Avoiding HIPAA Violations When Recording Calls, Meetings, and Telehealth Sessions

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Avoiding HIPAA Violations When Recording Calls, Meetings, and Telehealth Sessions

Kevin Henry

HIPAA

September 28, 2024

7 minutes read
Share this article
Avoiding HIPAA Violations When Recording Calls, Meetings, and Telehealth Sessions

HIPAA Compliance for Recording Sessions

Any audio, video, or screen recording that can identify a patient is Protected Health Information (PHI). Treat every recording as ePHI subject to the HIPAA Privacy and Security Rules, even when you believe no PHI was discussed. Build safeguards around the entire lifecycle—creation, transmission, storage, access, sharing, and disposal.

Start with purpose and proportionality: record only when it supports treatment, payment, or health care operations, or when you have a valid authorization. Perform a documented Risk Assessment for each recording use case, then define controls that reflect the “minimum necessary” standard and your organization’s Technical Safeguards.

  • Map where recordings originate (phone, telehealth, in-person), where they travel, and where they rest.
  • Designate an owner for each recording with accountability for retention, access, and deletion.
  • Use vendors that will execute a Business Associate Agreement (BAA) for any handling of PHI.
  • Set recording off by default; require explicit user action and justification to enable it.
  • Document how patients can access, request amendments to, or receive copies of recordings.

HIPAA focuses on how PHI is used and disclosed. If you record for treatment or operations, HIPAA may not require a separate authorization; however, you should still obtain clear patient permission to record and document that permission. If the recording will be used outside TPO—for training, marketing, or research—obtain a HIPAA-compliant authorization before you press record.

Capture consent in a durable form and store it with the encounter record. If verbal, record a brief preamble noting the patient’s name, date, purpose, who will access the file, retention period, and the patient’s acknowledgment. Address special cases such as minors (use the legal representative), language access, and revocation of consent.

  • Explain why you are recording, how it will be protected, and how long you will keep it.
  • Offer a no-recording alternative (e.g., notes only) without compromising care quality.
  • Reconfirm consent if circumstances change (e.g., new participants join the session).

Platform Selection

Choose communication platforms that provide HIPAA-eligible services and will sign a Business Associate Agreement. Evaluate whether the vendor’s default behavior, admin controls, and logs align with your policies and Technical Safeguards. Avoid consumer features that route data to third parties outside your BAA.

  • Require End-to-End Encryption when feasible; otherwise enforce Secure Transmission Protocols (e.g., TLS for signaling, SRTP for media in transit).
  • Confirm recording indicators, host-only controls, and the ability to block local downloads or screen captures by policy.
  • Validate transcription, AI note-taking, or analytics features are covered by the BAA and disabled by default if not needed.
  • Use SSO/MFA, role-based access control, granular retention settings, and detailed audit trails.
  • Prefer options for customer-managed keys or hardware-backed key storage and documented key rotation.

Recording Storage

Store recordings only in repositories that are in scope for HIPAA with a signed BAA. Prohibit saving to personal devices or ungoverned locations. Centralize storage to enforce retention, legal hold, and destruction standards consistently across all media types.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Encrypt at rest; separate encryption keys from the data and restrict key custodians.
  • Enforce least-privilege access, MFA, and just-in-time access for exceptional needs.
  • Apply Secure Transmission Protocols for uploads and transfers; validate integrity with checksums.
  • Tag recordings as PHI, capture metadata (encounter ID, owner, retention), and maintain immutable audit logs.
  • Test restores from backups, and securely dispose of files at end-of-life with verified deletion.

Security Measures

Layer administrative, physical, and Technical Safeguards to reduce risk from capture to deletion. Use security by default and make it easy for staff to do the right thing every time.

  • Technical Safeguards: End-to-End Encryption where possible, strong TLS/SRTP, modern cipher suites, device hardening, patching, MDM for mobile, DLP, and anomaly detection for unusual access or exfiltration.
  • Access Controls: SSO, MFA, role-based permissions, session timeouts, and automatic lock when recordings end.
  • Operational Hygiene: private spaces for telehealth, screen privacy filters, locked rooms, and clear on-screen indicators that recording is active.
  • Data Handling: redact transcripts before broader use, restrict exports, watermark copies, and disable cloud voice assistants that may capture audio.
  • Governance: periodic Risk Assessment, vendor due diligence, security testing, and a rehearsed Incident Response Plan with clear thresholds for breach notification.

State Laws on Recording

Beyond HIPAA, wiretap and eavesdropping laws vary by state. Some states allow one-party consent; others require all-party consent. Multi-state encounters and call centers complicate compliance because the strictest applicable law may govern.

  • Ask participants where they are located and apply the most restrictive consent rule across the session.
  • Obtain express, recorded consent from every participant, not merely implied consent.
  • Use written or electronic consent for planned recordings and verbal consent for ad hoc situations.
  • Refresh consent when new participants join, and stop recording immediately if anyone declines.
  • Coordinate with counsel on cross-border telehealth and calls that traverse multiple jurisdictions.

Training and Policies

Codify expectations so staff know exactly when and how recording is permitted. Policies should be practical, scripted where useful, and backed by training, attestations, and spot audits.

  • Define who may initiate recordings, approved platforms, and when recording is prohibited.
  • Provide a concise consent script and job aids; require documentation of consent in the record.
  • Set retention periods tied to medical-record and business needs; prohibit indefinite storage.
  • Specify storage locations, naming conventions, metadata, and access request workflows.
  • Control transcripts and AI features; ensure they remain inside your BAA and data boundaries.
  • Ban personal devices and accounts for PHI; enforce MDM and endpoint encryption.
  • Monitor with audit logs, review anomalies, and sanction policy violations consistently.
  • Maintain an Incident Response Plan with playbooks for misdirected shares, lost devices, or unauthorized access to recordings.

When you limit recording to clear purposes, secure the platform, store files in governed locations, and train your workforce, you substantially reduce the likelihood of HIPAA violations while preserving the clinical and operational value of recordings.

FAQs.

What constitutes a HIPAA violation in audio recording?

A violation occurs when a recording containing Protected Health Information is created, used, disclosed, or stored in a way that violates HIPAA—for example, recording without a legitimate purpose or authorization, saving PHI to an unapproved device, sharing outside the “minimum necessary,” using a vendor without a Business Associate Agreement, or failing to apply required Technical Safeguards and access controls.

Explain the purpose, who will access the file, how long you will retain it, and how it will be protected. Capture consent in writing within the record or as a brief recorded preamble at the start of the session. Reconfirm if circumstances change, document any revocation, and ensure consent covers related artifacts like transcripts or screenshots.

Which platforms comply with HIPAA for telehealth sessions?

Use platforms that offer a HIPAA-compliant service tier and will sign a Business Associate Agreement. Confirm End-to-End Encryption (or strong Secure Transmission Protocols), admin controls for recording, SSO/MFA, audit trails, configurable retention, and documented security practices. Treat AI transcription and analytics as in-scope services that must also be covered by the BAA.

What security measures are required for storing recorded PHI?

Encrypt at rest with managed keys, restrict access via least privilege and MFA, maintain immutable audit logs, and enforce retention plus timely deletion. Use Secure Transmission Protocols for uploads and transfers, validate integrity with checksums, back up securely, test restores, and include recordings explicitly in your Incident Response Plan.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles