The content on this page is general in nature and is not legal advice because legal advice, by definition, must be specific to a particular set of facts and circumstances. No person should rely, act, or refrain from acting based upon the content of this blog post.


How to Draft a Business Associate Agreement (BAA) Under HIPAA Rules

Skyline of the City of London with modern skyscrapers

Why a Business Associate Agreement Is Not Optional Under HIPAA

For any covered entity or business associate that handles protected health information, a Business Associate Agreement is not a mere formality. It is a binding contract that implements specific regulatory requirements under the HIPAA Privacy, Security, and Breach Notification Rules and the HITECH Act. In practice, a BAA governs who may access protected health information, how that information is safeguarded, what happens when things go wrong, and how the parties will coordinate complex compliance obligations. From the perspective of an attorney and CPA, the BAA sits at the intersection of legal risk, operational controls, and financial exposure, and careless drafting can multiply costs when an incident occurs.

A frequent misconception is that an NDA or confidentiality clause alone will satisfy HIPAA. It will not. HIPAA imposes prescriptive obligations on both the covered entity and the business associate, including flow-down requirements to subcontractors, minimum necessary standards, breach notification timelines, documentation retention, and cooperation with government investigations. A BAA must therefore be tailored to the actual services, data flows, and system architecture. The apparent simplicity of “we will keep your data confidential” collapses in the face of real-world complexities such as multi-tenant cloud environments, offshore support, third-party integrations, and evolving threat landscapes.

Understanding Who Needs a BAA and When

Any party that creates, receives, maintains, or transmits protected health information on behalf of a covered entity will generally be a business associate and must execute a compliant BAA before PHI is shared. This includes IT managed service providers, cloud hosting platforms, e-prescribing tools, billing services, document destruction vendors, and analytics providers. Being paid is not required to be a business associate, and incidental access is rarely a safe harbor. The so-called “conduit” exception is extremely narrow and typically limited to services that merely transmit PHI without persistent storage, such as traditional postal services. Most modern technology vendors cannot credibly claim conduit status because transient caching, logging, backups, and support access create maintenance or storage functions.

A BAA is also required between a business associate and any of its subcontractors that will handle PHI. Many organizations neglect this flow-down obligation, assuming that only the covered entity must contract. That assumption is incorrect and can trigger enforcement exposure. A covered entity remains obligated to obtain satisfactory assurances, but business associates must also ensure their downstream partners execute compliant agreements and implement appropriate safeguards. When in doubt, treat any entity touching PHI, even indirectly through support tickets or screen sharing, as a potential business associate and evaluate whether a BAA is legally required.

Core Regulatory Elements a BAA Must Contain

At its core, a compliant BAA must define the permitted and required uses and disclosures of PHI by the business associate, prohibit uses and disclosures not expressly allowed, and require the business associate to implement appropriate administrative, physical, and technical safeguards to protect the confidentiality, integrity, and availability of electronic PHI. The agreement must obligate reporting of breaches and certain security incidents, mandate flow-down of obligations to subcontractors, restrict sale or marketing of PHI without proper authorization, and require return or destruction of PHI upon termination when feasible. Each of these items has technical and operational implications that must be reflected in policies, procedures, and system configurations.

Beyond minimum content, the BAA should align with the specific services performed. A templated BAA that does not reflect real data flows can create gaps. For example, if the vendor provides analytics using de-identified datasets, the BAA should describe de-identification methodologies and prohibit attempts to re-identify. If data is stored in a multi-tenant cloud, the BAA should account for logical separation, encryption key management, and contingency planning. While it may be tempting to copy a generic form, regulators evaluate whether the contract and actual practices match. A mismatch invites scrutiny, particularly during incident response when timelines are compressed and inconsistencies are exposed.

Defining Permitted and Prohibited Uses and Disclosures

The permitted use clause should be grounded in the precise services and include the minimum necessary principle. Vague catchall language such as “for services” is inadequate when services include support, logging, analytics, and subcontracted tasks. The BAA should delineate when PHI may be used for management and administration of the business associate, under what safeguards and legal process disclosure to third parties may occur, and how data is handled for quality assurance or error remediation. If de-identification will be performed, define whether the Safe Harbor or expert determination method is used and require documentation for audit purposes.

Prohibited uses should be explicit. Common prohibitions include re-identification of de-identified data, use of PHI for advertising or product development without authorization, aggregation for unrelated customers, and sharing with data brokers. Also clarify whether limited data sets will be used and require data use agreements when applicable. Seemingly small wording differences can alter obligations; for example, allowing “de-identified” analytics but failing to forbid re-identification can create loopholes that contradict organizational privacy commitments, investor expectations, and cyber insurance representations.

Security Safeguards and the Reality of Technical Controls

A BAA must require the business associate to implement administrative, physical, and technical safeguards for electronic PHI that are no less stringent than the HIPAA Security Rule standards. However, inserting the words “HIPAA compliant” does not make it so. The agreement should describe expectations around risk analysis, encryption in transit and at rest, multi-factor authentication, least privilege access, logging and monitoring, vulnerability management, incident response planning, and workforce training. If services include mobile access or APIs, specify token management, device security, and secure software development lifecycle practices. Avoid aspirational controls that the vendor does not actually maintain; the purpose is enforceable, implemented measures, not marketing language.

Covered entities commonly demand adherence to specific frameworks such as NIST, HITRUST, or SOC 2 Type II. The BAA can require independent assessments, penetration testing, and timely remediation of high-risk findings. It should also address backup and disaster recovery, including recovery time and recovery point objectives, restoration testing frequency, and geographic redundancy. When the vendor relies on upstream providers, the BAA should require comparable safeguards and delineate responsibility for shared controls. Absent such precision, the parties may dispute who must act during a ransomware event, which leads to delays, higher breach costs, and regulatory exposure.

Breach and Security Incident Notification Mechanics

Notification obligations are among the most consequential terms in a BAA. The contract should define “security incident,” “breach,” and “discovery” in harmony with HIPAA rules but tailored to operational realities. Specify notification timelines, recognizing that HIPAA mandates notification to covered entities without unreasonable delay and no later than 60 days after discovery, but many covered entities require much shorter contractual windows such as 24 to 72 hours for initial notice. Outline the content of notices, including a description of what happened, categories and approximate number of individuals affected, types of PHI involved, and steps taken to mitigate harm. The business associate should be obligated to provide supporting forensic detail as it becomes available, even if the initial notification is preliminary.

Laypersons often underestimate the complexity of incident determination. Not every event is a reportable breach, but under HIPAA the presumption is that an impermissible use or disclosure of PHI is a breach unless a documented four-factor risk assessment demonstrates a low probability of compromise. The BAA should allocate responsibility for performing that assessment, approving methodology, and retaining documentation. It should also address law enforcement delays, coordination of public statements, allocation of costs for notification and credit monitoring, and control over engaging breach counsel and forensic firms under privilege. Absent clear rules, incident response devolves into a high-stakes dispute when time is at a premium.

Subcontractors, Flow-Down Obligations, and Monitoring

Every subcontractor that creates, receives, maintains, or transmits PHI on behalf of the business associate must sign a written agreement that imposes the same restrictions and conditions required by the BAA. The prime business associate remains responsible for its subcontractors’ compliance. The BAA should require prior written approval for any subcontractor with PHI access, mandate due diligence of security posture, and confirm that offshore processing, if permitted at all, satisfies applicable legal, contractual, and payer constraints. If data localization is required, the BAA must be explicit about geographic restrictions for storage, processing, logs, and backups.

Monitoring should be more than a certification checkbox. Require periodic attestations of compliance, timely reporting of material changes in security controls, and the right to audit or receive third-party audit reports subject to confidentiality. If practical audits are impossible due to multi-tenant platforms, negotiate alternative assurances such as SOC 2 reports, HITRUST certifications, or targeted audit letters. The key is to obtain sufficient visibility to manage risk without forcing operational disruption or inadvertently gaining custodial responsibilities for the vendor’s systems.

Individual Rights: Access, Amendment, and Accounting

HIPAA requires cooperation with individual rights, including access to PHI, amendment requests, and accounting of certain disclosures. The BAA should detail how the business associate will respond to requests routed through the covered entity, turnaround times, formats, and security of transmissions. For electronic PHI, specify support for machine-readable formats and secure delivery methods. If the business associate maintains designated record sets, this must be recognized and the associated obligations clearly stated. Failure to assign these duties leads to finger-pointing and missed deadlines that carry regulatory penalties and reputational harm.

Accounting of disclosures is often overlooked but can be labor-intensive if not planned. The BAA should require logging of disclosures and retention of records for at least six years, consistent with HIPAA documentation requirements. Where the business associate makes routine disclosures permitted by the BAA, clarify whether they are excluded from accounting or must be captured. These details affect system design; retrofitting logs after an OCR inquiry is far more costly than building the capability as a contractual requirement from the outset.

Minimum Necessary, De-Identification, and Data Governance

The minimum necessary rule is easy to endorse in principle and difficult to implement in practice. The BAA should demand role-based access controls, data minimization in data sets, and masking where feasible. If the service requires full data for certain processes, the BAA should tie that need to documented risk analyses and technical justifications. For testing and development, prohibit use of production PHI unless strictly necessary and safeguarded, and require tokenized or de-identified data where possible. The contract should also address retention schedules, specifying data archival, secure deletion, and verification of destruction at termination.

When de-identification is used, the methodology matters. Safe Harbor requires removal of specific identifiers; expert determination requires documented analysis by a qualified expert that the risk is very small. The BAA should require the documentation be provided to the covered entity upon request, forbid re-identification, and ensure that derivative datasets remain subject to appropriate contractual restrictions. Many organizations assume any anonymization is sufficient; regulators disagree. Precision in definitions and evidence of method selection are essential.

Insurance, Indemnification, and Allocation of Financial Risk

A breach can trigger substantial costs: forensic investigations, notifications, call centers, credit monitoring, regulatory fines, class actions, and business interruption. The BAA should therefore include robust insurance requirements. At minimum, require cyber liability coverage with sufficient limits, including coverage for privacy liability, regulatory fines and penalties where insurable, business interruption, data restoration, and incident response services. Specify that coverage must be maintained for a tail period after termination and that certificates of insurance and endorsements will be furnished on request. If the vendor relies on a claims-made policy, continuity and retroactive dates must be addressed.

Indemnification provisions should allocate responsibility for third-party claims, regulatory penalties, and internal costs arising from the vendor’s breach of the BAA, negligence, or willful misconduct. Limitations of liability often become contentious. Covered entities may resist caps for privacy events, while vendors seek predictable exposure. A balanced approach can carve out uncapped liability for breach of confidentiality, data security violations, or infringement, while setting reasonable caps for other claims. Failing to negotiate these terms leaves the parties exposed to unbounded risk or, conversely, with caps that do not align with likely damages. The proper calibration requires legal judgment and financial modeling, not boilerplate.

Audit Rights, Cooperation with OCR, and Termination Assistance

The BAA should provide the covered entity the right to obtain information reasonably necessary to assess compliance and to cooperate with the Secretary of Health and Human Services in any investigation. This does not mean unfettered access to proprietary systems. Scope, frequency, and confidentiality must be defined. Require prompt production of policies, risk analyses, workforce training records, and incident response plans. If a regulator requests direct access to the business associate, the BAA should require immediate notice to the covered entity unless legally prohibited and coordinated strategy for response, including legal counsel involvement.

Termination provisions must be more than a formality. The BAA must allow termination if the business associate has materially breached the agreement and failed to cure. It should also obligate return or destruction of PHI, with certification of destruction where feasible, and provide transitional assistance so that services can be migrated without service disruption or data loss. In multi-tenant architectures where destruction is not feasible, the BAA should require continued protections and prohibit further use or disclosure. These are not theoretical niceties; termination after a security incident frequently involves these precise scenarios under tight deadlines.

State Law Overlays, Special Data, and Cross-Border Issues

HIPAA preempts contrary state law, but many state privacy and breach notification statutes are more stringent or apply in parallel. The BAA should incorporate a governing law strategy and expressly require compliance with applicable state data security and breach notification laws, which can alter notification timelines, content, and remediation obligations. For substance use disorder records under 42 CFR Part 2, reproductive health information, genetic data, or highly sensitive mental health records, additional restrictions and consent rules may apply. The BAA should flag such categories and require elevated safeguards and approval workflows.

Cross-border processing adds further complexity. If PHI will be accessed or stored outside the United States, the BAA should require disclosure, approvals, and alignment with payer contracts and state restrictions. Address export controls, conflict-of-law risks, and practical matters such as time zones and law enforcement access. Even where offshore access is prohibited, log exports, diagnostic dumps, or remote screen shares can inadvertently transmit PHI internationally. Contract language must be paired with technical enforcement to be credible.

Vendor Reality: Cloud, APIs, and Shared Responsibility

Most modern services involve cloud infrastructure and APIs, which require a shared responsibility model. The BAA should delineate which party configures network security groups, identity and access management policies, key management, logging, and patching. When the vendor uses a hyperscale cloud provider, require that the vendor maintains appropriate tenant configurations and monitors for drift. If the covered entity retains control over certain configuration elements, the BAA should allocate consequences when misconfigurations lead to exposure. Absent clarity, a breach caused by an open storage bucket spawns protracted disputes over fault and indemnity.

Integration via APIs requires rate limiting, robust authentication, and secure secret storage. The BAA should prohibit hardcoded credentials, require rotation policies, and define how shared logs will be handled to avoid uncontrolled PHI proliferation. If third-party integrations are enabled by the business associate, ensure those parties are vetted and bound by equivalent obligations. User-friendly features like webhooks, data exports, and dashboards often create silent copies of PHI in email, spreadsheets, or chat tools. The contract must anticipate these realities and apply restrictions consistently.

Common Misconceptions That Increase Risk

Several misconceptions cause organizations to stumble. First, assuming that a vendor’s marketing claim of “HIPAA compliance” equals legal sufficiency is dangerous. HIPAA compliance is not a certification; it is an ongoing program evidenced by risk analyses, policies, training, and controls. Second, believing that a master services agreement with a confidentiality clause eliminates the need for a BAA is incorrect. A BAA is mandatory where the vendor meets the business associate definition. Third, equating encryption with immunity is misguided. Encryption reduces risk and may obviate breach notification in certain scenarios, but only if keys are properly managed and the entirety of the event supports a low probability of compromise.

Another common error is ignoring subcontractors. Help desk providers, data migration firms, and analytics consultants frequently access PHI without a BAA in place, especially during urgent projects. Finally, organizations often accept vendor-favored limitations of liability that render indemnities hollow, or they agree to notification timelines that are operationally impossible. Each of these mistakes is avoidable through disciplined contracting and professional guidance, but only if leadership recognizes that the administrative burden of careful drafting is far less costly than crisis management after a breach.

Negotiation Priorities and Practical Compromises

Effective negotiation focuses on real risk drivers. Start with security controls, breach response, subcontractor oversight, and insurance. Confirm that the vendor’s control environment is mature and documented. Where vendors resist audits, negotiate for robust independent assessments and remediation commitments. In exchange for reasonable audit limitations, require enhanced reporting and prompt notification of material changes. For breach costs, consider a cost-sharing model with caps tied to insurance limits while carving out uncapped liability for intentional misconduct and data misuse.

Compromises should be anchored in evidence. If a vendor claims it cannot meet a 48-hour incident notice requirement, require immediate notification of suspected incidents and a staged reporting schedule with specified content. If the vendor cannot destroy all PHI at termination due to immutable backups, require encryption key retirement, logical deletion, retention-only status, and strict post-termination use prohibitions. The art is translating operational constraints into enforceable legal obligations that withstand regulatory scrutiny and litigation.

Governance, Training, and Documentation That Make the BAA Real

A well-drafted BAA is only as strong as the governance program behind it. Both parties must maintain written policies and procedures, conduct periodic risk analyses, train workforce members, and test incident response plans. The BAA should require designation of points of contact for privacy and security, escalation paths for incidents, and standing quarterly or semiannual compliance touchpoints. These mechanisms ensure that contractual obligations remain aligned with evolving services, system changes, and legal developments.

Documentation is a compliance asset. Require retention of risk assessments, audit logs, access reviews, subcontractor due diligence files, training rosters, and incident reports for at least six years. Establish change control for any amendments to data flows or processing purposes and mandate written approval before expanding PHI use. Regulators and auditors will scrutinize documentation to validate assertions. A BAA that anticipates these expectations reduces friction and improves defensibility.

When and How to Revisit Your BAA

BAAs are living documents. Revisit them upon material changes to services, technology platforms, or regulatory guidance. Cloud migrations, new analytics features, mergers and acquisitions, and integrations with third-party tools all change data exposure. The BAA should include a change management clause that triggers review and amendment, not a perfunctory notice after the fact. Calendar periodic reviews to assess whether timelines, insurance limits, and audit commitments remain realistic and whether new state privacy laws or payer requirements necessitate updates.

Incident learnings should drive improvement. After any security event, conduct a post-incident review that not only refines technical controls but also tests whether the BAA’s notification, cooperation, and cost allocation provisions worked as intended. If ambiguity or operational friction arose, amend the BAA to close gaps. Treat the agreement as part of your risk management system, not a static attachment filed away until renewal.

Actionable Drafting Tips from an Attorney and CPA

Translate business reality into contractual clarity. Name the systems and data sources in scope. Spell out whether PHI includes images, metadata, logs, and backups. Define the environment boundaries and who controls what. Tie permitted uses to specific workflows and explicitly forbid unrelated analytics or product development without authorization. Require encryption standards that are actually deployed and document exceptions with compensating controls. Include a schedule that lists approved subcontractors and their roles, and require advance notice and approval for changes.

Align financial terms with risk. Set cyber insurance limits that reflect credible breach scenarios for your volume and sensitivity of PHI, and require endorsements that cover regulatory proceedings. Calibrate liability caps to those limits and carve out uncapped categories where justified. Pre-negotiate vendor cooperation with counsel and forensic firms under privilege, and allocate who will lead notification to individuals and regulators. Include a termination assistance plan with timelines, formats, and secure transfer methods. Finally, ensure signature by entities with real financial substance, and obtain guarantees when dealing with thinly capitalized service providers.

The Case for Professional Guidance

On paper, BAAs may appear routine. In reality, they are dense instruments entwined with technical architectures, regulatory obligations, and financial exposure. A seemingly minor phrase can shift millions of dollars of risk, while an omitted definition can derail an incident response. Automated templates and generic forms rarely fit the operational complexity of modern health technology ecosystems. The interplay among HIPAA, state laws, payer contracts, and cyber insurance demands a multidisciplinary approach.

An experienced professional can translate engineering constraints into legal obligations, quantify financial impacts for negotiation, and build a governance program that renders the BAA a living part of your compliance infrastructure. That level of rigor is difficult to achieve with internal resources alone, particularly for organizations scaling rapidly or integrating multiple vendors. The investment in proper drafting and negotiation pays dividends when incidents occur, audits commence, or strategic transactions demand due diligence. In short, treat your Business Associate Agreement as a mission-critical asset, and approach its drafting with the depth and precision it deserves.

Next Steps

Please use the button below to set up a meeting if you wish to discuss this matter. When addressing legal and tax matters, timing is critical; therefore, if you need assistance, it is important that you retain the services of a competent attorney as soon as possible. Should you choose to contact me, we will begin with an introductory conference—via phone—to discuss your situation. Then, should you choose to retain my services, I will prepare and deliver to you for your approval a formal representation agreement. Unless and until I receive the signed representation agreement returned by you, my firm will not have accepted any responsibility for your legal needs and will perform no work on your behalf. Please contact me today to get started.

Book a Meeting
As the expression goes, if you think hiring a professional is expensive, wait until you hire an amateur. Do not make the costly mistake of hiring an offshore, fly-by-night, and possibly illegal online “service” to handle your legal needs. Where will they be when something goes wrong? . . . Hire an experienced attorney and CPA, knowing you are working with a credentialed professional with a brick-and-mortar office.
— Prof. Chad D. Cummings, CPA, Esq. (emphasis added)


Attorney and CPA

/Meet Chad D. Cummings

Picture of attorney wearing suit and tie

I am an attorney and Certified Public Accountant serving clients throughout Florida and Texas.

Previously, I served in operations and finance with the world’s largest accounting firm (PricewaterhouseCoopers), airline (American Airlines), and bank (JPMorgan Chase & Co.). I have also created and advised a variety of start-up ventures.

I am a member of The Florida Bar and the State Bar of Texas, and I hold active CPA licensure in both of those jurisdictions.

I also hold undergraduate (B.B.A.) and graduate (M.S.) degrees in accounting and taxation, respectively, from one of the premier universities in Texas. I earned my Juris Doctor (J.D.) and Master of Laws (LL.M.) degrees from Florida law schools. I also hold a variety of other accounting, tax, and finance credentials which I apply in my law practice for the benefit of my clients.

My practice emphasizes, but is not limited to, the law as it intersects businesses and their owners. Clients appreciate the confluence of my business acumen from my career before law, my technical accounting and financial knowledge, and the legal insights and expertise I wield as an attorney. I live and work in Naples, Florida and represent clients throughout the great states of Florida and Texas.

If I can be of assistance, please click here to set up a meeting.



Read More About Chad