HIPAA

What Is a Business Associate Agreement (BAA)?

| | 11 min read | Updated March 1, 2026

Bottom Line Up Front

A Business Associate Agreement (BAA) is a federally mandated contract under HIPAA 164.502(e) between a Covered Entity and any vendor creating, receiving, maintaining, or transmitting PHI on its behalf. The BAA establishes permitted uses of PHI, requires Security Rule safeguards, mandates breach notification within 60 days, and creates federal liability for the vendor. Three contract traps to review before signing: notification timeline (negotiate 72 hours from discovery, not 24 hours from occurrence), liability cap (2-3x annual contract value), and data destruction (30-day return/destroy with certification).

Before the 2013 HIPAA Omnibus Rule, Business Associates operated in a regulatory gray zone. Covered entities signed agreements. Vendors accepted them. HHS had no direct enforcement authority over the vendors themselves. When Advocate Medical Group lost unencrypted laptops containing 4 million patient records in 2013, HHS could penalize the hospital but not the third-party contractor who lost the hardware. The Omnibus Rule closed the gap: Business Associates now face direct federal enforcement, independent of the covered entity’s liability [78 FR 5566].

A Business Associate Agreement is the legal mechanism creating that enforcement chain. Without it, the vendor bears no federal obligation to safeguard patient data, report breaches, or share liability for unauthorized disclosures [HIPAA 164.502(e)]. HHS OCR enforcement data shows “failure to obtain BAAs” appears in 34% of resolution agreements, making it the second most common finding after incomplete risk assessments [HHS OCR 2024 Annual Report].

The agreement contains six required elements, three contract traps hiding in standard templates, and post-signing obligations most vendors underestimate until an OCR investigation surfaces them.

A Business Associate Agreement (BAA) is a federally mandated HIPAA contract requiring any vendor that creates, receives, maintains, or transmits PHI on behalf of a covered entity to implement Security Rule safeguards, report breaches within 60 days, and accept federal liability for patient data handling [HIPAA 164.502(e)].

Who Needs a Business Associate Agreement?

HHS OCR data shows 34% of resolution agreements cite missing BAAs, making it the second most common enforcement finding after incomplete risk assessments [HHS OCR 2024 Annual Report]. The trigger is the data, not the vendor category. If a vendor creates, receives, maintains, or transmits Protected Health Information on behalf of a covered entity, the vendor is a Business Associate requiring a BAA [HIPAA 45 CFR 160.103]. The definition is functional, not categorical.

Common Vendors Requiring BAAs

Cloud storage: Google Drive, Dropbox, AWS, Azure (if storing PHI). Communication platforms: Slack (Enterprise Grid only), Zoom (healthcare license), Microsoft Teams (with Microsoft BAA). SaaS applications: EHR systems, practice management software, billing platforms, scheduling tools, patient portals. AI tools: ChatGPT Enterprise/API, Claude Enterprise, Microsoft Copilot (commercial license). Service providers: Medical billing companies, transcription services, IT managed service providers, document shredding companies.

The Conduit Exception

Entities providing transmission services without routine access to PHI fall under the conduit exception and do not require BAAs [HIPAA 45 CFR 160.103]. The US Postal Service delivering sealed envelopes containing patient records is a conduit. Internet service providers transmitting encrypted data packets are conduits. The distinction: conduits transport data without accessing, storing, or processing it. A cloud provider hosting an encrypted database maintains the data (even without decrypting it) and requires a BAA. An ISP routing packets between your office and the cloud provider does not.

Audit your vendor inventory against the BAA requirement. For every vendor touching PHI, document: vendor name, service provided, PHI types handled, BAA status (executed/pending/not available), and BAA execution date. Flag every vendor handling PHI without an executed BAA. Prioritize remediation by PHI volume: the EHR vendor processing 50,000 records without a BAA creates greater exposure than the scheduling app with 200 records. If a vendor refuses to sign a BAA, stop sharing PHI with that vendor and find a compliant alternative [HIPAA 164.502(e)].

The SaaS Tier Trap

Most SaaS vendors offer BAAs only on premium tiers. The free and standard plans your practice uses daily do not include BAA eligibility. Using a non-BAA tier to process PHI violates HIPAA regardless of the platform’s security features.

Platform BAA Availability by Tier

Platform BAA-Eligible Tier Non-Compliant Tiers
Slack Enterprise Grid Free, Pro, Business+
Zoom Healthcare / Enterprise (with BAA) Basic, Pro (consumer)
Google Workspace Business / Enterprise (BAA in Admin Console) Personal Gmail accounts
Microsoft 365 Business / Enterprise (BAA in admin portal) Personal / Family plans
Dropbox Business / Enterprise (with BAA addendum) Basic, Plus, Professional

Google Workspace and Microsoft 365 require an additional step beyond purchasing the business tier: executing the BAA through the admin console. The BAA is not automatic. A practice running Google Workspace Business without signing the BAA in the Admin Console operates without HIPAA protection despite paying for a BAA-eligible plan. OCR classifies this as willful neglect because the organization paid for compliance capability and failed to activate it [HIPAA 164.402].

Verify the tier and BAA activation status for every SaaS platform processing PHI. For Google Workspace: open Admin Console, select Account, then Account Settings, and confirm the BAA is signed and active. For Microsoft 365: check the Microsoft Trust Portal for your organization’s BAA status. For Slack, Zoom, and Dropbox: contact the vendor to confirm your plan tier includes BAA eligibility and request the executed agreement. A paid business plan without an activated BAA provides zero HIPAA protection. Document the BAA activation date for each platform.

The Three BAA Contract Traps

Standard BAA templates contain three clauses determining liability allocation during a breach. Organizations signing BAAs without reviewing these clauses accept terms creating disproportionate risk. Both covered entities and vendors should negotiate these terms before execution.

Trap 1: The Notification Timeline

HIPAA requires breach notification “without unreasonable delay” with a maximum of 60 days from discovery [HIPAA 164.410(a)]. Covered entities drafting BAAs frequently insert 24-hour notification requirements. A 24-hour window from the moment of “occurrence” (not discovery) is operationally impossible. The vendor will not identify the breach scope, affected records, or attack vector within 24 hours. Signing this clause guarantees contract breach the moment an incident occurs.

Negotiate to: 72 hours from discovery (not occurrence), measured in business days. This timeline aligns with GDPR’s 72-hour standard and provides sufficient time for initial forensic assessment without unreasonable delay.

Trap 2: The Unlimited Liability Clause

Large health systems insert indemnification clauses requiring the vendor to cover “any and all damages” arising from a breach. Without a liability cap, a $50,000 annual SaaS contract creates exposure for millions in breach costs: OCR fines, patient notification, credit monitoring, forensic investigation, and litigation. The liability exceeds the contract value by orders of magnitude.

Negotiate to: Liability capped at 2-3x the annual contract value, or a fixed dollar amount ($1M-$5M) with cyber liability insurance requirements. This is market standard for healthcare SaaS contracts.

Trap 3: The Data Retention Clause

HIPAA requires return or destruction of PHI upon contract termination [HIPAA 164.504(e)(2)(ii)(J)]. Standard BAA templates often include an exception: “vendor retains data as necessary for business purposes” or “for archival purposes.” This exception allows the vendor to hold patient data indefinitely after the relationship ends, creating ongoing breach exposure for records you no longer control.

Negotiate to: Return or certify destruction of all PHI within 30 days of contract termination. Require a written certificate of destruction. If the vendor claims data retention is operationally necessary (backup tapes, disaster recovery), document the specific retention period and require encryption of retained data with the covered entity’s key. The following comparison separates reasonable contract standards from the trap language hiding in default BAA templates.

BAA Clause Reasonable Standard Trap Language
Breach notification 72 hours from discovery (business days) 24 hours from occurrence
Liability Capped at 2-3x annual contract value “Any and all damages” (unlimited)
Data destruction Return or destroy within 30 days Retained “for business purposes” (indefinite)

Review every active BAA for these three clauses. Create a BAA Review Checklist documenting: notification timeline (acceptable: 30-72 hours from discovery), liability cap (acceptable: 2-3x contract value or fixed amount), and data destruction terms (acceptable: 30-day return/destroy with certification). For BAAs containing trap language, initiate renegotiation with the vendor. If the vendor refuses to negotiate, document the risk in your risk register with the specific clause, the exposure amount, and the risk owner accepting the terms. Never sign a BAA with unlimited liability without executive approval and documented risk acceptance.

What Obligations Follow After Signing a BAA?

A 2024 Verizon DBIR analysis found that 62% of healthcare breaches involved a third-party vendor, and executing a BAA triggers HIPAA Security Rule obligations for each one. The BAA is the starting line, not the finish line. Vendors treating the signed BAA as the final compliance step face enforcement actions when OCR investigates.

The Four Vendor Obligations

1. Annual risk assessment: Business associates must conduct their own HIPAA risk assessment annually, independent of the covered entity’s assessment [HIPAA 164.308(a)(1)(ii)(A)]. 2. Access controls and audit logging: Track every access to PHI with user identification, timestamp, and action performed. Audit logs must be retained for six years [HIPAA 164.312(b)]. 3. Subcontractor BAAs: If the vendor uses subcontractors touching PHI (AWS hosting, third-party analytics, backup providers), each subcontractor requires its own BAA. The chain must remain unbroken from covered entity to business associate to subcontractor [HIPAA 164.502(e)(1)(ii)]. 4. Breach notification: Report security incidents to the covered entity within the timeline specified in the BAA. The notification must include the nature of the breach, the PHI involved, the individuals affected, and the corrective actions taken.

For vendors: create a Post-BAA Compliance Checklist documenting the four obligations with completion dates and responsible parties. Schedule the annual risk assessment on the compliance calendar. Verify subcontractor BAAs are in place for every downstream vendor touching PHI. Implement audit logging on all systems processing PHI and test log retention quarterly. For covered entities: add BAA compliance verification to your annual vendor review process. Covered entities retain the right to audit their business associates for HIPAA compliance. Request evidence of risk assessments, audit log samples, and subcontractor BAA documentation from each business associate annually [HIPAA 164.308(b)(4)].

A BAA is not a compliance checkbox. It is the legal document determining who pays when a breach occurs. Two patterns dominate OCR enforcement actions: covered entities sharing PHI without BAAs in place, and vendors signing BAAs without reading the liability clauses. Audit every vendor relationship for BAA status. Review every BAA for notification timelines, liability caps, and data destruction terms. The BAA you sign before the breach determines your organization’s financial exposure after the breach.

Frequently Asked Questions

What is a Business Associate Agreement?

A Business Associate Agreement (BAA) is a federally mandated HIPAA contract between a covered entity and any vendor creating, receiving, maintaining, or transmitting PHI on its behalf. The BAA establishes permitted PHI uses, requires Security Rule safeguards, mandates breach notification, and creates federal liability for the vendor. Sharing PHI without an executed BAA is a HIPAA violation [HIPAA 164.502(e)].

When is a BAA not required?

BAAs are not required for entities falling under the conduit exception: organizations providing transmission services without routine access to PHI. The US Postal Service, Internet service providers, and telephone companies transporting sealed or encrypted data without accessing it qualify as conduits. BAAs are also not required for vendors with only incidental PHI exposure (janitorial staff, facility maintenance) who do not access, process, or store patient data [HIPAA 45 CFR 160.103].

Does encryption eliminate the need for a BAA?

Encryption does not eliminate the BAA requirement because HIPAA’s definition of “maintaining” PHI applies regardless of whether the vendor holds decryption keys, meaning any cloud provider hosting encrypted patient data still qualifies as a Business Associate [HHS OCR Guidance on Business Associates]. A cloud vendor hosting an encrypted database still “maintains” PHI under HIPAA’s definition, triggering Business Associate status regardless of whether the vendor holds decryption keys. OCR guidance confirms: if the vendor maintains the data (even encrypted), the vendor is a Business Associate requiring a BAA [HHS OCR Guidance on Business Associates].

What happens if a vendor refuses to sign a BAA?

HIPAA prohibits covered entities from disclosing PHI to any vendor without an executed BAA, so the immediate step when a vendor refuses to sign is to stop sharing PHI with that vendor [HIPAA 164.502(e)]. If the vendor’s service is operationally critical, find a BAA-eligible alternative or negotiate with the vendor’s legal team. Document the vendor’s refusal and your remediation timeline in your compliance records.

What liability cap is standard in a BAA?

Market standard for healthcare SaaS contracts: 2-3x the annual contract value, or a fixed amount ($1M-$5M) depending on the PHI volume and contract size. BAAs without liability caps expose the vendor to unlimited damages. BAAs with caps exceeding 5x the contract value are aggressive and warrant negotiation. Both parties should carry cyber liability insurance as a backstop to the contractual cap.

Does a BAA apply to subcontractors?

Business Associates must execute BAAs with every subcontractor handling PHI on behalf of the covered entity [HIPAA 164.502(e)(1)(ii)]. If your EHR vendor hosts patient data on AWS, the vendor needs a BAA with AWS. If the vendor uses a third-party analytics platform processing PHI, a BAA is required with the analytics provider. The BAA chain must remain unbroken from covered entity through every vendor layer touching PHI.

How often should BAAs be reviewed?

Review BAAs annually during vendor management assessments and upon any material change: contract renewal, service scope expansion, new PHI types processed, subcontractor changes, or a security incident involving the vendor. HIPAA does not mandate a specific review frequency, but OCR expects active management of BAA relationships. Stale BAAs with outdated service descriptions or terminated vendors still listed create compliance gaps during investigations.

Get The Authority Brief

Weekly compliance intelligence for security leaders and technology executives. Frameworks decoded. Audit strategies explained. Regulatory updates analyzed.

Discipline in preparation. Confidence in the room.

Josef Kamara, CPA, CISSP, CISA, Security+
Josef Kamara
Josef Kamara
CPA · CISSP · CISA · Security+

Former KPMG and BDO. Senior manager over third-party risk attestations and IT audits at a top-five global firm, and former technology risk leader directing the IT audit function at a Fortune 500 medical technology company. Advises growth-stage SaaS companies on SOC 2, HIPAA, and AI governance certifications.