Beginner’s Guide: Is Texting a HIPAA Violation? What You Need to Know to Stay Compliant

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Beginner’s Guide: Is Texting a HIPAA Violation? What You Need to Know to Stay Compliant

Kevin Henry

HIPAA

March 29, 2025

5 minutes read
Share this article
Beginner’s Guide: Is Texting a HIPAA Violation? What You Need to Know to Stay Compliant

HIPAA Compliance and Texting

Texting is not automatically a HIPAA violation. It becomes a problem when Protected Health Information (PHI) is involved and you fail to apply the HIPAA Privacy and Security Rules—policies, safeguards, and documentation—to protect that information.

The HIPAA Security Rule requires administrative, physical, and technical safeguards whenever you create, receive, maintain, or transmit electronic PHI (ePHI). If you plan to text PHI, your program must account for those safeguards. ([hhs.gov](https://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/index.html?utm_source=openai))

Practically, that means you perform a HIPAA Risk Assessment, implement appropriate controls (for example, access control, user authentication, audit controls, and transmission security), and manage texting through policy and training. These obligations flow from the Security Rule’s administrative and technical requirements. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.308?utm_source=openai))

Secure Texting Platforms

A secure texting platform (STP) is essential for provider-to-provider or staff communications containing PHI. Look for capabilities that map to HIPAA’s technical safeguards while supporting real-world workflows.

Core capabilities to require

  • End-to-End Encryption for data in transit and, ideally, at rest to mitigate interception risk.
  • User Authentication (unique IDs) and multifactor authentication to verify identity before access.
  • Granular access control and role-based permissions to restrict PHI to authorized users.
  • Audit Trails that log message access, sending, receiving, and administrative actions.
  • Remote Wipe Capability and device lockout via MDM to protect PHI if a phone is lost or stolen.
  • Message retention, export, and archiving controls aligned to your records policies.
  • Administrative controls: BAA with the vendor, onboarding/offboarding, training, and periodic HIPAA Risk Assessment focused on texting.

These features align to Security Rule standards for access control, authentication, audit controls, and transmission security; encryption is “addressable” but strongly recommended and often decisive for risk reduction. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.312?utm_source=openai))

You may communicate with patients electronically (including text) if you apply reasonable safeguards. If a patient prefers an unencrypted channel, you should warn them of the risks, honor their preference, and document that preference; HIPAA permits unencrypted email in these circumstances, and the same principle applies to texting as an electronic communication. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/faq/570/does-hipaa-permit-health-care-providers-to-use-email-to-discuss-health-issues-with-patients/index.html?utm_source=openai))

Beyond warning and documentation, give patients clear expectations: what you will send (e.g., reminders, scheduling, logistics), how to revoke consent, and that texting is not for emergencies. Patients also have a right to request confidential communications by alternative means or locations (for example, texts instead of calls), and providers must accommodate reasonable requests and track revocations. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.522?utm_source=openai))

CMS Guidelines on Texting

For hospitals and critical access hospitals, CMS now permits texting patient information and patient orders among the care team if done through a HIPAA‑compliant secure texting platform and in compliance with the Conditions of Participation. CMS continues to prefer CPOE, but the February 8, 2024 memo (QSO‑24‑05‑Hospital/CAH) updated the prior 2018 policy that prohibited texting orders. ([cms.gov](https://www.cms.gov/medicare/health-safety-standards/quality-safety-oversight-general-information/policy-memos-states-and-cms-locations/texting-patient-information-and-orders-hospitals-and-cahs?utm_source=openai))

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Risks of Non-Compliance

Common failure modes include sending PHI over standard SMS without safeguards, misdirected messages, using platforms without BAAs or audit trails, storing PHI on unmanaged devices, or bypassing the STP for orders. Any resulting impermissible disclosure can trigger breach analysis and, if not mitigated, breach notification and regulatory investigation, with potential civil money penalties and corrective action plans. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity/ransomware-fact-sheet/index.html?utm_source=openai))

Minimum Necessary Standard

Even when your platform and policies are solid, the Minimum Necessary Rule still applies: limit text content to the least amount of PHI needed to meet the purpose. For example, “Your results are ready—please call the clinic” is usually better than including diagnoses or values. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/minimum-necessary-requirement/index.html?utm_source=openai))

Build templated messages that omit sensitive details unless they are essential and you are using a secure channel. Train staff to verify recipients and confirm phone numbers before sending, and to pivot to portals or calls when detail is required.

Device Security for Texting

Phones are often the weakest link. Enforce passcodes/biometrics, automatic lock, OS and app updates, and full‑device encryption. Disable lock‑screen previews for messaging, and restrict copy/paste or local backups from secure apps. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity-newsletter-summer-2021/index.html?utm_source=openai))

Use Mobile Device Management to inventory devices, enforce configuration, and enable Remote Wipe Capability if a device is lost, stolen, or compromised. Establish a rapid loss/theft reporting process and media sanitization procedures for reuse or disposal. ([cms.gov](https://www.cms.gov/tra/Infrastructure_Services/IS_0280_Mobile_Device_Management.htm?utm_source=openai))

Conclusion

Texting can be HIPAA‑compliant when you pair a secure texting platform with clear patient consent practices, apply the Minimum Necessary Rule, secure every device, and continually test your program with a HIPAA Risk Assessment. Done well, texting improves speed and satisfaction without sacrificing privacy or safety.

FAQs

Is standard text messaging allowed under HIPAA?

Standard SMS lacks essential safeguards like encryption, access controls, and audit trails, so it is generally unsuitable for provider‑to‑provider or staff texting of PHI. For provider‑to‑patient communication, HIPAA permits electronic communications; if a patient insists on an unencrypted method after being warned of risks, you may honor that preference and document it, but using a secure platform is the safer default. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/faq/570/does-hipaa-permit-health-care-providers-to-use-email-to-discuss-health-issues-with-patients/index.html?utm_source=openai))

What features make a texting platform HIPAA compliant?

Look for End‑to‑End Encryption, unique IDs and User Authentication (ideally MFA), role‑based access, Audit Trails, Remote Wipe Capability via MDM, and controls for message retention/exports. These map directly to Security Rule technical safeguards for access control, audit controls, integrity, authentication, and transmission security. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/45/164.312?utm_source=openai))

Inform the patient of texting risks, capture their preference (written or clearly documented), specify what you will send, and explain how to revoke consent. Maintain the record in your system and respect requests for alternative means or locations for communications per HIPAA. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/faq/570/does-hipaa-permit-health-care-providers-to-use-email-to-discuss-health-issues-with-patients/index.html?utm_source=openai))

What are the consequences of texting PHI without compliance?

Impermissible disclosures can trigger breach analysis and, if necessary, breach notifications to patients, HHS, and sometimes the media, along with investigations, corrective action plans, and civil monetary penalties. Beyond regulatory exposure, non‑compliance erodes trust and can harm patient care. ([hhs.gov](https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity/ransomware-fact-sheet/index.html?utm_source=openai))

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles