HIPAA Compliance for Physical Therapists: Requirements, Best Practices, and Checklist

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Physical Therapists: Requirements, Best Practices, and Checklist

Kevin Henry

HIPAA

February 27, 2026

9 minutes read
Share this article
HIPAA Compliance for Physical Therapists: Requirements, Best Practices, and Checklist

HIPAA Compliance Requirements

As a physical therapist, you are typically a covered entity if you transmit health information electronically for standard transactions. That makes HIPAA compliance non‑negotiable, especially when you handle electronic protected health information (ePHI). Your compliance program components should translate the law’s requirements into practical, day‑to‑day controls.

The three core HIPAA rules

HIPAA Privacy Rule: Governs how you may use and disclose PHI, establishes patients’ rights (access, amendments, restrictions, confidential communications), and requires a Notice of Privacy Practices (NPP) and “minimum necessary” policies.

• Security Rule: Requires administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of ePHI, including risk analysis, access controls, audit logs, authentication, encryption practices, and contingency planning.

Breach Notification Rule: Mandates evaluating potential incidents and notifying affected individuals (and, when applicable, regulators and media) without unreasonable delay and within specified timelines after discovering a breach.

Foundational program elements for PT clinics

Designate a Privacy Officer and Security Officer (often the same person in small practices), adopt written policies and procedures, implement role‑based access to ePHI, and maintain Business Associate Agreements (BAAs) with vendors that handle PHI on your behalf. Ensure sanction and incident‑response procedures are documented and enforced.

Quick checklist

  • Appoint Privacy/Security leadership and define responsibilities.
  • Publish and distribute an up‑to‑date NPP; apply the minimum necessary standard.
  • Document policies for access, disclosures, device use, and incident management.
  • Execute and manage BAAs with all applicable vendors.
  • Maintain processes for patient rights requests and identity verification.
  • Establish breach assessment and notification procedures.

Conducting Risk Assessments

A risk analysis is the backbone of Security Rule compliance. Use structured risk assessment protocols to identify where ePHI resides, what could go wrong, and how to reduce risk to a reasonable and appropriate level for your practice.

Practical, step‑by‑step approach

  1. Inventory assets: EHR, scheduling/billing tools, patient portal, telehealth platforms, email, texting, laptops, tablets, phones, servers, backup media, Wi‑Fi, and paper records that interface with ePHI.
  2. Map data flows: Where ePHI is created, received, maintained, and transmitted, including to clearinghouses and business associates.
  3. Identify threats and vulnerabilities: Lost/stolen devices, misdirected email/fax, improper disposal, weak passwords, unpatched systems, insider error, or third‑party compromise.
  4. Evaluate likelihood and impact: Rate inherent risk, note current controls, and determine residual risk.
  5. Prioritize remediation: Assign owners, timelines, and budgets; track to completion.
  6. Review and update: Reassess at least annually and whenever technology, vendors, locations, or workflows change.

Common PT‑specific considerations

Account for images, home exercise videos, wearable data, telehealth sessions, and communications with referring providers. Include situations like treating in gyms, assisted‑living facilities, or on the sidelines, where workstation and device controls differ from the clinic.

Quick checklist

  • Maintain a current asset and data‑flow inventory.
  • Keep a risk register with likelihood/impact ratings and residual risk.
  • Publish a remediation plan with due dates and owners.
  • Document risk acceptance where remediation is not feasible.
  • Schedule periodic re‑assessments and trigger reviews after major changes or incidents.

Implementing Staff Training

Your workforce is your strongest control—and your greatest exposure. Effective training turns policies into habits and reduces human‑error incidents.

What to cover

  • HIPAA basics: Privacy Rule, Security Rule, and Breach Notification Rule, plus what counts as PHI and ePHI.
  • Role‑based access and the minimum necessary standard in front desk, treatment, and billing workflows.
  • Secure communications: Email, texting, portals, telehealth etiquette, and identity verification.
  • Device and password hygiene, phishing awareness, safe use of personal devices, and reporting lost/stolen items.
  • Social media boundaries, photography/video in clinic, and disclosures to family or caregivers.
  • Incident reporting, response steps, and workforce sanctions for violations.

Frequency and proof

Train all new hires promptly, provide annual refreshers, and issue targeted updates after policy or technology changes. Keep sign‑in sheets or LMS records, test comprehension, and secure signed acknowledgments of policies.

Quick checklist

  • Annual training plan with curriculum mapped to job roles.
  • New‑hire onboarding within a defined timeframe.
  • Simulations/drills (e.g., phishing tests, breach tabletop exercises).
  • Training records, scores, and attestations retained for at least six years.
  • Immediate retraining following incidents or major workflow changes.

Securing Communication Channels

Protecting patient conversations is central to trust. Standardize how your team communicates so the safeguards match the sensitivity of the message and the channel used.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Email and texting

  • Use secure messaging or a patient portal for ePHI when possible; if emailing, enable encryption and avoid PHI in subject lines.
  • Adopt approved texting apps with authentication, audit trails, and remote‑wipe; avoid native SMS for ePHI.
  • Obtain patient communication preferences and informed consent when using less secure channels.

Telehealth and portals

  • Choose platforms that support encryption and provide BAAs.
  • Verify patient identity, confirm private surroundings, and document consent at session start.
  • Keep software patched and enable multi‑factor authentication for staff and patients where available.

Fax, phone, and mail

  • Pre‑program frequent fax numbers; use cover sheets and verify recipients before sending.
  • When leaving voicemails, disclose the minimum necessary information.
  • Secure outgoing/incoming mail; track anything containing PHI.

Technical guardrails

  • Encrypt data in transit and at rest on laptops and mobile devices.
  • Use strong passwords, auto‑lock, timeout policies, and multi‑factor authentication.
  • Enable logging and periodic review of access and transmission records.

Quick checklist

  • Standard operating procedures for email, texting, phone, fax, and telehealth.
  • HIPAA‑capable vendors selected and configured; BAAs in place.
  • Patient communication consent documented and honored.
  • Encryption enabled; audit logs reviewed on a defined cadence.
  • Templates for routine messages to ensure minimum necessary content.

Managing Business Associate Agreements

Any vendor that creates, receives, maintains, or transmits PHI on your behalf is a business associate. Common examples include EHR and billing vendors, clearinghouses, cloud storage and email providers, IT support, telehealth platforms, patient engagement tools, shredding companies, and answering services.

What strong BAAs include

  • Permitted uses and disclosures of PHI and ePHI.
  • Safeguard requirements aligned to the Security Rule.
  • Incident and breach reporting obligations and timelines.
  • Subcontractor “flow‑down” requirements for any downstream vendors.
  • Right to audit or obtain reasonable security assurances.
  • Termination, data return/destruction, and cooperation during investigations.
  • Insurance and indemnification provisions proportionate to risk.

Due diligence and lifecycle

Assess vendor security before contracting, document your review, and re‑evaluate periodically. Keep a central inventory of vendors, ensure BAAs are executed before PHI exchange, and have an offboarding plan for access removal and data disposition at termination.

Quick checklist

  • Vendor inventory with risk tiers and services listed.
  • Executed BAAs for all applicable vendors, stored in one repository.
  • Security questionnaire or evidence review (e.g., audit reports) on file.
  • Annual vendor risk reviews and change‑management triggers.
  • Termination checklist covering access revocation and PHI return/destruction.

Maintaining Documentation Practices

Documentation proves compliance and speeds response when something goes wrong. Treat your written materials as living assets that reflect how you actually operate.

What to document and retain

  • Policies/procedures and the NPP, plus revision history and approvals.
  • Risk analyses, remediation plans, and evidence of completion.
  • Training rosters, materials, tests, and acknowledgments.
  • Access logs, audit reviews, and user provisioning/deprovisioning records.
  • BAAs and vendor assessments.
  • Incident reports, breach assessments, and notifications.
  • Patient rights requests (access, amendments, restrictions, confidential communications) and responses.
  • Device inventory, encryption status, backups, and disaster recovery tests.

Retain HIPAA‑required documentation for at least six years from creation or last effective date. If state law sets longer retention for medical records, follow the stricter standard.

Quick checklist

  • Central repository with version control and access permissions.
  • Document control procedures for drafting, approval, and periodic review.
  • Evidence library (screenshots, reports, tickets) mapped to policies.
  • Retention schedule covering HIPAA and state requirements.
  • Incident and decision logs for auditability.

Enhancing Physical Office Security

Security Rule physical safeguards protect the spaces, devices, and media that touch ePHI. Align facility practices with how your clinic actually functions—from open gyms to private treatment rooms and reception areas.

Facility and workstation controls

  • Control access with keys/badges; maintain visitor sign‑in and escorts for restricted areas.
  • Position screens out of public view; use privacy filters where needed.
  • Auto‑lock workstations and deploy cable locks on portable devices.
  • Separate guest Wi‑Fi from clinical systems and secure network closets.

Device and media safeguards

  • Encrypt laptops and mobile devices; enable remote‑wipe for lost/stolen equipment.
  • Use locked cabinets for paper charts and forms awaiting scanning or shredding.
  • Adopt clean‑desk and clear‑printer policies to prevent stray PHI.
  • Contract with certified shredding vendors and document destruction.

Contingency and environmental readiness

  • Maintain emergency operations and disaster recovery plans; test backups regularly.
  • Protect equipment from water, dust, and temperature extremes; secure portable media.
  • Post quick‑reference procedures for power or network outages that affect access to ePHI.

Quick checklist

  • Locked doors/cabinets, visitor logs, and alarm systems in critical areas.
  • Screen privacy, workstation auto‑lock, and secured printer pickup.
  • Encrypted, tracked, and inventory‑managed devices and media.
  • Documented disposal procedures for paper and electronic media.
  • Tested contingency plans with clear roles and contact lists.

Bringing these administrative, technical, and physical safeguards together—backed by risk assessment protocols, staff training, BAAs, and disciplined documentation—creates a practical, defensible HIPAA program for physical therapy. Review your controls regularly, adjust to workflow and technology changes, and consult qualified counsel or compliance experts when questions arise.

FAQs.

What are the key HIPAA requirements for physical therapists?

Core requirements include honoring the HIPAA Privacy Rule for permissible uses/disclosures and patient rights; implementing Security Rule safeguards across administrative, physical, and technical domains to protect ePHI; and following the Breach Notification Rule to investigate incidents and notify affected parties when required. You must also maintain written policies, train your workforce, execute appropriate BAAs, and document what you do.

How often should physical therapists conduct risk assessments?

Conduct a comprehensive risk analysis at least annually and any time you experience significant changes—such as adopting a new EHR, enabling telehealth, adding locations, switching vendors, or after a security incident. Smaller targeted assessments can address specific changes between full reviews.

What training is required for physical therapy staff on HIPAA?

Provide new‑hire training promptly, annual refreshers for all workforce members, and ad hoc updates after policy, technology, or workflow changes. Cover the Privacy Rule, Security Rule, Breach Notification Rule, role‑based access, secure communications, device security, phishing awareness, social media boundaries, and incident reporting. Keep attendance, test results, and signed acknowledgments as evidence.

How should physical therapists handle a breach notification?

First, contain and investigate the incident. Perform a breach risk assessment considering the nature of PHI, the unauthorized recipient, whether the PHI was actually acquired or viewed, and mitigation steps. If a breach occurred, notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery; notify regulators and, when applicable, the media as required. Document your analysis, decisions, and all notifications, and implement corrective actions to prevent recurrence.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles