Employee Wellness Programs and HIPAA: What Health Data Employers Can Access

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Employee Wellness Programs and HIPAA: What Health Data Employers Can Access

Kevin Henry

HIPAA

December 14, 2024

8 minutes read
Share this article
Employee Wellness Programs and HIPAA: What Health Data Employers Can Access

HIPAA Applicability to Wellness Programs

When HIPAA applies

HIPAA applies to wellness programs when they are offered as part of a group health plan or administered by a covered entity or its business associate that creates, receives, maintains, or transmits Protected Health Information (PHI). In those cases, the HIPAA Privacy Rule and HIPAA Security Rule govern how PHI is used, disclosed, and safeguarded.

When HIPAA does not directly apply

Standalone wellness programs that are not part of a group health plan and are not run by a covered entity generally fall outside HIPAA. Even then, you must account for other laws and commitments, including the Americans with Disabilities Act (ADA), the Genetic Information Nondiscrimination Act (GINA), state privacy laws, and contractual promises made to employees.

The employer versus the plan

An employer is usually not a HIPAA covered entity; the group health plan is. As a plan sponsor, you may receive PHI from the plan only for plan administration after required certifications are in place. Employment records held in your role as employer are not PHI, but information routed through the plan is.

Business associates and vendors

Wellness vendors that handle PHI on behalf of a group health plan are business associates and must implement HIPAA-compliant safeguards. Your contracts with such vendors should reflect Group Health Plan Compliance obligations, including permitted uses and disclosures of PHI.

Employer Access to Protected Health Information

Summary health information and enrollment data

As a plan sponsor, you may receive summary health information to obtain premium bids or amend, modify, or terminate the plan. You can also receive enrollment and disenrollment information. These datasets should exclude detailed diagnoses and treatment records tied to identifiable individuals.

Minimum necessary and plan administration

Access to PHI must be limited to the minimum necessary for plan administration. Only authorized personnel performing plan functions should see PHI, and you must keep it separate from general employment files. PHI cannot be used for hiring, firing, promotion, or other employment actions.

When individual-level PHI can flow to the employer

Individual PHI may be shared with you only if the disclosure is for plan administration under certified plan documents or if an employee signs a valid HIPAA authorization. Absent authorization, diagnostic details, lab results, and treatment notes should not reach the employer.

Vendor sharing

Wellness vendors may use and disclose PHI as permitted by the plan and HIPAA, but must not pass identifiable data to the employer for non-plan purposes. Aggregate reports can be provided to help you evaluate program effectiveness without exposing identities.

Under the HIPAA Privacy Rule, “authorization” is the formal permission required for disclosures of PHI beyond treatment, payment, health care operations, or plan administration. If you want to use identifiable health data for incentives, recognition, or employment-related purposes, you need a valid authorization from the individual.

Elements of a valid authorization

A compliant authorization specifies who may disclose and receive PHI, the purpose, the information to be disclosed, an expiration date or event, and the individual’s signature. It must also explain the right to revoke and the potential for redisclosure once data leaves a covered entity.

Plan sponsor certifications

Before the plan discloses PHI for administration, you must certify that PHI will be used only for plan functions, safeguarded appropriately, and not employed for other business purposes. Limiting access to designated staff helps demonstrate Group Health Plan Compliance.

Revocation and alternatives

Employees may revoke authorizations at any time in writing. If an employee refuses or revokes authorization, you should provide a reasonable alternative means to earn wellness incentives that does not require disclosing PHI.

Safeguarding and Security of Health Data

Administrative, physical, and technical safeguards

Where HIPAA applies, the HIPAA Security Rule requires risk analysis, role-based access, workforce training, encryption where reasonable and appropriate, and strong authentication. You should maintain audit logs and regularly review access to ePHI to detect inappropriate use.

Privacy governance and segregation

Keep wellness and plan PHI separate from general HR files, limit access to a need-to-know basis, and document procedures for minimum necessary use. Written policies, training, and sanctions reinforce compliance and reduce insider risk.

Breach readiness

Implement incident response steps: identify and contain, assess the nature and extent of PHI involved, mitigate harm, and notify as required. Coordinate closely with business associates to ensure timely investigation and notification obligations are met.

Lifecycle management

Apply retention schedules that align with legal requirements and securely dispose of records at end-of-life. For shared workspaces and devices, use screen privacy, automatic logoff, and clean-desk practices to reduce accidental exposure.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Use of De-Identified and Aggregate Data

Data De-Identification Standards

HIPAA recognizes two methods to de-identify data: Safe Harbor, which removes specific identifiers (such as names and full-face photos), and Expert Determination, which uses statistical methods to ensure re-identification risk is very small. Choose the method that fits your data and use case.

Aggregate reporting in practice

Use aggregate dashboards to track participation, risk trends, and outcomes without exposing identities. Apply small-cell suppression and cohort size thresholds so reports do not indirectly reveal information about individuals in small departments.

Re-identification controls

Prohibit combining de-identified data with other datasets that could re-identify people. If you assign codes for longitudinal tracking, store the re-identification key separately with strict access controls and auditing.

Compliance with GINA and ADA

Genetic Information Nondiscrimination Act

GINA restricts acquiring and using genetic information, including family medical history, for employment decisions. Wellness programs should avoid soliciting genetic information and must never condition employment, benefits, or incentives on providing it.

Americans with Disabilities Act

Under the ADA, disability-related inquiries and medical exams within wellness programs must be voluntary and reasonably designed to promote health or prevent disease. Medical information obtained must be kept confidential and shared with the employer only in aggregate, except where individual data is necessary for accommodations.

Coordinating overlapping rules

Align HIPAA, GINA, and ADA by collecting only what you need, favoring aggregate or de-identified reporting, and securing explicit authorizations when identifiable information may be used beyond plan administration. Clear notices and accessible alternatives help keep participation genuinely voluntary.

Employer Use of Health Data for Safety Purposes

For safety-sensitive roles, the ADA permits fitness-for-duty or return-to-work assessments when they are job-related and consistent with business necessity. Limit requests to information needed to evaluate safety risks and document the rationale for each request.

Disclosures permitted by law and urgent threats

HIPAA allows disclosures required by law and certain disclosures to avert a serious and imminent threat. Coordinate with your plan and vendors to ensure any safety-related disclosures fit within HIPAA’s permitted pathways or are backed by valid authorizations.

Practical steps for safety programs

  • Define narrowly the safety purpose and the minimal data elements required.
  • Prefer de-identified or aggregate risk indicators to individual records where possible.
  • Store any received PHI separately with strict access controls and auditing.
  • Train supervisors not to solicit or use PHI for general employment decisions.

Key takeaways

Use PHI only for plan administration or with valid authorization, keep wellness data walled off from HR decisions, and rely on de-identified and aggregate reporting whenever feasible. Align HIPAA obligations with GINA and ADA by honoring voluntariness, minimizing data, and safeguarding confidentiality at every step.

FAQs.

What health data can employers access under HIPAA?

You may receive enrollment and disenrollment information, plus summary health information to obtain premium bids or change the plan. Individual-level PHI can be shared with you only for plan administration under certified plan documents or with a valid HIPAA authorization. Diagnostic and treatment details should not flow to the employer for employment decisions.

How does HIPAA apply to wellness programs not part of group health plans?

Standalone programs typically are not subject to HIPAA unless a covered entity or business associate handles PHI. Still, ADA, GINA, state laws, and contractual promises apply, so you should limit data collection, use aggregate reporting, and implement strong privacy and security practices.

What are employer responsibilities for safeguarding employee health data?

Limit access to a designated team, maintain separate files, and apply minimum necessary standards. Where HIPAA applies, follow the HIPAA Security Rule for ePHI, manage vendor risks, train staff, and prepare for breach response. Use retention schedules and secure disposal to control lifecycle risk.

For disclosures beyond plan administration—such as using identifiable data for incentives or recognition—you need a valid HIPAA authorization. Wellness participation must be voluntary under the ADA and GINA, and employees should have reasonable alternatives that do not require revealing PHI.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles