Skip to main content
RSS Feed
·9 min read

HIPAA Business Associate Agreements: Who Needs One and What to Include

Every vendor that handles PHI on your behalf needs a business associate agreement. That requirement has been in HIPAA since 2003 and was strengthened by the HITECH Act in 2009. Yet missing or incomplete BAAs remain one of the most common findings in OCR investigations and audits.

What is a business associate?

Under 45 CFR § 160.103, a business associate is any person or organization — other than a member of your workforce — that creates, receives, maintains, or transmits protected health information on behalf of a covered entity, or that provides certain services to a covered entity involving the disclosure of PHI.

In practice, that includes:

The list is longer than most practices expect. If you are unsure whether a vendor qualifies, ask one question: does this vendor have access to, or could they reasonably encounter, PHI as part of the service they provide? If yes, they are likely a business associate.

Who does not need a BAA?

Not every vendor relationship requires one. The regulation carves out several categories:

The gray areas usually involve technology vendors. A cloud email provider that stores your messages? Probably a business associate if those messages contain PHI. A janitorial company that cleans your office? Generally not, unless they have access to areas where PHI is stored and could reasonably access it.

What the BAA must contain

The required provisions are spelled out in 45 CFR § 164.504(e)(2). A compliant BAA must include:

Common mistakes

1. Vendors without BAAs

This is the most straightforward violation and one of the most commonly penalized. In 2023, OCR settled with a dental practice for $50,000 specifically because it used a cloud-based storage service for patient records without a BAA. The practice had fewer than 10 employees. Size does not matter for this requirement.

The fix is an inventory. List every vendor. Determine which ones handle PHI. Confirm you have a signed BAA for each. If you find gaps, close them immediately — either by signing a BAA or by stopping the use of that vendor for PHI-related services.

2. BAAs without breach notification clauses

Some BAAs — particularly older ones drafted before the HITECH Omnibus Rule took effect in 2013 — lack adequate breach notification language. If your BAA does not require the business associate to notify you of breaches within a specific timeframe, you could discover a breach affecting your patients months after it happened. By then, your own 60-day notification clock under 45 CFR § 164.404 may have already expired.

3. Signing the vendor's template without review

Most large vendors (Microsoft, Google, Amazon) offer standard BAAs. These are generally compliant, but they are written to protect the vendor. They may include broad permitted uses, minimal breach notification timelines, and limitations on liability. Read them. Know what you are agreeing to. Negotiate where you can, especially on breach notification timelines.

4. No process for tracking or renewing BAAs

A BAA signed in 2018 may not reflect your current relationship with that vendor, changes in regulations, or changes in what PHI the vendor handles. BAAs should be reviewed when you renew vendor contracts, when your use of the vendor changes, and when regulations are updated. Without a tracking system, BAAs expire, fall out of date, or get lost.

Managing BAAs at scale

A typical healthcare practice with 5–20 employees may have 15–30 business associate relationships. A multi-location practice or health system can have hundreds. Managing this manually — tracking expiration dates, ensuring all required provisions are present, following up on missing agreements — breaks down quickly.

What works is a centralized inventory with four fields per vendor: vendor name, whether a BAA is in place, the date it was last reviewed, and the breach notification timeline it specifies. Update it whenever you onboard a new vendor or renew an existing contract. Run a gap check quarterly.

For definitions of key terms like business associate, covered entity, and subcontractor, see the compliance glossary.

What happens when a BA relationship goes wrong

If you learn that a business associate has violated a material term of the BAA — for example, they suffered a breach and failed to notify you — you are required to take reasonable steps to cure the violation. If the violation cannot be cured, you must terminate the agreement. If termination is not feasible (for example, you have no alternative vendor), you must report the problem to HHS.

You cannot simply ignore known violations. Under 45 CFR § 164.504(e)(1)(ii), a covered entity that knows of a "pattern of activity or practice" constituting a material breach by a BA — and does not act — is itself in violation. This is how a vendor's problem becomes your problem.

How BlackSheep helps

BlackSheep's HIPAA compliance platform includes a vendor management module that tracks your business associate inventory, flags missing or expired BAAs, and stores signed agreements with version history. When you add a new vendor, the platform walks you through the BAA checklist so nothing gets skipped.

Know which vendors have BAAs and which ones do not.

Track your BAAs with BlackSheep

Free download: SEC Reg S-P compliance checklist

27-point checklist covering every Reg S-P requirement. Know exactly where your firm stands before the June 2026 deadline.

No spam. Unsubscribe anytime.