HIPAA and Email Rules Explained: What You Can Send, What You Can’t, and How to Stay Compliant

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA and Email Rules Explained: What You Can Send, What You Can’t, and How to Stay Compliant

Kevin Henry

HIPAA

May 10, 2025

6 minutes read
Share this article
HIPAA and Email Rules Explained: What You Can Send, What You Can’t, and How to Stay Compliant

HIPAA Email Compliance Overview

What HIPAA protects

HIPAA safeguards the confidentiality, integrity, and availability of electronic communications that contain Protected Health Information (PHI). Any email that can identify a patient and relates to health status, treatment, or payment is PHI and must be handled under the Privacy and Security Rules. Email is permitted, but it must be secured and governed by policy.

Core compliance building blocks

  • Risk analysis and risk management focused on email systems and workflows.
  • Documented policies, workforce training, and sanctions for violations.
  • Technical safeguards: encryption, Access Controls, authentication, and Audit Logs.
  • Vendor oversight via a Business Associate Agreement (BAA) when third parties handle ePHI.
  • Use of Secure Messaging Systems or patient portals when email is not appropriate.

Sending PHI via Email

What you can send

You may email PHI for treatment, payment, and healthcare operations when security safeguards are in place. Apply the minimum necessary standard: include only the details required to accomplish the task. Prefer secure links to portals or Secure Messaging Systems for documents and images rather than embedding PHI in the message body.

What you should not send

Avoid unnecessary identifiers, sensitive diagnoses when not needed, and full financial data such as complete card numbers. Do not send PHI over open, unencrypted channels. Subject lines should never contain PHI. Disclaimers do not make an insecure message compliant.

A safe sending workflow

  • Decide whether email is appropriate; use a portal when feasible.
  • Limit content to the minimum necessary and de-identify when possible.
  • Use enforced encryption with tested fallbacks (for example, portal pickup).
  • Verify recipient identity and address; confirm external recipients before sending.
  • Remove auto-complete risks; delay delivery to allow last-minute corrections.
  • Log the transmission and retain messages and metadata per policy.

Encryption and Security Requirements

Encryption in transit and at rest

Under the Security Rule, encryption is an addressable safeguard, but in practice it is expected for email containing PHI. Use strong, modern Encryption Standards for data in transit (such as enforced TLS) and for data at rest on servers and devices (for example, AES-based mailbox and storage encryption). When TLS cannot be established, route the message to a secure portal.

End-to-end and alternative methods

For high-risk exchanges, consider S/MIME or PGP for end-to-end encryption where both parties manage keys. If you must send an attachment, encrypt it and share the password through a separate channel. Configure Data Loss Prevention rules to detect PHI patterns and automatically trigger encryption or message quarantine.

Key management and device security

  • Rotate keys and restrict administrative access to cryptographic material.
  • Enforce mobile device encryption, screen locks, and remote wipe for cached email.
  • Disable local downloads where feasible and restrict forwarding outside your domain.

Access Controls for PHI

Role-Based Permissions and least privilege

Grant access based on Role-Based Permissions so staff see only what they need to perform their duties. Require unique user IDs, strong authentication, and multi-factor authentication for remote or privileged access. Limit export, printing, and forwarding of messages containing PHI.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Operational controls

  • Use approved shared mailboxes with audited membership instead of ad hoc forwarding.
  • Apply session timeouts and re-authentication for sensitive actions.
  • Review access rights regularly and remove access promptly during offboarding.

Maintaining Audit Trails

What to log

Maintain Audit Logs that capture sender and recipient, timestamps, message IDs, encryption status, delivery events, access attempts, and administrative changes. Preserve relevant metadata for attachments and secure portal pickups.

How to use the logs

  • Monitor for anomalies such as bulk forwarding, unusual download patterns, or failed encryption.
  • Retain logs and related documentation for at least six years in line with HIPAA record retention requirements.
  • Support investigations and breach notifications with tamper-evident, time-synchronized logs.

Business Associate Agreement Importance

When you need a BAA

You must execute a Business Associate Agreement with any vendor that creates, receives, maintains, or transmits PHI on your behalf. This commonly includes email service providers, encryption gateways, archiving solutions, ticketing platforms, and Secure Messaging Systems that handle ePHI.

What a strong BAA covers

  • Permitted uses and disclosures of PHI and prohibition on unauthorized uses.
  • Security obligations, including safeguards, breach notification timelines, and subcontractor flow-down requirements.
  • Access, amendment, and accounting support; return or destruction of PHI at termination; and the right to audit.

A BAA complements—never replaces—your technical and administrative controls. You remain responsible for oversight and enforcement.

Patients may request email communications. If a patient prefers standard email after being advised of risks, you may honor the request and should document their preference. Always verify addresses and identity before sending PHI and allow patients to update or revoke consent.

Restrictions and special cases

  • Do not include PHI in subject lines; avoid group emails that reveal identities.
  • Marketing uses generally require written authorization, distinct from treatment-related messages.
  • For proxies, minors, or guardians, confirm authority and apply the minimum necessary standard.

Conclusion

To stay compliant, secure emails with strong encryption, enforce Access Controls with Role-Based Permissions, maintain complete Audit Logs, and hold BAAs with all relevant vendors. Limit content to the minimum necessary, verify recipients, and document patient preferences. When in doubt, use Secure Messaging Systems or portals to reduce risk while maintaining efficient communication.

FAQs.

What are the HIPAA requirements for sending email containing PHI?

You must ensure confidentiality, integrity, and availability of PHI; apply the minimum necessary standard; use appropriate encryption; verify recipient identity; maintain Audit Logs; and implement policies, training, and incident response. If vendors handle ePHI, execute a Business Associate Agreement and monitor their performance.

How can email be encrypted to meet HIPAA compliance?

Use enforced TLS for transit and strong at-rest encryption for mailboxes and storage. If TLS cannot be established, route to a secure portal. For higher assurance, implement S/MIME or PGP end-to-end encryption. Encrypted attachments are acceptable when the password is shared through a separate channel and policies govern their use.

What is the role of a Business Associate Agreement in HIPAA email?

A BAA contractually requires vendors to safeguard PHI, restrict its use, notify you of breaches, flow down obligations to subcontractors, and support access and retention needs. It clarifies responsibilities but does not replace your own security controls or risk management.

Obtain and document patient preference when using standard email, especially if it may be unencrypted. For treatment, payment, and operations you may email PHI with safeguards, but marketing or non-routine disclosures typically require written authorization. Always verify the recipient and honor restrictions or revocations promptly.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles