HIPAA and Email Encryption: What’s Required and How to Stay Compliant

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA and Email Encryption: What’s Required and How to Stay Compliant

Kevin Henry

HIPAA

June 15, 2025

7 minutes read
Share this article
HIPAA and Email Encryption: What’s Required and How to Stay Compliant

Email remains essential for care coordination and administration, yet it’s also one of the riskiest places to handle electronic Protected Health Information (ePHI). To stay compliant, you need clear policies, strong encryption, and evidence that your program works in practice.

This guide distills what HIPAA expects, how to choose sound encryption approaches, and the controls you should pair with them to protect ePHI while keeping clinicians and staff productive.

HIPAA Email Encryption Requirements

What HIPAA actually requires

Under the Security Rule, encryption is an “addressable” safeguard. That means you must assess your risks, implement encryption whenever it is reasonable and appropriate, or document an equivalent alternative that reduces risk to a comparable level. In real-world email workflows, encryption is typically expected because messages traverse public networks and diverse devices.

When you must encrypt email

  • Anytime ePHI is sent outside your managed environment (e.g., to patients, payers, outside providers, or personal email domains).
  • Remote access to mailboxes containing ePHI, including mobile devices and webmail.
  • Backups, archives, and exports containing ePHI.
  • Shared mailboxes or distribution lists that handle ePHI.

Documentation that makes your stance defensible

  • Risk analysis identifying email-related threats and the decision to use encryption.
  • Policies describing how encryption is applied (transport, end-to-end, at rest) and when secure portals are required.
  • Verification that encryption is active in production, plus training records and monitoring evidence.

Why encryption matters for incident response

Properly encrypted ePHI can materially reduce breach risk. If an attacker exfiltrates messages but cannot access the keys, your exposure and notification obligations may be less severe. Strong key management is therefore as critical as the encryption itself.

Encryption Standards

In transit: Transport Layer Security

Use Transport Layer Security (TLS) for SMTP connections so ePHI is protected in transit. Enforce TLS 1.2 or higher for partner domains that regularly receive ePHI, monitor for downgrade attempts, and fall back to a secure message portal when a recipient cannot negotiate modern TLS.

End-to-end options when risk is higher

For especially sensitive exchanges or when you cannot enforce TLS, use end-to-end encryption (for example, S/MIME or PGP) or a secure messaging portal with recipient identity verification. Automate triggers so messages with ePHI are routed through the stronger channel without user guesswork.

At rest: Advanced Encryption Standard

Protect stored email, archives, and backups with the Advanced Encryption Standard (AES), preferably AES‑256. Use validated cryptographic modules, segregate encryption keys from the data they protect, rotate keys on a defined schedule, and restrict key access to a minimal set of administrators.

Devices, servers, and cloud workloads

  • Enable full‑disk encryption on laptops and mobile devices that can access ePHI mailboxes.
  • Encrypt server storage and message archives; ensure backup media are encrypted and tracked.
  • Apply message journaling to capture and encrypt copies for retention and eDiscovery.

Business Associate Agreements

What to specify in the Business Associate Agreement

Your Business Associate Agreement (BAA) should spell out who is responsible for email encryption at each stage—sending, transport, storage, archiving, and key management. It should also address subcontractors, incident reporting timelines, data return or destruction, and how you will validate the vendor’s controls.

Due diligence you should perform

  • Confirm TLS enforcement capabilities, end‑to‑end options, and secure portal workflows.
  • Review data residency, backup encryption, and key management practices.
  • Require the right to receive security attestations and to review audit results relevant to ePHI handling.

Operational clarity prevents gaps

Define how messages are classified, which routes trigger portal delivery, who holds keys, and how revocation works. Clear ownership in the BAA minimizes ambiguity during incidents and audits.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Access Controls

Enforce least privilege with role-based access control

Grant mailbox, archive, and administrative access using role-based access control so users receive only the permissions needed for their job. Review access regularly, remove stale accounts promptly, and separate duties for administrators who manage encryption keys.

Strengthen authentication

  • Require multifactor authentication for all accounts that can access ePHI.
  • Use single sign‑on with conditional access policies to block risky logins.
  • Disable automatic forwarding to external or personal addresses unless explicitly approved and controlled.

Session and device safeguards

  • Configure automatic logoff and session timeouts for webmail and portals.
  • Mandate mobile device encryption and remote wipe for lost or decommissioned devices.

Audit Trails

What to capture in audit logs

  • User logins, mailbox access, message sends/reads, and administrative changes.
  • TLS negotiation outcomes, encryption policy decisions, and portal deliveries.
  • Key usage events (creation, rotation, access), DLP triggers, and quarantine actions.

Make logs useful for investigations

  • Centralize, timestamp, and protect audit logs against tampering.
  • Retain logs for a period that aligns with your risk profile and legal requirements.
  • Continuously monitor for anomalies and alert on suspicious access patterns.

Email Retention

Design a clear email retention policy

HIPAA does not set a universal retention period for email content. Retain emails containing ePHI based on your organizational policy, applicable state medical record laws, and whether the message is part of the designated record set. Many organizations align to at least six years for related documentation and apply longer periods when state rules require it.

Practical retention controls

  • Use immutable archiving or journaling for messages that must be preserved.
  • Apply legal holds for litigation or investigations and document their release.
  • Expire and securely delete messages not subject to retention, including on endpoints and in backups.

Access and retrieval

Ensure authorized staff can find, export, and redact retained messages quickly. Fast, accurate retrieval reduces operational burden during audits, patient requests, and eDiscovery.

Compliance Best Practices

Build a resilient, auditable program

  • Complete a formal risk analysis and map email data flows that involve ePHI.
  • Standardize on enforced TLS for routine exchanges and use a secure portal or end‑to‑end encryption when needed.
  • Encrypt data at rest with AES, protect and rotate keys, and test restores from encrypted backups.
  • Pair technical controls with strong policies, training, and phishing‑resistant MFA.
  • Implement DLP rules to detect ePHI and automatically trigger secure delivery paths.
  • Continuously monitor audit logs, run tabletop exercises, and practice incident response.
  • Document everything—decisions, configurations, testing, and vendor assurances—so you can prove compliance.

Summary

HIPAA and email encryption go hand in hand: protect ePHI in transit with TLS, at rest with AES, and back your technology with RBAC, logging, retention discipline, and a clear BAA. When you align these pieces and keep evidence of how they work, you can reduce risk, speed audits, and communicate safely without slowing care.

FAQs.

What are the encryption requirements for HIPAA compliance?

Encryption is an addressable safeguard under the Security Rule: you must assess risk and implement encryption when reasonable and appropriate, or document an equivalent alternative. In practice, use Transport Layer Security for email in transit, apply the Advanced Encryption Standard for data at rest, protect and rotate keys, and use secure portals or end‑to‑end encryption when you cannot enforce modern TLS.

How does a Business Associate Agreement affect email encryption?

A Business Associate Agreement defines who is responsible for encrypting ePHI during sending, transport, storage, archiving, and key management. It should require modern TLS, outline when secure portals are used, set incident reporting expectations, bind subcontractors to the same controls, and specify how data and keys are returned or destroyed at contract end.

What are the penalties for non-compliance with HIPAA email rules?

Penalties vary by severity and culpability. They can include significant civil monetary fines per violation with annual caps, corrective action plans with ongoing oversight, and—in cases of willful misuse—criminal penalties. You may also face state enforcement, litigation, contractual liability under your BAA, and reputational harm.

How long must emails containing PHI be retained?

HIPAA does not mandate a single federal retention period for email content. Retain emails containing electronic Protected Health Information according to your email retention policy, applicable state medical record requirements, and whether the message belongs in the designated record set. Many organizations keep related records at least six years and extend retention where state rules require longer periods.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles