HIPAA Compliance for Marriage and Family Therapists: A Complete Guide to Requirements, Documentation, and Best Practices

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Marriage and Family Therapists: A Complete Guide to Requirements, Documentation, and Best Practices

Kevin Henry

HIPAA

January 29, 2026

8 minutes read
Share this article
HIPAA Compliance for Marriage and Family Therapists: A Complete Guide to Requirements, Documentation, and Best Practices

Understanding HIPAA Privacy Rule

As a marriage and family therapist (MFT), you handle Protected Health Information (PHI) about individuals, couples, and families. The Privacy Rule sets Privacy Rule Requirements for how you may use and disclose PHI, and it gives patients rights over their information. Your core permitted uses without written authorization are treatment, payment, and health care operations (TPO), while the “minimum necessary” standard applies to most other uses and disclosures.

Provide a clear Notice of Privacy Practices (NPP) at the first service and upon request. The NPP explains how you use PHI, patient rights, and how patients can exercise those rights. Patients have rights to access their designated record set (generally within 30 days), request amendments, receive an accounting of certain disclosures, request restrictions, and ask for confidential communications.

Psychotherapy notes—your separate, personal notes documenting or analyzing the counseling conversation—receive special protection. They are excluded from a patient’s standard right of access and require specific Patient Authorization for most disclosures. Keep them physically or electronically separate from progress notes and the rest of the clinical record.

In family or couples therapy, clarify how information is shared among participants. HIPAA allows you to involve family members in care with the patient’s agreement or when the patient has the opportunity to agree or object. For disclosures beyond care coordination, obtain written authorization and document the scope for each person involved.

Implementing Security Measures

The Security Rule requires you to protect electronic PHI (ePHI) through Security Rule Safeguards in three categories: administrative, physical, and technical. These safeguards scale to solo and small-group practices but must be documented and followed daily.

Administrative safeguards

  • Perform an initial Risk Analysis and maintain a Risk Management Plan that prioritizes controls and timelines.
  • Adopt policies for access, device use, remote work, telehealth, incident response, contingency planning, and sanctions for violations.
  • Limit workforce access by role and maintain procedures for onboarding, offboarding, and termination of access.
  • Execute Business Associate Agreements (BAAs) with vendors that create, receive, maintain, or transmit PHI for you (e.g., EHRs, billing services, secure messaging, cloud backups, telehealth platforms).

Physical safeguards

  • Control facility access; secure rooms and cabinets that store PHI; position screens to prevent shoulder surfing.
  • Protect devices with full‑disk encryption, screen locks, and secure storage; implement procedures for lost or stolen devices.
  • Use proper disposal for paper and media (cross‑cut shredding, secure e-waste destruction).

Technical safeguards

  • Require unique user IDs, strong passwords, and multi‑factor authentication where available.
  • Encrypt ePHI in transit (TLS) and at rest; use secure patient portals or encrypted messaging for sharing PHI.
  • Enable automatic logoff, audit logs, and integrity controls on your EHR and file systems.
  • Maintain patched systems and reputable anti‑malware; restrict risky apps and apply mobile device management or equivalent controls.

HIPAA does not require written consent for routine TPO activities, but it does require written Patient Authorization for most other uses and disclosures, including marketing, sale of PHI, and most disclosures of psychotherapy notes. State laws or professional ethics may require additional consents for sensitive information—build those into your intake workflow.

Core elements of a valid authorization

  • Description of the information to be used or disclosed and its purpose.
  • Who may disclose and who may receive the information.
  • Expiration date or event.
  • Patient (or personal representative) signature and date, with statements on the right to revoke and the potential for redisclosure by recipients.
  • Plain language and the understanding that, in most cases, you cannot condition treatment on signing an authorization.

For family and couples work, specify what may be shared between participants, with outside providers, schools, or insurers. Document verbal permissions when appropriate (e.g., discussing appointment logistics with a spouse) and use written authorizations for substantive disclosures of PHI.

Maintaining Proper Documentation

Good records prove compliance and make audits manageable. Keep HIPAA documentation for at least six years from the date of creation or last effective date (whichever is later), and longer if your state’s clinical record retention rules require it.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Essential compliance records

  • Policies and procedures covering Privacy Rule Requirements and Security Rule Safeguards.
  • Current Notice of Privacy Practices and acknowledgments of receipt (when obtained).
  • Risk Analysis, Risk Management Plan, and periodic updates.
  • BAA inventory and fully executed Business Associate Agreements.
  • Training materials and attendance logs for all workforce members, including interns and contractors.
  • Access control records, sanction logs, incident and breach logs, and contingency/backup test results.
  • Templates and completed forms for Patient Authorization, right of access, amendments, restrictions, and confidential communications.

Conducting Risk Assessments

A Risk Analysis is the foundation of your security program. It identifies where ePHI lives, what could go wrong, and how likely and impactful each risk is—so you can prioritize mitigations.

Practical step‑by‑step approach

  • Inventory: List all systems, apps, devices, and third parties that create, receive, maintain, or transmit ePHI.
  • Data flows: Map how ePHI enters, moves through, and leaves your practice (intake forms, EHR, telehealth, billing, backups).
  • Threats and vulnerabilities: Consider loss/theft of devices, phishing, mis‑addressed email, weak passwords, misconfigured cloud storage, natural disasters, and vendor failures.
  • Risk rating: Score likelihood and impact to rank risks; document assumptions and evidence.
  • Controls and gaps: Note existing safeguards; define remediation actions, owners, and deadlines in a Risk Management Plan.
  • Reassess: Update at least annually and whenever you change technology, locations, or vendors.

Training and Education for Staff

Train all workforce members—employees, contractors, students, and volunteers—on privacy and security before they access PHI and at least annually thereafter. Keep records of dates, content, and attendees.

Topics to cover

  • Recognizing PHI, minimum necessary, and how to handle requests from family members or schools.
  • Password hygiene, phishing awareness, secure texting and email, remote/telehealth practices, and reporting incidents promptly.
  • Using the EHR securely: role‑based access, audit logs, and proper documentation of Patient Authorization.
  • Policies for BYOD, social media, photography/video, and disposal of paper/electronic media.

Handling Breaches and Reporting

A breach is an impermissible use or disclosure of unsecured PHI that compromises its privacy or security. Three common exceptions include good‑faith, unintentional access by an authorized workforce member; inadvertent internal disclosures between authorized persons; and disclosures where the recipient could not reasonably retain the information.

Immediate response and assessment

  • Contain: Secure accounts and devices, retrieve misdirected messages, and preserve logs.
  • Analyze: Apply the Breach Notification Rule’s four‑factor assessment—(1) nature and extent of PHI, (2) the unauthorized person, (3) whether PHI was actually acquired or viewed, and (4) mitigation performed—to decide if notification is required.
  • Encrypt in advance: If lost data were properly encrypted, it is not “unsecured PHI,” and breach notification is typically not required.

Notifications and timelines

  • Individuals: Provide written notices without unreasonable delay and no later than 60 calendar days after discovery. Include what happened, what information was involved, steps they should take, what you are doing to mitigate harm, and your contact information.
  • HHS: For breaches affecting 500 or more individuals in a state or jurisdiction, notify HHS within 60 days of discovery and notify prominent media. For fewer than 500 individuals, log the breach and report to HHS within 60 days after the end of the calendar year.
  • Business associates: Require BAs to notify you of incidents promptly per the BAA so you can meet deadlines.

Documentation and improvement

  • Record your risk assessment, notification decisions, letters sent, and mitigation steps (e.g., credit monitoring when SSNs are exposed).
  • Update policies, training, and technical controls to prevent recurrence; note completion dates and responsible persons.

Conclusion

For MFTs, HIPAA compliance rests on clear privacy practices, right‑sized security controls, disciplined documentation, ongoing Risk Analysis, and timely response to incidents. Build these into everyday workflows, keep vendors under BAAs, and refresh training so your team consistently protects patient trust and PHI.

FAQs

What are the key HIPAA requirements for marriage and family therapists?

Follow the Privacy Rule for permissible uses/disclosures and patient rights; implement Security Rule Safeguards for ePHI; provide an NPP; apply the minimum necessary standard; complete a Risk Analysis and risk management plan; execute Business Associate Agreements; maintain required documentation; train your workforce; and follow the Breach Notification Rule when incidents occur.

How should therapists document HIPAA compliance?

Maintain written policies and procedures; your current NPP; Risk Analysis and Risk Management Plan; training materials and logs; BAAs; access and sanction records; incident and breach logs; contingency/backup tests; and templates plus completed Patient Authorizations and right‑of‑access responses. Retain HIPAA documentation for at least six years, or longer if state law requires.

What security measures must be implemented for patient data?

Use role‑based access with unique IDs and MFA, encrypt ePHI in transit and at rest, enable audit logs and auto‑logoff, patch systems, secure and encrypt mobile devices, and control physical access. Support these with administrative safeguards—policies, training, BAAs, contingency planning—and verify them through periodic Risk Analysis and testing.

How to handle and report HIPAA breaches?

Contain the incident, perform the four‑factor risk assessment, and determine if notification is required. If it is, notify affected individuals without unreasonable delay and within 60 days, include all required elements, and report to HHS according to the breach size thresholds (and media for large breaches). Document everything and update safeguards to prevent recurrence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles