Pursuant to 45 CFR Parts 160 and 164
Business Associate Agreement
Version 2026-04-21-v1 · Last updated: April 21, 2026
This Business Associate Agreement ("Agreement") is entered into between Simplest Healthcare Inc., operating as CoralEHR ("Business Associate"), and the healthcare provider or practice engaging CoralEHR's services ("Covered Entity" or "Practice"). It is executed pursuant to the Health Insurance Portability and Accountability Act of 1996, as amended ("HIPAA"), the Health Information Technology for Economic and Clinical Health Act ("HITECH"), and their implementing regulations at 45 CFR Parts 160 and 164 (collectively, the "HIPAA Rules").
The content below is the current standard form of CoralEHR's BAA. A countersigned PDF with the Covered Entity's name, address, effective date, and authorized signatories is provided before any Protected Health Information is created, received, maintained, or transmitted on the Practice's behalf.
What this BAA commits CoralEHR to
- ✓ Use PHI only to operate the CoralEHR services described here — never for marketing, sale, or underwriting
- ✓ Host PHI exclusively on HIPAA-eligible AWS infrastructure with an active AWS BAA
- ✓ Encrypt ePHI AES-256 at rest and TLS 1.2+ in transit, with mandatory MFA for all clinician accounts
- ✓ Report confirmed Breaches of Unsecured PHI without unreasonable delay, and in no case later than 30 calendar days after discovery
- ✓ Bind every Subcontractor that touches PHI to the same restrictions we agree to with you
1 Purpose
Covered Entity engages Business Associate to provide cloud-based electronic health record (EHR) services, including clinical documentation, patient management, assessment administration, treatment planning, billing facilitation, and related functionality (the "Services"). In connection with the Services, Business Associate may create, receive, maintain, or transmit Protected Health Information ("PHI") on behalf of Covered Entity.
This Agreement sets forth the terms and conditions under which Business Associate will handle PHI in compliance with the HIPAA Rules.
2 Definitions
Capitalized terms used in this Agreement and not otherwise defined shall have the meanings ascribed to them under the HIPAA Rules. Key definitions include:
- • Protected Health Information (PHI) — Individually identifiable health information transmitted or maintained in any form, as defined in 45 CFR § 160.103.
- • Electronic Protected Health Information (ePHI) — PHI transmitted or maintained in electronic media, as defined in 45 CFR § 160.103.
- • Breach — The acquisition, access, use, or disclosure of PHI in a manner not permitted by the Privacy Rule that compromises the security or privacy of such information, as defined in 45 CFR § 164.402.
- • Security Incident — The attempted or successful unauthorized access, use, disclosure, modification, or destruction of ePHI, or interference with system operations, as defined in 45 CFR § 164.304.
- • Designated Record Set — A group of records maintained by or for a Covered Entity, as defined in 45 CFR § 164.501.
- • Subcontractor — A person or entity to whom Business Associate delegates a function, activity, or service involving PHI.
- • Individual — The person who is the subject of the PHI, as defined in 45 CFR § 160.103.
3 Obligations of Business Associate
3.1 HIPAA Compliance
Business Associate shall comply with all provisions of the HIPAA Rules and HITECH that are made applicable to business associates, including 45 CFR §§ 164.502, 164.504, 164.308, 164.310, 164.312, 164.314, 164.316, 164.402, and 164.410.
3.2 Permitted Uses and Disclosures
Business Associate shall not use or further disclose PHI other than as permitted or required by this Agreement or as required by law. Business Associate shall use PHI solely to provide the Services described herein, including:
- • Hosting, storing, and processing clinical records in FHIR R4-compliant data stores
- • Enabling clinical note creation, assessment administration, and treatment plan management
- • Facilitating secure clinician authentication and access control
- • Processing de-identified billing metadata (no PHI is transmitted to payment processors)
3.3 Safeguards
Business Associate shall implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of ePHI in accordance with 45 CFR Part 164, Subpart C. These include, but are not limited to:
Administrative
- • Designated security officer
- • Role-based access controls
- • Workforce security training
- • Annual policy review
Technical
- • AES-256 encryption at rest
- • TLS 1.2+ in transit
- • MFA for all clinicians
- • Audit logging of ePHI access
Physical
- • HIPAA-eligible AWS services
- • Active BAA with AWS
- • SOC 2 Type II infrastructure
- • No PHI on local endpoints
3.4 Minimum Necessary Standard
Business Associate shall limit its use, disclosure, and requests for PHI to the minimum necessary to accomplish the intended purpose, in accordance with 45 CFR § 164.502(b) and § 164.514(d).
3.5 Mitigation
Business Associate shall mitigate, to the extent practicable, any harmful effect known to Business Associate of a use or disclosure of PHI by Business Associate or its Subcontractors in violation of this Agreement or the HIPAA Rules.
3.6 Breach and Incident Reporting
Business Associate shall report to Covered Entity:
- • Any successful Security Incident involving ePHI, or any use or disclosure of PHI not provided for by this Agreement, of which Business Associate becomes aware, without unreasonable delay and in no case later than seventy-two (72) hours after discovery.
- • Any Breach of Unsecured PHI, without unreasonable delay and in no case later than thirty (30) calendar days after discovery, in accordance with 45 CFR § 164.410.
Breach notifications shall include, to the extent available:
- (a) The nature of the Breach or unauthorized use or disclosure
- (b) The categories and types of PHI involved
- (c) The identification of each Individual whose Unsecured PHI has been, or is reasonably believed to have been, accessed, acquired, used, or disclosed
- (d) Steps taken to mitigate harm
- (e) Corrective actions implemented or planned
Aggregated unsuccessful incidents. The Parties acknowledge that unsuccessful Security Incidents — including pings, port scans, denial-of-service attempts without impact on the availability of ePHI, and login attempts blocked by access controls — occur continuously. Business Associate shall provide a consolidated summary of such unsuccessful incidents upon Covered Entity's written request, and this paragraph shall constitute notice thereof for purposes of 45 CFR § 164.314(a)(2)(i)(C).
3.7 Subcontractors
Business Associate shall ensure that any Subcontractor that creates, receives, maintains, or transmits PHI on behalf of Business Associate agrees in writing to the same restrictions, conditions, and requirements that apply to Business Associate under this Agreement, in accordance with 45 CFR § 164.502(e)(1)(ii) and § 164.308(b)(2).
Current Subprocessors:
| Subprocessor | Services | PHI Processed | BAA Status |
|---|---|---|---|
| Amazon Web Services, Inc. | Infrastructure (HealthLake, Lambda, API Gateway, Cognito, S3, DynamoDB, SES) | Yes | Active |
| Stripe, Inc. | Payment processing | No (de-identified UUIDs only) | N/A |
| Anthropic, PBC | AI-assisted clinical features (opt-in per Practice) | Configurable | Required before enablement |
AI-assisted clinical features are disabled by default. Business Associate will not enable them for Covered Entity's tenant until an executed BAA with Anthropic, PBC (with Zero-Data-Retention configuration) covers that workload. Business Associate shall notify Covered Entity of any material changes to its Subprocessors at least thirty (30) days prior to the change.
3.8 Access to PHI
Business Associate shall make available PHI in a Designated Record Set to Covered Entity, or at the direction of Covered Entity to an Individual, within fifteen (15) business days of request, to satisfy Covered Entity's obligations under 45 CFR § 164.524.
3.9 Amendment of PHI
Business Associate shall make PHI available for amendment and incorporate amendments to PHI in a Designated Record Set at the direction of Covered Entity, within fifteen (15) business days of request, in accordance with 45 CFR § 164.526.
3.10 Accounting of Disclosures
Business Associate shall make available to Covered Entity the information required to provide an accounting of disclosures in accordance with 45 CFR § 164.528, within thirty (30) days of request.
3.11 Internal Practices and Government Access
Business Associate shall make its internal practices, books, and records relating to the use and disclosure of PHI available to the Secretary of the U.S. Department of Health and Human Services (HHS) for purposes of determining compliance with the HIPAA Rules.
3.12 De-identification
Business Associate shall not de-identify PHI or create limited data sets from PHI except as expressly authorized in writing by Covered Entity, and only in accordance with 45 CFR § 164.514.
4 Obligations of Covered Entity
4.1 Notice of Privacy Practices
Covered Entity shall notify Business Associate of any limitations in its Notice of Privacy Practices under 45 CFR § 164.520, to the extent such limitations may affect Business Associate's use or disclosure of PHI.
4.2 Permission Changes
Covered Entity shall notify Business Associate of any changes in, or revocation of, the permission by an Individual to use or disclose PHI, to the extent such changes may affect Business Associate's permitted use or disclosure of PHI.
4.3 Restrictions on Use or Disclosure
Covered Entity shall notify Business Associate of any restriction on the use or disclosure of PHI to which Covered Entity has agreed in accordance with 45 CFR § 164.522, to the extent such restriction may affect Business Associate's use or disclosure of PHI.
4.4 Permissible Requests
Covered Entity shall not request Business Associate to use or disclose PHI in any manner that would not be permissible under the HIPAA Rules if done by Covered Entity, except to the limited extent permitted under 45 CFR § 164.504(e)(4).
5 Permitted Uses and Disclosures by Business Associate
5.1 Service Performance
Business Associate may use or disclose PHI as necessary to perform the Services set forth in this Agreement or any underlying service agreement between the Parties.
5.2 Management and Administration
Business Associate may use PHI for its proper management and administration or to carry out its legal responsibilities, provided that any disclosure for such purpose is:
- (a) Required by law; or
- (b) Made after Business Associate obtains reasonable written assurances from the recipient that the PHI will be held confidentially and used or further disclosed only as required by law or for the purposes for which it was disclosed, and the recipient will notify Business Associate of any Breach of which it becomes aware.
5.3 Data Aggregation
Business Associate may use PHI to provide data aggregation services relating to the healthcare operations of Covered Entity, as permitted by 45 CFR § 164.504(e)(2)(i)(B).
5.4 Prohibited Uses
Business Associate shall not:
- • Use or disclose PHI for marketing purposes without a written authorization from the Individual that complies with 45 CFR § 164.508
- • Sell PHI, as defined in 45 CFR § 164.502(a)(5)(ii)
- • Use or disclose genetic information for underwriting purposes, in accordance with the Genetic Information Nondiscrimination Act (GINA) and 45 CFR § 164.502(a)(5)(i)
- • Use PHI to train models for any customer or purpose other than Covered Entity's own operations, absent express written authorization from Covered Entity
6 Term and Termination
6.1 Term
This Agreement shall become effective on the Effective Date and shall remain in effect for the duration of the underlying service relationship between the Parties, unless earlier terminated in accordance with this Section.
6.2 Termination for Cause
Either Party may terminate this Agreement if it determines that the other Party has materially breached this Agreement, provided that:
- (a) The non-breaching Party provides written notice of the breach to the breaching Party;
- (b) The breaching Party is given thirty (30) calendar days to cure the breach;
- (c) If the breach is not cured within the cure period, the non-breaching Party may terminate this Agreement immediately upon written notice.
If cure is not feasible, the non-breaching Party may terminate this Agreement immediately upon written notice.
6.3 Effect of Termination
Upon termination of this Agreement for any reason, Business Associate shall:
- (a) Return to Covered Entity or destroy all PHI received from Covered Entity, or created, maintained, or received by Business Associate on behalf of Covered Entity, within sixty (60) calendar days of termination;
- (b) Retain no copies of such PHI, except as required by law;
- (c) Provide written certification of destruction to Covered Entity upon request.
If return or destruction of PHI is not feasible, Business Associate shall:
- (a) Notify Covered Entity in writing of the conditions that make return or destruction infeasible;
- (b) Extend the protections of this Agreement to such retained PHI;
- (c) Limit further uses and disclosures to those purposes that make return or destruction infeasible, for so long as the PHI is retained.
7 CoralEHR Technical Security Specifications
7.1 Infrastructure
All ePHI is processed and stored within HIPAA-eligible AWS services in the US-East-2 (Ohio) region. Business Associate maintains an active Business Associate Agreement with Amazon Web Services, Inc. covering all in-scope services.
7.2 Data Standards
Patient data is structured in compliance with HL7 FHIR R4 (Fast Healthcare Interoperability Resources, Release 4), ensuring standardized clinical data representation and exchange capability.
7.3 Authentication and Access Control
All users are authenticated via AWS Cognito with mandatory multi-factor authentication. Session tokens are encrypted with AES-256 and stored in session-scoped storage that is automatically cleared upon browser session termination. Role-based access control ensures clinician-only access to clinical data.
7.4 Payment Processing Isolation
Payment processing is performed by Stripe, Inc. under PCI-DSS compliance. No PHI is transmitted to Stripe — only de-identified UUIDs, invoice amounts, and transaction metadata. Raw payment card data is handled exclusively by Stripe Elements and never touches Business Associate's servers.
8 Miscellaneous
8.1 Regulatory References
A reference in this Agreement to a section in the HIPAA Rules means the section as in effect or as amended.
8.2 Amendment
The Parties agree to take such action as is necessary to amend this Agreement from time to time for compliance with the HIPAA Rules and any other applicable law.
8.3 Survival
The respective rights and obligations of Business Associate under Sections 3 and 6.3 of this Agreement shall survive the termination of this Agreement.
8.4 Interpretation
Any ambiguity in this Agreement shall be interpreted to permit compliance with the HIPAA Rules. In the event of any inconsistency between this Agreement and the underlying service agreement, this Agreement shall control to the extent necessary to comply with the HIPAA Rules.
8.5 No Third-Party Beneficiaries
Nothing express or implied in this Agreement is intended to confer, nor shall anything herein confer, upon any person other than the Parties (and their respective successors and permitted assigns) any rights, remedies, obligations, or liabilities whatsoever.
8.6 Insurance
Business Associate shall maintain commercially reasonable cyber liability and technology errors-and-omissions insurance coverage appropriate to the scope of the Services and the nature of the PHI processed under this Agreement.
8.7 Governing Law
This Agreement shall be governed by and construed in accordance with the laws of the State of California, without regard to its conflict of laws provisions, except to the extent preempted by federal law, including the HIPAA Rules.
8.8 Entire Agreement
This Agreement, together with any underlying service agreement, constitutes the entire agreement between the Parties with respect to the subject matter hereof and supersedes all prior negotiations, representations, or agreements relating thereto.
8.9 Notices
All notices required or permitted under this Agreement shall be in writing and delivered by email with read receipt or by certified mail to the addresses specified in the executed cover page. Notices to Business Associate shall be sent to support@coralehr.com with a copy to Simplest Healthcare Inc., 2261 Market Street STE 85566, San Francisco, CA 94114.
9 Execution
A countersigned PDF of this Agreement — with the Covered Entity's legal name, address, authorized signatory, and effective date filled in — is delivered to every Practice before PHI is exchanged. Request yours via the options below.
Questions about this BAA?
Our security team is happy to walk through any provision, accept redlines, or coordinate with your compliance counsel.
Simplest Healthcare Inc.
2261 Market Street STE 85566
San Francisco, CA 94114
Email: support@coralehr.com
This agreement is based on the HHS Model Business Associate Agreement and 45 CFR § 164.504(e) requirements, tailored to CoralEHR's architecture. Covered Entities are encouraged to have it reviewed by qualified legal counsel before execution.