Awareness article
Covered Entity vs. Business Associate
How to tell whether your clinic is the covered entity, when a vendor becomes a business associate, and why the distinction matters operationally.
The distinction matters because it changes what the clinic must do before work begins.
What a covered entity is in practice
For most readers of this site, the covered entity is the clinic itself. The clinic controls patient relationships, treatment operations, and the use of PHI in the normal course of care delivery.
What makes a vendor a business associate
A vendor becomes a business associate when it creates, receives, maintains, or transmits PHI for the clinic as part of providing a service. The test is functional. It does not matter whether the vendor calls itself a project manager, a storage company, an IT consultant, or a workflow platform.
Why small clinics get confused
Vendors often market “HIPAA-ready” or “secure” plans without clearly stating whether a BAA is available, on which tier, and under what operating assumptions. That leaves clinics comparing general security language instead of answering the real question: does this vendor take on business associate obligations for the workflow we want to run?
The practical workflow
Before PHI enters a system, the clinic should answer:
- Will this vendor handle PHI on our behalf?
- If yes, is there a signed BAA in place?
- Does the product actually support the controls we need once PHI is there?
The first two questions establish the legal relationship. The third determines whether the workflow is operationally defensible.
HIPAA Basics
Core definitions, rules, and operating concepts small clinics need before they can evaluate vendors or workflows.
7 HIPAA Compliance Requirements Small Clinics Must Address
7 HIPAA compliance requirements for small clinics: risk analysis, BAAs, audit controls, training, incident response, and more.
HIPAA-Compliant Task Management for Small Clinics
HIPAA-compliant task management for small clinics. Learn what task systems need: BAAs, audit controls, access limits, and safer workflows.
Sources