What is a Business Associate Agreement
A Business Associate Agreement (BAA) is a HIPAA-required contract that governs how a third party (a “business associate”) may create, receive, maintain, or transmit protected health information (PHI) for a covered entity. In third-party due diligence, a BAA is the control-bearing mechanism that allocates HIPAA Security/Privacy Rule obligations, breach reporting timelines, and downstream subcontractor requirements with an audit trail.
Key takeaways:
- A BAA is mandatory under HIPAA when a third party handles PHI on behalf of a covered entity (45 CFR §164.502(e), §164.504(e)).
- BAAs are not “paperwork”; they are enforceable control requirements that should map to HIPAA, SOC 2, and ISO 27001 control sets.
- A strong BAA supports control mapping, incident response SLAs, subcontractor flow-down, and evidence collection for audits.
If your organization is a HIPAA covered entity (or a business associate itself), “what is a business associate agreement” becomes a practical question during onboarding, renewals, and regulatory change management. The BAA is the contract artifact that converts HIPAA’s regulatory requirements into vendor-manageable obligations: permitted uses/disclosures, safeguards, breach notification, and subcontractor flow-down. Without it, your third-party relationship may be noncompliant even if the third party’s security posture is strong.
For GRC teams, BAAs are also a control mapping accelerator. A well-structured BAA lets you crosswalk contractual clauses to the HIPAA Security Rule standards and implementation specifications, then link those requirements to SOC 2 criteria or ISO 27001 Annex A controls for consistent assessment across your third-party population. The resulting audit trail is clearer: you can show (1) why the BAA is required, (2) what risk it mitigates, (3) which controls you expect, and (4) what evidence proves performance.
This glossary entry breaks down the definition, regulatory basis, how it works in real third-party due diligence, and where teams commonly mis-scope or over-scope BAAs.
What is a Business Associate Agreement (BAA)?
A Business Associate Agreement (BAA) is a written contract required by HIPAA between a covered entity and a business associate (or between a business associate and its subcontractor) that:
- Permits and limits the business associate’s uses and disclosures of PHI,
- Requires safeguards to protect PHI,
- Requires breach reporting and cooperation obligations, and
- Binds subcontractors that handle PHI to equivalent restrictions (flow-down).
Regulatory definition anchor: HIPAA requires covered entities to obtain “satisfactory assurances” in the form of a written contract that the business associate will appropriately safeguard PHI (45 CFR §164.502(e); required contract elements at 45 CFR §164.504(e)).
Key terms (precision matters)
- Covered Entity (CE): Health plans, health care clearinghouses, and many health care providers that conduct certain transactions electronically (HIPAA; 45 CFR §160.103).
- Business Associate (BA): A person or entity that performs functions/activities on behalf of, or provides certain services to, a CE that involve the use/disclosure of PHI (45 CFR §160.103).
- Subcontractor (of a BA): A third party to a BA that creates/receives/maintains/transmits PHI on behalf of the BA; BAAs must flow down (45 CFR §160.103; §164.504(e)).
Why this matters in third-party risk management
In third-party risk management (TPRM), a BAA is not only a legal requirement; it is a control-enforcement instrument.
1) Control mapping and framework crosswalks
A BAA translates HIPAA requirements into assessable controls:
- Administrative safeguards (e.g., security management process, workforce training) map to contractual obligations to maintain a security program (HIPAA Security Rule, 45 CFR §164.308).
- Physical safeguards map to data center/access requirements (45 CFR §164.310).
- Technical safeguards map to access controls, audit controls, integrity, transmission security (45 CFR §164.312).
Most GRC teams then crosswalk those obligations into:
- SOC 2 Trust Services Criteria (AICPA TSC; e.g., security, confidentiality, availability) to standardize evidence reviews (SOC 2 report, bridge letter, complementary user entity controls).
- ISO/IEC 27001:2022 (Annex A controls) to align contractual requirements with the supplier’s ISMS and supplier management controls.
The practical outcome: you avoid one-off “HIPAA-only” assessments and instead run a consistent third-party control baseline with HIPAA overlays.
2) Audit trail and defensibility
Auditors and regulators typically ask:
- Why was a BAA required (scope decision)?
- Where is the executed BAA (contract repository evidence)?
- How do you monitor compliance (continuous monitoring, periodic reviews, incident exercises)?
- What happened during an incident (breach timeline evidence)?
A BAA supports each of those with traceable obligations and timestamps. Without it, you may have a control gap even if you have a security questionnaire and a SOC 2 report.
3) Incident response integration
BAAs should integrate with your incident response and breach notification process:
- Definitions of “Security Incident” and “Breach”
- Notification timelines and required content
- Cooperation duties (forensics support, access to logs, preservation)
- Allocation of responsibilities for regulatory notifications and patient notifications
This is where TPRM becomes operational risk management, not just onboarding paperwork.
Regulatory context and citations (what requires a BAA)
HIPAA (primary legal driver)
- Requirement to have a BAA/satisfactory assurances: 45 CFR §164.502(e)
- Required contract elements: 45 CFR §164.504(e)
- Security Rule safeguards (often referenced in BAA control exhibits): 45 CFR §164.308, §164.310, §164.312
- Breach Notification Rule (timelines and obligations often mirrored in BAAs): 45 CFR Part 164, Subpart D (notably §164.400–§164.414)
HITECH Act (enforcement and BA accountability)
HITECH expanded direct liability for business associates under HIPAA rules and increased enforcement expectations (HITECH Act, Pub. L. 111–5; implemented through HIPAA Omnibus Rule).
Framework alignment (not “requires a BAA,” but governs assurance expectations)
These frameworks do not mandate a HIPAA BAA, but they influence how you manage the relationship and evidence:
- SOC 2 (AICPA Trust Services Criteria): A SOC 2 report can be used as evidence for security and confidentiality controls that support HIPAA safeguard obligations. You still need the BAA for HIPAA contract requirements.
- ISO/IEC 27001:2022: Supports structured supplier security governance and control validation. BAAs can reference ISO-aligned requirements (e.g., access control, cryptography, logging).
- NIST SP 800-53 Rev. 5 (widely used in healthcare ecosystems): Useful for mapping security control expectations (e.g., AC, AU, IR families) into BAA exhibits and your control mapping system.
GDPR note (common confusion in multinational environments)
GDPR does not require a BAA; it requires a controller-processor Data Processing Agreement (DPA) with specific clauses (GDPR Art. 28). If your third party processes both PHI (HIPAA) and EU personal data, you often need both a BAA and a DPA, plus a conflict-resolution clause.
How a BAA applies in practice (real-world TPRM examples)
Example 1: Cloud EHR hosting provider
- Scenario: A covered entity uses a cloud hosting provider to host an EHR application that stores PHI.
- TPRM actions:
- Classify the provider as a business associate due to hosting PHI (45 CFR §160.103).
- Execute a BAA with minimum elements (45 CFR §164.504(e)).
- Map BAA security obligations to your control library (HIPAA §164.312 audit controls → logging/monitoring evidence).
- Collect evidence: SOC 2 Type II, pen test summary, IR plan excerpt, encryption standard, access review tickets.
- Audit trail artifact set: executed BAA + risk assessment + control mapping crosswalk + evidence packet + renewal review notes.
Example 2: Revenue cycle management (RCM) third party
- Scenario: An RCM service accesses patient billing data and insurance information.
- Risk points: workforce access, minimum necessary data use, subcontractors (call centers), breach reporting.
- BAA clauses to tighten: role-based access, subcontractor flow-down BAAs, breach reporting windows, right to audit or right to receive independent audit reports.
Example 3: Marketing agency for a healthcare provider
- Scenario: A marketing agency runs campaigns and may receive lists that include appointment details or diagnosis-related information.
- Common mistake: treating the agency as a standard marketing vendor with an NDA only.
- TPRM decision: If they create/receive/maintain/transmit PHI on behalf of the provider, they are a BA and you need a BAA (45 CFR §160.103; §164.502(e)). If data is properly de-identified under HIPAA de-identification standards (45 CFR §164.514), you may avoid PHI handling, but that requires validation and process controls.
Related concepts and terminology (crosswalk-friendly)
- Data Processing Agreement (DPA): GDPR Art. 28 controller-processor contract; complements a BAA in multinational programs.
- HIPAA “required contract elements”: The checklist you use to validate BAA completeness (45 CFR §164.504(e)).
- Subcontractor flow-down: BA must bind downstream third parties that handle PHI (45 CFR §164.504(e)).
- Minimum necessary standard: Operational constraint on use/disclosure; often implemented via access controls and data minimization (HIPAA Privacy Rule; 45 CFR §164.502(b)).
- Business Associate risk tiering: TPRM categorization (critical/high/medium) based on PHI volume, connectivity, and service criticality.
- Complementary User Entity Controls (CUECs): SOC 2 concept; controls you must operate for the SOC report to be valid evidence in your environment.
Common misconceptions (and the correct framing)
-
“A BAA is only needed if the third party stores PHI.”
Wrong. A BA relationship can exist if the third party creates, receives, maintains, or transmits PHI (45 CFR §160.103). -
“Our third party has SOC 2, so we don’t need a BAA.”
Wrong. SOC 2 is assurance evidence. HIPAA requires a contract with specific elements (45 CFR §164.502(e), §164.504(e)). -
“An NDA covers HIPAA.”
Usually wrong. NDAs rarely include HIPAA-required provisions like permitted uses/disclosures, breach reporting, and subcontractor flow-down language. -
“Signing a BAA transfers HIPAA liability away from us.”
Overstated. A BAA allocates duties, but covered entities still retain compliance obligations and oversight expectations.
Industry-specific considerations
Healthcare providers and health systems
- Expect BA sprawl: labs, imaging, EHR add-ons, telehealth, transcription, analytics.
