Can You Send PHI via Email? HIPAA Rules, Risks, and How to Do It Safely

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Can You Send PHI via Email? HIPAA Rules, Risks, and How to Do It Safely

Kevin Henry

HIPAA

October 03, 2025

6 minutes read
Share this article
Can You Send PHI via Email? HIPAA Rules, Risks, and How to Do It Safely

HIPAA Email Compliance

You can send PHI via email under HIPAA if you implement appropriate administrative, physical, and technical safeguards. The Security Rule expects you to perform a risk analysis, apply “minimum necessary,” and maintain HIPAA Audit Trails that show who accessed which messages and when. Document decisions, controls, and training so you can demonstrate due diligence.

If a patient asks to receive information by email, you may honor the request after explaining risks and obtaining Patient Email Consent. Verify the address, confirm identity, and record consent. Even when a patient prefers unencrypted email, you should still apply reasonable safeguards and limit the data shared.

Core compliance pillars

  • Risk analysis and ongoing risk management tied to email workflows.
  • PHI Encryption in transit and, where feasible, at rest; document any exceptions.
  • Access controls and identity assurance for mailboxes and devices.
  • Minimum necessary content in each message and attachment.
  • HIPAA Audit Trails, retention of documentation, and incident response plans.
  • Business Associate Agreement in place with any vendor handling ePHI.

Risks of Emailing PHI

Email is fast but prone to errors and exposure. Common risks include misaddressed messages, account compromise, insecure recipient servers, and uncontrolled forwarding. PHI may also leak through mobile previews, subject lines, or long-lived backups and archives.

Attachments expand the blast radius because they are easily downloaded and re-shared. Phishing, spoofing, and weak authentication increase the chance that credentials are stolen and inboxes are mined for sensitive data.

Risk reduction quick wins

  • Force Secure Email Transmission with TLS and require stronger controls for high-risk messages.
  • Use message portals or end-to-end encryption for results, diagnoses, and high-sensitivity data.
  • Strip unnecessary identifiers and apply the minimum necessary rule to text and attachments.
  • Enable DLP scans for common PHI patterns before sending.

Encryption Requirements

HIPAA treats encryption as an “addressable” safeguard, meaning you must assess reasonableness, implement PHI Encryption when appropriate, or document an equivalent alternative. In practice, encryption is strongly expected for routine transmission of ePHI.

In-transit encryption (TLS)

Use Transport Layer Security (TLS) with enforced policies so emails are not sent if the recipient’s server can’t negotiate secure ciphers. Opportunistic TLS alone is insufficient because it can silently downgrade. For broad exchanges, combine forced TLS with a secure-portal fallback.

End-to-end options

For the highest protection, use S/MIME or PGP so only intended recipients can decrypt. Manage keys centrally, rotate certificates, and plan for recovery if keys are lost. Where end-to-end is impractical, portal-based secure messaging provides encryption plus access verification.

At-rest and attachment protection

Encrypt mailboxes and devices at rest and consider password-protected or encrypted files for sensitive attachments. Favor formats that support strong encryption and avoid embedding PHI in the subject line or filename.

Operational safeguards

  • Use FIPS-validated crypto modules where feasible and restrict weak ciphers.
  • Log encryption state for HIPAA Audit Trails and alerts when messages fall back to portal delivery.
  • Test recipient domains regularly to confirm Secure Email Transmission policies are honored.

Business Associate Agreements

A Business Associate Agreement is required with any vendor that creates, receives, maintains, or transmits ePHI on your behalf. This commonly includes email hosting, secure email gateways, archiving, backup, filtering, and managed IT providers.

The agreement should define permitted uses, safeguards, breach reporting timelines, subcontractor obligations, and data return or destruction. Without a signed Business Associate Agreement, you should not route PHI through the service.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Vendor due diligence

  • Confirm PHI Encryption, access controls, and HIPAA Audit Trails are available and enabled.
  • Verify data location, retention periods, and export options for eDiscovery or patient access.
  • Assess incident response, uptime commitments, and support for Patient Email Consent workflows.

Subject Line Precautions

Subject lines are widely exposed in inbox previews, notifications, and forwarded threads. Never include diagnoses, procedure names, medical record numbers, Social Security numbers, or other direct identifiers in the subject.

Use neutral, non-PHI subjects

  • Good: “Secure message from your care team,” “Appointment information,” “Form request.”
  • Avoid: “HIV test result for John Doe,” “MRI for Jane Smith 02/20/2026,” “MRN 123456—surgery details.”

If your system uses subject tags to trigger encryption (for example, a “secure” keyword), train staff to apply them consistently, but never rely on tags as a substitute for proper PHI Encryption.

Access Controls

Strong Email Access Control prevents unauthorized viewing or sending of PHI. Require unique IDs, strong passwords, and multi-factor authentication for every mailbox that can touch ePHI. Apply least-privilege and role-based access for shared department addresses.

Device and session protections

  • Encrypt laptops and mobile devices, enforce screen locks, and enable remote wipe.
  • Use mobile app policies to prevent copy/paste or local downloads of attachments.
  • Disable automatic forwarding to personal accounts and disallow legacy insecure protocols.

Logging and oversight

  • Maintain HIPAA Audit Trails for login activity, message access, policy hits, and DLP events.
  • Review logs, alerts, and quarantine queues; document follow-up actions.
  • Retain audit and policy records in line with your retention schedule.

Training and Policies

Document clear rules for when and how staff may send PHI via email. Train everyone on minimum necessary content, approved templates, and attachment handling. Include the Patient Email Consent process and scripts for risk explanations.

Make it stick day to day

  • Verify recipient identity and addresses before sending; use test emails for first-time contacts.
  • Prefer secure portals or end-to-end options for results, images, and detailed clinical notes.
  • Classify data and escalate to stronger controls when sensitivity increases.
  • Run phishing simulations and refresh training when policies or tools change.

Incident response and retention

  • Have procedures for misdirected mail, suspected compromises, and breach assessment.
  • Preserve relevant logs and messages to support HIPAA Audit Trails and investigations.
  • Review your risk analysis at least annually or after significant system or vendor changes.

Conclusion

You can send PHI via email safely when you pair Secure Email Transmission with strong access controls, PHI Encryption, and well-trained staff. Anchor your program in risk analysis, document Patient Email Consent, keep HIPAA Audit Trails, and ensure every vendor touching ePHI signs a Business Associate Agreement.

FAQs

What are the HIPAA rules for sending PHI via email?

HIPAA allows email if you implement appropriate safeguards: risk analysis, minimum necessary, access controls, and audit logging. Use encryption for routine transmissions, document your decisions, obtain Patient Email Consent when emailing patients, and ensure vendors handling ePHI are covered by a Business Associate Agreement.

How can emails containing PHI be securely encrypted?

Use enforced TLS for server-to-server Secure Email Transmission with a portal fallback, or choose end-to-end options like S/MIME or PGP where feasible. Encrypt mailboxes and devices at rest, protect attachments, manage keys centrally, and log encryption status to your HIPAA Audit Trails.

What risks are involved in emailing PHI?

Key risks include misaddressed messages, insecure recipient servers, account compromise, uncontrolled forwarding, and data exposure through subject lines or device notifications. Reduce risk with encryption, DLP scanning, minimal content, strong Email Access Control, and staff training.

How do Business Associate Agreements relate to email PHI handling?

A Business Associate Agreement is required with any service that creates, receives, maintains, or transmits ePHI for you—such as email hosting, gateways, archiving, and managed IT. The agreement sets security expectations, breach reporting, and subcontractor duties, enabling compliant handling of PHI over email.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles