HIPAA Privacy Rule and Social Media: Compliance Requirements and Best Practices

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Privacy Rule and Social Media: Compliance Requirements and Best Practices

Kevin Henry

HIPAA

February 09, 2025

7 minutes read
Share this article
HIPAA Privacy Rule and Social Media: Compliance Requirements and Best Practices

Avoid Sharing Patient Information

The HIPAA Privacy Rule protects individuals’ Protected Health Information (PHI). On public or semi-public platforms, even small details can identify a patient. Apply the minimum necessary principle and assume that comments, replies, photos, and metadata are persistent and discoverable.

What counts as Protected Health Information (PHI)

PHI is any health-related information tied to an identifiable person. Under the HIPAA safe harbor standard, identifiers include:

  • Names
  • Geographic data smaller than a state (street, city, ZIP except certain 3-digit ranges)
  • All elements of dates (except year) related to an individual; ages over 89 must be aggregated
  • Telephone numbers
  • Fax numbers
  • Email addresses
  • Social Security numbers
  • Medical record numbers
  • Health plan beneficiary numbers
  • Account numbers
  • Certificate or license numbers
  • Vehicle identifiers and license plates
  • Device identifiers and serial numbers
  • Web URLs
  • IP addresses
  • Biometric identifiers (e.g., fingerprints, voiceprints)
  • Full-face photos and comparable images
  • Any other unique identifying characteristic or code

De-identification before posting

To share content publicly, either remove all 18 identifiers (safe harbor) or obtain expert determination that re-identification risk is very small. When in doubt, treat the content as PHI and do not post.

Practical dos and don’ts

  • Do keep patients, visitors, screens, charts, and unique case details out of images and videos.
  • Do scrub metadata (EXIF, filenames) before publishing media.
  • Don’t discuss cases with unusual timing or circumstances that could indirectly identify a person.
  • Don’t answer health questions in comments; redirect to secure channels.

For social posts that feature or reveal a patient, you must obtain a HIPAA-compliant Patient Authorization, not just a general consent. Authorization is required for disclosures outside treatment, payment, and operations, including marketing and public testimonials.

Required elements of a valid Patient Authorization

  • Specific description of the information to be disclosed (text, photo, audio, video)
  • Who is authorized to disclose and who may receive/use it
  • Purpose of the disclosure
  • Expiration date or event
  • Statements on the right to revoke and how to do so
  • Notice that re-disclosure by others may occur once posted
  • Signature and date of the individual or personal representative, with authority described
  • Plain language and a copy provided to the individual

Operational safeguards

  • Verify identity, document the request, and store the authorization with the record.
  • Use language the patient understands; offer interpreter or translated forms when needed.
  • For minors or incapacitated individuals, obtain signatures from authorized representatives consistent with state law.
  • Honor revocations promptly; remove content you control and document actions taken.
  • Avoid making treatment or payment contingent on authorization for social media use.

Develop Social Media Policies

Strong Social Media Governance clarifies what is permitted, who approves content, and how risks are managed. Policies should align with HIPAA, organizational ethics, and branding while minimizing privacy risk.

Core policy components

  • Scope: covered platforms, accounts, and workforce roles (employees, contractors, volunteers)
  • Content standards: no PHI without authorization; de-identification rules; media handling; prohibited topics
  • Approval workflow: editorial calendar, legal/privacy review, crisis escalation paths
  • Account management: ownership, credentials, two-factor authentication, offboarding
  • Third-party tools: vendor vetting, Business Associate Agreements when PHI may be processed
  • Recordkeeping: archiving posts, comments, and approvals per retention policy
  • Privacy Risk Assessment before new campaigns; periodic policy reviews with Compliance Audits
  • Enforcement: consequences for violations and reporting mechanisms

Workflow in practice

  • Draft → privacy check for PHI → managerial approval → scheduled post → monitor engagement → archive artifacts.
  • Suspected issue → pause content → Incident Response activation → document, remediate, and review controls.

Secure Communication Channels

Public platforms are not appropriate for PHI. Direct individuals to secure, organization-controlled channels for care coordination. If PHI could be present, use systems that meet strong Encryption Standards and access controls.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Technical and administrative controls

  • Use TLS 1.2+ for data in transit and strong encryption at rest; enable device encryption and remote wipe.
  • Require two-factor authentication for all official accounts and any integrated tools.
  • Restrict PHI to secure portals or messaging systems; disable or avoid DMs for patient matters.
  • Limit access via role-based permissions; rotate credentials and audit logins regularly.
  • Execute BAAs with vendors that might process PHI; confirm data location and retention.
  • Standardize response scripts that move conversations off-platform without revealing PHI.

Sample redirection language

  • “For your privacy, we can’t discuss health details here. Please contact our secure patient portal or call our office.”
  • “We’re happy to help, but we need to move this to a private, secure channel. Send us a message through the portal.”

Separate Personal and Professional Accounts

Maintain clear boundaries to reduce risk and preserve professionalism. Personal accounts should never be used to discuss work, patients, or internal operations.

  • Use organization-owned accounts for official activity; prohibit posting work content from personal profiles.
  • Decline friend/follow requests from patients; do not join patient groups in a professional capacity without approval.
  • Lock down personal privacy settings, but never rely on them to protect PHI.
  • Store credentials only in approved password managers; change access immediately upon role changes.

Train Employees

Training turns policy into practice. Provide initial and periodic education tailored by role, with scenarios and assessments that reinforce HIPAA expectations on social platforms.

  • Identify PHI and gray areas (e.g., “anonymous” stories, small-town uniqueness, metadata in images).
  • Rules for photography and videography in clinical spaces; signage and patient surroundings.
  • How to handle comments, reviews, and direct messages without disclosing PHI.
  • Use of secure portals, Encryption Standards, and approved devices.
  • Reporting and Incident Response steps; how to preserve evidence and escalate.
  • Annual attestation plus spot checks; refreshers after policy updates or audit findings.

Monitor Social Media Activity

Continuous monitoring detects issues early and proves due diligence. Track official accounts and brand mentions, then tie findings to Privacy Risk Assessment, corrective action, and Compliance Audits.

What to monitor

  • Posts, comments, tags, stories, and live streams involving your brand or facilities
  • Unauthorized account creation or impersonation
  • Discussions that could expose PHI, including photos from clinical areas
  • Access and configuration changes on official accounts

Incident Response playbook

  • Contain: remove/takedown posts you control; request removal from platforms; secure accounts.
  • Evaluate: determine if PHI was disclosed, affected individuals, and risk of harm.
  • Notify: follow internal escalation; if a breach, apply Breach Notification Rule obligations.
  • Document: preserve screenshots, timestamps, decisions, and remediation steps.
  • Recover and improve: update training, controls, and Social Media Governance based on lessons learned.

Bottom line: treat social content as public forever, require Patient Authorization for identifiable sharing, route health conversations to secure systems, and prove compliance through training, monitoring, audits, and disciplined response.

FAQs.

What information is prohibited from sharing on social media under HIPAA?

Any content that reveals Protected Health Information is prohibited without a valid authorization or proper de-identification. This includes names, contact details, full-face photos, dates tied to care, medical record numbers, and unique circumstances that could identify a patient, even indirectly.

Use a HIPAA-compliant Patient Authorization that specifies what will be shared, with whom, why, and for how long, includes the right to revoke, and is signed and dated. Keep the authorization with the record, provide a copy to the patient, and honor revocations promptly by removing controlled content.

What are the consequences of HIPAA violations on social media?

Consequences can include corrective action plans, financial penalties, breach notifications to affected individuals and regulators, reputational harm, and workforce discipline. The organization must investigate, document, mitigate harm, and strengthen controls to prevent recurrence.

How should staff be trained to ensure HIPAA compliance on social media?

Provide role-based training on identifying PHI, photography rules, handling comments and DMs, secure-channel redirection, Encryption Standards, and Incident Response. Reinforce learning with scenarios, assessments, annual refreshers, and targeted updates after Compliance Audits or policy changes.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles