Can I Email Medical Records? What HIPAA Allows and Safer Ways to Share

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Can I Email Medical Records? What HIPAA Allows and Safer Ways to Share

Kevin Henry

HIPAA

September 15, 2025

6 minutes read
Share this article
Can I Email Medical Records? What HIPAA Allows and Safer Ways to Share

HIPAA Compliance for Emailing Medical Records

Emailing medical records is permitted under HIPAA when you follow the HIPAA Privacy Rule and HIPAA Security Rule. The Privacy Rule governs when Protected Health Information (PHI) may be used or disclosed; the Security Rule requires administrative, physical, and technical safeguards to protect electronic PHI during transmission and at rest. Together, they allow email if the purpose is permitted and reasonable safeguards are in place.

For routine care, payment, and operations, you may email PHI when appropriate; for other disclosures, you’ll generally need a valid patient authorization. When a patient exercises Patient Access Rights and asks for records by email, you must honor the request if it’s readily producible, while warning about any security risks and applying feasible safeguards.

Key compliance steps include verifying the recipient, confirming a permitted purpose or documented authorization, applying the Minimum Necessary Standard where it applies, and using encryption or a secure alternative whenever possible. Always document your decision-making and the safeguards you used.

HIPAA distinguishes between “authorization” (a formal, signed permission for disclosures not otherwise permitted) and a patient’s access request. If a patient requests their own records by email—even unencrypted—you may send them after advising of the risks and confirming the patient still wants email delivery. Keep a record of the request and your warning.

If the patient directs you to send records to a third party, obtain a written request that clearly identifies the third party and the destination (for example, an email address). When the disclosure is not for treatment, payment, or healthcare operations and is not under the access right, a HIPAA authorization that meets all content requirements is generally needed.

Before sending PHI, verify identity, confirm addresses carefully, and inform patients about the security trade-offs between standard email and more secure options. Clear communication and documentation are essential parts of compliance.

Minimum Necessary Standard

The Minimum Necessary Standard requires you to limit PHI to the least amount needed to accomplish the purpose. It applies to most uses, disclosures, and requests—but there are important exceptions: it does not apply to disclosures to or requests by a healthcare provider for treatment, to disclosures to the individual, or to uses/disclosures made pursuant to a valid authorization or as required by law.

In practice, when emailing for payment or operations, include only the specific data elements needed. Consider redacting nonessential pages, summarizing instead of attaching full charts, and removing extraneous identifiers. When emailing for treatment, the standard does not apply, but it remains prudent to avoid unnecessary detail.

Encryption and Security Best Practices

Encryption is one of the most effective safeguards for emailing PHI. At a minimum, enforce Transport Layer Security (TLS) for messages in transit. For stronger protection, use End-to-End Encryption (such as S/MIME or PGP) so only the intended recipient can decrypt the content. If end-to-end options are impractical, use a secure portal or encrypted file delivery and share access codes out-of-band.

Complement encryption with layered controls: strong authentication and multi-factor access; device encryption and remote wipe on laptops and phones; role-based access; data loss prevention for outbound email; and audit logging. Reduce misaddressed emails by disabling auto-complete on PHI workflows and requiring a second check for new recipients.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Use at-rest encryption on mail servers and backups.
  • Digitally sign messages to help verify sender integrity.
  • Apply DMARC, SPF, and DKIM to reduce spoofing risk.
  • Train staff to spot phishing and confirm unusual requests.

Risks of Unencrypted Email

Standard, unencrypted email can be intercepted, misdirected, or accessed on unsecured devices. Copies persist on multiple servers, backups, and users’ inboxes, increasing the chance of unauthorized access. Even if the message is delivered correctly, forwarding chains and lost devices can expand exposure beyond your control.

These risks can trigger breach notification obligations, downtime, and reputational harm. If a patient still prefers unencrypted delivery after you explain the risks, document their preference and your warning, and take reasonable steps to reduce exposure (for example, limiting identifiers or sending a secure link instead of full attachments).

Alternatives to Emailing Medical Records

When feasible, choose a more secure channel than standard email. Patient portals provide authenticated access with encryption and audit trails. Secure file transfer solutions and encrypted portals support large files, access controls, and automatic expiration. For provider-to-provider exchange, consider direct secure messaging or other healthcare-specific networks that support identity assurance and encryption.

  • Patient portal: best for routine sharing, ongoing access, and auditability.
  • Encrypted file transfer/portal: ideal for large images and time-limited access.
  • Direct secure messaging: suitable for provider-to-provider referrals and summaries.
  • Encrypted texting or mobile apps: useful for brief, time-sensitive updates, if managed and archived appropriately.

Business Associate Agreements

Vendors that create, receive, maintain, or transmit PHI on your behalf—such as email hosting, encryption gateways, e-fax, or IT support—are Business Associates. You must have a Business Associate Agreement (BAA) in place before sharing PHI with them. A BAA outlines required safeguards, reporting of incidents, permissible uses, subcontractor obligations, and the return or destruction of PHI at contract end.

Pure “conduits” that only transmit data without persistent storage are treated differently, but most cloud email and security services maintain or process PHI and therefore require BAAs. If a vendor will not sign a BAA, do not use that service for PHI. Verify that subcontractors of your vendor are also covered by BAAs and that security controls align with the HIPAA Security Rule.

Conclusion

You can email medical records under HIPAA when you meet the Privacy Rule’s disclosure requirements, apply Security Rule safeguards, respect Patient Access Rights, and use encryption wherever possible. Limit data to the Minimum Necessary Standard when applicable, prefer secure alternatives to standard email, and ensure BAAs are in place for any vendor touching PHI.

FAQs

Yes. HIPAA allows emailing PHI if the disclosure is permitted (or authorized), reasonable safeguards are used, and—when patients request email delivery—you advise them of risks if unencrypted and document their preference. Using encryption or a secure portal is strongly recommended.

What safeguards are required for emailing PHI?

Implement layered protections: enforced TLS or End-to-End Encryption, strong authentication and multi-factor access, device and at-rest encryption, access controls, data loss prevention, recipient verification, and audit logging. Train staff to avoid misaddressing and phishing, and apply the Minimum Necessary Standard when it applies.

How can patients receive their medical records securely by email?

Offer secure options first: a patient portal link or an encrypted file transfer with an access code shared out-of-band. If a patient still prefers standard email, explain the risks, confirm their choice in writing, limit unnecessary identifiers or attachments, and record the request to satisfy Patient Access Rights while reducing exposure.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles