Requirements for protecting electronic Protected Health Information (ePHI) and managing Business Associate risks
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule establishes national standards to protect individuals' electronic personal health information (ePHI) that is created, received, used, or maintained by a covered entity. It requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI.
A critical aspect involves managing "Business Associates" – third parties performing functions involving the use or disclosure of PHI on behalf of a covered entity. Covered entities must ensure their business associates comply with HIPAA safeguards.
Active - Final Rule effective April 2003 (modified by HITECH Act)
United States
Department of Health and Human Services (HHS), Office for Civil Rights (OCR)
Covered Entities (health plans, clearinghouses, providers) and their Business Associates
The cornerstone of managing third-party risk under HIPAA
Covered entities are required to enter into a formal, written contract or other arrangement – a Business Associate Agreement (BAA) – with their business associates before any PHI can be shared. This agreement is legally binding and outlines the responsibilities of both parties regarding PHI protection.
Beyond the BAA, covered entities have ongoing duties
Perform due diligence to obtain "satisfactory assurances" that the business associate can appropriately safeguard PHI before entering into a BAA.
If aware of a material breach or violation by the BA, the covered entity must take reasonable steps to cure the breach or end the violation. If unsuccessful, terminate the contract.
Implicit expectation to manage the relationship, though HIPAA doesn't explicitly mandate ongoing monitoring beyond acting on known violations.
Core security measures required by the HIPAA Security Rule
Policies, procedures, and actions to manage security measures and workforce conduct.
Measures to protect electronic systems, equipment, and data from physical threats.
Technology and related policies/procedures to protect ePHI and control access.
Official HHS and OCR guidance on HIPAA Security and Business Associates
Official text of the Security Standards for the Protection of ePHI.
Access RuleHHS guidance on Business Associates, including sample BAA provisions.
Access GuidanceDetailed guidance materials covering various aspects of the Security Rule.
Access MaterialsA tool to help organizations conduct risk assessments required by HIPAA.
Access ToolSolutions to streamline Business Associate Agreements and compliance
Centralized system to manage all business associates and their BAA status.
Standardized BAA templates and automated workflows for execution.
Customizable security questionnaires to assess BA compliance.
Tracking BA attestations, certifications, and incident reports.
Easy access to BAAs, due diligence records, and compliance evidence.
Automated reminders and workflows for periodic BAA reviews and renewals.
Implement effective processes and tools to manage BA risk and meet Security Rule requirements.