- Focus on identity, access governance, and audit log retention mapped to HIPAA technical safeguards (45 CFR §164.312).
Health plans
- BA relationships often involve claims processors, PBMs, care management platforms.
- Tighten data-sharing boundaries and ensure subcontractor flow-down is explicit and monitored.
Digital health and SaaS platforms
- If you are a business associate serving multiple covered entities, you need a scalable BAA template plus a contract variance process tied to regulatory change management.
- Track BAA deviations as control exceptions with compensating controls and expiry dates.
Financial services intersection (why the SEC “marketing rule” data sometimes shows up)
Some organizations operate hybrid environments (e.g., wealth management arms offering health-related benefits programs). The SEC Marketing Rule governs testimonials and endorsements for SEC-registered advisers (Investment Advisers Act Rule 206(4)-1). It does not create BAA requirements, but it can affect third-party oversight workflows for marketing claims and disclosures. Keep these control sets separate in your control mapping system to avoid mixing HIPAA PHI controls with marketing substantiation controls.
Practical due diligence checklist (BAA-focused)
- Scope the relationship: Does the third party touch PHI as defined by HIPAA? (45 CFR §160.103)
- Confirm role: Covered entity vs business associate vs subcontractor.
- Execute BAA before PHI access: Gate provisioning on contract completion.
- Control mapping: Map BAA clauses to HIPAA safeguards; crosswalk to SOC 2/ISO 27001 control IDs in your GRC tool.
- Evidence plan: Define what you will collect (SOC 2, ISO cert, policies, IR playbooks, access reviews) and how often.
- Ongoing monitoring: Track renewals, material changes, and subcontractor disclosures as part of regulatory change management.
Where Daydream fits (earned mention)
Daydream is useful when you need to standardize BAA-driven control mapping across many third parties, maintain a framework crosswalk (HIPAA ↔ SOC 2 ↔ ISO 27001), and preserve the audit trail from onboarding decisions through renewal and exception management.
Frequently Asked Questions
Do we need a BAA for every third party we share patient data with?
You need a BAA when the third party is acting as a business associate handling PHI on your behalf (45 CFR §164.502(e); §160.103). If the disclosure is to another covered entity for its own purposes, or the data is properly de-identified, the contract requirement may differ.
Can a BAA be signed after onboarding if the project is urgent?
Operationally it happens, but it creates a compliance gap because HIPAA ties permissibility of disclosures to obtaining satisfactory assurances via a written contract (45 CFR §164.502(e)). Many teams gate PHI access, accounts, and data connections on executed BAA status.
Does a SOC 2 Type II report replace a BAA?
No. SOC 2 provides assurance evidence about controls over time, but HIPAA requires specific contractual terms in a BAA (45 CFR §164.504(e)). Use SOC 2 to validate safeguards promised in the BAA.
What clauses should a GRC team verify for minimum BAA completeness?
Start with HIPAA’s required contract elements (45 CFR §164.504(e)): permitted uses/disclosures, safeguard requirements, reporting of breaches, subcontractor flow-down, access/amendment/accounting support, and termination provisions. Then add operational items like incident notification timelines, encryption expectations, and evidence rights.
How does a BAA relate to GDPR contracts?
A BAA is a HIPAA construct. GDPR typically requires a DPA between controller and processor (GDPR Art. 28). If a third party processes both PHI and EU personal data, you often need both agreements with consistent incident reporting and subcontractor controls.
Frequently Asked Questions
Do we need a BAA for every third party we share patient data with?
You need a BAA when the third party is acting as a **business associate** handling PHI on your behalf (45 CFR §164.502(e); §160.103). If the disclosure is to another covered entity for its own purposes, or the data is properly de-identified, the contract requirement may differ.
Can a BAA be signed after onboarding if the project is urgent?
Operationally it happens, but it creates a compliance gap because HIPAA ties permissibility of disclosures to obtaining satisfactory assurances via a written contract (45 CFR §164.502(e)). Many teams gate PHI access, accounts, and data connections on executed BAA status.
Does a SOC 2 Type II report replace a BAA?
No. SOC 2 provides assurance evidence about controls over time, but HIPAA requires specific contractual terms in a BAA (45 CFR §164.504(e)). Use SOC 2 to validate safeguards promised in the BAA.
What clauses should a GRC team verify for minimum BAA completeness?
Start with HIPAA’s required contract elements (45 CFR §164.504(e)): permitted uses/disclosures, safeguard requirements, reporting of breaches, subcontractor flow-down, access/amendment/accounting support, and termination provisions. Then add operational items like incident notification timelines, encryption expectations, and evidence rights.
How does a BAA relate to GDPR contracts?
A BAA is a HIPAA construct. GDPR typically requires a DPA between controller and processor (GDPR Art. 28). If a third party processes both PHI and EU personal data, you often need both agreements with consistent incident reporting and subcontractor controls.
Put this knowledge to work
Daydream operationalizes compliance concepts into automated third-party risk workflows.
See the Platform