Regulation & Policy

When the New HIPAA Security Rule Hits, Your Business Associates Are Your Biggest Liability — And Most Practices Have No Idea What Their Vendors Are Actually Doing With PHI

Key Takeaways

  • The updated HIPAA Security Rule introduces a new 24-hour incident notification trigger: business associates must alert covered entities when they activate an incident response plan, not just after a confirmed breach — a provision absent from most existing BAAs.
  • 41% of all healthcare data breaches originate from third-party vendors, yet most practices cannot produce a complete inventory of every PHI-touching tool that currently has a valid, updated business associate agreement on file.
  • OCR secured 10 HIPAA resolution agreements in just the first five months of 2025, with enforcement explicitly targeting covered entities that failed to conduct adequate risk analysis of their business associates.
  • Covered entities face direct liability for BA violations when they 'knew, or by exercising reasonable diligence, should have known' of non-compliance — meaning a signed BAA provides no protection if the practice never verified the BA's actual security posture.
  • The updated rule mandates annual BA verification of technical safeguard deployment, converting what most practices treat as a one-time contracting exercise into a continuous compliance obligation.

The HIPAA Security Rule overhaul expected to be finalized by mid-2026 is not primarily a technology story. It is a vendor accountability story. The rule's most consequential and least-discussed shift introduces a 24-hour incident notification mandate, requiring business associates to alert covered entities the moment they activate an incident response or contingency plan — before a confirmed breach, before forensics, before the vendor's legal team has crafted a response. That provision doesn't exist in most current business associate agreements. When OCR begins auditing compliance, the gap between what the new rule requires and what practices have actually signed will be the entry point for enforcement.

The enforcement trajectory is already visible. OCR secured 10 HIPAA resolution agreements in the first five months of 2025 alone, following 22 penalty actions across all of 2024. The agency's Risk Analysis Initiative, launched in October 2024, has made inadequate vendor oversight a primary target. With average healthcare data breach costs reaching $9.77 million — more than twice the cross-industry average — the financial exposure from a single unprepared vendor relationship now exceeds what most independent practices will generate in several years of revenue.

The BAA Clause That Most Practices Have Never Signed

Under the existing HIPAA Breach Notification Rule, business associates must notify covered entities of a confirmed breach of unsecured PHI within 60 days of discovery. That 60-day window is familiar, frequently cited in BAA templates, and routinely misunderstood as the primary notification obligation.

The updated rule introduces a fundamentally different trigger. Business associates must now notify covered entities within 24 hours of activating an incident response plan — a moment that precedes any determination of whether a breach has actually occurred. This is pre-breach notification, forcing practices into active awareness of a vendor security event in real time rather than receiving a polished incident summary weeks later. The practical implication is significant: practices must have operational protocols for receiving and acting on 24-hour BA notifications, including documented escalation procedures and legal counsel engagement timelines. Most practices have neither.

The gap exists because this provision is genuinely new. BAAs executed before the final rule publishes will not contain it. Every covered entity operating on legacy agreements — which describes the overwhelming majority of practices — will need to renegotiate or amend contracts with every business associate before the 180-day compliance window closes.

A Vendor Inventory Most Practices Cannot Produce

The scale of the problem is structural. The average hospital manages up to 1,000 vendors, and even smaller ambulatory practices accumulate PHI-touching cloud tools faster than their BAA inventories are updated. Billing platforms, patient communication systems, remote monitoring integrations, cloud-based EHR add-ons, scheduling software, secure messaging tools: each one that creates, receives, maintains, or transmits PHI on behalf of the covered entity legally requires a current, compliant BAA.

The breach data reflects this exposure. 41% of all healthcare data breaches originated from third-party vendors in 2024, with 55% of healthcare organizations reporting a third-party breach in the same period. Nearly 60% of all reported HIPAA breaches involve business associates, a figure that has remained stubbornly consistent even as covered entities have invested in their own internal security controls.

The sub-BAA chain compounds this problem. When a practice's BA subcontracts any PHI-related function to a third party, that subcontractor must also execute a BAA — and the practice is accountable for ensuring that chain exists. In practice, most covered entities have no visibility into their BAs' subcontractor relationships. The new rule does not relax this requirement; it tightens it.

How OCR Enforcement History Predicts Where 2026 Investigations Will Start

OCR's enforcement record is a reliable predictor of its investigation priorities. Recent BA-specific enforcement actions follow a consistent pattern: ransomware attacks on cloud service providers exposing ePHI across multiple covered entities simultaneously, followed by settlements that penalize both the BA and the covered entities that failed to conduct adequate due diligence.

The Comstar case is instructive. Comstar, a Massachusetts medical billing company serving more than 70 covered entities, suffered a 2022 ransomware attack that compromised approximately 585,000 individuals' data. OCR's investigation found that Comstar had not conducted an accurate and thorough risk analysis as required by the Security Rule. Every one of those 70-plus covered entities faced scrutiny over whether they had verified their BA's security posture before entrusting it with patient records.

The legal standard governing covered entity exposure is unambiguous. A covered entity can be held directly liable for a BA violation when it "knew, or by exercising reasonable diligence, should have known" of a pattern of non-compliance. That standard has teeth precisely because it extends liability to inaction. A practice that signed a BAA in 2019 and never reviewed it has not exercised reasonable diligence. OCR's 2025 enforcement tally reflects exactly this theory of liability.

What the Updated Rule Requires Practices to Verify Annually

The new HIPAA Security Rule introduces a mandatory annual verification cycle that covered entities have not previously been required to conduct. Business associates must verify, at least once every 12 months, that they have deployed the technical safeguards required by the Security Rule. The corresponding obligation for covered entities is to document that this verification occurred and to maintain records demonstrating ongoing BA oversight.

Practically, this means practices must obtain and review documentation from each BA confirming deployment of encryption for all ePHI at rest and in transit, multi-factor authentication across all access points, vulnerability scanning conducted at least every six months, and annual penetration testing. SOC 2 Type II reports, third-party security audit results, and written attestations of technical safeguard deployment are the currency of this verification process.

Practices that currently treat their BAA as a one-time contracting exercise need to understand that the updated rule converts vendor management into a recurring compliance function. The annual verification requirement will appear on OCR audit checklists. Practices without documentation of completed vendor reviews will face the same exposure as those that never executed BAAs at all.

Why 'The Vendor Handles Compliance' Will Cost You $10 Million

The most persistent and dangerous misconception in healthcare vendor management is the belief that executing a BAA transfers compliance responsibility to the business associate. It does not. The BAA may include indemnification provisions, but OCR enforcement runs to the covered entity regardless of the vendor's contractual obligations. A practice can hold a perfect BAA and still face a multimillion-dollar settlement if it cannot demonstrate ongoing oversight of the BA's actual security practices.

The Change Healthcare breach — a single business associate whose compromise ultimately affected records for roughly one in three Americans — illustrated the cascading liability that flows through vendor relationships. UnitedHealth required $8.5 billion in emergency loans in the immediate aftermath. For a large health system, that scale of exposure is survivable. For an independent practice or small physician group, a vendor-originated breach with enforcement action layered on top is an existential event.

The 2026 HIPAA Security Rule overhaul does not create new categories of risk. It creates new evidentiary standards for demonstrating that practices took vendor risk seriously. Practices that can produce current BAAs, annual verification records, BA security documentation, and incident notification protocols will be positioned to defend an investigation. Those operating on a 2019 BAA template with no vendor audit history will not. The compliance window after the final rule publishes is 180 days. That is the only timeline that matters.

Frequently Asked Questions

What exactly does the new 24-hour business associate notification requirement cover?

Under the updated HIPAA Security Rule, business associates must notify covered entities within 24 hours of activating an incident response or contingency plan, even before a breach is confirmed. This is separate from the existing 60-day breach notification obligation under the Breach Notification Rule, which applies after a breach of unsecured PHI is confirmed. Covered entities must have documented protocols for receiving and responding to these real-time notifications, including escalation procedures and legal counsel engagement steps.

Can a covered entity be fined for a breach that originated entirely with its business associate?

Yes. OCR holds covered entities directly liable for BA violations when the covered entity 'knew, or by exercising reasonable diligence, should have known' of a pattern of non-compliance. A signed BAA provides no protection if the practice never verified the BA's actual security posture. Recent 2025 enforcement actions confirm this: OCR investigated covered entities whose vendors — including cloud EHR providers and medical billing companies — suffered ransomware attacks, specifically examining whether the CE had conducted adequate risk analysis and oversight.

What documentation will OCR expect to see during a vendor oversight audit?

OCR will look for a complete inventory of all vendors handling PHI with corresponding current BAAs, annual verification records showing each BA has deployed required technical safeguards (encryption, MFA, vulnerability scanning, and penetration testing), and documentation of any sub-BAA relationships with BA subcontractors. Acceptable evidence of BA security posture includes SOC 2 Type II reports, third-party penetration test results, and written attestations of specific control deployment. Practices without this documentation trail have no defense against a 'should have known' liability theory.

When does the updated HIPAA Security Rule take effect?

HHS is targeting finalization of the updated Security Rule by mid-2026, with a 180-day compliance window after the final rule publishes. That places the practical compliance deadline in late 2026 or early 2027. The rule was proposed in January 2025 and represents the most significant overhaul of the Security Rule since its original implementation — eliminating the distinction between 'required' and 'addressable' implementation specifications and making all safeguards mandatory for both covered entities and business associates.

How does a practice identify which vendors require a BAA?

Any vendor that creates, receives, maintains, or transmits protected health information on behalf of a covered entity is a business associate under HIPAA and legally requires a BAA. This includes EHR vendors, medical billing companies, cloud storage providers, patient communication platforms, secure messaging tools, scheduling software, and any IT managed service provider with access to systems containing PHI. The threshold is access to PHI, not the primary business purpose of the vendor relationship — a distinction that means many SaaS tools practices use routinely qualify and may currently lack valid agreements.

More from Regulation & Policy

Congress Has Extended Telehealth Six Times in Eight Years — And Every Reprieve Is Making the Underlying Problem WorseHIPAA's 'Addressable' Loophole Is Officially Dead — The Encryption, MFA, and Pen-Testing Mandates That Will Cost Small Practices $40K to IgnoreHIPAA's 'Addressable' Loophole Is Officially Dead — The Encryption, MFA, and Pen-Testing Mandates That Will Cost Small Practices $40K to IgnoreHIPAA's 'Addressable' Loophole Is Officially Dead — The Encryption, MFA, and Pen-Testing Mandates That Will Cost Small Practices $40K to Ignore
← Back to Blog