A business associate agreement is a legal contract required under HIPAA when a covered entity shares protected health information with a vendor, contractor, or service provider. The vendor becomes a "business associate" the moment they handle, store, or transmit PHI on behalf of the covered entity, and the law requires a signed BAA before any PHI changes hands.

That's the textbook definition. The reality is more complicated, and most organizations are getting it wrong in ways that create compliance gaps and real liability.

I've reviewed hundreds of business associate agreements during my years working with healthcare organizations and their vendors. The pattern I see consistently: organizations treat BAAs as procurement paperwork rather than risk management instruments. They sign template agreements without understanding what protections they actually need, and they fail to recognize when a new vendor relationship triggers the BAA requirement in the first place.

The stakes have changed. Cloud platforms, AI tools, and complex subcontractor chains have made the business associate ecosystem far more intricate than it was when HIPAA was written. A modern healthcare organization might have dozens or hundreds of business associates, many of them handling PHI in ways that weren't contemplated in 1996.

When You Need a Business Associate Agreement

The trigger is simple in theory: if an external party creates, receives, maintains, or transmits PHI on your behalf, you need a BAA with them before they touch any data.

The confusion comes from what "on your behalf" means and what counts as PHI access. OCR has clarified this over the years through guidance and enforcement actions, but gaps remain in how organizations apply the rules.

Clear examples of business associate relationships include:

The gray areas emerge with vendors who have potential or incidental access to PHI. A janitorial service doesn't need a BAA. A cloud backup provider that stores encrypted PHI without the decryption keys doesn't need one under the conduit exception. But a SaaS platform that processes any identifiable health information, even if it's just names and appointment times, does need a BAA.

In my experience, organizations most commonly miss the BAA requirement with:

The legal exposure from missing a required BAA is significant. OCR has made clear through enforcement actions that failing to have a BAA in place before sharing PHI is itself a HIPAA violation, separate from any breach that might occur. It's not enough to get the BAA signed after you discover the gap.

What Must Be In a Business Associate Agreement

HIPAA specifies required provisions for every business associate agreement. These aren't suggestions or best practices. They're regulatory requirements found in 45 CFR § 164.504(e), and an agreement missing these elements doesn't satisfy the rule.

The business associate must agree to:

The covered entity retains the right to:

That's the regulatory minimum. The problems emerge in how these requirements get implemented in actual agreements, and what they don't cover.

Where Standard BAAs Fall Short

Most vendor-provided BAAs are written to minimize the vendor's obligations and liability, not to provide meaningful protection or compliance for the covered entity. I've seen this pattern repeatedly: vendors offer a standard BAA as part of their sales process, organizations sign it without negotiation, and the agreement provides almost no practical recourse when something goes wrong.

Common weaknesses in standard business associate agreements include:

Vague security commitments. The agreement says the business associate will implement "appropriate safeguards," but doesn't specify what that means. There's no commitment to encryption, no requirement for multi-factor authentication, no specification of acceptable security frameworks or standards. When pressed, the vendor points to their SOC 2 report and considers the matter closed.

Breach notification loopholes. The BAA requires breach notification, but defines "breach" narrowly or gives the business associate sole discretion to determine whether a reportable incident occurred. Some agreements include notification timeframes that exceed HIPAA's requirements, creating a situation where the business associate can delay reporting and leave the covered entity unable to meet its own regulatory deadlines.

Unlimited subcontractor rights. The agreement allows the business associate to use subcontractors without prior notice or approval. The covered entity discovers, often during an audit, that PHI is being processed by companies they've never heard of, in jurisdictions they didn't anticipate, with no direct BAA relationship or visibility into subcontractor security practices.

Weak audit rights. The BAA provides no right to audit the business associate's security practices, or limits audits to "industry standard" questionnaires. When a security incident occurs, the covered entity has no contractual right to verify what actually happened or whether the business associate's controls were adequate.

Liability caps and indemnification gaps. The agreement caps the business associate's liability at a small multiple of annual fees, and excludes consequential damages. If a breach occurs due to the vendor's negligence, the covered entity bears the full cost of notification, credit monitoring, regulatory fines, and reputational damage, with no realistic recovery from the party that caused the incident.

These aren't theoretical concerns. I've worked with organizations facing exactly these situations after breaches at business associates, and the BAA they signed years earlier offers no practical protection.

Need to Build a Better Vendor Risk Framework?

Carl speaks to healthcare organizations and industry groups about the real risks in third-party relationships and what effective vendor management looks like beyond checkboxes. His sessions give leadership and compliance teams practical frameworks for evaluating vendors, negotiating better BAAs, and building sustainable oversight programs.

Book Carl to Speak
Inline article illustration

The Cloud Platform Problem

Cloud service providers occupy a unique and often misunderstood position in the business associate ecosystem. The major platforms—AWS, Azure, Google Cloud—will sign BAAs with customers who configure and use their services to store or process PHI. That much is straightforward.

The confusion comes from what the BAA actually covers and what it doesn't.

When you sign a BAA with AWS, for example, you're getting an agreement that applies to the underlying infrastructure services you use. AWS becomes a business associate for the compute instances, storage buckets, and database services where your PHI resides. The BAA commits AWS to implementing appropriate safeguards for those infrastructure components and to notifying you of relevant security incidents.

What the BAA doesn't do is make your environment compliant. The cloud provider BAA doesn't cover:

This is the shared responsibility model, and it trips up organizations constantly. Having a signed BAA with your cloud provider is necessary but nowhere near sufficient for HIPAA compliance. You're still responsible for implementing the administrative, physical, and technical safeguards required by the Security Rule within your cloud environment.

The problem compounds with SaaS platforms built on top of infrastructure clouds. A healthcare organization might use a patient engagement platform hosted on AWS. The SaaS vendor has a BAA with AWS. The healthcare organization has a BAA with the SaaS vendor. But that doesn't mean AWS has any direct obligation to the healthcare organization, or that the healthcare organization has visibility into how the SaaS vendor configured their AWS environment.

This creates compliance gaps that surface during audits. OCR expects covered entities to understand the full chain of business associates and to have appropriate oversight mechanisms in place. Pointing to a SaaS vendor's BAA isn't enough if the vendor is exposing PHI through misconfigured cloud storage or inadequate application security.

AI Tools and the New Business Associate Analysis

Artificial intelligence platforms are forcing organizations to rethink how they identify business associate relationships and what protections they need in place.

The fundamental question is whether the AI tool creates, receives, maintains, or transmits PHI on behalf of the covered entity. The answer depends on the specific use case and how the tool operates.

A large language model that processes clinical notes to generate summaries is clearly handling PHI and requires a BAA. A predictive analytics platform that receives identified patient data to generate risk scores needs a BAA. An AI coding assistant that has access to your EHR database to suggest diagnosis codes needs a BAA.

The complexity emerges with AI platforms that claim they don't need BAAs because they process data "transiently" or because the AI vendor argues they're providing a tool rather than a service. These arguments don't hold up under HIPAA's functional analysis. If PHI reaches the vendor's systems, even temporarily, and the vendor is processing it on your behalf, the business associate relationship exists.

I wrote about this in detail when examining whether AI vendors need to sign BAAs, and the conclusion is clear: most AI tools used in healthcare settings trigger the BAA requirement. The vendor's business model or technical architecture doesn't change the legal analysis.

What makes AI tools particularly challenging is understanding what happens to the PHI after processing:

Standard BAA language often doesn't address these questions adequately. Vendors provide vague assurances about data handling without specific commitments. Organizations accept these assurances because the AI tool solves a real problem, and they don't want to slow down adoption by demanding detailed technical and contractual specifics.

This is a mistake. The pattern we're seeing in 2026 is that healthcare organizations are deploying AI tools faster than they're establishing proper governance and vendor oversight. When an incident occurs—unexpected data retention, unauthorized model training, inadequate access controls—the organization discovers their BAA provides no meaningful protection and no practical recourse.

Inline article illustration

Subcontractors and the Chain of Responsibility

Under HIPAA regulations, a business associate can use subcontractors to perform services involving PHI, but only if the business associate obtains satisfactory assurances through a written agreement that the subcontractor will appropriately safeguard the information. In practical terms, this means BAAs all the way down.

This creates a chain: covered entity → business associate → subcontractor → sub-subcontractor. Each link in the chain must be documented through a compliant business associate agreement, and each party in the chain bears direct liability under HIPAA for their own compliance failures.

The challenge for covered entities is visibility and oversight. Your BAA with a primary vendor doesn't automatically give you visibility into who their subcontractors are, where PHI is being processed, or what security controls are in place at each tier.

I see organizations struggle with this in several patterns:

Discovery after the fact. During an audit or after a security incident, the organization learns that their business associate has been using subcontractors they never knew about. The primary BAA allowed subcontractor use without notification requirements, so technically nothing was violated, but the organization had no opportunity to evaluate the risk or ensure appropriate safeguards.

Foreign subcontractors. PHI ends up processed or stored in jurisdictions the covered entity never anticipated, creating both compliance and business risk. This happens most commonly with customer support, development, and infrastructure services where the vendor uses offshore teams or data centers.

Vendor M&A activity. A business associate gets acquired, and the new parent company has different subcontractors, different security practices, and different risk profiles. The BAA doesn't address change of control scenarios, and the covered entity discovers the change through a vendor announcement rather than proper notice and evaluation.

Generic vendor questionnaires. Organizations try to get subcontractor visibility through vendor risk assessment questionnaires, but the questions are generic and the answers are marketing-speak. "We use industry-leading subcontractors with appropriate security measures" tells you nothing useful.

Effective oversight of business associate subcontractors requires specific contractual provisions:

Large vendors resist these provisions because they limit flexibility and create administrative burden. But that tension is exactly the point—the provisions force the vendor to think carefully about subcontractor risk and give the covered entity meaningful oversight.

Help Your Organization Navigate Modern HIPAA Risks

Carl delivers keynotes on HIPAA compliance challenges that matter today: cloud vendors, AI deployment, complex subcontractor relationships, and building vendor risk programs that work. His sessions give healthcare leaders and compliance teams practical guidance grounded in real regulatory experience. See all keynote speaking topics or reach out about your event.

Book Carl for Your Event

What Enforcement Actions Teach Us About BAAs

OCR's enforcement actions provide the clearest picture of what actually matters in business associate relationships. The patterns in settlements and civil monetary penalties show where organizations are failing and what OCR considers material violations.

Several themes emerge consistently:

Missing BAAs are violations in themselves. OCR treats the failure to have a BAA in place before sharing PHI as a separate violation from any breach or security incident. The University of Rochester Medical Center paid $3 million in 2021 partly because they disclosed PHI to a business associate without a signed BAA. The breach that followed compounded the problem, but the missing agreement was independently sanctionable.

Inadequate oversight equals lack of due diligence. Having a signed BAA doesn't satisfy HIPAA's requirements if the covered entity never monitors whether the business associate is actually complying. OCR expects organizations to conduct due diligence before engaging a business associate and ongoing oversight during the relationship. Generic vendor questionnaires aren't enough. Organizations need evidence they've evaluated the business associate's security practices and verified compliance over time.

Breach notification failures at business associates create liability for covered entities. When a business associate discovers a breach but delays notification to the covered entity, both parties face enforcement risk. The covered entity can't meet HIPAA's 60-day notification deadline to affected individuals if they don't know about the breach. OCR has held covered entities accountable for their business associates' notification failures, on the theory that proper oversight and contract provisions should have prevented the delay.

Termination provisions must be enforceable. BAAs are required to include provisions allowing the covered entity to terminate the agreement if the business associate violates a material term. But OCR has found situations where these provisions were purely theoretical—either because the covered entity had no practical ability to switch vendors, or because the contract terms made termination prohibitively expensive or complex. OCR expects termination rights to be real, not just legal boilerplate.

The practical lesson from enforcement patterns is that compliance requires substantive risk management, not just documentation. A file full of signed BAAs doesn't demonstrate compliance if the organization can't show they evaluated vendors properly, monitored their performance, responded to incidents appropriately, and held vendors accountable for failures.

What a Modern BAA Should Address

Given the limitations of standard business associate agreements and the complexity of modern vendor relationships, what should a well-drafted BAA actually cover?

Start with the regulatory requirements—the provisions I outlined earlier are non-negotiable. But a modern business associate agreement should go substantially further.

Specific security standards. Rather than generic language about "appropriate safeguards," reference specific frameworks or controls you expect the business associate to implement. This might include encryption requirements, access control standards, logging and monitoring capabilities, vulnerability management processes, and incident response procedures. If the vendor maintains relevant certifications (SOC 2, HITRUST, ISO 27001), the BAA should require maintaining those certifications and providing updated reports.

Detailed breach notification obligations. Specify that the business associate must notify you of any suspected or actual breach involving your PHI within a defined timeframe—typically 24 to 72 hours of discovery. Define what constitutes discovery. Require that notification include specific details: what happened, what data was affected, how many individuals, what the vendor is doing to investigate and contain the incident, and preliminary root cause. Make clear that the business associate doesn't get to decide unilaterally whether something is reportable.

Subcontractor requirements. Include the notification, approval, and flow-down provisions I described earlier. Specify any jurisdictions or service categories that require explicit approval. Require that the business associate maintain and provide you with a current list of all subcontractors handling your PHI.

Audit and verification rights. Give yourself the right to audit the business associate's security practices, either directly or through a third-party assessor. At minimum, you should have the right to receive relevant audit reports (SOC 2, penetration test results, vulnerability assessments) and to request specific evidence of security controls. This shouldn't be unlimited—vendors legitimately need to protect confidential information and manage audit burden—but the BAA should establish your right to verify compliance.

Data handling specifics. Address what the business associate can and cannot do with your PHI beyond the primary service purpose. Prohibit use of PHI for the vendor's own purposes, including product improvement, analytics, or model training, unless you explicitly consent. Specify data retention periods and deletion procedures. Address what happens to data in backups and archives.

Indemnification for regulatory violations. Include provisions that protect you from losses arising from the business associate's HIPAA violations. This won't cover everything—you can't contract away your own compliance obligations—but it should address damages caused by the vendor's failure to meet its commitments. Expect significant negotiation on this point; vendors resist broad indemnification for good reasons, but some protection is better than none.

Termination and transition. Beyond the regulatory requirement for termination rights, specify what happens during transition if you end the relationship. How long does the business associate have to return or destroy data? What format will data be provided in? What assistance must the vendor provide during migration? What happens if data destruction isn't feasible?

None of this is easy to negotiate, especially with large vendors who have standard terms they're reluctant to modify. But the conversation itself has value. When a vendor refuses to commit to reasonable security standards or notification timeframes, you learn something important about how they approach security and customer relationships. That information should factor into your risk assessment and vendor selection process.

Building a Sustainable Business Associate Management Program

The real work of business associate compliance isn't in the contracts—it's in the ongoing program of vendor identification, evaluation, oversight, and incident response.

Organizations that handle this well share several characteristics:

They have a systematic process for identifying business associate relationships. This means vendor intake procedures that route any potential PHI-handling vendor through privacy and security review before the contract is signed. It means training for procurement and business units so they understand what triggers a BAA requirement. It means periodic reviews of existing vendor relationships to catch cases where services have expanded to include PHI access.

They evaluate vendors before engagement, not after. Security questionnaires, references, audit reports, and technical reviews happen during vendor selection, not as an annual compliance exercise. The evaluation isn't about checking boxes—it's about understanding whether the vendor's security posture is adequate for the specific risk they'll create.

They maintain visibility into vendor performance. This includes collecting and reviewing security reports, monitoring vendor security incidents (even those that don't affect your data), tracking compliance with contractual obligations, and conducting periodic re-assessments. When a business associate has a publicized breach at another customer, effective programs investigate whether similar risks exist in their own relationship.

They have clear escalation paths for vendor issues. When a business associate doesn't meet notification timelines, refuses to provide required reports, or shows signs of security control failures, someone needs authority to escalate and potentially terminate the relationship. This requires executive support and business unit buy-in—which means the compliance program needs to make the case for why vendor risk management matters.

They plan for vendor breaches. When a business associate experiences a breach involving your PHI, you have 60 days from when you learn about it to notify affected individuals. That timeline is tight, and you can't meet it without pre-planned processes. Effective programs have playbooks for business associate breaches, define roles and responsibilities, establish communication channels with vendors, and conduct tabletop exercises to test response procedures.

The investment required to build and maintain this kind of program is significant. For a large healthcare organization with dozens or hundreds of business associates, you're talking about dedicated FTEs, technology for vendor management, legal and contracting support, and executive attention.

The alternative is accepting that your business associate risk management is largely theater—signed agreements that provide minimal protection and processes that catch problems only after incidents occur. Some organizations make that choice explicitly, deciding that the business risk is acceptable given other priorities. But it should be a conscious decision, not something that happens by default because no one wants to slow down vendor onboarding or push back on business units that want to use the latest SaaS tool.

The Strategic Implications for Healthcare Leadership

Business associate agreements matter because they sit at the intersection of several trends reshaping healthcare: cloud transformation, AI adoption, increasing regulatory scrutiny, and growing cyber threats targeting the healthcare supply chain.

From a CISO perspective, business associates represent one of your largest and least controllable attack surfaces. You can implement excellent security controls in your own environment, but you're still exposed through vendors who may have weaker security, may be targeted by sophisticated threat actors, or may simply make mistakes that expose your data. The BAA is one of your few tools for managing that risk.

From a privacy officer's perspective, business associates create compliance complexity that scales poorly. Every new vendor relationship is a potential audit finding, every breach at a vendor is a notification event you have to manage, and every vendor that doesn't meet its obligations creates regulatory risk you bear.

From an executive leadership perspective, business associates represent a growing source of operational and reputational risk. Breaches at vendors affect your patients, trigger regulatory investigations, and generate negative publicity, even when the security failure wasn't yours. The contractual protections you have in place determine whether you have any recourse when those incidents occur.

The strategic question is how much control you need over business associate risk, and what you're willing to invest to get it. The regulatory minimum—signed BAAs with required provisions—is achievable without heroic effort. Building a program that provides meaningful risk reduction and real vendor accountability requires substantially more.

Most organizations are somewhere in the middle: they have BAAs in place, they conduct some level of vendor evaluation, but they know significant gaps exist. The key is understanding where those gaps create unacceptable risk versus where they're a conscious trade-off against other priorities.

That analysis requires moving past the compliance checkbox mindset. A business associate agreement isn't just a HIPAA requirement—it's a risk management contract that defines what protection you have when things go wrong. The organizations that treat it that way, and build vendor management programs that match that understanding, are the ones that come out of vendor incidents with their compliance posture and reputation intact.

📖
The HIPAA Security Rule, Explained: Administrative, Physical, and Technical Safeguards → What Is Regulatory Compliance? A Practical Guide →