Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HIPAA » HIPAA Agreement

HIPAA Agreement

A HIPAA Business Associate Agreement is a contract between a HIPAA-covered entity (like a healthcare provider) and a business or individual that helps with certain functions involving PHI. It’s essentially a written arrangement that outlines how the PHI is used.

HIPAA requires covered entities to work with business associates who demonstrate the prowess to protect PHI. This must be validated using a contract or an agreement.

Also, the Health and Human Services (HHS) can audit business associates and subcontractors for HIPAA compliance, not just the covered entities. All three levels (covered entities, business associates, and subcontractors) must have a Business Associate Agreement (BAA) to meet HIPAA requirements.

What’s included in the agreement?

The Business Associate/Subcontractor Agreement must spell out several important details, as per HHS guidelines:

  • It describes how PHI can be used by the business associate/subcontractor
  • It ensures that the business associate/subcontractor will only misuse or share PHI within what the contract allows or requires by law
  • It mandates safeguards to prevent improper PHI use or sharing

Once these relationships are identified, you must ensure that third parties safeguard the PHI they handle. A signed agreement documents that the business associate understands and commits to handling PHI securely.

Additional reading

Top 8 Cloud Security Challenges: Addressing Modern Threats

80+ Cloud Security Statistics

The adoption of cloud infrastructure for businesses was rather quick. Cloud offers more flexibility to businesses at lower costs and higher efficiency. But could it also lead to increased security issues for your business?  82% of breaches involved cloud-stored data. Cloud security breaches have been on the rise for quite a while now. Plus, with…
ISO 27001 Risk Management Policy

ISO 27001 Risk Management Policy – Steps to Get Started

ISO 27001 is a globally recognized standard for information security that helps organizations up their information security game and keep up with threats of various kinds. Today organizations face numerous security risks that can jeopardize their reputation. Hence having a comprehensive risk management policy is highly needed. Risk management is a vital aspect of the…
Information Security Compliance

What is Information Security Compliance and why is it important

We all benefit from living in a connected world, from people using social media to remain in touch with distant family members to corporations reaping the benefits of remote working. Although connectivity is excellent and has many benefits, it also brings in vulnerabilities. Most businesses that handle sensitive data become the subject of cyberattacks. Organizations…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.