HIPAA Business Associate Agreement (BAA) — US Drafting Reference
Last verified
Drafting reference for HIPAA Business Associate Agreements — 45 CFR § 164.504(e) required elements, breach notification, HITECH direct liability, flow-down.
The Business Associate Agreement (BAA) is the inter-business contract through which a HIPAA Covered Entity extends the obligations of the Privacy Rule, Security Rule, and Breach Notification Rule to a downstream service provider that handles Protected Health Information (PHI). It is unusual among US commercial contracts in that its essential terms are not negotiated freely but prescribed by federal regulation — 45 CFR § 164.504(e) enumerates the clauses every BAA must contain, and a Covered Entity that disclosure PHI to a Business Associate without a compliant BAA is itself in violation of the Privacy Rule. After the HITECH Act of 2009, the BAA also became the contract through which Business Associates accept direct federal liability for HIPAA violations, not merely contract liability to the Covered Entity. This page is the US drafting reference for the agreement. Cross-reference Data Processing Agreement (DPA) for the broader privacy-vendor framework and MSA for the underlying commercial relationship that the BAA typically supplements.
Statutory and Regulatory Architecture
HIPAA — the Health Insurance Portability and Accountability Act of 1996, Pub. L. 104-191 — authorised HHS to promulgate national standards for the privacy and security of health information. The implementing regulations are codified across two parts of Title 45 of the Code of Federal Regulations and four operative rules:
- The Privacy Rule — 45 CFR Part 160 and 45 CFR Part 164 Subparts A and E — governs the permitted uses and disclosures of PHI, the rights of individuals (access, amendment, accounting), and the administrative obligations of Covered Entities.
- The Security Rule — 45 CFR Part 164 Subparts A and C — prescribes administrative, physical, and technical safeguards for electronic PHI (ePHI) at §§ 164.308, .310, .312.
- The Breach Notification Rule — 45 CFR §§ 164.400–414 — sets the discovery, assessment, and notification procedures following an unauthorised use or disclosure of unsecured PHI.
- The Enforcement Rule — 45 CFR Part 160 Subparts C, D, and E — sets HHS Office for Civil Rights (OCR) investigation procedures, penalties, and hearings.
The HITECH Act of 2009 — Title XIII of the American Recovery and Reinvestment Act, Pub. L. 111-5 — substantially restructured Business Associate obligations. Most importantly, HITECH § 13404 and the implementing 2013 Omnibus Rule made Business Associates directly subject to the Security Rule and to specified Privacy Rule provisions (45 CFR § 164.502(e)). The result is that a Business Associate today faces parallel sources of liability: contract liability to the Covered Entity under the BAA, and statutory liability to HHS for violations of the regulations themselves.
Covered Entities, Business Associates, and Subcontractors
The trigger for the BAA requirement is the disclosure of PHI by a Covered Entity to a Business Associate. Both terms are defined at 45 CFR § 160.103.
A Covered Entity is one of three things: a health plan (a plan paying the cost of medical care, including employer group health plans of 50+ participants), a healthcare clearinghouse (an entity that translates non-standard health information into standard transactions), or a healthcare provider that transmits health information in electronic form in connection with a HIPAA-covered transaction (claims, eligibility, enrolment, and similar). The third leg is the most consequential — a small physician practice that only bills patients directly and never transmits claims electronically is not a Covered Entity; the same practice the day after it enables electronic claims submission becomes one.
A Business Associate is any person or entity (other than a member of the Covered Entity’s workforce) that creates, receives, maintains, or transmits PHI on behalf of the Covered Entity for a function or activity regulated by HIPAA. The definition is functional, not formal — the question is not what the contract calls the relationship but whether PHI flows through the vendor. Typical Business Associates include claims-processing services, billing companies, IT service providers (managed-services, cloud hosting, data centre colocation), software-as-a-service vendors that store ePHI, transcription services, document-shredding services, legal counsel where representation involves PHI, accountants and auditors, accreditation organisations, and many consulting engagements.
The 2013 Omnibus Rule extended the Business Associate definition to subcontractors of Business Associates — any person to whom a Business Associate delegates a function involving the use or disclosure of PHI is itself a Business Associate, and the Business Associate must enter into a written BAA with that subcontractor. The chain of compliance is enforced through downstream BAAs: a Covered Entity contracts with a Business Associate, which in turn contracts with its subcontractors, and so on indefinitely. Each downstream BAA must impose obligations at least as restrictive as the upstream BAA.
The “conduit” exception narrows the Business Associate definition to exclude pure data-transit providers — the United States Postal Service, private courier services, internet service providers transmitting data without persistent access, and similar. The OCR has emphasised in commentary to the Omnibus Rule that the exception is narrow: a cloud-storage provider that maintains PHI on its servers, even if it has no actual access to the data, is not within the conduit exception. The line is transient access vs. persistent maintenance; a courier seeing a sealed envelope for 48 hours is exempt, an encrypted cloud-storage vendor holding data for years is not, even if the encryption keys are exclusively the customer’s.
BAA — Required Contract Elements (45 CFR § 164.504(e))
The Privacy Rule prescribes the substance of every BAA. The required elements at 45 CFR § 164.504(e)(2) are:
-
Permitted uses and disclosures of PHI. The BAA must establish the permitted and required uses and disclosures of PHI by the Business Associate. The BAA may not authorise uses or disclosures that would themselves violate the Privacy Rule if performed by the Covered Entity. Business Associate uses for its own management and administration, or to carry out its legal responsibilities, are permitted if the disclosure is required by law or the Business Associate obtains reasonable assurances of confidentiality from any recipient.
-
Prohibition on impermissible uses. The Business Associate must agree not to use or disclose PHI other than as permitted by the BAA or required by law.
-
Safeguards. The Business Associate must implement appropriate safeguards — including, with respect to ePHI, the administrative, physical, and technical safeguards specified at 45 CFR §§ 164.308, .310, .312 — to prevent use or disclosure other than as provided by the BAA.
-
Reporting of breaches and unauthorised uses. The Business Associate must report to the Covered Entity any use or disclosure not provided for by the BAA of which it becomes aware, including any breach of unsecured PHI as required by § 164.410, and any security incident of which it becomes aware.
-
Subcontractor requirements. The Business Associate must ensure that any subcontractor that creates, receives, maintains, or transmits PHI on its behalf agrees to the same restrictions and conditions that apply to the Business Associate — that is, the Business Associate must enter into a written BAA with each subcontractor.
-
Access by individuals to PHI. The Business Associate must make PHI available as necessary to satisfy the Covered Entity’s obligations under § 164.524 (individual right of access to PHI maintained in a designated record set).
-
Amendment of PHI. The Business Associate must make PHI available for amendment and incorporate amendments under § 164.526.
-
Accounting of disclosures. The Business Associate must make available the information required to provide an accounting of disclosures under § 164.528.
-
Internal practices availability for HHS audit. The Business Associate must make its internal practices, books, and records relating to the use and disclosure of PHI available to the Secretary of HHS for purposes of determining the Covered Entity’s HIPAA compliance.
-
Return or destruction at termination. At termination of the BAA, the Business Associate must return or destroy all PHI received from, or created or received by it on behalf of, the Covered Entity, and retain no copies. If return or destruction is not feasible, the BAA must extend the protections of the agreement to the retained PHI and limit further uses and disclosures to those purposes that make return or destruction infeasible.
-
Termination for material breach. The BAA must authorise the Covered Entity to terminate the BAA (and, in the underlying commercial agreement, the underlying services contract) if the Covered Entity determines that the Business Associate has violated a material term of the BAA. Where termination is not feasible, the Covered Entity must report the breach to HHS.
The HHS Sample Business Associate Agreement Provisions — published at hhs.gov — provide model language for each required element. Practitioners typically use the HHS model as the starting point and tailor it to the specific engagement; OCR enforcement actions consistently find that variation away from the model is the principal source of compliance gaps.
Breach Notification Chain — §§ 164.400-414
The Breach Notification Rule operates on a strict cascade of timelines and thresholds. A breach is defined at § 164.402 as the unauthorised acquisition, access, use, or disclosure of unsecured PHI that compromises the security or privacy of the PHI. An impermissible use or disclosure is presumed to be a breach unless the Covered Entity or Business Associate demonstrates a low probability of compromise through a four-factor risk assessment:
- The nature and extent of the PHI involved (identifiers, sensitivity).
- The unauthorised person who used the PHI or to whom the disclosure was made.
- Whether the PHI was actually acquired or viewed.
- The extent to which the risk to the PHI has been mitigated.
The four-factor assessment must be documented; OCR consistently faults entities that conclude “no breach” without a written four-factor analysis. Three statutory exceptions to the breach definition cover (a) unintentional acquisition by a workforce member in good faith and within scope, (b) inadvertent intra-organisational disclosure, and (c) disclosure where the recipient could not reasonably have retained the information.
The notification cascade following a breach determination is:
-
Business Associate to Covered Entity — § 164.410 requires the Business Associate to notify the Covered Entity without unreasonable delay and in no case later than 60 calendar days after discovery of the breach. Discovery is the day the breach is known or, by exercising reasonable diligence, would have been known. The notification must include, to the extent possible, the identification of each affected individual, and any other information the Covered Entity needs for its own downstream notifications. The BAA may shorten this period — a 24- to 72-hour reporting window is common in negotiated BAAs.
