI, with logs retained and reviewable.
- Incident response plan. A documented plan, tested at least annually, with BAA-compliant breach notification provisions baked in.
- Contingency planning. Backup, disaster recovery and emergency-mode operation plans.
- Evaluation. Periodic assessment of whether the program is operating as designed.
Most BAs in practice come up short on risk analysis documentation and audit controls. A BA operating without an annual documented risk analysis is out of compliance with the Security Rule, regardless of how strong the rest of the program is.
Where AR operates in the HIPAA ecosystem
We operate as the IT and cybersecurity partner for business associates and for covered entities that are BAA counterparties to enterprise health plans. The practical work:
- Building the Security Rule-aligned program the BAA actually requires
- Producing the annual risk analysis and the associated risk-management plan
- Implementing the technical safeguards (access control, encryption, audit logging, backup and recovery) to the standards a modern BAA specifies
- Operating the controls and producing the evidence the covered entity may request under its audit rights
- Responding to security incidents in the timeframes the BAA commits to
We do not issue formal HIPAA compliance attestations (there is no federal HIPAA certification body). What we do is operate the program so that a BA’s HIPAA posture is defensible to the covered entity, to OCR in the event of a complaint and to the BA’s own cyber insurance carrier at renewal.
What to do before signing a BAA
A short pre-signing checklist.
- Read the BAA. Not a summary. The actual language.
- Compare its breach notification timeline to your current incident response capability.
- Compare its insurance requirements to your current cyber insurance policy.
- Compare its specific security control requirements to your current controls, and identify any gaps.
- Compare its subcontractor flow-down language to your current vendor inventory.
- Compare its termination provisions to your current data retention practice.
If any comparison shows a gap, decide whether to close the gap before signing or to negotiate the BAA language.
If your company is a new business associate, or you have signed BAAs without a clear read of the operational obligations, or you want to confirm your current program meets what your BAA actually requires, schedule a discovery call. We can walk through a representative BAA and map the operational implications against your current posture.