HIPAA Emailing Medical Records: Compliance Rules, Encryption, and Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Emailing Medical Records: Compliance Rules, Encryption, and Best Practices

Kevin Henry

HIPAA

September 27, 2024

6 minutes read
Share this article
HIPAA Emailing Medical Records: Compliance Rules, Encryption, and Best Practices

HIPAA Email Communication

What HIPAA allows

HIPAA permits emailing medical records as long as you apply Reasonable Safeguards to protect Protected Health Information (PHI). You must verify recipients, limit what you send, and secure the transmission and storage of messages and attachments. When patients request email, you may honor that request if risks are explained and documented.

Right of access vs. routine operations

Patients can request their records by email as part of their right of access. For routine treatment, payment, and healthcare operations, you may email PHI internally or to partners when appropriate safeguards are in place and the Minimum Necessary Standard is followed. If PHI goes to a third party for non‑TPO purposes, obtain Patient Authorization first.

Reasonable Safeguards in practice

  • Confirm addresses before sending; use test emails for new recipients.
  • Avoid PHI in subject lines and auto‑replies; use neutral wording.
  • Apply message recall only as a last resort; rely on preventive controls.
  • Log access and transmissions for auditability.

Email Encryption Requirements

When encryption is expected

The HIPAA Security Rule treats encryption as an “addressable” safeguard, but regulators expect you to encrypt ePHI in transit across open networks. If you cannot encrypt for a specific workflow, document your risk analysis, apply alternative controls, and reevaluate regularly.

Patient-directed email

When patients ask for unencrypted email, advise them of the risks and document their preference. Send only the Minimum Necessary information and consider password‑protecting attachments even if the message body is unencrypted.

Operational requirements you should meet

  • Use enforced TLS for domains that support it; fall back to portal delivery or S/MIME/PGP when TLS is unavailable.
  • Encrypt stored emails and archives; protect mobile devices and backups.
  • Harden identity: multi‑factor authentication, strong passwords, and session timeouts.
  • Apply data loss prevention and Email Security Solutions to detect PHI and block risky sends.

Encryption Standards

Transport security (server to server and client to server)

  • Use TLS 1.2+ with strong ciphers; prefer AES‑GCM suites with forward secrecy.
  • Pin minimum certificate key sizes (for example, RSA‑2048 or ECC P‑256) and monitor for downgrade attempts.
  • Enable MTA‑STS/SMTP TLS reporting to enforce and observe TLS for partner domains.

End‑to‑end and at‑rest protection

  • Use S/MIME or OpenPGP for end‑to‑end encryption where feasible.
  • Encrypt mailboxes, archives, and device storage; apply 256-bit AES Encryption for files and databases.
  • Protect attachments with 256-bit AES Encryption (for example, encrypted PDF/ZIP) and share keys out‑of‑band.

Integrity, signing, and authenticity

  • Digitally sign messages (S/MIME) to prevent tampering and prove sender identity.
  • Use DKIM, SPF, and DMARC to reduce spoofing and improve trust, while noting these do not encrypt content.

Best Practices for Emailing PHI

Before sending

  • Validate the recipient and purpose; apply the Minimum Necessary Standard to every message.
  • Use secure templates and disable auto‑completion for external addresses where possible.
  • Keep PHI out of subject lines, calendar invites, and file names.

During transmission

  • Force TLS or use a secure portal; escalate to end‑to‑end encryption for sensitive cases.
  • Encrypt attachments separately; share passwords via phone or secure text, not the same email thread.
  • Enable message expiration and access revocation in your Email Security Solutions.

After delivery

  • Retain records per policy; avoid long‑term storage in personal inboxes.
  • Log access, apply retention schedules, and purge drafts/sent items that contain PHI.
  • Periodically test and audit your controls with mock emails and red‑team exercises.

Business Associate Agreements

Who needs a BAA

If a vendor can access PHI—such as an email provider, encryption gateway, archive, or support contractor—you must have a Business Associate Agreement in place before sharing PHI. The BAA should clearly define permitted uses, safeguards, and breach obligations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Key BAA provisions to include

  • Security controls: encryption in transit and at rest, access management, and audit logging.
  • Breach notification: prompt reporting timeframes and cooperation on investigation and mitigation.
  • Subcontractors: flow‑down of HIPAA requirements to all downstream providers.
  • Return or destruction of PHI upon termination and ongoing confidentiality obligations.

Staff Training and Policies

Build competency and consistency

Train staff to recognize PHI, apply Reasonable Safeguards, and follow the Minimum Necessary Standard. Reinforce how to choose the right channel (portal, TLS, or end‑to‑end) and when to require Patient Authorization.

Practical training topics

  • Phishing and social engineering awareness with regular simulations.
  • Recognizing sensitive identifiers and avoiding PHI in subject lines or group emails.
  • Using encryption tools, password‑sharing etiquette, and secure mobile workflows.
  • Escalation paths for misdirected emails and suspected incidents.

Policy essentials

  • Clear email do’s and don’ts, including use of personal devices and accounts.
  • Retention and destruction schedules that cover inboxes, archives, and backups.
  • Sanctions for noncompliance and periodic policy attestations.

Incident Response Planning

Responding to email mishaps

  • Detect and contain: revoke access, disable links, and contact unintended recipients to delete messages.
  • Assess risk: evaluate the nature of PHI, who received it, whether it was viewed, and mitigation steps taken.
  • Decide on notification: follow breach determination procedures and notify affected parties as required.
  • Prevent recurrence: update controls, retrain staff, and adjust your Email Security Solutions and rules.

Documentation and improvement

Document every step—facts, timeline, decisions, and remediation. Use findings to refine policies, BAAs, and technical controls, and to strengthen future training.

Conclusion

HIPAA emailing of medical records is feasible when you pair strong encryption with Reasonable Safeguards, disciplined workflows, and well‑trained people. By enforcing TLS or end‑to‑end protection, honoring the Minimum Necessary Standard, and maintaining solid BAAs and incident response, you can email PHI confidently and compliantly.

FAQs.

Is it a HIPAA violation to email medical records without encryption?

Not automatically, but it’s risky. Encryption is an addressable safeguard that regulators expect for ePHI sent over open networks. If encryption is unavailable for a specific case, you must document your risk analysis, apply alternative controls, and send only the Minimum Necessary data. When a patient knowingly requests unencrypted email, you may honor the request after explaining risks and documenting the preference.

For a patient’s own access request, obtain a clear request (written or logged) and advise on risks if unencrypted. For disclosures outside treatment, payment, and healthcare operations—such as sending records to a third party for non‑TPO purposes—obtain Patient Authorization that specifies what will be shared, with whom, and for what purpose. Always document the decision and the safeguards used.

How should healthcare providers handle email breaches involving PHI?

Act quickly: contain the incident, determine what PHI was exposed, assess the likelihood of compromise, and mitigate harm. If a breach is confirmed, follow your notification procedures, coordinate with involved Business Associates, and meet all timing and content requirements. Finally, remediate root causes, update policies, and reinforce staff training to prevent recurrence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles