HIPAA Compliance for Lactation Consultants: Requirements, Best Practices, and Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Lactation Consultants: Requirements, Best Practices, and Checklist

Kevin Henry

HIPAA

April 16, 2026

9 minutes read
Share this article
HIPAA Compliance for Lactation Consultants: Requirements, Best Practices, and Checklist

HIPAA Compliance Overview

Who is covered and when HIPAA applies

HIPAA applies to you if you are a healthcare provider who transmits standard electronic transactions (such as insurance claims) or if you are a business associate handling protected health information on behalf of a covered entity. Many independent lactation consultants fall into one of these categories, especially when billing payers or working under referral agreements.

Protected health information (PHI) includes any identifiable data about a client’s health, care, or payment. In lactation care, that can include maternal history, infant weight trends, feeding plans, photos or videos of latch, and appointment notes tied to a name, address, or other identifiers.

Core HIPAA rules you must meet

  • Privacy Rule: Sets when you may use or disclose PHI and outlines patient rights and privacy policies.
  • Security Rule: Requires administrative safeguards, technical safeguards, and physical safeguards for electronic PHI (ePHI).
  • Breach Notification Rule: Requires notices to affected individuals, regulators, and sometimes the media when unsecured PHI is breached.

Minimum compliance program for small practices

  • Appoint privacy and security leads (often you), complete a documented risk analysis, and implement a risk management plan.
  • Maintain written privacy policies and procedures, workforce training, and a sanctions policy.
  • Sign business associate agreements (BAAs) with vendors that access or store PHI.
  • Establish an incident response and breach notification process and document all decisions.

Patient Privacy

Notice of Privacy Practices and patient rights

Provide a Notice of Privacy Practices at or before the first visit and make a good‑faith effort to obtain acknowledgment. Patients have rights to access, request amendments, request restrictions, and choose confidential communications. Build simple workflows to verify identity and respond within required timelines.

Use, disclosure, and the minimum necessary standard

Use or disclose only the minimum necessary PHI to accomplish the task. Limit who in your workflow can see full records, and redact or summarize information when a full chart is not needed. Document routine disclosures (for treatment, payment, healthcare operations) in your privacy policies.

Authorizations and special situations

Obtain written authorization for uses not otherwise permitted—such as testimonials, marketing, or posting photos. Treat lactation images and videos as PHI when they are identifiable. For minors, ensure the correct decision‑maker signs authorizations and follow any stricter state rules.

Practical privacy safeguards in homes and clinics

  • Conduct conversations in private spaces; avoid discussing cases in public areas or over speakerphone.
  • Turn devices away from view, use privacy screens, and keep paper notes covered.
  • Store printed materials in locked bags during travel and in locked cabinets at the office.

Data Protection

Administrative safeguards

  • Complete a written risk analysis and risk management plan; review annually or after major changes.
  • Train all workforce members on privacy, security, and phishing awareness; document attendance.
  • Create contingency and backup plans, including data restoration testing and alternate workflows.
  • Maintain BAAs with EHR, email, storage, telehealth, billing, and texting vendors.

Technical safeguards

  • Use unique user IDs, strong passwords, and multi‑factor authentication on all PHI systems.
  • Encrypt ePHI at rest and in transit using recognized encryption standards (for example, AES‑256 and TLS 1.2+).
  • Enable automatic screen lock, remote‑wipe, and device tracking; restrict copy/paste and downloads where feasible.
  • Log access and changes to records; review audit trails periodically.

Physical safeguards

  • Control facility and room access; keep devices in locked locations when unattended.
  • Use privacy screens, cable locks, and secure transport bags for mobile practice.
  • Avoid leaving devices or files in vehicles; if unavoidable, lock and conceal and minimize what you carry.

Backups, integrity, and secure disposal

Back up data daily to encrypted storage, store at least one copy offsite, and test restores quarterly. Use checksums or EHR integrity controls to detect tampering. Shred paper with a cross‑cut shredder and sanitize or destroy media before disposal.

Communication Practices

Email, texting, and portals

Prefer secure portals or encrypted messaging. If a patient opts for standard email or SMS, document their preference and advise them of risks; still apply the minimum necessary rule. Use disclaimers sparingly but capture explicit consent and maintain it in the record.

Telehealth and video

Choose a telehealth platform that provides a BAA, uses strong encryption standards, and lets you disable recording. Verify identity at the start, confirm location for emergency purposes, and conduct visits in private spaces. Recordings, if any, require explicit authorization and secure storage.

Phones, voicemail, and identity verification

Share only minimal information on voicemail. Before discussing PHI by phone, verify identity with two factors (for example, name plus date of birth or a code word). For caregivers, confirm their authority to receive the child’s PHI.

Social media and direct messages

Do not confirm a patient relationship or discuss cases in comments or DMs. Obtain a valid authorization before sharing any testimonials or images. Route clinical questions to secure channels and document the interaction in the record.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Record Keeping

What to document

  • Intake forms, consent, and Notice of Privacy Practices acknowledgment.
  • Assessment notes, plans of care, feeding logs, weight trends, and follow‑up summaries.
  • Authorizations, restrictions, and patient communications (including consent for email/text).
  • Disclosures outside treatment/payment/operations and accounting of disclosures upon request.
  • Privacy policies and procedures, BAAs, risk analysis, training logs, and incident/breach records.

Retention and patient access

Keep HIPAA documentation (policies, procedures, and related records) for at least six years from the date last in effect. Medical record retention is set primarily by state law and payer rules; establish a written schedule and follow it consistently. Provide patients access to records within required timeframes and charge only reasonable, cost‑based fees when applicable.

Organization and auditing

Use standardized templates and naming conventions for efficiency. Maintain separate folders for authorizations and BAAs. Review access logs and disclosure logs periodically to confirm that controls work as intended.

Breach Notification

What is a breach and when the safe harbor applies

A breach is the unauthorized acquisition, access, use, or disclosure of unsecured PHI. If PHI is encrypted or destroyed according to recognized encryption standards, the incident may fall under the Breach Notification Rule’s safe harbor. Otherwise, perform a documented four‑factor risk assessment to determine if notification is required.

Immediate response steps

  • Contain: recover devices, change credentials, revoke access, and preserve logs.
  • Investigate: identify what PHI was involved, who saw it, and whether it was actually acquired or viewed.
  • Mitigate: request return or deletion, enable remote‑wipe, and reduce risk of further exposure.
  • Document: record timelines, decisions, and corrective actions.

Notification timelines and recipients

  • Individuals: notify without unreasonable delay and no later than 60 days after discovery; use first‑class mail or secure email if the patient agrees.
  • HHS: for breaches affecting 500 or more individuals in a state/jurisdiction, notify within 60 days of discovery; for fewer than 500, submit by 60 days after the end of the calendar year (generally by March 1).
  • Media: for breaches of 500+ individuals in a state/jurisdiction, notify a prominent media outlet.
  • Business associates: must notify the covered entity without unreasonable delay, providing details needed for notices.

After‑action improvements

Update your risk analysis, strengthen controls, retrain the workforce, and revise privacy policies as needed. Track corrective actions to closure and verify that changes are effective.

Best Practices for Consultants

Build a right‑sized compliance program

  • Map your data flows from intake to billing to identify where PHI is created, stored, and shared.
  • Standardize forms and checklists so every visit follows the same privacy‑first workflow.
  • Schedule brief quarterly reviews to test backups, review logs, and update risk management items.

Choose vendors with security in mind

  • Use vendors that sign BAAs and support encryption, access controls, and audit logs.
  • Avoid storing PHI in consumer apps or personal cloud accounts; separate work and personal devices.
  • Enable mobile device management to enforce screen locks, updates, and remote‑wipe.

Privacy by design for mobile and home visits

  • Carry only the minimum PHI needed for the visit; use secure, lockable storage for paper items.
  • Position screens away from family members and visitors; pause notifications during sessions.
  • Document immediately and sync to encrypted storage; avoid leaving files on local devices.

Practical checklist

  • Determine if you are a covered entity, business associate, or both; document the rationale.
  • Complete a written risk analysis and risk management plan; repeat at least annually.
  • Adopt clear privacy policies and procedures; appoint privacy and security leads.
  • Sign BAAs with EHR, email, storage, telehealth, billing, and messaging vendors.
  • Implement encryption standards for data at rest and in transit; enable MFA and auto‑lock.
  • Train all staff on administrative safeguards, technical safeguards, and physical safeguards.
  • Establish secure communication options; record patient preferences for email/text.
  • Set retention schedules; secure backups; test restores and document results.
  • Create an incident and breach notification plan; maintain an incident log.
  • Perform quarterly mini‑audits of access logs, disclosures, and vendor compliance.

Conclusion

HIPAA compliance for lactation consultants is achievable with clear privacy policies, right‑sized safeguards, and disciplined daily habits. Start with a risk analysis, choose secure vendors, encrypt data, and document everything. With a simple checklist and routine reviews, you can protect families’ PHI while delivering compassionate, effective lactation care.

FAQs

What are the key HIPAA requirements for lactation consultants?

Focus on three pillars: the Privacy Rule (limit uses/disclosures and honor patient rights), the Security Rule (implement administrative safeguards, technical safeguards, and physical safeguards for ePHI), and the Breach Notification Rule (notify after certain incidents involving unsecured PHI). Document your risk analysis, policies, training, BAAs, and incident response plan.

How should patient information be securely stored?

Store PHI in systems that provide encryption at rest, access controls, and audit logs. Keep paper records in locked storage and transport them in secure, lockable bags. Back up data to encrypted repositories, keep at least one offsite copy, and test restores regularly.

What steps must be taken after a data breach?

Contain the incident, secure accounts and devices, and preserve logs. Perform a four‑factor risk assessment, document findings, and notify affected individuals without unreasonable delay and within 60 days if notification is required. Report to HHS and, when applicable, the media, and then implement corrective actions and retraining.

How do communication practices impact HIPAA compliance?

Communication channels determine your risk profile. Prefer secure portals or encrypted messaging; if patients request standard email or SMS, document their preference and share only the minimum necessary information. For telehealth, use platforms with BAAs, strong encryption standards, and private settings, and verify identity at each session.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles