HIPAA Compliance for Counselors: A Complete Guide and Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Counselors: A Complete Guide and Checklist

Kevin Henry

HIPAA

August 30, 2025

8 minutes read
Share this article
HIPAA Compliance for Counselors: A Complete Guide and Checklist

HIPAA Regulatory Requirements

For counselors, HIPAA compliance means protecting Protected Health Information (PHI) in every format and embedding privacy and security into daily care. If you bill electronically or use an electronic record, you are a covered entity and must follow the Privacy Rule, Security Rule, and Breach Notification Rule.

Core rules you must meet

  • Privacy Rule: Limits uses/disclosures of PHI, sets the minimum necessary standard, and grants patient rights to access, amend, and receive an accounting of disclosures.
  • Security Rule: Requires safeguards for electronic PHI (ePHI) through Administrative Safeguards, Physical Safeguards, and Technical Safeguards.
  • Breach Notification Rule: For breaches of unsecured PHI, notify affected individuals without unreasonable delay and no later than 60 days; follow HHS and media thresholds.
  • Enforcement: Maintain policies, training, and documentation to demonstrate compliance and reduce penalties.

Special considerations for counseling practices

  • Psychotherapy notes: Keep separate from the medical record; most uses require written authorization.
  • Business Associates: Execute BAAs with EHRs, billing vendors, cloud storage, and telehealth platforms handling PHI.
  • Notice of Privacy Practices (NPP): Provide to clients and document acknowledgment.
  • State and other federal laws: When stricter, they control (for example, certain mental health or substance use records).

Quick compliance checklist

  • Designate a Privacy Officer and Security Officer.
  • Map PHI flows across intake, care, billing, telehealth, and disclosures.
  • Adopt written policies for uses/disclosures, client rights, and sanctions.
  • Complete a documented Risk Analysis and risk management plan.
  • Sign BAAs; verify vendors’ safeguards.
  • Implement workforce training and maintain logs.
  • Establish incident response and breach notification procedures.

Privacy Rule Implementation

Translate the Privacy Rule into practice with clear, simple workflows that your team can reliably follow. Start by defining routine uses and disclosures and where authorizations are required.

Minimum necessary and role-based access

  • Define roles (counselor, biller, admin) and the least PHI each needs for duties.
  • Use standard templates and checklists to prevent over-sharing (e.g., sharing treatment summaries instead of full records when appropriate).

Patient rights process

  • Access: Respond to record requests within 30 days (one 30-day extension allowed); offer secure electronic copies for ePHI.
  • Amendment: Document approvals/denials with rationale; keep addenda with the original record.
  • Restrictions and confidential communications: Honor reasonable requests (e.g., alternate address) and document in the chart and billing system.
  • Accounting of disclosures: Maintain a log for non-routine disclosures as required.

Authorizations and special cases

  • Use/disclose PHI for treatment, payment, and healthcare operations without authorization; obtain written authorization for most other purposes.
  • Psychotherapy notes need specific authorization except for limited uses defined by HIPAA.
  • De-identification or a limited data set reduces privacy risk when full identifiers are unnecessary.

Operational safeguards

  • Verify identity before disclosing PHI (in person, by phone, or electronically).
  • Standardize intake and release forms; pre-define decision trees for subpoenas and emergencies.
  • Document every decision and retain for required periods.

Security Rule Measures

The Security Rule requires you to safeguard ePHI through coordinated Administrative, Physical, and Technical Safeguards. Build controls that are practical, repeatable, and auditable.

Administrative Safeguards

  • Risk Analysis and risk management plan with prioritized remediation.
  • Assigned Security Officer and documented security policies/procedures.
  • Workforce training, sanctions, and vendor management with BAAs.
  • Contingency planning: data backups, disaster recovery, and emergency mode operations.
  • Periodic evaluations and audit reviews of access and activity.

Physical Safeguards

  • Facility access controls, locked offices, and visitor procedures.
  • Workstation security: privacy screens, clean-desk rules, and secure positioning.
  • Device and media controls: encrypted devices, chain-of-custody, secure disposal, and media re-use procedures.

Technical Safeguards

  • Access controls: unique user IDs, strong authentication, and automatic logoff.
  • Encryption for ePHI at rest and in transit; use TLS/VPN for remote access.
  • Audit controls: centralized logging, alerts for anomalous access, and regular log review.
  • Integrity and transmission security: patching, anti-malware, and safe configuration baselines.
  • Minimum necessary in systems: role-based permissions and restricted export/printing.

Risk Assessment Procedures

A structured Risk Analysis identifies where ePHI could be compromised and drives targeted mitigation. Keep it right-sized for your practice but thorough enough to withstand scrutiny.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Step-by-step method

  1. Define scope: all locations, systems, people, and vendors that create, receive, maintain, or transmit ePHI.
  2. Inventory assets and data flows: EHR, telehealth, email, backups, mobile devices, and paper-to-digital touchpoints.
  3. Identify threats and vulnerabilities: loss/theft, unauthorized access, misconfiguration, phishing, disasters, and human error.
  4. Evaluate existing controls: note strengths/gaps across Administrative, Physical, and Technical Safeguards.
  5. Score likelihood and impact to rate risk; create a risk register.
  6. Plan treatment: mitigate, transfer (e.g., insurance), accept with justification, or avoid; assign owners and deadlines.
  7. Document decisions and residual risk; obtain leadership sign-off.
  8. Monitor and update after incidents, new systems, location changes, or annually at minimum.

Artifacts to keep

  • Risk register, data-flow diagrams, and evidence of implemented controls.
  • Action plans, status updates, and validation tests (e.g., restore tests for backups).

Documentation and Record Keeping

HIPAA expects complete, current documentation that proves what you do and when you do it. If it is not documented, it did not happen.

Retention and organization

  • Retain HIPAA policies, procedures, and related documentation for at least six years from creation or last effective date.
  • Follow stricter state record-retention rules for clinical records when applicable.
  • Maintain version control, approval dates, and review cycles.

What to maintain

  • Policies/procedures for Privacy Rule and Security Rule; NPP; sanction policy.
  • BAAs, vendor due diligence, and service configurations.
  • Training curricula, rosters, test results, and acknowledgments.
  • Risk Analysis, risk management plans, audits, and access reports.
  • Incident reports, breach assessments, notifications, and corrective actions.
  • Patient requests (access, amendments, restrictions) and responses.

Secure storage and disposal

  • Use encrypted repositories with restricted access and regular backups.
  • Dispose of media with certified destruction; retain disposal certificates.

Telehealth Compliance Strategies

Telehealth expands access while raising privacy and security risks. Build a repeatable session workflow and select platforms that meet HIPAA expectations.

Platform and configuration

  • Choose a vendor that signs a BAA and supports encryption, access controls, and audit logs.
  • Disable recording by default; restrict file sharing and screen captures unless clinically necessary.
  • Require multi-factor authentication for clinician accounts.

Session workflow

  • Verify identity and the client’s physical location at each session.
  • Confirm a private environment on both ends; use headphones to minimize incidental disclosures.
  • Use waiting rooms and locked meetings; admit only authorized participants.
  • Obtain telehealth consent covering limitations, risks, and privacy practices.
  • Collect emergency contacts and local emergency resources; document crisis protocols.
  • Record session date, platform used, and any technical issues that may affect care.

Messaging and files

  • Use secure messaging portals for PHI; avoid standard SMS and consumer apps without a BAA.
  • Share minimum necessary information; set retention and deletion schedules.

Staff Training and Awareness

Training turns policy into practice. Make it role-specific, scenario-based, and recurring so behaviors stick.

Program essentials

  • New-hire and annual refreshers on the Privacy Rule, Security Rule, and breach reporting.
  • Role-based modules for front desk, billing, supervisors, and clinicians.
  • Hands-on exercises: phishing simulations, secure device setup, and identity verification drills.

Reinforcement and accountability

  • Short, periodic reminders (posters, emails) on topics like minimum necessary and clean desk.
  • Sanctions for violations applied consistently and documented.
  • Track completion, quiz scores, and acknowledgments; audit a sample of charts and disclosures each quarter.

Summary

Effective HIPAA compliance for counselors blends the Privacy Rule’s boundaries with the Security Rule’s safeguards, anchored by a living Risk Analysis and clear documentation. Focus on practical workflows, secure technology, trained people, and measurable follow-through.

FAQs

What are the key HIPAA requirements for counselors?

You must protect PHI under the Privacy Rule, safeguard ePHI with Administrative Safeguards, Physical Safeguards, and Technical Safeguards under the Security Rule, and follow the Breach Notification Rule when unsecured PHI is compromised. Core duties include minimum-necessary disclosures, client rights (access, amendment, restrictions), BAAs with vendors, documented Risk Analysis and risk management, workforce training, and timely incident response.

How can counselors protect patient information during telehealth sessions?

Use a HIPAA-eligible platform with a signed BAA, enable encryption and waiting rooms, require multi-factor authentication, and disable recording by default. Verify identity and location at each session, ensure privacy on both ends (headphones, closed doors), obtain telehealth consent, document the platform and issues, and route messages/files through secure portals using the minimum necessary PHI.

What steps should be taken for a HIPAA risk assessment?

Define scope across systems, locations, people, and vendors; inventory assets and PHI flows; identify threats and vulnerabilities; assess current controls; score likelihood and impact to rank risks; select and implement mitigations; document owners and timelines; and monitor and update after changes or at least annually. The Risk Analysis and resulting plan must be written, evidence-based, and tied to your practice’s real workflows.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles