Home Contract Samples S Standard Business Associate Agreement

Standard Business Associate Agreement: Definition, Terms, Example

Jump to Section

What is a Standard Business Associate Agreement?

A standard business associate agreement outlines the responsibilities of both you and any third-party service providers who have access to confidential information. Without such an agreement, one may be at risk for a data breach or other security incident.

A standard business associate agreement can protect a company's confidential information while still taking advantage of third-party services. In addition, a standard business associate agreement will include who is responsible for what and what may happen if either party breaks the conditions of the contract.

Common Sections in Standard Business Associate Agreements

Below is a list of common sections included in Standard Business Associate Agreements. These sections are linked to the below sample agreement for you to explore.

Standard Business Associate Agreement Sample

Exhibit 10.50

BUSINESS ASSOCIATE ADDENDUM

This Business Associate Addendum (the “Addendum”) is made effective January 1, 2010 among Northland Dental Partners, PLLC, a Minnesota professional limited liability company (“Northland”), its wholly owned subsidiaries, Family Periodontic Specialists, P.L.C., Family Oral Surgery Specialists, PLC, and Family Endodontic Specialists, PLC, all Minnesota professional limited liability companies (the “Subsidiaries,” and collectively with Northland, “Provider”), and American Dental Partners of Minnesota, LLC, a Delaware limited liability company (“Business Associate”).

Background Information

A. Provider and Business Associate (the “Parties”) are the parties to a Service Agreement having the same effective date as this Addendum (the “Service Agreement”). Pursuant to this Service Agreement, Business Associate will provide a variety of non-clinical administrative and management services to Provider.

B. In connection with its services under the Service Agreement, Business Associate will have access to “protected health information” and “electronic protected health information” regarding Provider’s patients (collectively, “PHI”), as those terms are defined in the Health Insurance Portability and Accountability Act of 1996 (P.L. 104-191), 42 U.S.C. Section 1320d, et. seq., and regulations promulgated thereunder, as amended (such statute and regulations collectively, “HIPAA”). In addition, Provider is a “covered entity,” and Business Associate is a “business associate,” as those terms are defined under HIPAA.

C. The Parties are entering into this Addendum to comply with HIPAA as it relates to the use and disclosure of PHI and related matters.

Statement of Agreement

The Parties hereby acknowledge the accuracy of the foregoing Background Information and agree as follows:

1. Definitions. Any capitalized terms used but not otherwise defined in this Addendum shall have the respective meanings given those terms under HIPAA.

2. Term. The term of this Addendum shall begin on the date of this Addendum and shall end on the date on which the Service Agreement is terminated; provided that if the Parties’ post-termination activities under the Service Agreement involve the potential use or disclosure of PHI by Business Associate, then the term of this Addendum shall continue until all such post-termination activities have been completed.

3. HIPAA Compliance and Agents. During the term of this Addendum, to the extent Business Associate has access to, uses, or discloses PHI, Business Associate shall comply with the “Business Associate” requirements under HIPAA. Without limiting the foregoing, Business Associate may use or disclose PHI only if such use or disclosure is permitted by this Addendum or HIPAA.


Business Associate shall ensure that each of its agents or subcontractors to whom it provides PHI received from, or created, used or disclosed by Business Associate on behalf of, Provider, agrees, by a written agreement or Workforce training, as applicable, to the same restrictions, terms, and conditions as are applicable to Business Associate under this Addendum, including without limitation the requirement to implement administrative, physical and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of any electronic PHI that it creates, receives, maintains, or transmits on behalf of Provider or Business Associate.

4. Use and Disclosure; Rights. Business Associate may use or disclose the PHI received or created by it: (a) to perform functions, activities, or services for, or on behalf of, Provider pursuant to the Service Agreement, as it may be amended from time to time, or for other related purposes requested or approved by Provider, (b) to perform its obligations under this Addendum, (c) to properly manage and administer Business Associate’s business, (d) to carry out its legal responsibilities if the disclosure is ‘required by law,’ as defined by HIPAA, (e) for ‘data aggregation functions,’ as defined by HIPAA, or (f) as otherwise permitted or required by applicable law. Provider shall not request that Business Associate use or disclose PHI in any manner that would not be permitted under HIPAA if done by Provider as a ‘covered entity.’ If, pursuant to clause (c) of this section, Business Associate discloses PHI to others, Business Associate shall obtain reasonable assurances from the person, firm, association, organization, or entity (hereinafter, simply “person”) to whom the information is disclosed that (i) such PHI shall be held confidentially and used or further disclosed only as required by law or for the purpose for which it is disclosed to such person, and (ii) that such person shall notify Business Associate of any instances of which it becomes aware that the confidentiality of the information has been breached.

5. HIPAA Security Rule; Safeguards. Business Associate shall implement, document, and use administrative, physical, and technical safeguards that prevent use or disclosure of PHI other than as permitted or required by this Addendum, and that reasonably and appropriately protect the confidentiality, integrity, and availability of any electronic PHI that it creates, receives, maintains, or transmits on behalf of Provider, including without limitation reporting to Provider any security incident of which Business Associate becomes aware. Without limiting the foregoing, on or before February 17, 2010, Business Associate shall comply with the Security Standards for the Protection of Electronic Protected Health Information (and Implementation Specifications therein) promulgated by the U. S. Department of Health and Human Services (“DHHS”) in §§ 164.308, 164.310, 164.312, and 164.316 of title 45, Code of Federal Regulations (the “Security Standards”) with respect to all electronic PHI (“ePHI”) it creates, receives, maintains or transmits on behalf of Provider. Notwithstanding the foregoing, Provider shall be solely responsible for ensuring that appropriate administrative, physical and technical safeguards are implemented with respect to ePHI Provider creates, receives, maintains, uses or discloses, in accordance with the Security Standards and other requirements under HIPAA as amended from time to time.

6. Minimum Necessary. Business Associate shall limit any use, disclosure, or request for use or disclosure to the minimum amount of PHI necessary to accomplish the intended purpose of the use, disclosure or request in accordance with the requirements of HIPAA.

 

-2-


7. Records; Covered Entity Access. Business Associate shall maintain such records of PHI received from, or created or received on behalf of, Provider as may be reasonably necessary and appropriate in order for Provider to comply with HIPAA with respect to the services described in the Service Agreement. Business Associate shall grant Provider reasonable access to examine and copy, at Provider’s expense, such PHI, and records and documents of Business Associate related thereto, during normal business hours.

8. DHHS Access to Books, Records, and Other Information. As required by applicable law, Business Associate shall make available to the Secretary of DHHS its internal practices, books, and records relating to the use and disclosure of PHI received from, or created or received by Business Associate on behalf of, Provider for purposes of determining the Provider’s or Business Associate’s compliance with HIPAA. Business Associate shall cooperate and assist Provider in good faith with complying with the requirements of HIPAA and any investigation of Provider regarding compliance with HIPAA conducted by DHHS, its Office for Civil Rights, or any other administrative or judicial body with jurisdiction over Provider.

9. Designated Record Set. Business Associate shall maintain a ‘designated record set,’ as defined by HIPAA, only for individuals for which it has PHI and only upon the specific written request of Provider or as required by the Service Agreement. Business Associate shall make a patient’s designated record set available to Provider for purposes of complying with such patient’s right under HIPAA to access, copy or append such record.

10. Accounting. Business Associate shall make available to Provider any PHI or any other information reasonably required to prepare, or reasonably assist in preparing, an accounting of disclosures in accordance with HIPAA. Business Associate shall document disclosures of PHI in such a manner as will assist Provider in responding to any request for an accounting of disclosures of PHI. With respect to written PHI, Business Associate shall have this information and documentation available for the six years preceding any request by Provider. If Business Associate maintains an “electronic health record” with respect to Provider’s patients, Business Associate shall have this information and documentation available for the three years preceding any request by Provider, and the exceptions under 45 C.F.R. § 164.528(a)(1)(i) shall not apply. Notwithstanding the foregoing, if Business Associate has provided services to Provider for less than the three-year or six-year, as applicable, Business Associate shall be obligated to make available to Provider only the information relating to the period during which Business Associate provided services to Provider.

11. Amendment of and Access to PHI; Notification. In accordance with an individual’s right to access his or her own PHI under HIPAA, and that individual’s right to copy or append amendments to such records, Business Associate shall make available to Provider all PHI in a designated record set that it maintains, or to the individual to whom the information pertains, or to such individual’s representative, in each case upon the written request of Provider. Business Associate shall append amendments to PHI in a designated record set that Business Associate maintains in accordance with a written request, including any amendment to be appended to such records, from Provider.

12. Individual Authorizations; Restrictions. Provider shall notify Business Associate of any restriction on the use or disclosure of PHI that Provider has agreed to with an individual, or that is otherwise required by HIPAA, or that Provider has placed in its Notice of Privacy

 

-3-


Practices, or of any changes in or revocation of an authorization or other permission by an individual, to the extent that such restriction, change or revocation may affect Business Associate’s use or disclosure of PHI. Provider shall notify Business Associate of any change in or revocation of any restriction on the use or disclosure of PHI that Provider had previously agreed to with an individual or that Provider had placed in its Notice of Privacy Practices.

13. Material Breach of Agreement. Pursuant to 45 C.F.R. 164.504(e)(1)(ii), if either Party knows or becomes aware of a pattern of activity or practice of the other Party that constitutes a material breach of the such Party’s obligations under this Addendum, such Party shall notify such other Party in writing, and both Parties shall, for a period of 60 days following receipt of such written notice and an explanation of the breach from the notifying Party, cooperate in good faith to take steps reasonably necessary to cure such breach; provided, however, that if such steps are unsuccessful, the non-breaching Party may, in addition to any other remedy: (a) terminate this Addendum, if feasible, or (b) if cure and termination are not feasible, discontinue use or disclosure of PHI to the extent feasible and report the breach to Secretary of DHHS.

14. Breach of Unsecured PHI. Pursuant to regulations promulgated under subpart D of part 164 of title 45, Code of Federal Regulations, as enacted by Section 13402(j) of the Health Information Technology for Economic and Clinical Health Act (“HITECH Act”), Business Associate is hereby delegated the authority and responsibility, on behalf of Provider, to notify individuals of any breach of unsecured PHI, as determined in good faith by Business Associate in accordance with the HIPAA Breach Notification Policy attached to this Addendum as Exhibit A, which is hereby incorporated herein by reference.

15. Electronic Standards, Code Sets, and Security Regulations. If Business Associate conducts, in whole or in part, electronic transactions on behalf of Provider of the type covered by HIPAA regulations, including Standards for Electronic Transactions and Electronic Code Sets, Business Associate shall comply, and shall require any of its agents or subcontractors to comply, with each applicable requirement of such regulations.

16. Return of PHI. At the end of the term of this Addendum, Business Associate shall return or destroy all PHI received from, or created or received by Business Associate on behalf of, Provider that Business Associate maintains in any form and retain no copies of such information; provided that, if and to the extent Business Associate reasonably determines that such return or destruction is not reasonably feasible, Business Associate shall not be required to return or destroy such PHI, but Business Associate shall extend the protections of this Addendum to such PHI.

17. Data Use Agreement. If Business Associate is the recipient of a ‘limited data set’, as defined by HIPAA, or if Business Associate is engaged by Provider to create a limited data set for purposes of Provider’s health care operations, this Addendum shall also be considered to be a ‘data use agreement,’ as defined by HIPAA, that establishes the permitted uses and disclosures of the information by Business Associate as a limited data set recipient as required by HIPAA. To the extent that, and for as long as, it possesses limited data set information for or on behalf of Provider, Business Associate hereby agrees to fully comply with the requirements of HIPAA applicable with respect to limited data set information, including without limitation, 45 C.F.R. §164.514(e). The provisions of this Addendum relative to PHI shall also apply to limited data

 

-4-


set information, if any, in the possession or control of Business Associate. Limited data set information may be used or disclosed by Business Associate only for the purposes of research, public health, or health care operations. Business Associate may not disclose limited data set information in a manner that would violate HIPAA if Business Associate were a covered entity thereunder. Business Associate may only disclose limited data set information to and permit the use of such information by other persons as may be agreed upon between Provider and Business Associate in writing from time to time. Business Associate shall not identify or attempt to identify the individual(s) to whom the limited data set information pertains or contact or attempt to contact the individual(s) that Business Associate believes to be the subject of any limited data set information.

18. HIPAA Amendments. In the event Congress or the U. S. Department of Health and Human Services amend HIPAA, this Addendum shall be deemed automatically amended to incorporate any supplemental, amended or modified requirements as are expressly applicable to Provider and/or Business Associate, effective on the effective date of such amendments. Without limiting the foregoing, the Parties agree to negotiate and cooperate in good faith in the execution of any amendments, agreements or other instruments deemed necessary or appropriate by the Parties in their reasonable discretion to carry out such HIPAA amendments.

19. Interpretation. This Addendum is an addendum to and a part of the Service Agreement and shall be interpreted in a manner consistent with the Service Agreement. In addition, the Addendum shall continue to apply to the Service Agreement as it may subsequently be amended or restated. In the event of any inconsistency between the provisions of the Service Agreement, as so amended and restated (if applicable), and this Addendum, the provisions of the Service Agreement shall control. This Addendum supersedes all prior agreements or understandings regarding the subject matter of this Addendum.

How ContractsCounsel Works
Hiring a lawyer on ContractsCounsel is easy, transparent and affordable.
1. Post a Free Project
Complete our 4-step process to provide info on what you need done.
2. Get Bids to Review
Receive flat-fee bids from lawyers in our marketplace to compare.
3. Start Your Project
Securely pay to start working with the lawyer you select.

 

PROVIDER:     SERVICE COMPANY:

NORTHLAND DENTAL

PARTNERS, PLLC *

   

AMERICAN DENTAL PARTNERS

OF MINNESOTA, LLC

By  

/s/ James Ludke

    By  

Ian H. Brock

Its  

President

    Its  

Vice President

 

*

For itself and on behalf of each

Subsidiary as its sole member

 

-5-


Exhibit A

HIPAA BREACH NOTIFICATION POLICY

SCOPE:

This HIPAA Breach Notification Policy (the “Policy”) applies to Northland Dental Partners, LLC (“Provider”), and its subsidiaries, members, directors, officers, employees, agents, and business associates (as defined in HIPAA), including American Dental Partners of Minnesota, LLC (“Business Associate”).

PURPOSE:

This Policy has been developed to facilitate the Provider’s compliance with the requirements of the Health Information Technology for Economic and Clinical Health Act (HITECH) component of the American Recovery and Reinvestment Act of 2009 (ARRA) concerning breach notification of unsecured protected health information (PHI). The purpose of this Policy is to outline a systematic process designed to notify patients of any breach of privacy or security with respect to any unsecured PHI that is received, created, retained, used or disclosed by Provider as a Covered Entity, its owners, members, directors, officers, employees, and business associates. The phrase “received, created, retained, used or disclosed” is interpreted to include many activities a Covered Entity may take with respect to PHI, including, but not limited to: accessing, maintaining, retaining, modifying, recording, storing, destroying, or otherwise holding, using or disclosing PHI.

DEFINITIONS:

The following definitions apply to all of the Provider’s privacy and security policies and procedures related to personal health information received, created, retained, used or disclosed by the Provider as a Covered Entity, Business Associate or any other business associate of the Provider.

Breach – The acquisition, access, use, or disclosure of PHI in a manner not permitted under the Privacy Rule (as defined below), which compromises the security or privacy of the PHI. The determination of whether any breach or potential breach compromises the security or privacy of the PHI shall be made in good faith by Business Associate on behalf of the Provider, taking into consideration an assessment of whether the potential breach poses a significant risk of financial, reputational, or other harm to the individual. The term “breach” does not include:

(i) any unintentional acquisition, access, or use of PHI by an employee or other workforce member of the Provider, or by a person acting under the authority of the Provider, such as a member of Business Associate’s workforce, if such acquisition, access, or use: (1) was made in good faith and within the course and scope of the employment or authority of such person, and (2) does not result in further use or disclosure in a manner not permitted under the Privacy Rule; or

(ii) any inadvertent disclosure by a person who is authorized to access PHI by the Provider or Business Associate, to another person authorized to access PHI at the Provider or


Business Associate, or within an organized health care arrangement in which the Provider participates, and the information received as a result of such disclosure is not further used or disclosed in a manner not permitted under the Privacy Rule; or

(iii) a disclosure of PHI where Business Associate or the Provider has determined or has a good faith belief that an unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information.

Breach Notification Rule – Regulations promulgated at subpart D of part 164, title 45, Code of Federal Regulations.

Business Associate – A person or entity who, on behalf of the Provider, or on behalf of an organized health care arrangement in which the Provider participates (“OHCA”), but other than in the capacity as an employee, performs or assists in the performance of: (a) a function or activity involving the use or disclosure of individually identifiable health information, including claims processing or administration; data analysis, processing or administration; utilization review; quality assurance; billing; benefit management; practice management; repricing; or any other function or activity regulated under HIPAA, or (b) provides legal, actuarial, accounting, consulting, data aggregation, management, administrative, accreditation, or financial services to or for Provider or such OHCA, where the provision of the service involves the disclosure of individually identifiable health information from Provider or such OHCA, or from another business associate of Provider or such OHCA, to the person or entity.

Covered Entity (1) A health plan; (2) a health care clearinghouse; or (3) a health care provider who transmits any health information in electronic form in connection with a transaction covered by HIPAA.

HIPAA – The Health Insurance Portability and Accountability Act of 1996 (P.L. 104-191), 42 U.S.C. Section 1320d, et. seq., and regulations promulgated thereunder, as amended from time to time.

Privacy Officer The person designated by the Provider, or, with Provider’s consent, by Business Associate as the manager of certain non-clinical parts of Provider’s dental practice, to oversee and administer the Provider’s compliance with HIPAA.

Privacy Rule – Regulations promulgated at subpart E of part 164, title 45, Code of Federal Regulations.

Protected Health Information, or PHI – PHI shall have the meaning prescribed to it under 45 C.F.R. § 160.103. Generally, this includes any oral, written or electronic individually-identifiable health information received, created, retained, used or disclosed by Provider as a Covered Entity. Individually-identifiable health information includes demographic information and is information created or received by a health care provider, health plan, employer, or health care clearinghouse; and relates to the past, present or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present or future payment for the provision of health care to an individual; and that identifies the individual, or with respect to which there is a reasonable basis to believe the information can be used to identify the individual. PHI does not include employment records held by a Covered Entity in its role as an employer.


Security Rule – Regulations promulgated at subpart C of part 164, title 45, Code of Federal Regulations.

Unsecured PHI – Protected health information that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified in guidance published by the Secretary of the Department of Health and Human Services (HHS).

Additional Definitions – Terms not otherwise defined herein, shall have the meanings set forth in the Administrative Simplification provisions of the Health Insurance Portability and Accountability Act of 1996 (P.L. 104-191), 42 U.S.C. Section 1320d, et. seq., and the HIPAA Privacy and Security Standards, 45 C.F.R. parts 160 and 164, as amended from time to time.

POLICY:

In the case of a breach of unsecured PHI, Business Associate, on behalf of the Provider, shall notify the affected patient(s) of the breach, without unreasonable delay and in no case later than sixty (60) calendar days after discovery of the breach.

Limited Data Sets (as defined under HIPAA) (except those that exclude patient zip code and date of birth) are subject to this Policy and the required breach notification.

All Provider and Business Associate directors, officers, employees and agents are expected to work collaboratively to timely and accurately report any breach of unsecured PHI to the Privacy Officer and according to this Policy, ARRA, and any and all other federal and state laws and regulations. The Privacy Officer shall maintain all documentation related to any breach of unsecured PHI, for a minimum of six (6) years from the date of notification provided hereunder.

PROCEDURE:

Breach Analysis:

Upon discovering a potential breach, in order to determine if a breach has actually occurred, Business Associate, in consultation with Provider, shall conduct a breach analysis. Such analysis consists of:

 

  1)

determining whether the PHI was unsecure;

 

  2)

determining whether the PHI was used or disclosed in an unauthorized manner (in a manner not permitted under the Privacy Rule);


  3)

determining whether the unauthorized use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individuals; and

 

  4)

determining whether the incident falls under any of the three enumerated exceptions to a breach listed in the definition of “breach” above.

The following information, in addition to any other relevant facts and circumstances, should be considered when determining whether the unauthorized use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individuals/participants/patients (number 3, above): who impermissibly used or to whom the information was impermissibly disclosed; whether immediate steps have been taken to mitigate an impermissible use or disclosure such that the risk of harm has been eliminated or reduced to less than a significant amount of harm; and the type and amount of PHI involved in the impermissible use or disclosure. The risk assessment should be fact specific.

Business Associate, on behalf of Provider, shall document its breach analysis and maintain such documentation for a minimum of six (6) years.

Notification of Affected Individuals/Patients:

1. After a prompt investigation and breach analysis, without unreasonable delay and in no case later than sixty (60) calendar days of Business Associate or Provider (as the case may be) discovering a breach, Business Associate, on behalf of the Provider, shall provide written notice to each patient whose unsecured PHI has been, or is reasonably believed by Business Associate to have been, accessed, acquired, used, or disclosed as a result of such breach. In the following situations, the persons listed shall be notified:

 

  a.

If the patient is deceased, the patient’s next-of-kin or personal representative (e.g., appointed executor or administrator of the patient’s estate), in accordance with applicable law.

 

  b.

If the patient is incapacitated/incompetent, the patient’s personal representative (e.g., durable power of attorney for health care or legal guardian).

 

  c.

If the patient is an unemancipated minor, the parent or legal guardian.

2. Written notification must be sent by first-class mail to the last known address of the patient, or, if previously agreed to by the patient and not revoked, by encrypted electronic mail.

3. In the case where there is insufficient or out-of-date contact information that precludes written notification to the patient, substitute notice reasonably calculated to reach the patient shall be provided, in accordance with §164.404(d)(2) of title 45, Code of Federal Regulations.


4. In any case that Business Associate, on behalf of the Provider, determines that the patient should be notified urgently of a breach because of possible imminent misuse of unsecured PHI, Business Associate may, in addition to providing notice as outlined in steps 1-3 above, contact the patient by telephone or other means, as appropriate.

5. If a law enforcement official determines that a notification would impede a criminal investigation or cause damage to national security, such notification shall be delayed in the same manner as provided under §164.528(a)(2) of title 45, Code of Federal Regulations.

Media Notification:

1. In any case where a breach involves more than 500 patients who are residents of the same State or jurisdiction, Business Associate, on behalf of the Provider, shall notify prominent media outlets, without unreasonable delay and in no case later than sixty (60) calendar days after discovery of the breach. The content of the media notice must meet the same requirements as the content of written notification to patients.

2. The Privacy Officer should work with Provider’s leadership and Business Associate management to coordinate any media notification required hereunder.

HHS Notification:

 

1.

In any case of a breach involving less than 500 patients (regardless of the State or jurisdiction), Business Associate, on behalf of the Provider, must record the breach in a centralized log of all breaches of unsecured PHI that occurred during the calendar year and annually submit the log to HHS (with a copy to Business Associate’s corporate office) no later than sixty (60) calendar days after the end of the calendar year. Notice of breaches affecting less than 500 individuals must be submitted electronically by using the breach notification form located at this website address: http://transparency.cit.nih.gov/breach/index.cfm (or at any address located in subsequent guidance). A separate form must be completed for every breach that has occurred and has been logged on behalf of Provider during the calendar year. If Business Associate has submitted a breach notification form to the Secretary of HHS on behalf of Provider, and later discovers additional information to report, Business Associate may submit an additional form, checking the appropriate box to signal that it is an updated submission.

 

2.

In any case of a breach involving 500 or more patients (regardless of the State or jurisdiction), Business Associate, on behalf of the Provider, shall, without unreasonable delay and in no case later than sixty (60) calendar days after discovery of the breach, provide notification to the Secretary of the U. S. Department of Health and Human Services (HHS). The notice to HHS shall be provided contemporaneously with, and in addition to, the notification to patients. The notice must be submitted electronically by using the breach notification form located at this website address: http://transparency.cit.nih.gov/breach/index.cfm (or at any address located in subsequent guidance).


Content of Notification:

Regardless of the method by which the notice is provided to patients, notice of the breach must include:

1. A brief description of what happened, including the date of the breach and the date of the discovery of the breach, if known.

2. A description of the types of unsecured PHI that were involved in the breach, such as whether or not the patient’s full name, Social Security Number, date of birth, home address, account number, diagnosis code or disability code or other types of information were involved. Only the generic type of PHI should be listed in the notice (i.e., “date of birth” rather than the patient’s actual birth date).

3. The steps the individual should take to protect themselves from potential harm resulting from the breach.

4. A brief description of what the Provider, or Business Associate on behalf of the Provider, is doing to investigate the breach, mitigate harm to the patients, and to protect against any further breaches.

5. Contact procedures for patients to ask questions or learn additional information, which shall include a toll-free telephone number, an e-mail address, website, or postal address.

6. Any other information required by the Breach Notification Rule.

7. Provider is required to maintain documentation that all required notifications were made, for a minimum of six (6) years.

Notification by the Provider’s Business Associates:

All business associates of Provider (as defined above) shall be required, either by the applicable Business Associate Agreement entered into with Provider, or by adherence to this Policy, to notify Business Associate of any breach of unsecured PHI, without unreasonable delay and in no event later than five (5) business days after the discovery of the breach by the business associate or any director, officer, employee, or agent of the business associate (excluding the person who may have committed the breach). Provider shall immediately notify Business Associate of any notices of breach it receives from its other business associates.

State Law or Other Legal Requirements:

In the event of a breach of PHI, Business Associate, on behalf of Provider, shall review and take appropriate actions under any applicable state breach notification laws, and/or other federal laws that may be applicable to the incident.


POLICY OVERSIGHT:

This Policy shall be administered by the Privacy Officer in consultation with Business Associate. The Privacy Officer shall review this Policy annually for updates and revisions required in order to comply with applicable state, federal or local laws. Proposed modifications, updates, or revisions required by law shall be presented by the Privacy Officer to the Provider and Business Associate for approval.


Reference:
Security Exchange Commission - Edgar Database, EX-10.50 7 dex1050.htm BUSINESS ASSOCIATE ADDENDUM, Viewed January 28, 2022, View Source on SEC.

Who Helps With Standard Business Associate Agreements?

Lawyers with backgrounds working on standard business associate agreements work with clients to help. Do you need help with a standard business associate agreement?

Post a project in ContractsCounsel's marketplace to get free bids from lawyers to draft, review, or negotiate standard business associate agreements. All lawyers are vetted by our team and peer reviewed by our customers for you to explore before hiring.


ContractsCounsel is not a law firm, and this post should not be considered and does not contain legal advice. To ensure the information and advice in this post are correct, sufficient, and appropriate for your situation, please consult a licensed attorney. Also, using or accessing ContractsCounsel's site does not create an attorney-client relationship between you and ContractsCounsel.


How ContractsCounsel Works
Hiring a lawyer on ContractsCounsel is easy, transparent and affordable.
1. Post a Free Project
Complete our 4-step process to provide info on what you need done.
2. Get Bids to Review
Receive flat-fee bids from lawyers in our marketplace to compare.
3. Start Your Project
Securely pay to start working with the lawyer you select.

Meet some of our Standard Business Associate Agreement Lawyers

Alen A. on ContractsCounsel
View Alen
5.0 (13)
Member Since:
August 26, 2021

Alen A.

Attorney
Free Consultation
Los Angeles, CA
19 Yrs Experience
Licensed in CA
University of West Los Angeles

Alen Aydinian is a seasoned real estate attorney with a wealth of experience in handling transactional matters, real estate transactions, and lease agreements. As a licensed real estate broker, Alen Aydinian brings a unique perspective to the table, allowing clients to benefit from both legal expertise and practical industry knowledge. He is a trusted advisor in the realm of real estate transactions and lease agreements. Whether representing buyers, sellers, landlords, or tenants, Alen Aydinian is committed to providing strategic counsel and dedicated advocacy every step of the way. Clients rely on him for sound legal guidance, proactive problem-solving, and unwavering support throughout the transaction process.

Recent  ContractsCounsel Client  Review:
5.0

"I contracted Alen for a commercial lease review. I couldn't be happier with the results, as he exceeded my expectations. He completed the project 2 days ahead of the estimated timeframe, gave me high quality feedback, and suggested alternate language. We had a call at the end and he answered all of my questions in detail. Incredible value. I'm so happy I chose Alen, and I definitely recommend him to anyone else needing legal assistance."

Garrett M. on ContractsCounsel
View Garrett
5.0 (12)
Member Since:
August 30, 2021

Garrett M.

Attorney
Free Consultation
Dexter, MO
10 Yrs Experience
Licensed in MO, TX
University of Texas

I am a solo practitioner with a practice mostly consisting of serving as counsel to start-ups and small business owners and investors. With a practical business background, I aim to bring practical, business minded solutions to my client's legal problems and pride myself on efficient yet effective work.

Recent  ContractsCounsel Client  Review:
5.0

"Garrett was extremely professional, attentive, and adhered to the very tight deadlines we had set. I would like to highlight that, in addition to completing the task assigned to him, he took the initiative to research all parties involved in the contract to provide us with the best possible support. We are very satisfied and look forward to working with him again."

Billy Joe M. on ContractsCounsel
View Billy Joe
5.0 (3)
Member Since:
October 26, 2021

Billy Joe M.

Partner Attorney
Free Consultation
Chicago, IL
17 Yrs Experience
Licensed in IL
University of Illinois at Urbana-Champaign

I graduated from the University of Illinois at Urbana-Champaign in 2006 with a degree in Political Science, Finance, and Economics. I stayed around Champaign for law school and graduated in 2009. I then worked at a big law firm in downtown Chicago. It was boring, so I quit in early 2011. I thought that I could not be happy practicing law - I was wrong. After I quit the traditional law firm life, I began representing my own clients. I realize now that I love helping normal people, small business owners, and non-profits address a variety of legal issues. I hope to hear from you.

Recent  ContractsCounsel Client  Review:
5.0

"Billy Joe was great to work with on a demand letter related to a HOA dispute. He was understanding of my situation, thorough in communication, and worked with me through a complex situation. I'm not a lawyer and he was very personable, as well as responsive. Highly recommended!"

Alex M. on ContractsCounsel
View Alex
Member Since:
August 26, 2021

Alex M.

Attorney
Free Consultation
Los Angeles, California
15 Yrs Experience
Licensed in CA
Southwestern Law School

Mr. Mehdipour attended the University of California San Diego where he received his degree in political science. After graduating from UCSD, Mr. Mehdipour attended Southwestern University School of Law where he received his JD. Upon passing the bar, Mr. Mehdipour gained invaluable experience both in a law firm and business setting. Mr. Mehdipour uses his prior business and legal experiences to negotiate the most advantageous results for his clients.

Nicholas A. on ContractsCounsel
View Nicholas
Member Since:
August 28, 2021

Nicholas A.

Founder, Victrix Legal LLC
Free Consultation
Buffalo, NY
5 Yrs Experience
Licensed in NY
Liberty University School of Law

I help small business owners build and protect their dreams. I always thought that I would just be a litigator. Then I joined an intellectual property clinic in law school. We were helping nonprofits and small businesses reach their goals. I fell in love with the work and decided to open my own firm so I could keep helping them. When I decided to start Victrix Legal, I decided that it would be a modern law firm designed to serve professionals. It would be different from every other law firm. In my experience, my law firms are designed to promote inefficiency and reactionary lawyering. Because in most firms, you make more money when you spend more time on a project. And you lose money if your client doesn't get sued. In my opinion, that's a built-in conflict of interest. My firm is different. I use flat fees for most basic projects to keep costs predictable for you and incentivize efficiency. I offer long-term advisory plans and legal audits to prevent issues from happening. I want my clients to see me as their business partner, not just the guy they call when they are in trouble. If any of that interests you, please reach out to me. I offer free consultations. Let's set aside some time and talk about what your legal needs are.

Gerald W. on ContractsCounsel
View Gerald
Member Since:
August 28, 2021

Gerald W.

Attorney
Free Consultation
Round Rock, Texas
12 Yrs Experience
Licensed in IL, TX
Valparaiso University School of Law

My clients know me as more than just an attorney. First and foremost, my background is much broader than that. Prior to attending the Valparaiso University School of Law, I earned a Master of Business Administration and ran a small business as a certified public accountant. Thanks to this experience, I possess unique insight which in turn allows me to better assist my clients with a wide range of business and tax matters today. In total, I have over 20 years of experience in financial management, tax law, and business consulting, and I’m proud to say that I’m utilizing the knowledge I’ve gained to assist the community of Round Rock in a variety of ways. In my current practice, I provide counsel to small to medium-sized businesses, nonprofit organizations, and everyday individuals. Though my primary areas of practice are estate planning, elder law, business consulting, and tax planning, I pride myself on assisting my clients in a comprehensive manner. Whenever I take on a new client, I make an effort to get to know them on a personal level. This, of course, begins with listening. It is important that I fully understand their vision so I can help them successfully translate it into a concrete plan of action that meets their goals and expectations. I appreciate the individual attributes of each client and know firsthand that thoughtful, creative, and customized planning can maximize both financial security and personal happiness. During my time as a certified public accountant, I cultivated an invaluable skill set. After all, while my legal education has given me a deep understanding of tax law, I would not be the tax attorney I am today without my background in accounting. Due to my far-reaching experience, I am competent in unraveling even the most complex tax mysteries and disputes. My CPA training benefits my estate planning practice, too. In the process of drafting comprehensive wills and trusts, I carefully account for every asset and plan for any tax burdens that may arise, often facilitating a much smoother inheritance for the heirs of my clients. Prior to becoming certified as a CPA, I made sure to establish a solid foundation in business both in and out of the classroom, and the acumen I’ve attained has served me well. Not only am I better able to run my own practice than I otherwise would be; I am able to help other small business owners fulfill their dreams, as well.

Anna K. on ContractsCounsel
View Anna
Member Since:
November 12, 2021

Anna K.

Manager
Free Consultation
Miami, Florida
28 Yrs Experience
Licensed in FL
University of Miami

Anna is an experienced attorney, with over twenty years of experience. With no geographical boundaries confining her practice, Anna works on corporate, healthcare and real estate transactions. Anna brings extensive big firm experience, garnered as an associate in the Miami office of the world's largest law firm, Baker and McKenzie, and the Miami office of the international law firm Kilpatrick Townsend. Her areas of expertise include: mergers and acquisitions, initial public offerings, private placements, healthcare transactions, corporate finance, commercial real estate transaction and acting as a general corporate counsel. Anna is certified to practice law in Florida and was admitted to the Florida Bar in 1998. Anna is also a Certified Public Accountant. She passed May 1995 CPA Exam on the first sitting. She is fluent in Russian (native).

Find the best lawyer for your project

Browse Lawyers Now

Quick, user friendly and one of the better ways I've come across to get ahold of lawyers willing to take new clients.

View Trustpilot Review

How It Works

Post Your Project

Get Free Bids to Compare

Hire Your Lawyer

Business lawyers by top cities
See All Business Lawyers
Standard Business Associate Agreement lawyers by city
See All Standard Business Associate Agreement Lawyers

Contracts Counsel was incredibly helpful and easy to use. I submitted a project for a lawyer's help within a day I had received over 6 proposals from qualified lawyers. I submitted a bid that works best for my business and we went forward with the project.

View Trustpilot Review

I never knew how difficult it was to obtain representation or a lawyer, and ContractsCounsel was EXACTLY the type of service I was hoping for when I was in a pinch. Working with their service was efficient, effective and made me feel in control. Thank you so much and should I ever need attorney services down the road, I'll certainly be a repeat customer.

View Trustpilot Review

I got 5 bids within 24h of posting my project. I choose the person who provided the most detailed and relevant intro letter, highlighting their experience relevant to my project. I am very satisfied with the outcome and quality of the two agreements that were produced, they actually far exceed my expectations.

View Trustpilot Review

How It Works

Post Your Project

Get Free Bids to Compare

Hire Your Lawyer

Want to speak to someone?

Get in touch below and we will schedule a time to connect!

Request a call

Find lawyers and attorneys by city