Third Party Privacy
To meet the HITRUST third party privacy requirement, you must ensure every third party that receives personal information provides privacy protection equivalent to your own. Operationally, that means contracts must bind the third party to your privacy policies, grant you audit rights, and require prompt breach notification, backed by due diligence and ongoing oversight. (HITRUST CSF v11 Control Reference)
Key takeaways:
- Put privacy obligations in writing: policy adherence, audit rights, and breach notice clauses are mandatory contract terms. (HITRUST CSF v11 Control Reference)
- “Equivalent privacy protection” requires more than a questionnaire; you need a risk-based assessment and monitoring that matches the data and processing. (HITRUST CSF v11 Control Reference)
- Evidence wins audits: keep executed agreements, assessment results, issue tracking, and proof you can enforce audit and notification requirements. (HITRUST CSF v11 Control Reference)
“Third party privacy” fails in predictable places: a legacy MSA without privacy terms, a fast procurement cycle that skips DPIA-style review, or a SaaS integration that quietly expands data sharing over time. HITRUST CSF v11 13.r is blunt: if a third party receives personal information, you remain accountable for ensuring equivalent privacy protection, and you must hardwire enforceable expectations into the agreement. (HITRUST CSF v11 Control Reference)
For a CCO or GRC lead, the practical goal is speed with control: identify which third parties touch personal information, set a minimum contract addendum that cannot be negotiated away without approval, and create a repeatable workflow that ties intake (what data, what purpose, where processed) to due diligence depth, contracting, and ongoing monitoring. Your implementation should make it easy for procurement and business owners to do the right thing, while preserving escalation paths for edge cases like affiliates, downstream subprocessors, and emergency buys.
This page translates the requirement into an operator-ready playbook: who is in scope, what contract terms are non-negotiable, what to build in your third-party risk program, and what evidence auditors ask for. (HITRUST CSF v11 Control Reference)
Regulatory text
Requirement (HITRUST CSF v11 13.r): Organizations must ensure third parties receiving personal information provide equivalent privacy protection. Third-party agreements must require compliance with the organization’s privacy policies, include audit rights, and require third parties to notify the organization of privacy breaches. (HITRUST CSF v11 Control Reference)
What the operator must do
- Ensure equivalency: You need a defensible method to confirm the third party’s privacy practices meet your organization’s privacy expectations for the specific data and processing. (HITRUST CSF v11 Control Reference)
- Contract for control: Your contracts must (1) bind the third party to your privacy policies, (2) grant audit rights, and (3) require breach notification to you. (HITRUST CSF v11 Control Reference)
- Run it as a lifecycle: Do this before data is shared, and keep it current as processing, data types, and subprocessors change. (HITRUST CSF v11 Control Reference)
Plain-English interpretation (requirement-level)
If a third party touches personal information, treat them like an extension of your own environment from a privacy standpoint. You can outsource processing, but you cannot outsource accountability. “Equivalent” does not mean identical controls; it means the third party’s privacy controls and commitments must be strong enough to meet your policy promises and risk tolerance for that particular relationship. (HITRUST CSF v11 Control Reference)
Your fastest path to “equivalent protection” is:
- classify the relationship by the personal information involved and processing purpose,
- perform due diligence proportionate to that risk, and
- lock obligations into the contract with enforceable rights and reporting. (HITRUST CSF v11 Control Reference)
Who it applies to (entity and operational context)
Entities
- All organizations that use third parties and share or permit access to personal information. (HITRUST CSF v11 Control Reference)
Operational context (what relationships are in scope)
Include any third party that:
- receives personal information directly (file transfers, API integrations, shared drives),
- can access personal information (support tools, managed services, contractors), or
- determines or materially influences how personal information is processed (platform providers, analytics, communications vendors). (HITRUST CSF v11 Control Reference)
Common in-scope examples:
- cloud hosting, SaaS platforms, call centers, claims processors, payment processors, marketing automation, data enrichment, outsourced IT, and implementation partners that access production. (HITRUST CSF v11 Control Reference)
What you actually need to do (step-by-step)
Step 1: Build and maintain a third party personal information inventory
Create a list of third parties and capture, at minimum:
- what personal information is shared or accessed,
- processing purpose,
- systems/integrations involved,
- locations of processing/storage if relevant to your privacy commitments,
- whether the third party uses subprocessors for the same data. (HITRUST CSF v11 Control Reference)
Practical tip: start with AP/vendor master + SSO app catalog + data export logs, then reconcile to an authoritative third-party register owned by GRC.
Step 2: Define “equivalent privacy protection” for your organization
Write a short, enforceable standard that maps to your privacy policies, for example:
- limits on use/disclosure to stated purposes,
- confidentiality and access controls,
- retention and deletion expectations,
- incident/breach reporting requirements,
- support for privacy requests if your operating model requires it,
- restrictions and approval for subprocessors. (HITRUST CSF v11 Control Reference)
This becomes the backbone for due diligence questions and the contract addendum.
Step 3: Run risk-based third party privacy due diligence before sharing data
Minimum workflow:
- Intake from the business owner (data types, purpose, access methods, criticality).
- Assess the third party’s privacy posture against your equivalency standard (questionnaire, documentation review, and targeted follow-ups).
- Record gaps as risks, with required remediations, compensating controls, or a documented exception. (HITRUST CSF v11 Control Reference)
Keep it pragmatic. If the third party will have privileged access or large-scale processing, require deeper validation (document review, interviews, or independent reports if available).
Step 4: Contracting—make three clauses non-negotiable
Your agreement (MSA + DPA/privacy addendum + SOW) must include:
- Compliance with your privacy policies
- Make the obligation explicit and scoped to the services.
- Add precedence language so the addendum controls if there’s conflict. (HITRUST CSF v11 Control Reference)
- Audit rights
- Define audit scope (privacy and related controls relevant to your data).
- Define how audits occur (on-site, remote, document-based) and cooperation expectations.
- Define timelines for remediation of audit findings. (HITRUST CSF v11 Control Reference)
- Privacy breach notification to your organization
- Require the third party to notify you of privacy breaches affecting your personal information.
- Specify that notice must include key facts you need to act: what happened, impacted data, containment steps, and planned remediation. (HITRUST CSF v11 Control Reference)
Contract implementation pattern that works in practice:
- publish a standard third party privacy addendum,
- prohibit data sharing until executed,
- route deviations to Legal + Privacy/GRC for approval,
- track deviations as time-bound exceptions. (HITRUST CSF v11 Control Reference)
Step 5: Operationalize enforcement (audit rights must be real)
Audit rights fail if you never test them. Set a routine:
- trigger an audit event for high-risk third parties, material incidents, or repeated control failures,
- document requests sent and responses received,
- track corrective actions through closure. (HITRUST CSF v11 Control Reference)
If a third party refuses audit cooperation, treat it as a risk acceptance decision with executive sign-off, or change providers.
Step 6: Ongoing monitoring and change management
Equivalent protection can degrade when:
- the third party adds subprocessors,
- processing locations change,
- product features expand data collection,
- the business expands integrations. (HITRUST CSF v11 Control Reference)
Add lightweight monitoring:
- periodic reassessment for higher-risk third parties,
- contract renewal checkpoints,
- onboarding/offboarding checklists (including data return/deletion attestations if your policy requires it),
- incident drills that include third-party notification paths. (HITRUST CSF v11 Control Reference)
Step 7: Tie it to intake controls so the business can’t bypass it
Embed gates in:
- procurement (no PO without privacy addendum when personal information is involved),
- security reviews (integration approvals require third party privacy clearance),
- accounts payable (block payment if contracting is incomplete),
- SSO/app onboarding (no production access without third party approval). (HITRUST CSF v11 Control Reference)
Daydream note: teams often operationalize this fastest by using Daydream to centralize third-party intake, route approvals, store DPAs/MSAs, and produce audit-ready evidence from a single workflow rather than scattered email threads.
Required evidence and artifacts to retain
Auditors typically want proof across the lifecycle: identify → assess → contract → monitor → enforce. Keep:
- Third party register with flags for personal information access/receipt. (HITRUST CSF v11 Control Reference)
- Data sharing/intake records (purpose, data elements, systems, owners). (HITRUST CSF v11 Control Reference)
- Due diligence package for each in-scope third party (questionnaire, document reviews, follow-ups, risk rating, approvals). (HITRUST CSF v11 Control Reference)
- Executed agreements showing:
- incorporation of your privacy policies (or equivalent binding terms),
- audit rights,
- breach notification obligations. (HITRUST CSF v11 Control Reference)
- Exception log for non-standard terms, with risk acceptance and expirations. (HITRUST CSF v11 Control Reference)
- Ongoing monitoring evidence (reassessments, renewal reviews, subprocessor notices and approvals if you require them). (HITRUST CSF v11 Control Reference)
- Audit exercise evidence (at least for a subset): audit requests, results, remediation tickets, closure proof. (HITRUST CSF v11 Control Reference)
- Incident communications runbook that includes third party notification and escalation. (HITRUST CSF v11 Control Reference)
Common exam/audit questions and hangups
Expect questions like:
- “Show me the contract language that obligates the third party to comply with your privacy policies.” (HITRUST CSF v11 Control Reference)
- “Where are your audit rights, and have you ever used them?” (HITRUST CSF v11 Control Reference)
- “How do you ensure third parties provide equivalent privacy protection, beyond contract language?” (HITRUST CSF v11 Control Reference)
- “How do you ensure breach notification reaches the right team, fast enough to meet your obligations?” (HITRUST CSF v11 Control Reference)
- “How do you handle subprocessors?” If you don’t track them, say so and document compensating controls, but expect follow-up. (HITRUST CSF v11 Control Reference)
Hangups that trigger findings:
- missing addendum for one “small” third party with real data access,
- audit rights in theory, but no operational process to execute them,
- breach notification clause that is vague, buried, or overridden by general liability terms. (HITRUST CSF v11 Control Reference)
Frequent implementation mistakes and how to avoid them
- Relying on a security review alone. Security questionnaires rarely map cleanly to privacy policy promises. Add privacy-specific requirements and approvals. (HITRUST CSF v11 Control Reference)
- Letting SOWs override the privacy addendum. Add precedence language and require Legal review for all variations. (HITRUST CSF v11 Control Reference)
- No clear definition of “personal information.” Use your internal definition consistently across intake, assessment, and contracting. (HITRUST CSF v11 Control Reference)
- Audit rights that can’t be exercised. Define process, ownership, and triggers. Keep proof you requested artifacts or performed an audit. (HITRUST CSF v11 Control Reference)
- Breach notification routed to the wrong inbox. Require specific notice channels (named email aliases, ticketing intake) and maintain a tested escalation path. (HITRUST CSF v11 Control Reference)
Enforcement context and risk implications
No public enforcement case sources were provided for this specific HITRUST control. Practically, the risk is still concrete: privacy incidents involving third parties become your incident, your notifications, and your reputational damage. Weak contracts also reduce your ability to investigate quickly, prove scope, and compel remediation. (HITRUST CSF v11 Control Reference)
Practical 30/60/90-day execution plan
First 30 days (Immediate stabilization)
- Publish a minimum third party privacy addendum with the three mandatory clauses: policy compliance, audit rights, breach notification. (HITRUST CSF v11 Control Reference)
- Stand up a third party intake form that captures personal information elements, purpose, and access method. (HITRUST CSF v11 Control Reference)
- Freeze data sharing for new third parties until intake + addendum are complete, with an emergency exception path owned by Legal/Privacy. (HITRUST CSF v11 Control Reference)
- Identify top-risk existing third parties (those with broad access or core processing) and confirm agreements include required terms. (HITRUST CSF v11 Control Reference)
Next 60 days (Program build-out)
- Complete due diligence for the top-risk set; document gaps and remediation plans. (HITRUST CSF v11 Control Reference)
- Create an exception register and standard approval workflow for non-conforming contract terms. (HITRUST CSF v11 Control Reference)
- Build an audit-rights playbook: triggers, request templates, evidence storage, and remediation tracking. (HITRUST CSF v11 Control Reference)
- Implement renewal and change triggers so expansions in scope re-open privacy review. (HITRUST CSF v11 Control Reference)
By 90 days (Operational maturity)
- Extend contracting cleanup to remaining in-scope third parties on a prioritized basis; align to renewal cycles where needed. (HITRUST CSF v11 Control Reference)
- Run at least one audit-rights exercise (document-based is fine) and close findings with tracked actions. (HITRUST CSF v11 Control Reference)
- Test the breach notification path with a tabletop scenario that includes a third party notifying you and your internal escalation. (HITRUST CSF v11 Control Reference)
- Centralize evidence so audits are exportable by third party: intake, assessment, contract, monitoring, exceptions, and incidents. Tools like Daydream help by keeping this in one place and producing a clean audit trail. (HITRUST CSF v11 Control Reference)
Frequently Asked Questions
Does this apply if the third party only has “incidental” access (like support)?
Yes, if they can access personal information, you must ensure equivalent privacy protection and contract for it. Limit access technically, but still require the agreement terms and breach notification obligations. (HITRUST CSF v11 Control Reference)
What does “equivalent privacy protection” mean in practice?
It means the third party’s commitments and controls must meet the privacy promises you make in your own policies for the specific data and processing. Document how you evaluated equivalence and how gaps were remediated or accepted. (HITRUST CSF v11 Control Reference)
Our MSA is already signed. How do we fix missing privacy terms?
Add a privacy addendum or DPA that amends the existing agreement and clearly states precedence. Track outreach, execution status, and any exceptions for third parties that refuse changes. (HITRUST CSF v11 Control Reference)
Are audit rights required even if we rely on third party certifications or reports?
Yes. The requirement explicitly calls for audit rights in the third-party agreement, even if you primarily validate through documentation and independent reports. (HITRUST CSF v11 Control Reference)
What evidence is most persuasive to an auditor?
Executed agreements showing the three required clauses, plus a due diligence record that ties to the specific personal information shared. Add proof of monitoring or at least one exercised audit-right activity for higher-risk third parties. (HITRUST CSF v11 Control Reference)
How do we handle fourth parties (subprocessors)?
Your due diligence should ask whether subprocessors receive your personal information, and your contracts should require transparency and control appropriate to your policy commitments. Document your approach and keep subprocessor lists or notices where available. (HITRUST CSF v11 Control Reference)
Frequently Asked Questions
Does this apply if the third party only has “incidental” access (like support)?
Yes, if they can access personal information, you must ensure equivalent privacy protection and contract for it. Limit access technically, but still require the agreement terms and breach notification obligations. (HITRUST CSF v11 Control Reference)
What does “equivalent privacy protection” mean in practice?
It means the third party’s commitments and controls must meet the privacy promises you make in your own policies for the specific data and processing. Document how you evaluated equivalence and how gaps were remediated or accepted. (HITRUST CSF v11 Control Reference)
Our MSA is already signed. How do we fix missing privacy terms?
Add a privacy addendum or DPA that amends the existing agreement and clearly states precedence. Track outreach, execution status, and any exceptions for third parties that refuse changes. (HITRUST CSF v11 Control Reference)
Are audit rights required even if we rely on third party certifications or reports?
Yes. The requirement explicitly calls for audit rights in the third-party agreement, even if you primarily validate through documentation and independent reports. (HITRUST CSF v11 Control Reference)
What evidence is most persuasive to an auditor?
Executed agreements showing the three required clauses, plus a due diligence record that ties to the specific personal information shared. Add proof of monitoring or at least one exercised audit-right activity for higher-risk third parties. (HITRUST CSF v11 Control Reference)
How do we handle fourth parties (subprocessors)?
Your due diligence should ask whether subprocessors receive your personal information, and your contracts should require transparency and control appropriate to your policy commitments. Document your approach and keep subprocessor lists or notices where available. (HITRUST CSF v11 Control Reference)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream