Skip to main content
Patient Protect circular logo mark in purple and white used for site navigationPatient Protect
Compliance Operations

Top 6 BAA Red Flags Every Independent Practice Misses

The six clauses in a Business Associate Agreement that determine whether the contract actually protects the practice or just satisfies the HIPAA box-check. What to read for before signing.

Joseph A. Perrin·April 5, 2026·5 min read
Share
Business Associate Agreement red flags that independent healthcare practices miss before signing

Top 6 BAA Red Flags Every Independent Practice Misses

A Business Associate Agreement is required under 45 CFR §164.504(e) before a vendor can receive PHI on a practice's behalf. The presence of a signed BAA is a HIPAA box that must be checked. The substance of the BAA is what determines whether the practice is actually protected when something goes wrong.

Most vendor BAA templates are written by the vendor's counsel. They protect the vendor. Below are the six clauses to scrutinize before signing.

1. Subcontractor language written too broadly

Vendors hire subcontractors. A cloud EHR may sit on AWS. An IT contractor may use offshore staffing. A billing service may rely on a clearinghouse. Each of those subcontractors becomes a downstream Business Associate — required by HIPAA to be bound by an equivalent BAA flowing from the primary vendor.

The red flag: a BAA clause that says "Business Associate may engage subcontractors as needed without further notice or consent." This effectively grants the vendor permission to send your PHI anywhere they choose.

Better language: Subcontractor list disclosed in writing, advance notice required for additions, downstream BAA requirement explicit, right to terminate if subcontractor scope changes materially.

2. Breach notification timeline beyond 60 days

HIPAA's Breach Notification Rule gives a Business Associate 60 days from discovery to notify the practice. Most well-drafted BAAs require much faster — 24 to 72 hours — because the practice's own 60-day clock to notify patients also starts at discovery, and the practice needs time to investigate before notifying.

The red flag: a BAA that mirrors the regulation's 60-day maximum, leaving the practice with zero time to investigate before its own notification clock expires.

Better language: Breach notification within 24–72 hours of discovery, including a defined description of what constitutes "discovery" and what minimum information the notice must contain.

3. Indemnification clauses that flip the breach cost back to the practice

Indemnification is where the BAA reveals its true author. Vendor-friendly BAAs are silent on indemnification or include limited mutual indemnification capped at the contract value. Practice-friendly BAAs include uncapped indemnification from the vendor when the breach originated on the vendor's side.

The red flag: language that says the practice will indemnify the vendor for "any claims arising from PHI processing" — without the inverse obligation when the vendor causes the breach.

Better language: Vendor indemnifies practice for all costs, losses, and regulatory penalties resulting from the vendor's breach, including reasonable attorney fees, with no contractual cap.

4. Audit rights that exist on paper but can't be exercised

Practices have the right under their BAA — and good practice under HIPAA — to verify the vendor's safeguards. Vendor-friendly BAAs grant audit rights in theory but make them practically unusable: 60-day advance notice, vendor selects the auditor, vendor controls the scope, audit at practice expense.

The red flag: audit clauses with conditions so restrictive that no audit will ever happen.

Better language: Reasonable notice (10–30 days), independent auditor of practice's choosing (subject to NDA), defined scope sufficient to verify safeguards, vendor cooperation including documentation access. SOC 2 Type II report acceptance can substitute for many audit requests.

5. Termination terms that leave PHI in the vendor's possession

HIPAA requires that on contract termination, the Business Associate return or destroy all PHI it received, or — if neither is feasible — extend the BAA protections to the data indefinitely. Vendors prefer the third option because it's the path of least operational change.

The red flag: termination clause defaults to "extension of protections" rather than mandating return or destruction within a specific window.

Better language: Return or certified destruction of PHI within 30–60 days of termination, documentation of method and completion, audit rights to verify destruction, indefinite-extension only as last resort with explicit justification.

6. Safeguards described in generic boilerplate

HIPAA requires the BAA to describe the safeguards the Business Associate will implement to protect PHI. The lazy version: "Business Associate will implement reasonable and appropriate administrative, physical, and technical safeguards." This is exactly the language of the regulation — and tells the practice nothing specific.

The red flag: safeguards section that paraphrases 45 CFR §164.308, §164.310, and §164.312 without naming any actual controls.

Better language: Specific encryption standards (AES-256 at rest, TLS 1.3 in transit), specific access control approach (RBAC, MFA), audit log retention duration, vulnerability management cadence, incident response timeline. SOC 2 Type II or HITRUST certification referenced where applicable.

How to use this list

Walk through your existing BAAs — every one of them, not just the EHR. The pattern that emerges almost always: BAAs signed in the early years of the practice are far weaker than BAAs signed recently. Vendors update their templates as enforcement evolves; many practices never renegotiate.

Three actions:

  • Inventory: Pull every BAA the practice has signed. Date them. Identify which ones are older than three years.
  • Triage: Run each through the six red flags. Score weakest first.
  • Renegotiate: Vendors expect this on contract renewal. The replacement template will almost always be stronger than the original.

Where Patient Protect fits

Patient Protect tracks BAAs continuously rather than at contract execution — vendor list, signing dates, expiration windows, and the specific clauses governing breach notification timeline and indemnification scope. Documentation-focused compliance platforms typically provide BAA template libraries and execution workflow. Patient Protect adds the active layer on the executed agreements: alerts when notification windows are about to expire, monitoring when subcontractor scope changes, integration discovery as new vendors connect to the practice's systems. The two complement each other. Most practices need both.


Patient Protect tracks every BAA in your stack — execution, expiration, clauses, and subcontractor lists — starting at $39/month. Free HIPAA Risk Assessment inventories your vendor relationships, no account required.

Was this useful? Share it.

Share

Next step

What would an OCR investigator find on your website?

Free 30-second scan — tracking pixels, security gaps, missing policies. See what’s visible before they do.

Stay informed

Get HIPAA Pulse delivered.

Breach alerts, enforcement updates, and compliance intelligence — every two weeks.

© 2026 Patient Protect LLC. All rights reserved. Content may not be reproduced, scraped, or used to train AI models without written permission. Terms · DMCA