Business Associate Agreements: IT Provider Checklist
by Jon Lober | NOC Technology
One contract to rule them all.
Your IT provider has access to everything. Your servers, your backups, your email - and if you're a healthcare practice, your patient records. One missing contract could turn a routine IT partnership into a compliance nightmare that costs you over $1.5 million in fines.
That contract is called a Business Associate Agreement (BAA), and it's not optional. HIPAA requires covered entities to have a signed BAA with any vendor who handles protected health information (PHI) on their behalf. Your IT provider almost certainly qualifies.
But here's the problem: not all BAAs are created equal. Some IT providers hand you a generic template that protects them more than you. Others skip it entirely and hope you don't notice. Both scenarios put your practice at risk.
This checklist will help you evaluate whether your IT provider's BAA actually protects your practice - and what to do if it doesn't.
What is a Business Associate Agreement?
A Business Associate Agreement is a legally binding contract required by HIPAA whenever a covered entity (like your medical practice) shares PHI with a third party (like your IT company). The BAA establishes what the business associate can and cannot do with patient data, what safeguards they must implement, and what happens if something goes wrong.
Think of it as the rulebook for your vendor relationship. Without it, you're both operating without boundaries - and HIPAA doesn't tolerate ambiguity.
The penalty for operating without a BAA? Fines start at $141 per violation and can climb to over $2 million per year for willful neglect. The HHS Office for Civil Rights (OCR) has made it clear: missing or inadequate BAAs are one of the most common findings in HIPAA audits (Source: HHS.gov).
Why Your IT Provider Needs a BAA
If your IT provider does any of the following, they're a business associate per HIPAA:
● Manages your servers or workstations that store patient data
● Provides cloud backup of your practice management system or EHR
● Has remote access to troubleshoot issues on machines containing PHI
● Hosts your email (if you send patient information via email)
● Monitors your network for security threats
● Handles your disaster recovery or business continuity planning
In other words, any modern managed IT relationship with a healthcare practice requires a BAA. There's no exception for "we only handle the technical stuff." If they can see PHI, they need a BAA.
Some IT providers push back on this. They'll say things like "we don't look at patient data" or "our access is limited." It doesn't matter. Potential access counts. If a technician could access a file containing PHI while troubleshooting, even if they never do, a BAA is required.
The BAA Checklist: 10 Must-Have Elements
Before you sign a BAA with any IT provider, verify these elements are clearly addressed. Missing any of these could leave gaps in your compliance posture.
1. Permitted Uses and Disclosures
The BAA must specify exactly what the IT provider can do with PHI. This should be limited to the services they're contracted to provide - nothing more. Watch for vague language like "may use data for business purposes." That's too broad.
Look for: Specific, limited permitted uses tied directly to the services in your contract.
2. Safeguard Requirements
The IT provider must agree to implement appropriate administrative, physical, and technical safeguards to protect PHI. This isn't just a promise - it should reference specific security measures aligned with the HIPAA Security Rule.
Look for: Commitments to encryption, access controls, multi-factor authentication, and monitoring.
3. Breach Notification Procedures
When (not if) a security incident occurs, how quickly must the IT provider notify you? HIPAA requires notification "without unreasonable delay" and no later than 60 days, but your BAA can set stricter timelines. Most healthcare practices want notification within 24-72 hours.
Look for: Specific timeframes for notification, not vague "reasonable" language.
4. Subcontractor Requirements
If your IT provider uses subcontractors (cloud providers, specialized vendors, etc.), those subcontractors must also be bound by BAA terms. This is called "flow-down" - the protections flow down to anyone who touches your data.
Look for: Clear requirements that subcontractors sign their own BAAs with equivalent protections.
5. PHI Return or Destruction
When the relationship ends, what happens to your data? The BAA should require the IT provider to return all PHI or certify its destruction. If return or destruction isn't feasible (common with certain backup systems), protections must continue indefinitely.
Look for: Specific procedures for data return/destruction and continued protections when that isn't possible.
6. Access to Records
HIPAA gives patients the right to access their health information. Your BAA should ensure your IT provider will help you respond to these requests - including providing any PHI they hold within required timeframes.
Look for: Commitment to assist with patient access requests within 30 days.
7. Amendment Support
Patients can request amendments to their health records. If your IT provider maintains any systems containing PHI, they need to support your ability to make those amendments.
Look for: Procedures for incorporating amendments to PHI when requested.
8. Accounting of Disclosures
HIPAA requires you to track certain disclosures of PHI. If your IT provider makes disclosures (even incidental ones during service delivery), they must document them and share that information with you.
Look for: Agreement to maintain disclosure records and provide accounting on request.
9. Audit Rights
Can you verify your IT provider is actually doing what they promised? The BAA should give you the right to audit their compliance - or at minimum, require them to provide evidence of compliance upon request.
Look for: Audit rights, SOC 2 reports, or other verification mechanisms.
10. Termination for Breach
If your IT provider violates the BAA, you need an exit strategy. The agreement should allow termination if material breaches occur and aren't cured within a reasonable timeframe.
Look for: Termination rights for uncured material breaches, typically with a 30-day cure period.
Red Flags in IT Provider BAAs
Some BAAs look complete but contain provisions that shift risk to you or limit the provider's accountability. Watch for these warning signs:
- Liability caps that are too low: If your IT provider limits their liability to the amount you paid them last year, that won't cover much when a breach costs hundreds of thousands in remediation.
- Vague security commitments: "Industry standard security" means nothing. Require specific safeguards aligned with the HIPAA Security Rule.
- Long breach notification windows: If they're giving themselves 60 days to notify you, that's the bare minimum. Push for faster notification so you can respond quickly.
- No subcontractor accountability: If they can outsource your data to anyone without equivalent protections, your security is only as good as their weakest vendor.
- One-sided indemnification: The BAA should include mutual indemnification - they protect you from breaches they cause, and vice versa. If only you're indemnifying them, push back.
What if Your IT Provider Won't Sign a BAA?
This happens more than you'd think. Some IT providers don't understand HIPAA requirements. Others know exactly what they're being asked to do and don't want the liability.
Either way, it's a deal-breaker.
An IT provider who refuses to sign a HIPAA-compliant BAA is telling you one of two things: they don't understand healthcare compliance, or they don't plan to meet the security standards required to protect your patients. Neither is acceptable.
If your current IT provider won't sign, it's time to find a new one. The risk of operating without a BAA, both regulatory and reputational, far exceeds the inconvenience of switching providers.
Working with a HIPAA-Experienced IT Partner
Not every IT company understands healthcare. General-purpose managed service providers may be great at keeping computers running, but compliance requires specialized knowledge.
When evaluating IT providers for your practice, ask these questions:
● How many healthcare clients do you currently serve?
● Can you provide references from medical practices similar to ours?
● What HIPAA-specific training do your technicians receive?
● Do you have a standard BAA, or will you sign ours?
● What security certifications do you maintain (SOC 2, HITRUST, etc.)?
The right IT partner will welcome these questions. They'll have clear answers, documented processes, and a track record of supporting compliant healthcare organizations.
Next Steps for Your Practice
If you're not sure whether your current IT provider has a valid BAA in place, check now. Pull out your vendor contracts and look for a signed Business Associate Agreement. If you can't find one, reach out to your provider today.
If you do have a BAA, use this checklist to evaluate whether it actually protects your practice. Many older agreements are missing critical elements, especially around breach notification timelines and subcontractor requirements.
Healthcare IT isn't just about keeping systems running. It's about protecting patient data while keeping systems running. The right IT partner understands both - and puts it in writing.
Ready to evaluate your practice's IT compliance? Contact NOC Technology for a HIPAA security assessment. We'll review your current vendor agreements, identify gaps, and help you build a compliance posture that protects your patients and your practice.






