Obi Health

Business Associate Agreement

Introducing Obi Health

Expert fertility care, local convenience

Obi’s network extends the reach of reproductive endocrinologists, so patients can get most of their care close to home and only visit harder to reach fertility clinics as needed.

Fertility clinic access

Extended access with Obi

This Business Associate Agreement (this “Agreement”) is incorporated by reference into and made a part of Obi Health, Inc.’s Terms of Use as well as any contract that references this Agreement, and is entered into by and between Obi Health, Inc., a Delaware corporation (“Obi”) and the applicable counterparty and/or user of Obi’s Services (“Customer”); provided, however, that the terms of this Agreement apply only if and solely to the extent that Obi’s performance Services meets, with respect to the Customer and the Customer’s use of Obi’s services, the definition of a Business Associate under Health Insurance Portability and Accountability Act of 1996, as amended by Subtitle D of the Health Information Technology for Economic and Clinical Health Act, Title XIII of Division A and Title IV of Division B of the American Recovery and Reinvestment Act of 2009 (Pub. L. No. 111-5) (the “HITECH Act”) and the federal regulations (“HIPAA Rules”) published at 45 CFR parts 160 and 164 (collectively, “HIPAA”), and solely with regard to PHI that the Customer provides or makes available to Obi in connection with the Services. 

1. GENERAL PROVISIONS

  1. Status of Parties Under HIPAA. The parties acknowledge and agree that Customer (“Covered Entity”) is a Covered Entity and Obi (“Company”) is a Business Associate of Covered Entity when Company creates, receives, maintains, transmits, uses or discloses Protected Health Information on behalf of Covered Entity (“PHI”).
  2. Effect. To the extent that Company receives PHI in order to perform Business Associate activities, the terms and provisions of this Addendum shall supersede any conflicting or inconsistent terms and provisions in this Agreement to the extent of such conflict or inconsistency.
  3. Defined Terms. Capitalized terms used in this Agreement (including this Addendum) without definition shall have the respective meanings assigned to such terms by the Administrative Simplification section of the Health Insurance Portability and Accountability Act of 1996, the Health Information Technology for Economic and Clinical Health Act and their implementing regulations as amended from time to time (collectively, “HIPAA”).
  4. No Third Party Beneficiaries. The parties have not created and do not intend to create by this Agreement any third party rights, including, but not limited to, third party rights for Covered Entity’s patients.
  5. HIPAA Amendments. Any future amendments to HIPAA affecting business associate agreements are hereby incorporated by reference into this Addendum as if set forth in this Addendum in their entirety, effective on the later of the effective date of this Addendum or such subsequent date as may be specified by HIPAA.
  6. Regulatory References. A reference in this Addendum to a section in HIPAA means the section as it may be amended from time to time. 
  7. Independent Contractor Status. The parties acknowledge and agree that Company is at all times acting as an independent contractor of Covered Entity and not as an agent or employee of Covered Entity under this Agreement. 

2. OBLIGATIONS OF COMPANY

  1. Use and Disclosure of PHI. Company may use and disclose PHI as permitted or required under this Agreement (including this Addendum) or as Required by Law, but shall not otherwise use or disclose any PHI. Company shall not use or disclose PHI received from Covered Entity in any manner that would constitute a violation of HIPAA if so used or disclosed by Covered Entity (except as set forth in Sections 2.1(a), (b) and (c) of this Addendum). To the extent Company carries out any of Covered Entity’s obligations under the HIPAA privacy standards, Company shall comply with the requirements of the HIPAA privacy standards that apply to Covered Entity in the performance of such obligations. Without limiting the generality of the foregoing, Company is permitted to use or disclose PHI as set forth below:
  • Company may use PHI internally for Company’s proper management and administration or to carry out its legal responsibilities; 
  • Company may disclose PHI to a third party for Company’s proper management and administration, provided that the disclosure is Required by Law or Company obtains reasonable assurances from the third party to whom the PHI is to be disclosed that the third party will (1) protect the confidentiality of the PHI, (2) only use or further disclose the PHI as Required by Law or for the purpose for which the PHI was disclosed to the third party and (3) notify Covered Entity of any instances of which the third party is aware in which the confidentiality of the PHI has been breached;
  • Company may use PHI to provide Data Aggregation services relating to the Health Care Operations of Covered Entity if required or permitted under this Agreement; and
  • Company may use PHI to create de-identified health information in accordance with the HIPAA de-identification requirements. Company may disclose de-identified health information for any purpose permitted by law.
  1. Safeguards. Company shall use appropriate safeguards to prevent the use or disclosure of PHI other than as permitted or required by this Addendum. In addition, Company shall implement Administrative Safeguards, Physical Safeguards and Technical Safeguards that reasonably and appropriately protect the Confidentiality, Integrity and Availability of PHI transmitted or maintained in Electronic Media (“EPHI”) that it creates, receives, maintains or transmits on behalf of Covered Entity. Company shall comply with the HIPAA Security Rule with respect to EPHI.
  2. Minimum Necessary Standard. To the extent required by the “minimum necessary” requirements of HIPAA, Company shall only request, use and disclose the minimum amount of PHI necessary to accomplish the purpose of the request, use or disclosure. 
  3. Mitigation. Company shall take reasonable steps to mitigate, to the extent practicable, any harmful effect (that is known to Company) of a use or disclosure of PHI by Company in violation of this Addendum.
  4. Trading Partner Agreement. Company shall not take any of the following actions: (a) change the definition, Data Condition, or use of a Data Element or Segment in a Standard, except where necessary to implement state or federal law, or to protect against fraud and abuse, (b) add any Data Elements or Segments to the maximum defined Data Set, (c) use any code or Data Elements that are either marked “not used” in the Standard’s Implementation Specification or are not in the Standard’s Implementation Specification(s), or (d) change the meaning or intent of the Standard’s Implementation Specification(s). 
  5. Subcontractors. Company shall enter into a written agreement meeting the requirements of 45 C.F.R. §§ 164.504(e) and 164.314(a)(2) with each Subcontractor (including, without limitation, a Subcontractor that is an agent under applicable law) that creates, receives, maintains or transmits PHI on behalf of Company. Company shall ensure that the written agreement with each Subcontractor obligates the Subcontractor to comply with restrictions and conditions that are at least as restrictive as the restrictions and conditions that apply to Company under this Addendum.
  6. Reporting Requirements.
  • If Company becomes aware of a use or disclosure of PHI in violation of this Agreement by Company or a third party to which Company disclosed PHI, Company shall report the use or disclosure to Covered Entity without unreasonable delay. 
  • Company shall report any Security Incident involving EPHI of which it becomes aware in the following manner: (1) any actual, successful Security Incident will be reported to Covered Entity in writing without unreasonable delay, and (2) any attempted, unsuccessful Security Incident of which Company becomes aware will be reported to Covered Entity orally or in writing on a reasonable basis, as requested by Covered Entity. If the HIPAA security regulations are amended to remove the requirement to report unsuccessful attempts at unauthorized access, the requirement hereunder to report such unsuccessful attempts will no longer apply as of the effective date of the amendment.
  • Company shall, following the discovery of a Breach of Unsecured PHI, notify Covered Entity of the Breach in accordance with 45 C.F.R. § 164.410 without unreasonable delay and in no case later than 60 days after discovery of the Breach. 
  1. Access to PHI. Within 15 business days of a written request by Covered Entity for access to PHI about an Individual contained in any Designated Record Set of Covered Entity maintained by Company, if any, Company shall make available to Covered Entity such PHI for so long as Company maintains such information in the Designated Record Set. If Company receives a request for access to PHI directly from an Individual, Company shall forward such request to Covered Entity within ten business days. Covered Entity shall have the sole responsibility to make decisions regarding whether to approve a request for access to PHI.
  2. Availability of PHI for Amendment. Within 15 business days of receipt of a written request from Covered Entity for the amendment of an Individual’s PHI contained in any Designated Record Set of Covered Entity maintained by Company, if any, Company shall provide such information to Covered Entity for amendment and incorporate any such amendments in the PHI (for so long as Company maintains such information in the Designated Record Set) as required by 45 C.F.R. § 164.526. If Company receives a request for amendment to PHI directly from an Individual, Company shall forward such request to Covered Entity within ten business days. Covered Entity shall have the sole responsibility to make decisions regarding whether to approve a request for an amendment to PHI. 
  3. Accounting of Disclosures. Within 30 business days of written notice by Covered Entity to Company that it has received a request for an accounting of disclosures of PHI (other than disclosures to which an exception to the accounting requirement applies), Company shall make available to Covered Entity such information as is in Company’s possession and is required for Covered Entity to make the accounting required by 45 C.F.R. § 164.528. If Company receives a request for an accounting directly from an Individual, Company shall forward such request to Covered Entity within ten business days. Covered Entity shall have the sole responsibility to provide an accounting of disclosures to the Individual.
  4. Availability of Books and Records. Following reasonable advance written notice, Company shall make its internal practices, books and records relating to the use and disclosure of PHI received from, or created or received by Company on behalf of, Covered Entity available to the Secretary for purposes of determining Covered Entity’s compliance with HIPAA.

3. Obligations of Covered Entity

  1. Permissible Requests. Covered Entity shall not request Company to use or disclose PHI in any manner that would not be permissible under HIPAA if done directly by Covered Entity (except as provided in Sections 2.1(a), (b) and (c) of this Addendum). 
  2. Minimum Necessary PHI. When Covered Entity discloses PHI to Company, Covered Entity shall provide the minimum amount of PHI necessary for the accomplishment of Company’s purpose. 
  3. Permissions; Restrictions. Covered Entity represents and warrants that it has obtained and will obtain any consents, authorizations and/or other legal permissions required under HIPAA and other applicable law for the disclosure of PHI to Company. Covered Entity shall notify Company of any changes in, or revocation of, the permission by an Individual to use or disclose his or her PHI, to the extent that such changes may affect Company’s use or disclosure of PHI. Covered Entity shall not agree to any restriction on the use or disclosure of PHI under 45 C.F.R. § 164.522 that restricts Company’s use or disclosure of PHI under this Agreement unless such restriction is Required By Law or Company grants its written consent, which consent shall not be unreasonably withheld.
  4. Notice of Privacy Practices. Except as Required By Law, with Company’s consent or as set forth in this Agreement, Covered Entity shall not include any limitation in the Covered Entity’s notice of privacy practices that limits Company’s use or disclosure of PHI under this Agreement.

4. Termination of this Agreement

  1. Termination Upon Breach of this Addendum. Any other provision of this Agreement notwithstanding, either party (the “Non-Breaching Party”) may terminate this Agreement upon 30 days advance written notice to the other party (the “Breaching Party”) in the event that the Breaching Party breaches this Addendum in any material respect and such breach is not cured to the reasonable satisfaction of the Non-Breaching Party within such 30-day period.
  2. Return or Destruction of PHI upon Termination. Upon expiration or earlier termination of this Agreement, Company shall either return or destroy all PHI received from Covered Entity or created or received by Company on behalf of Covered Entity and which Company still maintains in any form. Notwithstanding the foregoing, to the extent that Company reasonably determines that it is not feasible to return or destroy such PHI, the terms and provisions of this Addendum shall survive termination of this Agreement and such PHI shall be used or disclosed solely for such purpose or purposes which prevented the return or destruction of such PHI.