Establishing secure connection… Loading editor… Preparing document…
Navigation

Fill and Sign the Hippa Business Agreement Form

Fill and Sign the Hippa Business Agreement Form

How it works

Open the document and fill out all its fields.
Apply your legally-binding eSignature.
Save and invite other recipients to sign it.

Rate template

4.8
49 votes
HIPAA Business Associate Agreement between Covered Entity and Business Associate (Compliance with Privacy and Security Rules) This HIPAA Business Associate Agreement ( Agreement ) is between _______________ ___________ (Name of Covered Entity) of _________________________________________ _____________________________________ (street address, city, county, state, zip code) , hereinafter referred to as the Covered Entity , and __________________________ (Name of Business Associate) , hereinafter referred to a Business Associate , located at ___________ ______________________________________________________________ (street address, city, county, state, zip code) , and includes all office locations and other business locations at which Business Associate data may be used or maintained. Covered Entity and Business Associate may be referred to herein individually as Party or collectively as Parties. 1. Covered Entity acknowledges that it is subject to the Privacy and Security Rules (45 CFR Parts 160 and 164) promulgated by the United States Department of Health and Human Services pursuant to the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law 104-191. 2. If Business Associate provides services to Covered Entity pursuant to one or more contractual relationships, said Agreements are hereinafter referred to as Service Agreements . A list of said agreements affected by this HIPAA Business Associate Agreement is attached hereto as Exhibit A , and made a part hereto by reference. 3. In the course of executing Service requests, Business Associate may come into contact with, use, or disclose Protected Health Information (PHI) (defined in Section 5-M below). Said Service Agreements are hereby incorporated by reference and shall be taken and considered as a part of this document the same as if fully set out herein. 4. In accordance with the federal privacy and security regulations set forth at 45 C.F.R. Part 160 and Part 164, Subparts A, C, and E, which require Covered Entity to have a written memorandum with each of its internal Business Associate s, the Parties wish to establish satisfactory assurances that Business Associate will appropriately safeguard PHI and, therefore, execute this Agreement. 5. Definitions A. Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in 45 CFR §§ 160.103, 164.304, 164.504 and 164.501. B. Breach of the Security of the Business Associate’s Information System shall mean the unauthorized acquisition, including, but not limited to, access to, use, disclosure, modification or destruction, of unencrypted computerized data that materially compromises the security, confidentiality, or integrity of personal information maintained by or on behalf of the Covered Entity under the terms of ________________________ (State Code provision, if applicable) and this Agreement. C. Commercial Use means obtaining protected health information with the intent to sell, transfer or use it for commercial, or personal gain, or malicious harm; sale to third party for consumption, resale, or processing for resale; and application or conversion of data to make a profit or obtain a benefit contrary to the spirit of this Agreement, including but not limited to presentation of data or examples of data in a conference or meeting setting where the ultimate goal is to obtain or gain new business. D. Confidential Information shall mean any non-public, confidential or proprietary information, whether written, graphic, oral, electronic, visual or fixed in any tangible medium or expression, which is supplied by Covered Entity to the Trading Partner under this Agreement. Any information, whether written, graphic, oral, electronic, visual or fixed in any tangible medium or expression, relating to individuals enrolled in the Covered Entity program ( Covered Entity Enrollees ), or relating to individuals who may be potentially enrolled in the Covered Entity program, which is provided to or obtained through the Trading Partner’s performance under this Agreement, shall also be treated as Confidential Information to the extent that confidential status is afforded such information under state and federal laws or regulations. All confidential information shall not be subject to disclosure under the ____________________ (Name of State) Public Records Act. E. Designated Record Set shall have the meaning set out in its definition at 45 C.F.R. § 164.501. F. Electronic Protected Health Information (EPHI) shall have the meaning set out in its definition at 45 C.F.R. § 160.103. G. Encryption means the process using publicly known algorithms to convert plain text and other data into a form intended to protect the data from being able to be converted back to the original plain text by known technological means. H. Health Care Operations shall have the meaning set out in its definition at 45 C.F.R. § 164.501. I. Individual shall have the same meaning as the term individual in 45 CFR § 160.103 and shall include a person who qualifies as a personal representative in accordance with 45 CFR § 164.502(g). J. Marketing shall have the meaning under 45 CFR § 164.501 and the act or process of promoting, selling, leasing or licensing any Covered Entity information or data for profit without the express written permission of Covered Entity . K. Privacy Officer shall have the meaning as set out in its definition at 45 C.F.R. § 164.530(a)(1). The Privacy Officer is the official designated by a Covered Entity or Business Associate to be responsible for compliance with HIPAA regulations. L. Privacy Rule shall mean the Standards for Privacy of Individually Identifiable Health Information at 45 CFR Part 160 and Part 164, subparts A, and E. M. Protected Health Information shall have the same meaning as the term protected health information in 45 CFR § 160.103, limited to the information created or received by Business Associate from or on behalf of Covered Entity . PHI includes information in any format, including but not limited to electronic or paper. N. Required By Law shall have the same meaning as the term required by law in 45 CFR § 164.103. O. Security Incident shall mean the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system. P. Security Event shall mean an immediately reportable subset of security incidents which incident would include: 1. A suspected penetration of Business Associate ’s information system of which the Business Associate becomes aware but for which it is not able to verify within Forty-Eight (48) hours or no more than Two Business Days (of the time the Business Associate became aware of the suspected incident) that enrollee PHI or other confidential Covered Entity data was not accessed, stolen, used, disclosed, modified, or destroyed; 2. Any indication, evidence, or other security documentation that the Business Associate ’s network resources, including, but not limited to, software, network routers, firewalls, database and application servers, intrusion detection systems or other security appliances, may have been damaged, modified, taken over by proxy, or otherwise compromised, for which Business Associate cannot refute the indication within Forty-Eight (48) or no more than Two Business Days of the time the Business Associate became aware of such indication; 3. A breach of the security of the Business Associate ’s information system(s) (see Paragraph 5-B above), by unauthorized acquisition, including, but not limited to, access to or use, disclosure, modification or destruction, of unencrypted computerized data and which incident materially compromises the security, confidentiality, or integrity of Covered Entity enrollee PHI; and/or 4. The unauthorized acquisition, including but not limited to access to or use, disclosure, modification or destruction, of unencrypted Covered Entity enrollee PHI or other confidential information of the Covered Entity by an employee or authorized user of Business Associate ’s system(s) which materially compromises the security, confidentiality, or integrity of Covered Entity enrollee PHI or other confidential information of the Covered Entity . If data acquired (including but not limited to access to or use, disclosure, modification or destruction of such data) is in encrypted format but the decryption key which would allow the decoding of the data is also taken, the parties shall treat the acquisition as a breach for purposes of determining appropriate response. Q. Security Rule shall mean the Security Standards for the Protection of Electronic Protected Health Information” at 45 CFR Parts 160 and 164, Subparts A and C. 6. Obligations and Activities of BUSINESS ASSOCIATE (Privacy Rule) A. Compliance with the Privacy Rule . Business Associate agrees to fully comply with the requirements under the Privacy Rule applicable to Business Associate s, as that term is defined in the Privacy Rule and not use or further disclose PHI other than as permitted or required by this Agreement, the Service Agreements, or as Required By Law. In case of any conflict between this Agreement and the Service Agreements, this Agreement shall govern. B. Privacy Safeguards and Policies. Business Associate agrees to use appropriate safeguards to prevent use or disclosure of PHI other than as provided for by the Service Agreement(s), this Agreement or as Required By Law. This includes the implementation of administrative, physical, and technical safeguards to reasonably and appropriately protect the Covered Entity ’s PHI against any reasonably anticipated threats or hazards, utilizing the technology commercially available to the Business Associate (See also Section 7-B ). The Business Associate shall maintain appropriate documentation of its compliance with the Privacy Rule, including, but not limited to, its policies, procedures, records of training and sanctions of members of its workforce. C. Business Associate Contracts. Business Associate shall require any agent, including a subcontractor, to whom it provides PHI received from, maintained, created or received by Business Associate on behalf of Covered Entity , or that carries out any duties for the Business Associate involving the use, custody, disclosure, creation of, or access to PHI or other confidential Covered Entity information, to agree, by written contract with Business Associate , to the same restrictions and conditions that apply through this Agreement to Business Associate with respect to such information. D. Mitigation of Harmful Effect of Violations . Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate of a use or disclosure of PHI by Business Associate in violation of the requirements of this Agreement. E. Reporting of Violations in Use and Disclosure of PHI. Business Associate agrees to require its employees, agents, and subcontractors to promptly report to Business Associate any use or disclosure of PHI in violation of this Agreement and to report to Covered Entity any use or disclosure of the PHI not provided for by this Agreement. The Business Associate shall report such violation to Covered Entity within Forty-Eight (48) or no more than Two Business Days of event. F. Access of Individual to PHI and other Requests to Business Associate. If Business Associate receives PHI from Covered Entity in a Designated Record Set, Business Associate agrees to provide access to PHI in a Designated Record Set to Covered Entity in order to meet its requirements under 45 CFR § 164.524. If Business Associate receives a request from an Individual for a copy of the individual's PHI, and the PHI is in the sole possession of the Business Associate , Business Associate will provide the requested copies to the individual in a timely manner. If Business Associate receives a request for PHI not in its possession and in the possession of the Covered Entity , or receives a request to exercise other individual rights as set forth in the Privacy Rule, Business Associate shall promptly forward the request to Covered Entity . Business Associate shall then assist Covered Entity as necessary in responding to the request in a timely manner. If a Business Associate provides copies of PHI to the individual, it may charge a reasonable fee for the copies as the regulations shall permit. G. Requests to Covered Entity for Access to PHI. The Covered Entity shall forward to the Business Associate in a timely manner any Individual’s request for access to or a copy of their PHI that shall require Business Associate ’s participation, after which the Business Associate shall provide access to or deliver such information as follows: 1. The Parties understand that if either Party receives a request for access to or copies of PHI from an Individual which the Party may complete with only its own onsite information, the time for such response shall be thirty (30) days, with notification to the Covered Entity upon completion. 2. If Covered Entity does not have the requested PHI onsite and directs Business Associate to provide access to or a copy of his/her PHI directly to the Individual, the Business Associate shall have sixty (60) days from the date of the Individual’s request to provide access to PHI or deliver a copy of such information to the Individual. The Business Associate shall notify the Covered Entity when it completes the response. 3. If the Covered Entity receives a request and requires information from the Business Associate in addition to the Covered Entity ’s onsite information to fulfill the request, the Business Associate shall have thirty (30) days from date of Covered Entity ’s notice to provide access or deliver such information to the Covered Entity so that the Covered Entity may timely respond to the Individual within the sixty (60) day requirement of 45 CFR § 164.524. 4. If the Party designated above responding to the Individual’s request is unable to complete the response to the request in the time provided, that Party shall provide the Individual with a written statement of the reasons for the delay and the date by which the Party will complete its action on the request. The Party may extend the response time once for no more than thirty (30) additional days. H. Individuals’ Request to Amend PHI. If Business Associate receives PHI from Covered Entity in a Designated Record Set, Business Associate agrees to make any amendments to PHI in a Designated Record Set that Covered Entity directs or agrees to pursuant to 45 CFR § 164.526, regarding an Individual’s request to amend PHI. The Business Associate shall make the amendment promptly in the time and manner designated by Covered Entity , but shall have thirty (30) days notice from Covered Entity to complete the amendment to the Individual’s PHI and to notify the Covered Entity upon completion. I. Recording of Designated Disclosures of PHI. Business Associate agrees to document disclosures of PHI and information related to such disclosures as would be required for Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 CFR § 164.528. J. Accounting for Disclosures of PHI. The Business Associate agrees to provide to Covered Entity or to an Individual, in time and manner designated by Covered Entity , information collected in accordance with this Agreement, to permit Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 CFR § 164.528. The Covered Entity shall forward the Individual’s request requiring the participation of the Business Associate to the Business Associate in a timely manner, after which the Business Associate shall provide such information as follows: 1. If Covered Entity directs Business Associate to provide accounting of disclosures of the Individual’s PHI directly to the Individual, the Business Associate shall have sixty (60) days from the date of the Individual’s request to provide access to or deliver such information to the Individual. The Covered Entity shall provide notice to the Business Associate in time to allow the Business Associate a minimum of thirty (30) days to timely complete the Individual’s request. 2. If the Covered Entity elects to provide the accounting to the Individual, the Business Associate shall have thirty (30) days from date of Covered Entity ’s notice of request to provide information for the Accounting to the Covered Entity so that the Covered Entity may timely respond to the Individual within the sixty (60) day period. 3. If either of the Parties is unable to complete the response to the request in the times provided above, that Party shall notify the Individual with a written statement of the reasons for the delay and the date by which the Party will complete its action on the request. The Parties may extend the response time once for no more than thirty (30) additional days. 4. The accounting of disclosures shall include at least the following information: (i) date of the disclosure; (ii) name of the third party to whom the PHI was disclosed, (iii) if known, the address of the third party; (iv) brief description of the disclosed information; and (v) brief explanation of the purpose and basis for such disclosure. 5. The Parties shall provide one (1) accounting in any twelve (12) months to the Individual without charge. The Parties may charge a reasonable, cost-based fee, for each subsequent request for an accounting by the same Individual if he/she is provided notice and the opportunity to modify his/her request. Such charges shall not exceed any applicable State statutes or rules. K. Minimum Necessary. Business Associate agrees it must use reasonable efforts to limit any use, disclosure, or request for use or disclosure of PHI to the minimum amount necessary to accomplish the intended purpose of the use, disclosure, or request in accordance with the requirements of the Privacy Rule. 1. Business Associate represents to Covered Entity that all its uses and disclosures of, or requests for, PHI shall be the minimum necessary in accordance with the Privacy Rule requirements. 2. Covered Entity may, pursuant to the Privacy Rule, reasonably rely on any requested disclosure as the minimum necessary for the stated purpose when the information is requested by Business Associate . 3. Business Associate agrees to adequately and properly maintain all PHI received from, or created or received on behalf of, Covered Entity L. Privacy Compliance Review upon Request. Business Associate agrees to make its internal practices, books and records, including policies, procedures, and PHI, relating to the use and disclosure of PHI received from, created by or received by Business Associate on behalf of Covered Entity available to the Covered Entity or to the Secretary of the United States Department of Health in Human Services or the Secretary’s designee, in a time and manner designated by the requester, for purposes of determining Covered Entity ’s or Business Associate ’s compliance with the Privacy Rule. M. Cooperation in Privacy Compliance. Business Associate agrees to fully cooperate in good faith and to assist Covered Entity in complying with the requirements of the Privacy Rule. 7. Obligations and Activities of Business Associate (Security Rule) A. Compliance with Security Rule. Business Associate agrees to fully comply with the requirements under the Security Rule applicable to Business Associate s, as that term is defined in the Security Rule. In case of any conflict between this Agreement and Service Agreements, this Agreement shall govern. B. Security Safeguards and Policies. Business Associate agrees to implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the electronic PHI that it creates, receives, maintains, or transmits on behalf of the Covered Entity as required by the Security Rule. This includes specifically, but is not limited to, the utilization of technology commercially available at the time to the Business Associate to protect the Covered Entity ’s PHI against any reasonably anticipated threats or hazards. The Business Associate understands that it has an affirmative duty to perform a regular review or assessment of security risks, conduct active risk management and supply best efforts to assure that only authorized persons and devices access its computing systems and information storage, and that only authorized transactions are allowed. The Business Associate will maintain appropriate documentation of its compliance with the Security Rule. C. Security Provisions in Business Associate Contracts. Business Associate shall ensure that any agent, including a subcontractor, to whom it provides electronic PHI received from, maintained, or created for Covered Entity or that carries out any duties for the Business Associate involving the use, custody, disclosure, creation of, or access to PHI supplied by Covered Entity , shall execute a bilateral contract (or the appropriate equivalent if the agent is a government entity) with Business Associate , incorporating the same restrictions and conditions in this Agreement with Business Associate regarding PHI. D. __________________ (Name of State, if applicable) Consumer Notice of System Breach. Business Associate understands that the Covered Entity is an information holder ( as may be Business Associate ) under the terms of ______________ (State Code Citation if applicable) , and that in the event of a breach of the Business Associate ’s security system as defined by that statute and Section 5-B of this Agreement, the Business Associate shall indemnify and hold the Covered Entity harmless for expenses and/or damages related to the breach. Such obligation shall include, but is not limited to, the mailed notification to any _________________ (Name of State) resident whose personal information is reasonably believed to have been acquired by an unauthorized individual. In the event that the Business Associate discovers circumstances requiring notification of more than one thousand (1,000) persons at one time, the person shall also notify, without unreasonable delay, all consumer reporting agencies and credit bureaus that compile and maintain files on consumers on a nationwide basis, as defined by 15 U.S.C. § 1681a, of the timing, distribution and content of the notices. Substitute notice, as defined by _________________ (State Code Citation if applicable) , shall not be permitted except as approved in writing in advance by the Covered Entity . The parties agree that PHI includes data elements in addition to those included by personal information under _______________ (State Code Citation if applicable) , and agree that Business Associate ’s responsibilities under this paragraph shall include all PHI. E. Reporting of Security Incidents. The Business Associate shall track all security incidents as defined by HIPAA and shall periodically report such security incidents in summary fashion as may be requested by the Covered Entity , but not less than annually within sixty (60) days of the anniversary of this Agreement. The Covered Entity shall not consider as security incidents, for the purpose of reporting, external activities (port enumeration, etc.) typically associated with the footprinting of a computing environment as long as such activities have only identified but not compromised the logical network perimeter, including but not limited to externally facing firewalls and web servers. The Business Associate shall reasonably use its own vulnerability assessment of damage potential and monitoring to define levels of Security Incidents and responses for Business Associate ’s operations. However, the Business Associate shall expediently notify the Covered Entity ’s Privacy Officer of any Security Incident which would constitute a Security Event as defined by this Agreement, including any breach of the security of the system under _________________ (State Code Citation if applicable) , within Forty-Eight (48) hours or no more than Two Business Days of any unauthorized acquisition including but not limited to use, disclosure, modification, or destruction of PHI by an employee or otherwise authorized user of its system of which it becomes aware. The Business Associate shall likewise notify the Covered Entity within Forty-Eight (48) hours or no more than Two Business Days of event. Business Associate shall identify in writing key contact persons for administration, data processing, Marketing, Information Systems and Audit Reporting within thirty (30) days of execution of this Agreement. Business Associate shall notify Covered Entity of any reduction of in-house staff persons during the term of this Agreement in writing within ten (10) business days. F. Contact for Security Event Notice. Notification for the purposes of Sections 6- E, 7-D and 7-E shall be in writing made by certified mail or overnight parcel within Forty- Eight (48) hours or no more than Two Business Days of the event, with supplemental notification by facsimile and/or telephone as soon as practicable, to: ____________________________ Privacy Officer ____________________________ Bureau of Covered Entity ____________________________ Street Address or P.O. Box No. ____________________________ City, State, Zip Code G. Security Compliance Review upon Request. Business Associate agrees to make its internal practices, books, and records, including policies and procedures relating to the security of electronic PHI received from, created by or received by Business Associate on behalf of Covered Entity , available to the Covered Entity or to the Secretary of the United States Department of Health in Human Services or the Secretary’s designee, in a time and manner designated by the requester, for purposes of determining Covered Entity ’s or Business Associate ’s compliance with the Security Rule. H. Cooperation in Security Compliance. Business Associate agrees to fully cooperate in good faith and to assist Covered Entity in complying with the requirements of the Security Rule. 8. Permitted Uses and Disclosures by Business Associate A. Use of PHI for Operations on Behalf of Covered Entity. Except as otherwise limited in this Agreement, Business Associate may use or disclose PHI to perform functions, activities, or services (i.e., treatment, payment or health care operations) for, or on behalf of, Covered Entity as specified in Service Agreements, provided that such use or disclosure would not violate the Privacy and Security Rule, if done by Covered Entity . B. Other Uses of PHI. Except as otherwise limited in this Agreement, Business Associate may use PHI within its workforce as required for Business Associate 's proper management and administration, not to include Marketing or Commercial Use, or to carry out the legal responsibilities of the Business Associate . C. Third Party Disclosure Confidentiality. Except as otherwise limited in this Agreement, Business Associate may disclose PHI for the proper management and administration of the Business Associate , provided that disclosures are Required By Law, or, if permitted by law, this Agreement, and the Service Agreement, provided that, if Business Associate discloses any PHI to a third party for such a purpose, Business Associate shall enter into a written agreement with such third party requiring the third party to: (i) maintain the confidentiality, integrity, and availability of PHI and not to use or further disclose such information except as Required By Law or for the purpose for which it was disclosed, and (ii) notify Business Associate of any instances in which it becomes aware in which the confidentiality, integrity, and/or availability of the PHI is breached within Forty-Eight (48) hours or no more than Two Business Days of event. D. Data Aggregation Services. Except as otherwise limited in this Agreement, Business Associate may use PHI to provide Data Aggregation Services to Covered Entity as permitted by 45 CFR § 164.504(e)(2)(i)(B). E. Other Uses Strictly Limited . Nothing in this Agreement shall permit the Business Associate to share PHI with Business Associate ’s affiliates or contractors except for the purposes of the Service Agreement(s) between the Covered Entity and Business Associate (s) identified in the L ist of Agreements Affected by this HIPAA Business Associate Agreement in Exhibit A attached hereto. F. Covered Entity Authorization for Additional Uses . Any use of PHI or other confidential Covered Entity information by Business Associate , its affiliate or Contractor, other than those purposes of this Agreement, shall require express written authorization by the Covered Entity , and a Business Associate agreement or amendment as necessary. Activities which are prohibited include, but not are not limited to, Marketing, as defined by 45 CFR § 164.503 or the sharing for Commercial Use or any purpose construed by Covered Entity as Marketing or Commercial use of Covered Entity enrollee personal or financial information with affiliates, even if such sharing would be permitted by federal or state laws. G. Prohibition of Offshore Disclosure. Nothing in this Agreement shall permit the Business Associate to share, use or disclose PHI in any form via any medium with any third party beyond the boundaries and jurisdiction of the United States without express written authorization from the Covered Entity . H. Data Use Agreement - Use and Disclosure of Limited Data Set. Business Associate may use and disclose a Limited Data Set that Business Associate creates for Research, public health activity, or Health Care Operations, provided that Business Associate complies with the obligations below. Business Associate may not make such use and disclosure of the Limited Data Set after any cancellation, termination, expiration, or other conclusion of this Agreement. I. Limitation on Permitted Uses and Disclosures. Business Associate will limit the uses and disclosures it makes of the Limited Data Set to the following: Research, public health activity, or Health Care Operations, to the extent such activities are related to covered functions , including business planning and development such as conducting cost-management and planning-related analysis related to managing and operating Business Associate s functions, formulary development and administration, development and improvement of methods of payment or coverage policies, customer service, including the provision of data analysis for policy holders, plan sponsors, or other customers, to the extent such activities are related to covered functions, provided that PHI is not disclosed and disclosure is not prohibited pursuant to any other provisions in this Agreement related to Marketing or Commercial use. 9. Obligations of Covered Entity A. Notice of Privacy Practices. Covered Entity shall provide Business Associate with the notice of Privacy Practices produced by Covered Entity in accordance with 45 CFR § 164.520, as well as any changes to such notice. B. Notice of Changes in Individual’s Access or PHI. Covered Entity shall provide Business Associate with any changes in, or revocation of, permission by an Individual to use or disclose PHI, if such changes affect Business Associate ’s permitted or required uses. C. Notice of Restriction in Individual’s Access or PHI. Covered Entity shall notify Business Associate of any restriction to the use or disclosure of PHI that Covered Entity has agreed to in accordance with 45 CFR § 164.522, to the extent that such restriction may affect Business Associate 's use of PHI. D. Reciprocity for Requests Received by Business Associate. The Parties agree that this Section 9 is reciprocal to the extent Business Associate is notified or receives an inquiry from any individual within Covered Entity ’s covered population. 10. Permissible Requests by Covered Entity Requests Permissible under HIPAA. Covered Entity shall not request Business Associate to use or disclose PHI in any manner that would not be permissible under the Privacy or Security Rule. 11. Term and Termination A. This Agreement shall be effective as of the date on which it has been signed by both parties and shall terminate when all PHI which has been provided, regardless of form, by Covered Entity to Business Associate , or created or received by Business Associate on behalf of Covered Entity , is destroyed or returned to Covered Entity , or, if the Parties agree that it is unfeasible to return or destroy PHI, Subsection C-5 below shall apply. B. Termination for Cause. This Agreement authorizes and Business Associate acknowledges and agrees Covered Entity shall have the right to immediately terminate this Agreement and Service Agreement in the event Business Associate fails to comply with, or violates a material provision of this Agreement and any provision of the Privacy and Security Rules. 1. Upon Covered Entity ’s knowledge of a material breach by Business Associate , Covered Entity shall either: a. Provide notice of breach and an opportunity for Business Associate to reasonably and promptly cure the breach or end the violation, and terminate this BAA if Business Associate does not cure the breach or end the violation within the reasonable time specified by Covered Entity ; or b. Immediately terminate this BAA if Business Associate has breached a material term of this BAA and cure is not possible; or c. If termination, cure, or end of violation is not feasible, Covered Entity shall report the violation to the Secretary. C. Effect of Termination. Upon termination of this Agreement for any reason, except as provided in Subsections C-2 and C-5 below, Business Associate shall at its own expense either return and/or destroy all PHI and other confidential information received, from Covered Entity or created or received by Business Associate on behalf of Covered Entity . This provision applies to all confidential information regardless of form, including but not limited to electronic or paper format. This provision shall also apply to PHI and other confidential information in the possession of sub-contractors or agents of Business Associate . 1. The Business Associate shall consult with the Covered Entity as necessary to assure an appropriate means of return and/or destruction and shall notify the Covered Entity in writing when such destruction is complete. If information is to be returned, the Parties shall document when all information has been received by the Covered Entity . 2. This provision ( Section 11-C and its subsections) shall not prohibit the retention of a single separate, archived file of the PHI and other confidential Covered Entity information by the Business Associate if the method of such archiving reasonably protects the continued privacy and security of such information and the Business Associate obtains written approval at such time from the Covered Entity . Otherwise, neither the Business Associate nor its subcontractors and agents shall retain copies of Covered Entity confidential information, including enrollee PHI, except as provided herein in Subsection C-5 . 3. The Parties agree to anticipate the return and/or the destruction of PHI and other Covered Entity confidential information, and understand that removal of the confidential information from Business Associate ’s information system(s) and premises will be expected in almost all circumstances. The Business Associate shall notify the Covered Entity whether it intends to return and/or destroy the confidential with such additional detail as requested. In the event Business Associate determines that returning or destroying the PHI and other confidential information received by or created for the Covered Entity at the end or other termination of the Service Agreement is not feasible, Business Associate shall provide to Covered Entity notification of the conditions that make return or destruction unfeasible. 4. Except for Business Associate Agreements in effect prior to April 21, 2005 when the Security Rule became effective, for the renewal or amendment of those same Agreements, or for other unavoidable circumstances, the Parties contemplate that PHI and other confidential information of the Covered Entity shall not be merged or aggregated with data from sources unrelated to that Agreement, or Business Associate ’s other business data, including for purposes of data backup and disaster recovery, until the parties identify the means of return or destruction of the Covered Entity data or other confidential information of the Covered Entity at the conclusion of the Service Agreement, or otherwise make an express alternate agreement consistent with the provisions of Section 11-C and its subsections. 5. Upon written mutual agreement of the Parties that return or destruction of PHI is unfeasible and upon express agreement as to the means of continued protection of the data, Business Associate shall extend the protections of this Agreement to such PHI and limit further uses and disclosures of such PHI to those purposes that make the return or destruction unfeasible, for so long as Business Associate maintains such PHI. 12. Miscellaneous A. Regulatory Reference. A reference in this Agreement to a section in the Privacy and/or Security Rule means the section as in effect or as amended. B. Amendment. The Parties agree to take such action to amend this Agreement from time to time as is necessary for Covered Entity to comply with the requirements of the Privacy and Security Rules and the Health Insurance Portability and Accountability Act, Public Law 104-191. Business Associate and Covered Entity shall comply with any amendment to the Privacy and Security Rules, the Health Insurance Portability and Accountability Act, Public Law 104-191, and related regulations upon the effective date of such amendment, regardless of whether this Agreement has been formally amended. C. Survival. The respective rights and obligations of Business Associate under Section 11-C of this Agreement shall survive the termination of this Agreement. D. Interpretation. Any ambiguity in this Agreement shall be resolved in favor of a meaning that permits Covered Entity and the Business Associate to comply with the Privacy and Security Rules. E. Notices and Communications. All instructions, notices, consents, demands, or other communications required or contemplated by this Agreement shall be in writing and shall be delivered by hand, by facsimile transmission, by overnight courier service, or by first class mail, postage prepaid, addressed to the respective party at the facsimile number, or address as may be hereafter specified by written notice. (For purposes of this section, effective notice to Respective Party is not dependent on whether the person named below remains employed by such Party.) The Parties agree to use their best efforts to immediately notify the other Party of changes in address, telephone number, fax numbers and to promptly supplement this Agreement as necessary with corrected information . Notifications relative to Sections 6-E, 7-D and 7-E of this Agreement must be reported to the Privacy Officer pursuant to Section 7-F. F. Covered Entity ______________________ (Name of Contact Person) Department of __________________ (Name of Department) Bureau of __________________ (Covered Entity) ________________________________ (Street Address or Post Office Box No.) ________________________________ (City, State, Zip Code) ______________________ (Phone Number) ______________________ (Fax Number) Business Associate : ______________________ (Name of Contact Person) Department of ___________________ (Name of Department) ______________________________ (Street Address or Post Office Box No.) __________________________ (City, State, Zip Code) _____________________ (Phone Number) _____________________ (Fax Number) All instructions, notices, consents, demands, or other communications shall be considered effectively given as of the date of hand delivery; as of the date specified for overnight courier service delivery; as of three (3) business days after the date of mailing; or on the day the facsimile transmission is received mechanically by the facsimile machine at the receiving location and receipt is verbally confirmed by the sender. G. Strict Compliance. No failure by any Party to insist upon strict compliance with any term or provision of this Agreement, to exercise any option, to enforce any right, or to seek any remedy upon any default of any other Party shall affect, or constitute a waiver of, any Party's right to insist upon such strict compliance, exercise that option, enforce that right, or seek that remedy with respect to that default or any prior, contemporaneous, or subsequent default. No custom or practice of the Parties at variance with any provision of this Agreement shall affect, or constitute a waiver of, any Party's right to demand strict compliance with all provisions of this Agreement. H. Severability . With respect to any provision of this Agreement finally determined by a court of competent jurisdiction to be unenforceable, such court shall have jurisdiction to reform such provision so that it is enforceable to the maximum extent permitted by applicable law, and the Parties shall abide by such court's determination. In the event that any provision of this Agreement cannot be reformed, such provision shall be deemed to be severed from this Agreement, but every other provision of this Agreement shall remain in full force and effect. I. Governing Law. This Agreement shall be governed by and construed in accordance with the laws of the State of ________________ (Name of State) except to the extent that _________________ (Name of State) law has been pre-empted by HIPAA and without giving effect to principles of conflicts of law. Jurisdiction shall be ______________________________ (Name of County, City, State) , for purposes of any litigation resulting from disagreements of the parties for purpose of this Agreement and the Service Agreement(s). J. Compensation. There shall be no remuneration for performance under this Agreement except as specifically provided by, in, and through, existing administrative requirements of ___________________ (Name of State) State government and Services Agreement(s) referenced herein. Witness our signatures this ________________ (date) . __________________________ ____________________________ (Name of Covered Entity) (Name of Business Associate) By: _____________________________ ________________________________ ________________________ ___________________________ (Printed Name & Signature) (Printed Name & Signature) ________________________ ___________________________ (Office or Department) (Name of Corporate Office)

Useful advice on preparing your ‘Hippa Business Agreement’ online

Are you fed up with the inconvenience of dealing with paperwork? Look no further than airSlate SignNow, the ultimate electronic signature tool for individuals and small to medium-sized businesses. Wave goodbye to the time-consuming routine of printing and scanning documents. With airSlate SignNow, you can effortlessly complete and sign documents online. Utilize the extensive features embedded in this user-friendly and cost-effective platform and transform your document management process. Whether you need to authorize forms or gather electronic signatures, airSlate SignNow manages everything smoothly, with just a few clicks.

Follow this detailed guide:

  1. Log in to your account or sign up for a free trial with our service.
  2. Click +Create to upload a document from your device, cloud storage, or our form library.
  3. Open your ‘Hippa Business Agreement’ in the editor.
  4. Click Me (Fill Out Now) to complete the form on your end.
  5. Add and assign fillable fields for others (if necessary).
  6. Proceed with the Send Invite options to request eSignatures from others.
  7. Download, print your copy, or convert it into a reusable template.

No need to worry if you need to work with others on your Hippa Business Agreement or send it for notarization—our solution has everything you require to complete those tasks. Join airSlate SignNow today and take your document management to new heights!

Here is a list of the most common customer questions. If you can’t find an answer to your question, please don’t hesitate to reach out to us.

Need help? Contact Support
Hipaa business agreement template
Hipaa business agreement pdf
Hipaa business agreement template word
HIPAA Business Associate Agreement PDF
Business Associate Agreement HIPAA
Hipaa business agreement sample
Hipaa business agreement example
Hipaa business agreement template free
Hipaa business agreement template
Hipaa business agreement pdf
Hipaa business agreement template word
Business Associate Agreement Template

The best way to complete and sign your hippa business agreement form

Save time on document management with airSlate SignNow and get your hippa business agreement form eSigned quickly from anywhere with our fully compliant eSignature tool.

How to Sign a PDF Online How to Sign a PDF Online

How to complete and sign forms online

In the past, coping with paperwork took pretty much time and effort. But with airSlate SignNow, document management is quick and easy. Our robust and easy-to-use eSignature solution allows you to effortlessly complete and eSign your hippa business agreement form online from any internet-connected device.

Follow the step-by-step guide to eSign your hippa business agreement form template online:

  • 1.Register for a free trial with airSlate SignNow or log in to your account with password credentials or SSO authorization option.
  • 2.Click Upload or Create and add a form for eSigning from your device, the cloud, or our form catalogue.
  • 3.Click on the document name to open it in the editor and use the left-side toolbar to complete all the blank areas properly.
  • 4.Drop the My Signature field where you need to eSign your form. Provide your name, draw, or upload a picture of your regular signature.
  • 5.Click Save and Close to accomplish editing your completed document.

After your hippa business agreement form template is ready, download it to your device, export it to the cloud, or invite other parties to eSign it. With airSlate SignNow, the eSigning process only requires a couple of clicks. Use our powerful eSignature tool wherever you are to deal with your paperwork effectively!

How to Sign a PDF Using Google Chrome How to Sign a PDF Using Google Chrome

How to complete and sign paperwork in Google Chrome

Completing and signing paperwork is simple with the airSlate SignNow extension for Google Chrome. Adding it to your browser is a quick and beneficial way to manage your forms online. Sign your hippa business agreement form sample with a legally-binding electronic signature in just a couple of clicks without switching between applications and tabs.

Follow the step-by-step guide to eSign your hippa business agreement form in Google Chrome:

  • 1.Navigate to the Chrome Web Store, locate the airSlate SignNow extension for Chrome, and install it to your browser.
  • 2.Right-click on the link to a form you need to approve and choose Open in airSlate SignNow.
  • 3.Log in to your account with your credentials or Google/Facebook sign-in buttons. If you don’t have one, you can start a free trial.
  • 4.Use the Edit & Sign toolbar on the left to complete your sample, then drag and drop the My Signature field.
  • 5.Insert a picture of your handwritten signature, draw it, or simply enter your full name to eSign.
  • 6.Verify all data is correct and click Save and Close to finish editing your form.

Now, you can save your hippa business agreement form sample to your device or cloud storage, email the copy to other individuals, or invite them to electronically sign your form with an email request or a secure Signing Link. The airSlate SignNow extension for Google Chrome improves your document processes with minimum time and effort. Try airSlate SignNow today!

How to Sign a PDF in Gmail How to Sign a PDF in Gmail How to Sign a PDF in Gmail

How to complete and sign documents in Gmail

When you get an email with the hippa business agreement form for signing, there’s no need to print and scan a document or download and re-upload it to another program. There’s a better solution if you use Gmail. Try the airSlate SignNow add-on to promptly eSign any paperwork right from your inbox.

Follow the step-by-step guidelines to eSign your hippa business agreement form in Gmail:

  • 1.Go to the Google Workplace Marketplace and look for a airSlate SignNow add-on for Gmail.
  • 2.Set up the tool with a related button and grant the tool access to your Google account.
  • 3.Open an email containing an attached file that needs approval and utilize the S symbol on the right sidebar to launch the add-on.
  • 4.Log in to your airSlate SignNow account. Choose Send to Sign to forward the document to other people for approval or click Upload to open it in the editor.
  • 5.Put the My Signature option where you need to eSign: type, draw, or import your signature.

This eSigning process saves time and only takes a few clicks. Take advantage of the airSlate SignNow add-on for Gmail to update your hippa business agreement form with fillable fields, sign paperwork legally, and invite other parties to eSign them al without leaving your inbox. Improve your signature workflows now!

How to Sign a PDF on a Mobile Device How to Sign a PDF on a Mobile Device How to Sign a PDF on a Mobile Device

How to complete and sign paperwork in a mobile browser

Need to quickly submit and sign your hippa business agreement form on a smartphone while doing your work on the go? airSlate SignNow can help without needing to set up extra software programs. Open our airSlate SignNow solution from any browser on your mobile device and add legally-binding eSignatures on the go, 24/7.

Follow the step-by-step guidelines to eSign your hippa business agreement form in a browser:

  • 1.Open any browser on your device and follow the link www.signnow.com
  • 2.Sign up for an account with a free trial or log in with your password credentials or SSO authentication.
  • 3.Click Upload or Create and import a file that needs to be completed from a cloud, your device, or our form library with ready-to go templates.
  • 4.Open the form and fill out the empty fields with tools from Edit & Sign menu on the left.
  • 5.Put the My Signature area to the form, then enter your name, draw, or upload your signature.

In a few simple clicks, your hippa business agreement form is completed from wherever you are. When you're finished editing, you can save the document on your device, create a reusable template for it, email it to other individuals, or invite them eSign it. Make your paperwork on the go fast and effective with airSlate SignNow!

How to Sign a PDF on iPhone How to Sign a PDF on iPhone

How to complete and sign forms on iOS

In today’s business world, tasks must be completed quickly even when you’re away from your computer. Using the airSlate SignNow application, you can organize your paperwork and approve your hippa business agreement form with a legally-binding eSignature right on your iPhone or iPad. Set it up on your device to conclude agreements and manage forms from anywhere 24/7.

Follow the step-by-step guidelines to eSign your hippa business agreement form on iOS devices:

  • 1.Go to the App Store, find the airSlate SignNow app by airSlate, and set it up on your device.
  • 2.Open the application, tap Create to import a template, and choose Myself.
  • 3.Opt for Signature at the bottom toolbar and simply draw your signature with a finger or stylus to eSign the form.
  • 4.Tap Done -> Save right after signing the sample.
  • 5.Tap Save or utilize the Make Template option to re-use this document in the future.

This method is so straightforward your hippa business agreement form is completed and signed in a few taps. The airSlate SignNow application works in the cloud so all the forms on your mobile device are kept in your account and are available any time you need them. Use airSlate SignNow for iOS to enhance your document management and eSignature workflows!

How to Sign a PDF on Android How to Sign a PDF on Android

How to complete and sign documents on Android

With airSlate SignNow, it’s simple to sign your hippa business agreement form on the go. Install its mobile app for Android OS on your device and start boosting eSignature workflows right on your smartphone or tablet.

Follow the step-by-step guide to eSign your hippa business agreement form on Android:

  • 1.Open Google Play, find the airSlate SignNow application from airSlate, and install it on your device.
  • 2.Log in to your account or create it with a free trial, then add a file with a ➕ button on the bottom of you screen.
  • 3.Tap on the imported file and choose Open in Editor from the dropdown menu.
  • 4.Tap on Tools tab -> Signature, then draw or type your name to eSign the template. Fill out blank fields with other tools on the bottom if necessary.
  • 5.Use the ✔ key, then tap on the Save option to end up with editing.

With a user-friendly interface and total compliance with main eSignature standards, the airSlate SignNow app is the perfect tool for signing your hippa business agreement form. It even operates offline and updates all form modifications when your internet connection is restored and the tool is synced. Complete and eSign forms, send them for eSigning, and create multi-usable templates whenever you need and from anywhere with airSlate SignNow.

Sign up and try Hippa business agreement form
  • Close deals faster
  • Improve productivity
  • Delight customers
  • Increase revenue
  • Save time & money
  • Reduce payment cycles