Can You Email Medical Records? HIPAA Rules and Secure Ways to Share
HIPAA Compliance for Emailing Medical Records
What HIPAA allows
Email can be used to transmit medical records when you apply safeguards required by the HIPAA Privacy Rule and HIPAA Security Rule. If a message contains Protected Health Information (PHI)—including electronic PHI (ePHI)—you must protect its confidentiality, integrity, and availability throughout transmission and storage.
Covered entities, business associates, and BAAs
Healthcare providers, health plans, and clearinghouses are responsible for messages they send and receive. If an email service, encryption gateway, archive, or help desk can access PHI, that vendor is a business associate and you need a Business Associate Agreement (BAA) before using the service for PHI.
Risk analysis and safeguards
Conduct and document a risk analysis, then implement administrative, physical, and technical safeguards that match identified risks. Typical controls include access management, authentication, transmission security, audit logging, workforce training, incident response, and device protections for laptops and mobile phones.
Permitted Uses for Emailing Medical Records
Treatment, payment, and healthcare operations
You may email PHI for treatment, payment, and healthcare operations when it is reasonably necessary for those purposes. Examples include coordinating care with another provider, sending records to a billing service under a BAA, or sharing information internally to run your practice.
Disclosures to the individual and authorizations
Patients can receive their own records by email if they ask, including through personal email services. If a disclosure is not otherwise permitted, obtain a valid patient authorization that describes what will be sent, to whom, and for what purpose.
Public health and legal obligations
Limited disclosures are permitted for public health reporting, certain law enforcement needs, and other situations recognized by the HIPAA Privacy Rule. Apply the Minimum Necessary Standard whenever it applies and document the basis for your disclosures.
De-Identification of PHI
When data are de-identified under HIPAA—using expert determination or the Safe Harbor method that removes specified identifiers—the information is no longer PHI. De-identified data can be emailed without HIPAA restrictions, though your organization’s policies may still apply.
Minimum Necessary Standard
The Minimum Necessary Standard requires you to limit PHI in an email to the smallest amount needed to accomplish the task. Use role-based access, predefined templates, and data loss prevention (DLP) rules to strip superfluous details, large attachments, and full record sets.
Exceptions exist. The Minimum Necessary Standard does not apply to disclosures for treatment, to the individual who is the subject of the information, or when a valid authorization is in place. Even in those cases, sending more than you need increases risk—so tailor content thoughtfully.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Encryption Standards and Message Security
In transit and at rest
Use strong encryption to protect PHI in transit and at rest. Transport Layer Security (TLS) should be enforced for server-to-server delivery, and device storage should be encrypted. When feasible, prefer End-to-End Encryption (for example, S/MIME or PGP) so only intended recipients can decrypt content.
Alternatives to traditional email
Secure portals and secure-message links provide message-level protection, audit trails, and access controls such as multi-factor authentication. If you email a link to a portal instead of attaching files, you can revoke access, set expirations, and verify identity before records are viewed.
Operational controls
Implement key management procedures, strong authentication, and anti-phishing protections. Avoid putting PHI in subject lines or file names, and scrub metadata where possible. Use SPF, DKIM, and DMARC to reduce spoofing, and maintain detailed audit logs for compliance monitoring.
Risks of Emailing Medical Records
Common risks include misaddressed messages, unauthorized forwarding, account compromise through phishing, and interception when encryption is not enforced. Lost or stolen devices, auto-sync to consumer cloud accounts without a BAA, and retained drafts or backups can also expose PHI.
Human error often drives incidents. Auto-complete can insert the wrong recipient, “reply all” can broaden exposure, and message recall rarely works. Build verification steps and technical controls that prevent or quarantine risky sends before they leave your system.
Patient Consent for Email Communication
Patients may request to receive records by email, even unencrypted. You should advise them of the risks, offer a more secure option, and document their preference and acknowledgment. Capture consent in writing, store it in the record, and honor revocations promptly.
Before sending, verify the patient’s identity, confirm the email address, and avoid including PHI in subject lines. If attachments are necessary, consider password protection and send the password through a separate channel.
Best Practices for Secure Email Communication
- Default to secure portals or encrypted delivery; enforce TLS and prefer End-to-End Encryption where practical.
- Apply the Minimum Necessary Standard; remove superfluous pages and identifiers; use De-Identification of PHI when full identity is not required.
- Verify recipient identity and address; use test emails for first-time recipients; disable auto-complete for external addresses when possible.
- Use DLP, message labeling, and encryption gateways to detect and protect PHI automatically.
- Keep PHI out of subject lines and file names; redact or compress attachments to the specific data needed.
- Require multi-factor authentication on email and mobile devices; enable device encryption and remote wipe; restrict local downloads.
- Sign BAAs with any vendor that stores, transmits, or supports email containing PHI; review logs and retention settings regularly.
- Train staff on phishing and sending protocols; simulate scenarios and audit adherence to policies.
FAQs.
Is it legal to email medical records under HIPAA?
Yes. HIPAA permits emailing medical records when you implement appropriate safeguards under the HIPAA Privacy Rule and HIPAA Security Rule. If a patient requests email, you may comply—even using unencrypted email—after advising them of risks and documenting their preference.
What safeguards are required for emailing medical records?
Required safeguards include a documented risk analysis, access controls, authentication, transmission security, auditing, workforce training, and incident response. In practice, enforce TLS, prefer End-to-End Encryption or secure portals, avoid PHI in subject lines, verify recipients, use DLP, encrypt devices, and maintain BAAs with any service that handles PHI.
How can patients consent to receiving records via email?
Explain the risks, offer a secure alternative, and document the patient’s choice and acknowledgment—ideally in writing—within the record. Verify identity, confirm the destination address, and note any preferences such as unencrypted delivery or password-protected attachments; honor changes or revocations promptly.
What are the risks of emailing medical records?
Primary risks include sending to the wrong recipient, interception if encryption is not enforced, account compromise via phishing, unauthorized forwarding, and exposure from lost or stolen devices. Metadata, auto-sync to non-BAA services, and long-lived inbox copies also increase the chance of unauthorized access.
Table of Contents
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.