Common HIPAA Compliance Misconceptions (and the Facts You Need to Know)

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Common HIPAA Compliance Misconceptions (and the Facts You Need to Know)

Kevin Henry

HIPAA

March 16, 2026

6 minutes read
Share this article
Common HIPAA Compliance Misconceptions (and the Facts You Need to Know)

HIPAA Applicability and Coverage

One of the most common HIPAA compliance misconceptions is that the law applies to anyone who touches health data. In reality, HIPAA applies to Covered Entities—health care providers that transmit standard transactions, health plans, and health care clearinghouses—and to their vendors acting as Business Associates. If a vendor creates, receives, maintains, or transmits Protected Health Information for you, a Business Associate Agreement is required.

Business Associates range from billing services and cloud platforms to e-signature tools and secure messaging providers. Using a vendor without a signed Business Associate Agreement exposes you to avoidable risk, even if the vendor claims to be “HIPAA compliant.” Hybrid entities (such as universities or municipal systems) must formally designate which components are subject to HIPAA to avoid accidental sprawl.

  • What HIPAA does not cover: employment records held by an employer in its role as employer; education records covered by FERPA; and direct-to-consumer apps that are not acting on behalf of a Covered Entity or Business Associate. State Privacy Laws may still apply in these scenarios.
  • Group health plans sponsored by employers are Covered Entities, but the employer itself is not—unless it also functions as a health care provider or another HIPAA-regulated component.

Another misconception is that patient “consent” is always required. HIPAA permits uses and disclosures for treatment, payment, and health care operations without patient authorization. For these purposes, the Minimum Necessary standard applies to most disclosures (not to treatment), and disclosures to Business Associates are allowed under a Business Associate Agreement.

Authorization is required for certain activities, including most marketing, the sale of PHI, and most uses of psychotherapy notes. Research typically requires authorization or an Institutional Review Board waiver. Disclosures for public health, those required by law, and specific law enforcement or safety exceptions can occur without authorization. Remember that State Privacy Laws may impose stricter consent rules for categories like mental health, reproductive health, HIV, or genetic data.

Understanding Protected Health Information

Protected Health Information is individually identifiable health information created or received by a Covered Entity or Business Associate that relates to a person’s health, care, or payment, in any form—paper, oral, or electronic (ePHI). Identifiers include details such as name, full address, contact numbers, Social Security number, full-face photos, and device or biometric identifiers.

Not all personal data is PHI. Consumer wellness data held by a non-HIPAA app, employment records held by an employer, and education records under FERPA are not PHI. De-identified information that meets HIPAA’s De-Identification Standards is also not PHI, though careless handling can reintroduce risk.

Addressing Encryption Requirements

“Encryption is optional” is a half-truth. Under the Security Rule, encryption is an Addressable Safeguard, meaning you must implement it if reasonable and appropriate—or document a rigorously equivalent alternative. In practice, encrypting ePHI in transit and at rest is expected for modern systems, especially on laptops and mobile devices where loss or theft is foreseeable.

  • In transit: use strong TLS for email gateways, APIs, and web portals; avoid transmitting PHI over unsecured channels.
  • At rest: use strong, industry-standard algorithms on servers, databases, backups, and endpoints; manage and rotate keys securely.
  • Devices: enable full-disk encryption, remote wipe, and mobile device management; restrict local downloads of PHI.

Proper encryption can provide “safe harbor” in breach analysis—if a lost device was encrypted to accepted standards, you may avoid breach notification. If you choose not to encrypt, you must document why and implement compensating controls that truly mitigate the same risks.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Managing Internal Access to PHI

A widespread myth is that once staff are trained, broad access is fine. HIPAA expects Role-Based Access Controls and the Minimum Necessary standard to limit access to what each role needs. Access should reflect duties, change as roles evolve, and be revoked promptly when users leave.

  • Design roles before provisioning; grant least-privilege access and separate duties where appropriate.
  • Use unique user IDs, strong authentication (preferably MFA), and automatic session timeouts.
  • Enable audit logs; review access and logs regularly, with “break-the-glass” emergency access monitored and justified.
  • Run joiner–mover–leaver processes, quarterly access reviews, workforce training, and sanctions for violations.

Securing Communications via Texting and Email

HIPAA does not ban texting or email; it requires appropriate safeguards. Standard SMS is typically not sufficient for PHI. Use secure messaging that provides encryption, identity verification, message retention, and auditability. For email, enable strong encryption in transit and consider message-level encryption or secure portals for sensitive content.

  • Provider-to-provider: use secure apps, verify recipients, and make messages part of the designated record when appropriate.
  • Provider-to-patient: you may email or text patients if they prefer it and you advise them of risks; document their preference and use the Minimum Necessary.
  • Vendors: if your email, texting, or cloud provider handles PHI, execute a Business Associate Agreement and configure the service for HIPAA requirements.

De-Identification and Re-Identification Risks

“Removing names is enough” is incorrect. HIPAA offers two De-Identification Standards: the Safe Harbor method (removal of 18 identifiers with no actual knowledge of re-identification risk) and Expert Determination (a qualified expert applies statistical methods to ensure very small risk). A Limited Data Set—with certain identifiers removed—may be shared under a Data Use Agreement for specific purposes like research or public health.

Re-identification remains possible through linkage with other datasets (the “mosaic effect”). Reduce risk by separating re-identification codes, restricting access, testing re-identification risk periodically, and honoring contractual prohibitions on re-identification. Even de-identified or limited data may still trigger obligations under State Privacy Laws or contractual commitments.

Key takeaway: HIPAA is risk-based. Clarify who is covered, document how PHI flows, encrypt pragmatically, restrict access by role, and treat “de-identified” claims with healthy skepticism. Doing so turns misconceptions into defensible, day-to-day practices.

FAQs.

Does HIPAA apply to employers' internal employee health records?

Generally no. HIPAA does not apply to employment records held by an employer in its role as employer. However, the employer’s group health plan is a Covered Entity, and PHI within the plan must be protected and segregated from general HR files. Other laws—such as disability, workplace safety, or State Privacy Laws—can still govern how employers handle employee medical information.

No. HIPAA allows use and disclosure without authorization for treatment, payment, and health care operations, as well as for certain public health, legal, and safety purposes. Authorization is required for most marketing, sale of PHI, and most uses of psychotherapy notes, and may be required by State Privacy Laws for sensitive categories of information.

When is encryption mandatory under HIPAA?

Encryption is an Addressable Safeguard—so you must implement it when reasonable and appropriate, or document a truly equivalent alternative. Because encryption materially reduces risk (and can provide safe harbor in breach analysis), it is effectively mandatory for most ePHI in transit and at rest, especially on mobile devices and laptops.

What are the requirements for business associate agreements?

A Business Associate Agreement must define permitted uses and disclosures, require appropriate safeguards for PHI, mandate breach reporting, bind subcontractors to the same obligations, and address return or destruction of PHI at termination. It should also require access to books and records for compliance review and be retained for the required record-keeping period.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles