Do Accountants Need to Be HIPAA Compliant? Real-World Scenarios Explained

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Do Accountants Need to Be HIPAA Compliant? Real-World Scenarios Explained

Kevin Henry

HIPAA

April 25, 2025

9 minutes read
Share this article
Do Accountants Need to Be HIPAA Compliant? Real-World Scenarios Explained

HIPAA Compliance Requirements for Accountants

Yes—accountants must follow HIPAA when their work involves Protected Health Information (PHI) for a covered entity (such as a health care provider, health plan, or clearinghouse) or for another business associate. In those situations, you are a Business Associate and are directly responsible for HIPAA duties alongside your client’s obligations.

When accountants qualify as Business Associates

  • Outsourced bookkeeping or revenue-cycle support for clinics or dental practices that exposes you to patient billing files or encounter data.
  • Forensic accounting during a healthcare investigation where you review claim-level detail.
  • Using cloud storage, e-signature, or email services on behalf of a covered entity to exchange PHI.

If you only receive aggregated totals or properly de-identified data (no patient identifiers), HIPAA typically does not apply to you. When in doubt, assume PHI is present and limit what you collect to the minimum necessary.

What counts as Protected Health Information

Protected Health Information (PHI) is individually identifiable health information in any format (paper, verbal, or electronic). Patient names, dates of service, medical record numbers, claim numbers, and addresses tied to health care billing are all PHI. General ledger balances or anonymized summaries usually are not PHI.

Which HIPAA provisions apply to accountants

  • Privacy Rule: use and disclosure limits plus the minimum necessary standard.
  • HIPAA Security Rule: administrative, physical, and technical Compliance Safeguards for electronic PHI (ePHI).
  • Breach Notification Rule: duties to assess incidents and notify affected parties and regulators within required timelines.

Business Associate Agreements and Their Importance

A Business Associate Agreement (BAA) is a contract that must be in place before PHI is shared. It authorizes your permitted uses and disclosures, binds you to safeguard PHI, and sets expectations if a security incident or breach occurs. Without a BAA, sharing PHI is itself a violation.

What a solid BAA should cover

  • Permitted and prohibited uses/disclosures of PHI, including the minimum necessary principle.
  • Security commitments that align with the HIPAA Security Rule (risk analysis, access controls, audit logs).
  • Incident and breach reporting duties consistent with the Breach Notification Rule.
  • Subcontractor requirements: you must obtain BAAs with any downstream vendors that can access PHI.
  • Return or destruction of PHI at contract end and Data Disposal Regulations for records and devices.
  • Termination rights and cooperation during investigations or audits.

Common pitfalls to avoid

  • Starting work with PHI before a BAA is executed.
  • Failing to obtain BAAs with cloud providers, file-sharing tools, or consultants you engage.
  • Relying on marketing claims of “HIPAA compliance” without validating controls and Encryption Standards.

Real-World HIPAA Violation Cases

Case 1: No BAA, yet PHI was shared

A medical practice sent patient billing spreadsheets to a CPA firm before signing a BAA. A minor email mishap later triggered an investigation that uncovered the missing contract. Regulators focused less on the email error and more on the unauthorized disclosure without a BAA.

Prevention: never accept PHI until a BAA is fully executed and logged. Use secure portals rather than ad‑hoc email transfers.

Case 2: Lost laptop without encryption

An accountant’s laptop with ePHI for several clinics was stolen from a car. Because the device lacked full-disk encryption and strong access controls, the incident became a reportable breach with costly remediation.

Prevention: apply device encryption that meets strong Encryption Standards (for example, AES‑256 full‑disk encryption), enforce automatic lock, and enable remote wipe.

Case 3: Improper disposal of paper files

Boxes of aging patient billing records were discarded in regular trash during an office move. The exposed PHI triggered notices to patients and negative media attention.

Prevention: follow Data Disposal Regulations—use certified shredding, maintain destruction logs, and sanitize devices before reuse.

Case 4: Spreadsheet sent to the wrong recipient

A monthly A/R export containing names and dates of service was emailed to an incorrect domain. The file lacked password protection and audit tracking, complicating risk assessment.

Prevention: send PHI only through encrypted portals, apply role-based access, and mask or de-identify data when detailed identifiers are unnecessary.

Penalties and Enforcement Actions

HIPAA enforcement is handled primarily by the HHS Office for Civil Rights (OCR), with state attorneys general also empowered to act. Civil monetary penalties are tiered by culpability—from lack of knowledge to willful neglect—and adjusted for inflation. Multiple violations and days of noncompliance can compound exposure, and resolution agreements often require multi‑year corrective action plans and monitoring.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Civil penalties: tiered per‑violation amounts with annual caps for identical provisions; settlements frequently include audits, policy remediation, and workforce training.
  • Criminal penalties: for knowingly obtaining or disclosing PHI under false pretenses or for personal gain; these are rare but serious.
  • Breach Notification Rule: strict timelines for notifying affected individuals, regulators, and, in large incidents, the media—plus costs for mailing, call centers, and remediation.
  • Contractual consequences: loss of clients, indemnification claims, and higher insurance premiums.
  • Reputational and operational impact: disruption of services, staff retraining, and increased scrutiny from partners and auditors.

HIPAA-Compliant Accounting Software Solutions

No software is “certified HIPAA compliant.” Compliance depends on how you configure and use the tool, plus whether the vendor will sign a Business Associate Agreement. Evaluate platforms against the HIPAA Security Rule and your risk analysis, not just marketing claims.

Security features to require

  • Encryption Standards: TLS for data in transit and strong encryption at rest (for example, AES‑256), preferably using FIPS 140‑2 validated modules.
  • Access controls: unique IDs, role‑based permissions, multi‑factor authentication, automatic logoff, and IP allow‑listing.
  • Audit logging: immutable logs for access, changes, and exports; alerting for anomalous activity.
  • Data lifecycle: backups, disaster recovery, retention rules, legal holds, and documented Data Disposal Regulations.
  • Secure file exchange: client portal with granular sharing, watermarking, and expiring links; avoid sending PHI by standard email.
  • Vendor assurances: signed BAA, security whitepapers, penetration testing summaries, and evidence of ongoing controls (e.g., SOC 2 Type II or ISO 27001).

Operational controls you still own

  • Limit the PHI you ingest—prefer claim IDs or patient numbers over names whenever possible.
  • Harden endpoints with full‑disk encryption, patching, EDR/antivirus, and device inventory.
  • Define data entry standards so staff never paste PHI into free‑text fields that sync broadly.

Accountants’ Role in Protecting PHI

Your role is more than number‑crunching—you design workflows that respect privacy, implement Compliance Safeguards, and model disciplined handling of PHI across the engagement lifecycle.

Workflow design and minimization

Map data flows and apply the minimum necessary standard. Replace patient names with unique IDs in accounting systems, restrict who can view detail, and de‑identify reports used for management analysis.

Vendor and subcontractor oversight

Inventory all tools that can touch PHI (email, storage, e‑fax, e‑signature). Execute and track BAAs with each, verify Encryption Standards, and ensure downstream vendors follow the HIPAA Security Rule.

Incident response readiness

Establish procedures to detect, contain, and assess incidents. Document your breach risk assessments and follow the Breach Notification Rule timelines for notifications and regulatory reporting.

Remote and mobile controls

Secure laptops and phones with encryption and automatic lock, use a vetted VPN on public networks, and prohibit saving PHI to personal devices or unapproved apps.

Best Practices for Maintaining HIPAA Compliance

Practical compliance checklist

  • Perform a written risk analysis annually and upon major changes; prioritize remediation plans.
  • Adopt concise policies for access control, email/file sharing, incident response, and Data Disposal Regulations.
  • Train staff at onboarding and annually; include phishing simulations and role‑specific scenarios.
  • Enforce least‑privilege access and review permissions quarterly; promptly offboard departing users.
  • Encrypt all endpoints and portable media; require MFA on every PHI‑capable system.
  • Use a secure client portal; avoid emailing PHI. If email is unavoidable, apply message‑level encryption.
  • Standardize reporting to exclude direct identifiers unless truly necessary; mask or tokenize when possible.
  • Keep a BAA register with renewal dates; verify subcontractor controls and insurance coverage.
  • Test backups and disaster recovery; ensure you can restore without re‑exposing PHI.
  • Log access to PHI and review audit trails for anomalies; investigate and document findings.
  • Follow defensible destruction practices for paper and devices; retain proof of destruction.
  • Run tabletop breach drills to practice Breach Notification Rule decision‑making and communications.

Conclusion

Accountants do need to be HIPAA compliant when their work touches PHI. By executing strong BAAs, implementing Security Rule safeguards, honoring the Breach Notification Rule, and minimizing PHI exposure, you can deliver high‑quality services while protecting patient privacy and your firm’s reputation.

FAQs

When must accountants comply with HIPAA?

You must comply when you qualify as a Business Associate—meaning you create, receive, maintain, or transmit PHI for a covered entity or another business associate. Typical triggers include reviewing patient‑level billing, processing claim data, or storing PHI in your systems or cloud tools. If you only handle de‑identified or aggregate financial data, HIPAA usually does not apply.

What is a Business Associate Agreement?

A Business Associate Agreement is a required contract executed before PHI is shared. It defines permitted uses and disclosures, requires safeguards aligned to the HIPAA Security Rule, mandates prompt incident and breach reporting, flows obligations to subcontractors, and sets terms for returning or destroying PHI at the end of the engagement.

How can accountants protect PHI?

Limit what you collect to the minimum necessary, use secure portals instead of email, encrypt devices and data, enforce role‑based access and MFA, maintain audit logs, train staff regularly, and follow Data Disposal Regulations for paper and devices. Validate vendors, sign BAAs, and keep a tested incident response plan that aligns with the Breach Notification Rule.

What are the consequences of HIPAA non-compliance for accountants?

Consequences include tiered civil monetary penalties, corrective action plans, possible criminal exposure for deliberate misuse, contract termination, reputational harm, and higher insurance and operational costs. Breach notifications can be time‑consuming and expensive, especially when the incident spans multiple clients or systems.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles