Can You Email Medical Records? HIPAA Rules and Secure Ways to Share

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Can You Email Medical Records? HIPAA Rules and Secure Ways to Share

Kevin Henry

HIPAA

August 07, 2025

6 minutes read
Share this article
Can You Email Medical Records? HIPAA Rules and Secure Ways to Share

HIPAA Compliance for Emailing Medical Records

What HIPAA allows

Email can be used to transmit medical records when you apply safeguards required by the HIPAA Privacy Rule and HIPAA Security Rule. If a message contains Protected Health Information (PHI)—including electronic PHI (ePHI)—you must protect its confidentiality, integrity, and availability throughout transmission and storage.

Covered entities, business associates, and BAAs

Healthcare providers, health plans, and clearinghouses are responsible for messages they send and receive. If an email service, encryption gateway, archive, or help desk can access PHI, that vendor is a business associate and you need a Business Associate Agreement (BAA) before using the service for PHI.

Risk analysis and safeguards

Conduct and document a risk analysis, then implement administrative, physical, and technical safeguards that match identified risks. Typical controls include access management, authentication, transmission security, audit logging, workforce training, incident response, and device protections for laptops and mobile phones.

Permitted Uses for Emailing Medical Records

Treatment, payment, and healthcare operations

You may email PHI for treatment, payment, and healthcare operations when it is reasonably necessary for those purposes. Examples include coordinating care with another provider, sending records to a billing service under a BAA, or sharing information internally to run your practice.

Disclosures to the individual and authorizations

Patients can receive their own records by email if they ask, including through personal email services. If a disclosure is not otherwise permitted, obtain a valid patient authorization that describes what will be sent, to whom, and for what purpose.

Limited disclosures are permitted for public health reporting, certain law enforcement needs, and other situations recognized by the HIPAA Privacy Rule. Apply the Minimum Necessary Standard whenever it applies and document the basis for your disclosures.

De-Identification of PHI

When data are de-identified under HIPAA—using expert determination or the Safe Harbor method that removes specified identifiers—the information is no longer PHI. De-identified data can be emailed without HIPAA restrictions, though your organization’s policies may still apply.

Minimum Necessary Standard

The Minimum Necessary Standard requires you to limit PHI in an email to the smallest amount needed to accomplish the task. Use role-based access, predefined templates, and data loss prevention (DLP) rules to strip superfluous details, large attachments, and full record sets.

Exceptions exist. The Minimum Necessary Standard does not apply to disclosures for treatment, to the individual who is the subject of the information, or when a valid authorization is in place. Even in those cases, sending more than you need increases risk—so tailor content thoughtfully.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Encryption Standards and Message Security

In transit and at rest

Use strong encryption to protect PHI in transit and at rest. Transport Layer Security (TLS) should be enforced for server-to-server delivery, and device storage should be encrypted. When feasible, prefer End-to-End Encryption (for example, S/MIME or PGP) so only intended recipients can decrypt content.

Alternatives to traditional email

Secure portals and secure-message links provide message-level protection, audit trails, and access controls such as multi-factor authentication. If you email a link to a portal instead of attaching files, you can revoke access, set expirations, and verify identity before records are viewed.

Operational controls

Implement key management procedures, strong authentication, and anti-phishing protections. Avoid putting PHI in subject lines or file names, and scrub metadata where possible. Use SPF, DKIM, and DMARC to reduce spoofing, and maintain detailed audit logs for compliance monitoring.

Risks of Emailing Medical Records

Common risks include misaddressed messages, unauthorized forwarding, account compromise through phishing, and interception when encryption is not enforced. Lost or stolen devices, auto-sync to consumer cloud accounts without a BAA, and retained drafts or backups can also expose PHI.

Human error often drives incidents. Auto-complete can insert the wrong recipient, “reply all” can broaden exposure, and message recall rarely works. Build verification steps and technical controls that prevent or quarantine risky sends before they leave your system.

Patients may request to receive records by email, even unencrypted. You should advise them of the risks, offer a more secure option, and document their preference and acknowledgment. Capture consent in writing, store it in the record, and honor revocations promptly.

Before sending, verify the patient’s identity, confirm the email address, and avoid including PHI in subject lines. If attachments are necessary, consider password protection and send the password through a separate channel.

Best Practices for Secure Email Communication

  • Default to secure portals or encrypted delivery; enforce TLS and prefer End-to-End Encryption where practical.
  • Apply the Minimum Necessary Standard; remove superfluous pages and identifiers; use De-Identification of PHI when full identity is not required.
  • Verify recipient identity and address; use test emails for first-time recipients; disable auto-complete for external addresses when possible.
  • Use DLP, message labeling, and encryption gateways to detect and protect PHI automatically.
  • Keep PHI out of subject lines and file names; redact or compress attachments to the specific data needed.
  • Require multi-factor authentication on email and mobile devices; enable device encryption and remote wipe; restrict local downloads.
  • Sign BAAs with any vendor that stores, transmits, or supports email containing PHI; review logs and retention settings regularly.
  • Train staff on phishing and sending protocols; simulate scenarios and audit adherence to policies.

FAQs.

Yes. HIPAA permits emailing medical records when you implement appropriate safeguards under the HIPAA Privacy Rule and HIPAA Security Rule. If a patient requests email, you may comply—even using unencrypted email—after advising them of risks and documenting their preference.

What safeguards are required for emailing medical records?

Required safeguards include a documented risk analysis, access controls, authentication, transmission security, auditing, workforce training, and incident response. In practice, enforce TLS, prefer End-to-End Encryption or secure portals, avoid PHI in subject lines, verify recipients, use DLP, encrypt devices, and maintain BAAs with any service that handles PHI.

Explain the risks, offer a secure alternative, and document the patient’s choice and acknowledgment—ideally in writing—within the record. Verify identity, confirm the destination address, and note any preferences such as unencrypted delivery or password-protected attachments; honor changes or revocations promptly.

What are the risks of emailing medical records?

Primary risks include sending to the wrong recipient, interception if encryption is not enforced, account compromise via phishing, unauthorized forwarding, and exposure from lost or stolen devices. Metadata, auto-sync to non-BAA services, and long-lived inbox copies also increase the chance of unauthorized access.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles