Beyond HIPAA: Why Your Business Associate Agreement May Be Creating Unnecessary Risk

Business Associate Agreements (BAAs) have become a battleground where HIPAA compliance meets contractual overreach. While these agreements serve a critical purpose in protecting PHI, many covered entities have transformed them into vehicles for shifting risk far beyond what HIPAA actually requires. For vendors, understanding the difference between regulatory requirements and contractual expansion is essential to maintaining both compliance and operational viability.

In this blog post, I’ll be focusing on several key areas including (1) client requests for unlimited liability; (2) timeline compression; and (3) scope creep.

The Liability Exemption Problem

The most dangerous provision lurking in many BAAs isn’t what they include – it’s what they exclude. Standard commercial agreements contain carefully negotiated liability limitations that reflect balanced risk allocation and insurable limits. Yet a single sentence in the BAA – “This Agreement supersedes any conflicting provisions in the underlying agreement” – can obliterate the well defined limitation of liability structure in the underlying agreement.

Consider the reality of breach costs: IBM’s 2024 Cost of a Data Breach Report places the average healthcare data breach at $10.93 million – the highest of any industry for the 14th consecutive year. This astronomical figure is precisely why vendors negotiate liability caps in their MSAs, typically at twelve months’ fees.

This liability cap reflects what’s commercially insurable and sustainable for a technology vendor. Yet when the BAA exempts itself from this limitation, suddenly a vendor faces potential bankruptcy from a single incident – exposed to statutory penalties of $2 million per violation type per year, state AG enforcement actions, class action lawsuits, and indemnifying the covered entity’s costs.

The carefully negotiated liability structure that allows the vendor to operate, obtain insurance, and price their services appropriately gets obliterated by a single BAA provision.

The Vendor’s Response:

First, recognize that HIPAA doesn’t require unlimited liability on the part of the business associate. The regulation requires “reasonable and appropriate” safeguards, not perfection.

Consider this alternative language:

“Notwithstanding any liability limitations in the underlying agreement, Business Associate’s liability for a breach caused by its gross negligence or willful misconduct shall be [higher cap or multiple of standard cap]. 

This elevated cap recognizes the sensitivity of PHI while maintaining commercially reasonable limits. This approach acknowledges the special nature of PHI without creating existential risk for every incident.

When a client asks a vendor to sign up for unlimited liability, this unlimited exposure fundamentally misunderstands the vendor’s role in the healthcare ecosystem. Business associates are not meant to serve as insurers of all risk, even when a breach originates from their systems. Insurance exists precisely because perfect security is impossible. The question isn’t whether incidents will occur, but how parties fairly allocate responsibility when they do.

A vendor who contributes to a breach should bear proportionate liability, not become the financial guarantor for all downstream consequences including the covered entity’s own failure to maintain adequate insurance, their decision to store excessive data, or their delay in detecting the incident.

Unlimited liability transforms vendors from technology partners into unwitting insurance companies, without the premiums, reserves, or regulatory framework that actual insurers maintain.

Timeline Compression Beyond Regulatory Requirements

HIPAA’s actual breach notification requirements are clear: notification to the covered entity “without unreasonable delay and in no case later than 60 days” after discovery (45 CFR §164.410). Yet vendor BAAs routinely demand notification within 24-72 hours, sometimes even shorter.

This timeline compression creates multiple problems:

Operational Impossibility: Determining whether a HIPAA breach has occurred requires assessment of whether PHI was actually accessed or acquired, whether exceptions apply (encryption, good faith access, etc.), and often involves forensic analysis. A 24-hour deadline forces premature notifications that may later prove unnecessary, damaging trust and triggering unnecessary costs.

Investigation Quality: Rushed investigations lead to incomplete root cause analysis, inadequate remediation, and potential re-occurrence. The pressure to notify immediately conflicts with the need to understand what happened and prevent repetition.

False Positives: Without time for proper investigation, vendors must over-notify to avoid contractual breach, leading to notification fatigue and unnecessary anxiety for affected individuals.

Negotiation Strategy:

Propose language that aligns with HIPAA while providing reasonable operational flexibility:

“Business Associate shall notify Covered Entity of any Breach without unreasonable delay, but in no event later than thirty (30) calendar days after discovery, with preliminary notice of a potential incident within five (5) business days if investigation is ongoing. Such preliminary notice shall not constitute admission of a Breach and shall be supplemented with findings as the investigation proceeds.”

This maintains HIPAA compliance while allowing proper investigation and avoiding premature determinations.

Scope Creep in BAA Language

Often BAAs contain provisions that have nothing to do with HIPAA but everything to do with risk-shifting. A vendor may find state specific requirements presented as a HIPAA obligation, technical standards beyond safe harbor, expanded audit rights

Common examples include:

  • CCPA/CPRA requirements
  • State biometric laws included regardless of data types processed
  • GDPR provisions for purely domestic operations

Many BAAs require specific encryption standards (e.g., AES-256) when HIPAA’s Safe Harbor provision simply requires encryption to NIST standards. Some go further, mandating:

  • Specific key management procedures
  • Particular authentication protocols
  • Defined password complexity beyond NIST 800-63B guidelines
  • Annual penetration testing when HIPAA requires only periodic technical evaluations

While HIPAA requires making information available to determine compliance, many BAAs demand:

  • Unlimited on-site audits at vendor expense
  • Use of covered entity’s chosen (expensive) auditors
  • Annual SOC 2 Type II reports for small vendors
  • Right to audit subcontractors directly

The Vendor’s Counter:

Challenge scope creep by asking: “Can you identify where in HIPAA this requirement appears?” Then offer alternatives:

“Business Associate will implement administrative, physical, and technical safeguards that reasonably and appropriately protect PHI as required by 45 CFR Part 164, Subpart C. Additional security measures beyond HIPAA requirements may be negotiated in the underlying agreement with appropriate cost adjustments.”

Negotiation Strategies for Vendors

Here are your red-lining priorities:

1. Never Accept: Unlimited liability, indemnification for covered entity’s acts, warranty of zero breaches, assumption of covered entity’s HIPAA obligations

2. Always Modify: Notification timelines under 5 business days for initial notice, audit provisions lacking mutuality, termination rights that don’t provide cure periods

3. Negotiate Hard: Insurance requirements beyond your coverage, flow-down requirements to subcontractors that exceed prime obligations, return/destruction timelines that ignore technical realities, the client who wants to audit at any time and for any reason

Alternative Language Templates

For audit rights:

“Covered Entity may audit no more than annually upon 60 days notice, with costs shared equally/born by Covered Entity. Business Associate may satisfy audit requirements by providing SOC 2 Type II report or similar third-party attestation.”

For subcontractor flow-downs:

“Business Associate will ensure subcontractors agree to the same restrictions and conditions that apply to Business Associate with respect to PHI, as required by 45 CFR §164.504(e)(1)(i).” (Note: This is the actual HIPAA requirement—nothing more.)

For termination:

“Material breach may be cured within 30 days of notice. If cure is not possible, parties will work together to ensure continuity of services during transition period not to exceed 90 days.”

Validating True HIPAA Requirements: Your Defense Toolkit

When covered entities insist their excessive requirements are “required by HIPAA”, arm yourself with authoritative sources:

Primary Legal Sources:

  • 45 CFR §164.502(e): Business Associate contracts general requirements
  • 45 CFR §164.504(e): Specific required elements of BAAs
  • 45 CFR §164.308(b): Administrative safeguards for business associates
  • 45 CFR §164.410: Breach notification requirements

HHS Guidance Documents:

  • HHS Business Associate Guidance (direct from HHS.gov, not law firm interpretations)
  • HIPAA Security Rule Guidance Material
  • Breach Notification Rule FAQs
  • Resolution Agreements and Civil Money Penalties (showing what HHS actually enforces)

Documentation Strategy:

Create a “HIPAA Requirements Matrix” comparing:

  • Actual regulatory text
  • HHS guidance interpretation
  • Client’s BAA demand
  • Your proposed alternative

This visual tool demonstrates reasonableness and regulatory compliance while highlighting overreach.

Sample Matrix Entry:

TopicHIPAA RequirementClient BAA LanguageRisk to VendorProposed Alternative
Breach Notification“Without unreasonable delay and in no case later than 60 days” (§164.410)“Within 24 hours”Impossible to investigate properly“Preliminary notice within 5 business days, full report within 30 days”

Practical Implementation Tips

Pre-Negotiation Preparation:

  1. Develop your standard BAA based strictly on HIPAA requirements
  2. Create a “negotiation deck” with regulatory citations
  3. Identify your absolute walk-away provisions
  4. Know your insurance coverage and communicate limits early

During Negotiation:

  1. Lead with compliance: “We take HIPAA compliance seriously and meet all regulatory requirements required of us as Business Associates.
  2. Request justification: “Could you point me to the HIPAA provision requiring this?
  3. Offer alternatives that achieve the same goal with less risk
  4. Document agreed interpretations in the agreement

Post-Execution Management:

  1. Calendar all notification deadlines
  2. Ensure incident response plans align with BAA timelines
  3. Train staff on BAA-specific requirements
  4. Maintain evidence of compliance efforts

The Bottom Line

HIPAA compliance is non-negotiable, but contractual overreach is. Vendors must push back against provisions that create operational impossibility, existential liability risk, or obligations beyond regulatory requirements. By understanding actual HIPAA requirements, preparing alternative language, and negotiating from a position of knowledge, vendors can achieve agreements that protect PHI without sacrificing commercial viability.

Remember: A BAA that bankrupts the vendor on the first incident doesn’t serve anyone’s interests, least of all the patients whose care depends on functioning technology infrastructure. Reasonable risk allocation isn’t just good business – it’s essential for sustainable healthcare innovation.

For vendors navigating BAA negotiations, the key is distinguishing between what HIPAA requires and what covered entities want. Armed with regulatory knowledge and practical alternatives, you can achieve compliance without accepting unlimited risk.

References and Resources for BAA Negotiation

Primary HIPAA Regulatory Sources

Code of Federal Regulations – Business Associate Requirements

HHS Official Guidance

Business Associate Guidance

Breach Notification Resources

HIPAA Enforcement Data

Understanding Real-World Enforcement

Industry Reports and Cost Data

Data Breach Cost Analysis

NIST Security Standards (Referenced in HIPAA)

Technical Standards and Guidelines

Additional Authoritative Sources

Government Resources

Professional Organizations

Key Takeaway for Vendors

When negotiating BAAs, always return to these primary sources. If a covered entity claims something is “required by HIPAA,” ask them to identify the specific regulation section. The actual requirements are far more limited than most BAA templates suggest.

Kara Dowdall
CEO and Founder

About the Author

Kara specializes in deal strategy, contract development, contract negotiation, project management and deal management, with a particular emphasis on licensing and service agreements and strategic partnership agreements in the healthcare and technology spaces. Drawing on over 20 years of operational expertise, she crafts and executes operationally and fiscally sound agreements tailored to her clients' strategic objectives.

Turn Your Contracts Into a Competitive Advantage

Get In Touch Let’s Talk

INTELLECT HEALTH™ LLC                  BASED IN SAN DIEGO | SERVING CLIENTS ACROSS THE COUNTRY

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.