Can You Send PHI in Text Messages? HIPAA Rules, Risks, and Best Practices

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Can You Send PHI in Text Messages? HIPAA Rules, Risks, and Best Practices

Kevin Henry

HIPAA

April 23, 2026

7 minutes read
Share this article
Can You Send PHI in Text Messages? HIPAA Rules, Risks, and Best Practices

You can text protected health information (PHI) only when you manage risk and follow HIPAA requirements. Standard SMS is inherently risky for PHI transmission because it lacks end‑to‑end encryption and robust controls. The safest path is a secure messaging platform backed by a Business Associate Agreement (BAA). If a patient specifically requests texting and accepts the risks, you may use unsecure channels with documented informed consent and reasonable safeguards.

HIPAA Compliance for Text Messaging

When texting PHI is permissible

HIPAA allows communication with patients and among care teams for treatment, payment, and healthcare operations when you implement appropriate safeguards. For routine clinical coordination, use a secure messaging platform that supports encryption protocols, access controls, and audit trails. If a patient asks for standard texting, first advise them of the risks, obtain and document their informed consent, and limit content to what is necessary.

Core compliance expectations

  • Risk analysis and risk management addressing mobile workflows, devices, and PHI transmission paths.
  • Business Associate Agreement with any vendor handling PHI, including secure text messaging services.
  • Identity verification procedures before disclosing PHI, especially when initiating a new text thread or updating a phone number.
  • Retention and e-discovery policies that capture communications needed for the medical record or legal holds without oversharing.
  • “Minimum necessary” content for non-treatment uses; avoid unnecessary identifiers in message bodies and notifications.

What to avoid

  • Sending PHI via personal messaging apps or unmanaged devices that lack technical safeguards.
  • Group texts that include people without a legitimate need to know.
  • Images or attachments with embedded identifiers unless you use a secure platform and have a clear purpose.

Risks of Texting PHI

Security gaps in standard SMS/MMS

  • No end‑to‑end encryption; messages can be exposed on devices, in transit, and in backups.
  • Misdelivery to wrong numbers, shared phones, or recycled numbers.
  • Device loss, theft, or SIM‑swap attacks that hand over message history to unauthorized parties.
  • Uncontrolled screenshots and forwards that bypass your safeguards.
  • Inability to enforce access controls, remote wipe, or message expiration increases breach likelihood.
  • Lack of audit trails complicates investigations and incident response.
  • Unmanaged PHI transmission raises the likelihood of HIPAA violations, regulatory scrutiny, and costly remediation.

Secure Text Messaging Platforms

Capabilities to require

  • End‑to‑end encryption protocols in transit and at rest, with strong key management.
  • Granular access controls, role-based permissions, and enforced multi-factor authentication.
  • Comprehensive audit trails capturing sender, recipient, timestamp, delivery/read status, edits, and deletions.
  • Remote wipe, device‑level PIN/biometric enforcement, and jailbreak/root detection.
  • Data loss prevention (DLP) rules, message expiration, forwarding restrictions, and screenshot deterrence.
  • Directory integration (e.g., SSO), on‑call routing, escalation paths, and secure file/image exchange.
  • Archiving and export options to reconcile with the designated record set when messages impact care.

Implementation tips

  • Obtain a signed Business Associate Agreement (BAA) and validate the vendor’s security posture through due diligence and testing.
  • Deploy mobile device management (MDM) to enforce updates, encryption, and lock-screen policies.
  • Standardize templates for patient outreach that minimize identifiers and include misdirect disclaimers.

If a patient requests texting, you may use it after explaining risks and documenting informed consent. Patient authorization is a distinct, formal permission typically required for uses and disclosures beyond treatment, payment, and operations (for example, certain marketing or third‑party sharing). Do not rely on informal consent where a HIPAA‑compliant authorization is required.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Advise the patient that standard SMS is not a secure channel and outline potential risks.
  • Offer a secure alternative (e.g., portal or secure messaging). Respect the patient’s preference if they still choose texting.
  • Confirm the exact phone number, owner, and whether others can access the device.
  • Record consent in the EHR, including date, scope (what topics can be texted), and any opt‑out conditions.
  • Reconfirm consent whenever numbers change or if the conversation scope expands.

Special considerations

  • Be cautious when sensitive topics (e.g., behavioral health, reproductive health) could create heightened privacy risks under state or federal law.
  • For minors or caregivers, verify legal authority to receive PHI before texting.

HIPAA Security Rule Safeguards

Technical Safeguards to apply

  • Access Controls: unique user IDs, MFA, automatic logoff, and device encryption.
  • Audit Trails: event logging for message creation, access, modification, and export, with regular review.
  • Encryption Protocols: modern TLS for data in transit and strong encryption for data at rest on servers and devices.
  • Integrity and transmission security measures that detect alteration and protect PHI transmission from interception.

Administrative and physical layers

  • Policies, training, and sanctions that set expectations for texting PHI and escalate urgent or sensitive matters to safer channels.
  • Device and media controls, including inventory, secure disposal, and procedures for lost or stolen phones.
  • Contingency planning so critical communications continue securely during outages.

Best Practices for Texting PHI

Before you text

  • Default to a secure messaging platform for all PHI transmission; fall back to SMS only with documented consent.
  • Verify identity at the start of a new thread and when discussing particularly sensitive details.
  • Use short, purpose‑built templates that minimize identifiers and avoid detailed diagnosis information.

While texting

  • Share the minimum necessary information and steer deeper clinical content into secure portals or calls.
  • Add a brief misdirect notice (e.g., “If you are not the intended recipient, reply STOP and delete”).
  • Avoid attachments with embedded identifiers unless the platform is secure and you have a clear clinical need.

After the exchange

  • Document clinically relevant decisions in the record; don’t rely on a phone’s message history.
  • Apply retention rules and ensure audit trails are reviewable for compliance and quality improvement.
  • Periodically re‑train staff and test incident response with texting scenarios.

Improper texting can trigger HIPAA violations, including civil penalties, corrective action plans, and intensive monitoring. Business associates share liability when their systems contribute to a breach. Beyond federal enforcement, state privacy laws, consumer protection statutes, and professional licensing boards may impose additional consequences.

A misdirected or intercepted message that compromises confidentiality can constitute a reportable breach. Expect breach notification duties, patient outreach, and forensic investigation costs. Contracts may require indemnification, and reputational harm can outlast any fine. Building secure workflows, documenting consent, and maintaining audit trails substantially reduce both regulatory and litigation risk.

Conclusion

You can text PHI safely by defaulting to secure platforms with strong technical safeguards, obtaining informed consent when patients prefer standard SMS, and enforcing disciplined policies for identity verification, access controls, encryption protocols, and audit trails. Treat texting as one part of a broader privacy and security program, and you will lower risk while keeping communication convenient for patients and clinicians.

FAQs

What constitutes PHI in text messages?

PHI includes any individually identifiable health information related to a person’s health, care, or payment. In texts, this can be a name plus appointment details, test results, medication names tied to a person, photos of a wound showing the face, or even a phone number combined with clinical context. A standalone phone number may be an identifier; when paired with health details, the message becomes PHI.

How can healthcare providers ensure HIPAA compliance when texting?

Use a secure messaging platform with encryption protocols, access controls, and audit trails; sign a BAA with the vendor; train staff; and document workflows in policy. If a patient requests standard texting, explain risks, record informed consent, confirm the number, and limit content. Always reconcile clinically relevant texts back into the record.

What are the risks of using standard SMS for PHI?

Standard SMS lacks end‑to‑end encryption, offers poor access control, and leaves PHI exposed on devices and carrier systems. Messages can reach wrong numbers, be read on shared phones, persist in backups, or be captured via screenshots. These gaps raise breach likelihood and the chance of HIPAA violations.

What are acceptable alternatives to texting PHI?

Prefer secure, HIPAA‑ready messaging platforms with strong technical safeguards, patient portals integrated with your EHR, or secure email with enforced TLS and message portals. For sensitive or complex matters, use a phone call with identity verification or schedule a telehealth visit, then document outcomes in the record.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles