Category:

What a Strong Business Associate Agreement Should Include

This is some text inside of a div block.

By:

Brent Farese

,

March 25, 2026

Does your vendor ever come into contact with protected health information (PHI), even indirectly through a tool, inbox, or system they support?

A business associate agreement (BAA) is the contract that sets the rules when a covered entity works with a vendor who will handle PHI.

It lays out what the vendor can do with that data, the protections they’re expected to maintain, how incident reporting works, and what happens to the information when the relationship ends.

In this guide, you’ll see what a strong BAA should include before you sign. It covers the situations that typically trigger a BAA, what counts as PHI in real workflows, and the requirements that tend to matter most.

It also points out the clauses worth a closer look, common red flags, and a practical template you can use as a reference while you review agreements.

What Is a Business Associate Agreement?

A business associate agreement is a contract a covered entity uses when hiring a vendor that will handle protected health information. It sets the rules for how that vendor can use and share PHI, plus the security and reporting responsibilities that come with it.

In many cases, you’ll request business associate terms before any PHI is shared, so expectations are clear from day one.

A typical BAA requires appropriate safeguards, limits PHI use to the services being provided, and spells out what happens if there’s a security incident or breach. It also covers subcontractors, so downstream access to PHI stays controlled. More on this later.

In short, the BAA is one of the main documents the U.S. Department of Health and Human Services expects to see when a third party works with PHI on your behalf.

When You Need a Business Associate Agreement

You need a business associate agreement when a vendor will create, receive, maintain, or transmit protected health information for you as part of a paid service.

This comes up most often with a provider, a health plan, or a health care clearinghouse working with third parties tied to treatment, billing, or health care operations.

If you’ll disclose protected health information to the vendor, or the vendor can access PHI inside your systems, get the BAA signed before any work starts.

If a vendor claims they don’t need one, pause and sort it out first. Even with an existing master agreement, you may still need to notify business associate stakeholders internally and attach the BAA as an addendum.

Common situations:

  • Cloud hosting, backups, or email tools: PHI stored or routed through their platform often triggers BAA requirements and HIPAA Security Rule expectations.
  • Billing, claims, and revenue cycle vendors: Access to codes, account data, and patient identifiers is routine.
  • IT support and managed security providers: Admin access can expose PHI even without day-to-day handling.
  • Analytics, call centers, and patient communications vendors: Identifiable patient data in the workflow usually means BAA territory.

What Counts as PHI for BAA Purposes?

PHI, for BAA purposes, is health information tied to an identifiable person that a covered entity or business associate creates, receives, maintains, or transmits. It can show up in paper files, an electronic form, recordings, screenshots, support tickets, exports, and backups.

It’s easy to focus on diagnoses and medical charts, but PHI often hides in the identifiers and context around care or payment.

Common PHI examples include:

  • Names
  • Phone numbers
  • Email addresses
  • Home addresses
  • Dates tied to care (appointments, admission, discharge)
  • Medical record numbers
  • Account numbers and billing details
  • Insurance member IDs
  • Lab results and imaging reports
  • Prescriptions and treatment notes
  • Patient portal messages
  • Device identifiers linked to a patient

A business associate contract usually sits alongside an underlying service agreement, and both should apply the same restrictions on PHI use and disclosure. When PHI gets misclassified as “just data,” teams open themselves up to avoidable risk and potential HIPAA violations.

Business Associate Agreement Requirements

Essentially, a solid BAA sets clear rules for PHI and keeps responsibilities easy to enforce. Here are the requirements that usually matter most:

  • Permissible uses and disclosures: Define the business associate’s use of PHI only for the services described, and add such limitation in plain language so the scope stays tight under HIPAA rules.
  • Safeguards and proper management: Require business associates to maintain administrative, physical, and technical safeguards that fit the risk and applicable law, including the HIPAA Security Rule.
  • Privacy rule alignment: Make the HIPAA business associate follow privacy practices that match the covered entity's compliance obligations under the Privacy Rule.
  • Breach notification standards: Set breach notification standards and timelines, aligned with the HITECH Act, including what details must be shared and who must be notified.
  • Subcontractor controls: Require business associates to bind subcontractors to the same restrictions, so downstream access doesn’t weaken protections.
  • Access, amendment, and accounting support: Explain how the business associate will support patient rights requests and recordkeeping needs.
  • Termination and data return/destruction: State what happens at the end of the relationship, plus what steps apply if PHI can’t be destroyed.

Key Clauses to Look For Before You Sign

Before you sign a BAA, focus on the clauses that set the real boundaries and the real consequences. These might include:

Definitions and Scope

This section tells you what the BAA covers and what it doesn’t. Start by checking how it defines PHI, what systems or data types fall under the agreement, and which party roles apply.

If you’re working with certain services that touch patient data indirectly, make sure the scope still captures that access.

Pay close attention to how the contract describes unsecured PHI, since that language often connects to incident response and reporting.

If definitions feel broad or fuzzy, ask for such changes early, since unclear scope tends to create messy legal responsibilities later.

Permitted Uses and Disclosures

This is where the agreement draws the boundaries around the disclosure of PHI and how the business associate can use it. HIPAA requires limits tied to the underlying services, so the allowed uses should track closely to what the vendor actually does.

Watch for open-ended language that allows “any business purpose” or “product improvement” without guardrails. Covered entities and business associates share real legal responsibilities here, so keep the permissions narrow and easy to defend as meeting HIPAA requirements.

Safeguards and Security Measures

This section should spell out the protection standards the vendor must follow. HIPAA requirements point to administrative, physical, and technical safeguards, and the agreement should reflect that in practical terms.

Look for commitments that match the risk of the data, especially if the vendor stores PHI in multiple systems or relies on subcontractors.

If you see vague promises with no specifics, request such changes so the contract clearly sets the same requirements you expect from any party handling PHI.

Security Incident and Breach Notification

You’re looking for clear triggers, timelines, and a practical notification process. The clause should explain what the vendor must report, how fast they must report it, and what details you’ll get (what happened, what data was involved, who was affected, and what they’re doing next).

Strong language also accounts for other applicable law, since reporting duties can extend beyond HIPAA depending on the situation. If the timing is vague or the notice goes to the wrong contact, fix it before signing.

Subcontractors and Flow-Down Requirements

Vendors often rely on sub-processors for hosting, support, or analytics, so this section matters more than people think.

It should require the vendor to contractually bind subcontractors to the same privacy and security obligations, and to keep oversight through audits, security reviews, or documented internal practices.

You also want clarity on who is responsible if a subcontractor causes an incident, since finger-pointing burns time during a response.

Term and Termination

This section defines how long the BAA stays in effect, what events trigger termination, and what happens once the relationship ends.

Look for a right to exit if the business associate violates key obligations, and confirm the agreement allows you to authorize termination without jumping through unnecessary hoops.

It’s also smart to confirm how the termination date is defined, since return or destruction obligations usually start counting from that point.

Return or Destruction of PHI

This clause covers what happens to PHI when the relationship ends. Ideally, the vendor returns or securely destroys such information, including copies in backups or archived systems, and confirms completion in writing.

If destruction isn’t feasible, the agreement should require continued protections and clear limits on use and disclosure.

It also helps to see language confirming controls apply to the vendor’s workforce members, since offboarding and access removal are common weak points after termination.

Remember: Tight drafting here supports the covered entity's obligation to protect PHI and reduce follow-on risk after data breaches.

Order of Precedence With Other Agreements

This section decides which terms win if the BAA conflicts with the underlying service agreement, a master agreement, or a security addendum. You want the BAA to control when privacy or security terms clash, since it carries HIPAA Privacy Rule-driven contractual obligations.

Look for wording that gives you reasonable assurances the vendor will follow the stricter standard when documents disagree, so a broader commercial clause doesn’t quietly override privacy protections.

Common Red Flags in a Business Associate Agreement

When you review a BAA, red flags usually show up as vague language, missing timelines, or loopholes that weaken HIPAA compliance. If the work will involve access to PHI, it’s worth slowing down and scanning for these issues:

  • Overly broad permitted uses: Language that lets the vendor use data for “any business purpose” can lead to unauthorized use and arguments over what’s allowed.
  • Weak disclosure limits: If the agreement doesn’t clearly restrict when the vendor can disclose PHI, the HIPAA covered entity carries extra risk.
  • No clear incident timeline: Missing breach or security incident deadlines make response slower and harder to manage.
  • Subcontractors left open-ended: If it doesn’t require the business associate to bind subcontractors to the same terms, PHI protection can fall apart downstream.
  • No audit or documentation support: If you can’t request records relating to access, disclosures, or incidents, proving compliance becomes harder.
  • Liability language that dodges responsibility: Some BAAs try to shift all fallout to you, even when the vendor is directly liable under HIPAA.
  • Termination rights too limited: If you can’t exit when obligations are breached, it can affect a business associate's exposure and your own risk profile.

Business Associate Agreement Template

This template is a general guide and a quick preview of common BAA terms. It’s not legal advice. Talk with a qualified professional before you use it for a real deal, since the right language depends on the services, the data, and your risk profile.

Business Associate Agreement

This Business Associate Agreement (“Agreement”) is entered into as of [Effective Date] (“Effective Date”) between:

Covered Entity: [Legal Name], located at [Address] (“Covered Entity”)
and
Business Associate: [Legal Name], located at [Address] (“Business Associate”)

This Agreement is part of, and relates to, the [Underlying Service Agreement Name] dated [Date] (the “Service Agreement”). Business Associate performs functions or services for Covered Entity that involve access to, use of, disclosure of, creation of, receipt of, maintenance of, or transmission of Protected Health Information.

1. Definitions

Terms not defined here have the meaning given under HIPAA, the HIPAA Privacy Rule, the HIPAA Security Rule, and the HITECH Act.

1.1 “HIPAA” means the Health Insurance Portability and Accountability Act of 1996 and its implementing regulations, as amended.
1.2 “HITECH Act” means the Health Information Technology for Economic and Clinical Health Act and its implementing regulations, as amended.
1.3 “PHI” means Protected Health Information, including PHI in electronic form (“ePHI”).
1.4 “Breach” has the meaning set forth in 45 C.F.R. § 164.402.
1.5 “Security Incident” has the meaning set forth in 45 C.F.R. § 164.304.
1.6 “Unsecured PHI” has the meaning set forth in 45 C.F.R. § 164.402.
1.7 “Designated Record Set” has the meaning set forth in 45 C.F.R. § 164.501.

2. Permitted Uses and Disclosures

2.1 Service-related use and disclosure. Business Associate may use and disclose PHI only as necessary to perform services described in the Service Agreement, subject to this Agreement.
2.2 Minimum necessary. Business Associate will limit use, disclosure, and requests for PHI to the minimum necessary for the permitted purpose, as applicable under HIPAA.
2.3 Management and administration. Business Associate may use PHI for its proper management and administration, or to carry out its legal responsibilities, if such use is permitted under HIPAA.
2.4 Disclosures for management and administration. Business Associate may disclose PHI for proper management and administration, or to carry out legal responsibilities, if:

  • The disclosure is required by law, or
  • Business Associate obtains reasonable assurances from the recipient that the PHI will remain confidential and used or further disclosed only as required by law or for the purpose disclosed, and the recipient will notify Business Associate of any breach of confidentiality.

2.5 Data aggregation. Business Associate may perform data aggregation services (as defined in 45 C.F.R. § 164.501) only if expressly authorized in the Service Agreement or this Agreement: [Yes/No]. If yes, permitted scope: [Describe].

3. Prohibited Uses and Disclosures

3.1 Business Associate will not use or disclose PHI other than as permitted under this Agreement, the Service Agreement, or as required by law.
3.2 Business Associate will not use or disclose PHI in a manner that would violate the HIPAA Privacy Rule if done by Covered Entity, where applicable to Business Associate’s activities.

4. Safeguards

4.1 General safeguards. Business Associate will implement appropriate safeguards to prevent unauthorized use or disclosure of PHI.
4.2 Security Rule safeguards for ePHI. Business Associate will comply with the HIPAA Security Rule requirements applicable to Business Associate and will implement administrative, physical, and technical safeguards to protect ePHI.
4.3 Policies and workforce. Business Associate will maintain internal practices, policies, and procedures and will apply them to its workforce members who have access to PHI.

5. Reporting Security Incidents and Breaches

5.1 Security incidents. Business Associate will report Security Incidents to Covered Entity without unreasonable delay and no later than [X] days after discovery. Business Associate will document Security Incidents and, upon request, provide a summary of incidents and responses.
5.2 Breach of Unsecured PHI. Business Associate will notify Covered Entity of any Breach of Unsecured PHI without unreasonable delay and no later than [X] days after discovery.
5.3 Notice contents. The notice will include, to the extent known:

  • A brief description of what happened, including dates of breach and discovery
  • The types of PHI involved
  • Steps individuals should take to protect themselves, if applicable
  • What Business Associate is doing to investigate, mitigate harm, and prevent recurrence
  • Contact information for Business Associate

5.4 Mitigation. Business Associate will take reasonable steps to mitigate harmful effects of any unauthorized use or disclosure of PHI.

6. Subcontractors

6.1 Flow-down. Business Associate will require any subcontractor that creates, receives, maintains, or transmits PHI on behalf of Business Associate to agree in writing to restrictions and conditions at least as protective as this Agreement.
6.2 Responsibility. Business Associate remains responsible for acts and omissions of its subcontractors relating to PHI.

7. Individual Rights and Covered Entity Support

7.1 Access. Business Associate will make PHI in a Designated Record Set available as needed for Covered Entity to meet access obligations under 45 C.F.R. § 164.524 within [X] days of request.
7.2 Amendment. Business Associate will incorporate amendments to PHI in a Designated Record Set as directed by Covered Entity under 45 C.F.R. § 164.526 within [X] days.
7.3 Accounting of disclosures. Business Associate will document disclosures and provide information required for Covered Entity to respond to accounting requests under 45 C.F.R. § 164.528 within [X] days.
7.4 Records relating to compliance. Business Associate will make records relating to its use and disclosure of PHI available to Covered Entity as reasonably necessary for Covered Entity’s HIPAA compliance obligations.

8. Access for Oversight

8.1 Business Associate will make its internal practices, books, and records relating to the use and disclosure of PHI available to the Secretary of Health and Human Services for purposes of determining compliance, as required by law.

9. Term and Termination

9.1 Term. This Agreement begins on the Effective Date and continues until PHI obligations end under this Agreement, unless terminated earlier under this Section.
9.2 Termination for cause. If Covered Entity determines Business Associate has violated a material term of this Agreement, Covered Entity may:

  • Provide written notice and an opportunity to cure within [X] days, or
  • Immediately authorize termination if cure is not possible, if repeated violations occur, or if required under other applicable law

9.3 Effect of termination. The termination date is [Date] or, if not specified, the date the termination notice becomes effective under this Section.

10. Return or Destruction of PHI

10.1 Upon termination or expiration, Business Associate will return to Covered Entity or destroy all PHI received from, or created or received on behalf of, Covered Entity.
10.2 If return or destruction is not feasible, Business Associate will notify Covered Entity in writing and will extend protections of this Agreement to such PHI and limit further uses and disclosures to those purposes that make return or destruction infeasible.

11. Order of Precedence

11.1 If this Agreement conflicts with the Service Agreement or any other agreement between the parties, this Agreement controls for PHI privacy and security obligations, unless a stricter requirement is stated in writing and signed by both parties.

12. Miscellaneous

12.1 Amendment. The parties will amend this Agreement as needed to comply with changes in HIPAA requirements or applicable law.
12.2 Survival. Sections relating to safeguards, reporting, return or destruction, and permitted uses and disclosures survive termination as required for compliance.
12.3 No third-party beneficiaries. This Agreement creates no rights for third parties.
12.4 Governing law. Governing law is [State], subject to federal HIPAA requirements.

Signatures

Covered Entity
Name: [Name]
Title: [Title]
Signature: _________________________
Date: [Date]

Business Associate
Name: [Name]
Title: [Title]
Signature: _________________________
Date: [Date]

A Quick Final Check Before You Sign

A BAA can look fine on the surface, then cause headaches later because one section is too vague or a deadline is missing. So, before you sign, do one last scan with fresh eyes.

Make sure the scope matches what the vendor will actually do, the permitted uses don’t wander beyond the service, and the incident notice language gives you real timelines and a real contact path.

If subcontractors are involved, confirm the same protections apply downstream and not only on paper.

Once those pieces line up, the agreement becomes a lot easier to live with day to day, and a lot easier to defend if questions come up later.

FAQs About Business Associate Agreements

What is a BAA, and when does a covered entity need one?

A covered entity typically needs a BAA before sharing patient data with a vendor that will create, receive, maintain, or transmit PHI as part of the service. The goal is to set clear rules before any covered entity's PHI changes hands.

What’s a common clause people miss that can cause trouble later?

Watch for a vague “permitted uses” section. A strong BAA puts such restrictions on how PHI can be used and disclosed, tied to the specific services in the contract.

What happens if a business associate breaks the rules?

Consequences can affect business associates in real ways, including investigation and enforcement exposure. Depending on the facts, outcomes can include civil penalties and, in extreme cases, criminal penalties.

Who enforces BAAs, and how do patient rights show up in the contract?

Enforcement often involves the HHS Office for Civil Rights. Many BAAs also require the vendor to support individuals' requests, like access or amendment, so you can respond on time and keep your process clean.

Draft, redline, and query legal documents 10X faster with AI

More Posts

You Might Also Like

No items found.

Want to learn more about Aline Workflows? Get in touch.

Learn more