-
Covered Entity to affected individuals — § 164.404 requires the Covered Entity to notify each affected individual without unreasonable delay and in no case later than 60 calendar days after discovery. Notice must be by first-class mail (or by email if the individual has agreed); content prescribed at § 164.404(c) includes a brief description of the breach, types of PHI involved, recommended steps for the individual, the entity’s investigation and mitigation, and contact information. Substitute notice — a conspicuous web posting plus media notification — is required where insufficient or out-of-date contact information for ten or more individuals prevents direct notice.
-
Covered Entity to HHS — § 164.408 requires notification to the Secretary via the OCR breach portal. For breaches affecting 500 or more individuals, notification must be without unreasonable delay and in no case later than 60 calendar days after discovery. For breaches affecting fewer than 500 individuals, the Covered Entity may report annually — within 60 days of the end of the calendar year in which the breaches were discovered.
-
Covered Entity to prominent media — § 164.406 requires notification to prominent media outlets serving the affected state or jurisdiction for breaches affecting more than 500 residents of a state or jurisdiction, within the same 60-day window.
The thresholds and timelines are mandatory minima — the BAA may not extend them. Because the Covered Entity’s 60-day clock runs from its discovery, and because Covered Entities typically discover via Business Associate notification, a BAA that allows the Business Associate the full 60 days leaves the Covered Entity with zero time to investigate, notify, and process. Negotiated BAAs almost invariably compress the Business Associate notification window to between 5 and 30 days.
Penalties — Civil and Criminal
The HITECH Act restructured HIPAA penalties into four tiers based on culpability, codified at 42 USC § 1320d-5. The penalty amounts are adjusted annually for inflation under 45 CFR § 102.3. For 2024 the tier ranges are:
| Tier | Culpability | Per-violation minimum | Per-violation maximum | Annual cap (per identical violation) |
|---|---|---|---|---|
| 1 | Unknowing | $137 | $68,928 | $2,067,813 |
| 2 | Reasonable cause | $1,379 | $68,928 | $2,067,813 |
| 3 | Wilful neglect — corrected | $13,785 | $68,928 | $2,067,813 |
| 4 | Wilful neglect — not corrected | $68,928 | $2,067,813 | $2,067,813 |
The annual cap applies per identical-violation-type per calendar year; an organisation facing violations across multiple HIPAA requirements faces stacked caps.
Criminal penalties under 42 USC § 1320d-6 — a separate enforcement track administered by the Department of Justice — escalate from $50,000 / one year imprisonment for basic wrongful disclosure, to $100,000 / five years for offences committed under false pretences, to $250,000 / ten years for offences with intent to sell, transfer, or use PHI for commercial advantage, personal gain, or malicious harm.
Published OCR resolution agreements illustrate enforcement priorities. Anthem — the largest HIPAA settlement to date — paid $16 million in 2018 following a 2015 cyberattack exposing the ePHI of nearly 79 million individuals (see the HHS resolution agreement). Premera Blue Cross paid $6.85 million in 2020 for a 2014 breach affecting 10.4 million individuals. Memorial Healthcare System paid $5.5 million in 2017 for impermissible access to over 115,000 patient records. The recurring OCR findings — inadequate risk analysis, failure to manage user access, missing or non-compliant BAAs with downstream vendors — are the practical drafting agenda for the BAA itself.
State Law Preemption
HIPAA establishes a floor, not a ceiling. 45 CFR § 160.203 preempts contrary state law unless the state law is more stringent — that is, provides greater privacy protection or greater individual rights. Several states impose materially heavier obligations: California’s Confidentiality of Medical Information Act (CMIA) imposes its own contractor obligations parallel to the BAA framework; Texas’s Medical Records Privacy Act reaches more entities than HIPAA does; New York’s SHIELD Act imposes its own data-security obligations on entities holding the private information of New York residents.
A well-drafted BAA accordingly includes a state law flow-down — the Business Associate agrees to comply with applicable state laws relating to the privacy and security of PHI and to flow down equivalent obligations to its subcontractors. The BAA’s HIPAA-required provisions establish the federal minimum; state-law overlays sit on top.
21st Century Cures Act and Information Blocking
The 21st Century Cures Act (Pub. L. 114-255, 2016) and the implementing ONC Information Blocking Rule at 45 CFR Part 171 prohibit healthcare providers, health information networks/exchanges, and certified health-IT developers from engaging in practices likely to interfere with the access, exchange, or use of electronic health information (EHI). The information-blocking regime is administratively separate from HIPAA but overlaps in coverage. BAAs covering electronic health record (EHR), health information exchange (HIE), and certified health-IT vendors should accordingly include an information-blocking compliance recital and align permitted-disclosures language with the eight statutory information-blocking exceptions (privacy, security, infeasibility, health-IT performance, content and manner, fees, licensing, manner).
Sample BAA — Clause-by-Clause Skeleton
The following structure reflects the HHS model BAA plus modifications routinely added in negotiated agreements between sophisticated Covered Entities and Business Associates.
- Recitals. Identify the parties; recite the underlying services agreement (MSA, SaaS agreement, professional services contract); recite that the Business Associate will create, receive, maintain, or transmit PHI on behalf of the Covered Entity; recite HIPAA / HITECH applicability.
- Definitions. Incorporate by reference the definitions at 45 CFR §§ 160.103, 164.103, 164.402, and 164.501; define PHI, ePHI, Breach, Security Incident, Subcontractor, Unsecured PHI.
- Permitted Uses and Disclosures. Specify the permitted uses and disclosures tied to the underlying services. Reserve Business Associate uses for its own management, administration, and legal responsibilities subject to reasonable-assurances safeguards.
- Prohibited Uses. Use or disclosure beyond the BAA or otherwise prohibited by the Privacy Rule is forbidden; no sale of PHI; no use of PHI for marketing without authorization.
- Safeguards. Implement administrative, physical, and technical safeguards per 45 CFR §§ 164.308, .310, .312; comply with the Security Rule directly as required by HITECH § 13401; specify minimum standards (encryption per NIST SP 800-111 / FIPS 140-2 / 140-3, access controls, audit logging, workforce training).
- Reporting — Breaches and Security Incidents. Notification of any unauthorised use or disclosure; notification of any Breach within [negotiated period — typically 5-30 days] of discovery; notification of any Security Incident on an agreed schedule (often quarterly summary for unsuccessful attempts).
- Subcontractors. Written BAA with each subcontractor that creates, receives, maintains, or transmits PHI; subcontractor obligations no less restrictive than this BAA.
- Individual Rights. Procedures to support Covered Entity’s obligations on individual access (§ 164.524), amendment (§ 164.526), accounting of disclosures (§ 164.528).
- HHS Access. Internal practices, books, and records available to the Secretary on request for HIPAA compliance determinations.
- Term and Termination. Term coextensive with underlying services agreement; termination for material breach with cure period; termination by Covered Entity if cure infeasible; reporting to HHS if termination infeasible.
- Return or Destruction at Termination. Return or destruction of all PHI on termination; if return or destruction infeasible, extension of BAA protections to retained PHI with continuing restrictions.
- State Law Flow-Down. Compliance with applicable state laws relating to privacy and security of PHI.
- Information Blocking (where applicable). Compliance with 45 CFR Part 171 for EHR/HIE/certified health-IT engagements.
- Indemnification. Mutual indemnification for HIPAA violations, breach-notification costs, and regulatory penalties; super-cap or uncapped treatment for breach of confidentiality.
- Cybersecurity Insurance. Carriage of cyber-liability insurance at agreed minima; certificate of insurance on request.
- Audit Rights. Annual SOC 2 Type II report; right of independent third-party audit on reasonable notice; remediation of identified deficiencies.
- Boilerplate. Incorporation into underlying services agreement; precedence (BAA controls in conflict with services agreement); survival; amendment; governing law; notices.
Bibliography
- 45 CFR Part 160 — General administrative requirements
- 45 CFR Part 164 — Security and privacy (Subparts A, C, D, E)
- 45 CFR § 164.504(e) — BAA required contents
- 45 CFR §§ 164.400–414 — Breach Notification Rule
- 42 USC § 1320d-5 — HIPAA civil money penalties
- 42 USC § 1320d-6 — Wrongful disclosure of individually identifiable health information (criminal)
- 42 USC § 17934 — HITECH § 13404 (BA direct liability)
- 45 CFR Part 171 — ONC Information Blocking Rule
- HHS Sample Business Associate Agreement Provisions
- HHS OCR — Anthem $16M Resolution Agreement (2018)
- HIPAA — Pub. L. 104-191 (1996)
- HITECH Act — Pub. L. 111-5, Title XIII (2009)
- 45 CFR § 102.3 — CMP inflation adjustment
Cross-references
- Data Processing Agreement (DPA) — vendor processor framework for non-PHI personal data; CCPA / GDPR / state-law overlay
- Master Services Agreement (MSA) — the underlying commercial framework that the BAA typically supplements
- Standard Clauses — boilerplate (governing law, indemnification, limitation of liability) for BAA execution
- eSignature and UETA — electronic execution of BAAs under ESIGN / UETA
Further Reading
Disclaimer: This content is informational, not legal advice. Last verified: 2026-05-10. Always consult licensed counsel for binding decisions.