HIPAA Requirements for Speech Therapy Clinics: Compliance Checklist and Best Practices

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Requirements for Speech Therapy Clinics: Compliance Checklist and Best Practices

Kevin Henry

HIPAA

April 05, 2026

8 minutes read
Share this article
HIPAA Requirements for Speech Therapy Clinics: Compliance Checklist and Best Practices

Speech therapy clinics handle sensitive clinical notes, audio/video recordings, scheduling details, and billing data—each a potential element of Protected Health Information (PHI). This guide translates HIPAA’s Privacy and Security Rules into practical steps you can implement today, with checklists and best practices tailored to typical speech-language pathology workflows.

HIPAA Compliance in Speech Therapy Clinics

HIPAA applies to any clinic that transmits health information electronically for billing or insurance. Your program must protect both paper PHI and Electronic Protected Health Information (ePHI), uphold patient rights, and document how you prevent, detect, and respond to privacy or security incidents.

Because therapy often involves recordings and school or family coordination, you should apply the “minimum necessary” standard rigorously—share only what is required for treatment, payment, or operations, and secure all media that could reveal a patient’s identity.

Quick compliance checklist

  • Designate a Privacy Officer and a Security Officer with clear duties.
  • Maintain written policies for the Privacy Rule, Security Rule, and Breach Notification Rule.
  • Publish and distribute your Notice of Privacy Practices and collect acknowledgments.
  • Execute a Business Associate Agreement with every vendor that handles PHI/ePHI.
  • Complete a documented Risk Assessment and remediation plan at least annually.
  • Encrypt devices, control access, and log activity for systems containing ePHI.
  • Train staff on policies, secure communication, and Incident Response Procedures.

Privacy Rule Requirements

The Privacy Rule governs how you use and disclose PHI. You may use PHI without patient authorization for treatment, payment, and health care operations. For other purposes—such as marketing, teaching with identifiable recordings, or sharing testimonials—you need a signed authorization that describes the use and its expiration.

Provide a clear Notice of Privacy Practices (NPP) to every patient. The NPP explains how you use PHI, patient rights, complaint processes, and contact information for your Privacy Officer. For pediatric clients, ensure the NPP and any authorizations are signed by the appropriate parent or legal guardian.

Privacy checklist

  • Apply the minimum necessary standard to phone calls, emails, faxes, and handoffs.
  • Use private spaces for case discussions; avoid PHI on whiteboards visible to others.
  • Honor patient rights: access, amendments, accounting of disclosures, and restrictions.
  • Document all authorizations and maintain them for at least six years.
  • De-identify case examples used for training whenever possible.

Security Rule Safeguards

The Security Rule requires administrative, physical, and technical safeguards to protect ePHI. Your goal is to ensure confidentiality, integrity, and availability of records across your EHR, scheduling, telehealth, and storage systems.

Administrative safeguards

  • Perform a comprehensive Risk Assessment and maintain a risk management plan.
  • Define role-based access; grant the least privilege needed to do the job.
  • Establish contingency plans: data backups, disaster recovery, and emergency operations.
  • Adopt security incident procedures and a sanctions policy for violations.
  • Evaluate your security program periodically and after significant changes.

Technical safeguards

  • Unique user IDs, strong authentication, and automatic logoff for all systems.
  • Audit controls to log access to charts, images, and recordings.
  • Integrity controls to prevent unauthorized alteration of documentation or media.
  • Encryption Standards: AES-256 (at rest) and TLS 1.2+ (in transit), or documented alternatives if encryption is not feasible.

Use mobile device management for laptops, tablets, and phones that may store ePHI. Enable remote lock/wipe and ensure local storage is encrypted.

Business Associate Agreements

A Business Associate Agreement (BAA) is required with vendors that create, receive, maintain, or transmit PHI on your behalf—such as EHR providers, billing services, cloud storage, telehealth platforms, e-fax vendors, appointment reminder tools, transcription services, and IT support.

BAA essentials

  • Permitted uses/disclosures and a requirement to apply appropriate safeguards.
  • Subcontractor flow-down clauses binding downstream vendors to the same protections.
  • Prompt breach notification obligations and cooperation with investigations.
  • Return or secure destruction of PHI at termination, if feasible.
  • Right to audit or receive reasonable assurances of compliance.

Inventory all vendors, confirm whether PHI is involved, and obtain signed BAAs before sharing any data. Keep executed agreements and renewal dates on file.

Staff Training and Documentation

Train all workforce members at onboarding and at least annually. Cover the Privacy Rule, Security Rule, secure messaging, phishing awareness, device handling, social media boundaries, and procedures for handling recordings and school coordination.

Document attendance, content, dates, and any assessments. Keep training records, policies, procedures, BAAs, and acknowledgments for a minimum of six years from creation or last effective date.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Training checklist

  • Role-specific modules for clinicians, front desk, billers, and contractors.
  • Hands-on practice with your EHR, patient portal, and telehealth tools.
  • Clear escalation paths for suspected incidents or misdirected communications.
  • Periodic phishing simulations and password hygiene refreshers.

Secure Communication Methods

Choose communication channels that protect PHI without disrupting clinical flow. Whenever possible, use a patient portal or secure messaging that authenticates users, logs access, and applies strong encryption.

Best practices

  • Email: Use encrypted email for PHI. If a patient requests unencrypted email, explain risks and document the request.
  • Text/SMS: Avoid PHI in standard SMS; prefer secure apps. If texting is unavoidable, obtain patient consent and limit content.
  • Phone/Voicemail: Verify identities before discussing PHI; leave minimal details in messages.
  • Fax/e-fax: Confirm numbers, use cover sheets, and route received faxes to secure inboxes.
  • File sharing: Use encrypted portals for home programs, progress notes, and media files.

Telehealth Compliance

Telepractice introduces unique privacy considerations for live sessions and stored recordings. Use a platform that supports encryption, access controls, audit logging, and offers a Business Associate Agreement.

Telehealth checklist

  • Obtain informed consent describing technology, risks, and recording practices.
  • Confirm patient identity, current location, and an emergency contact at each session.
  • Use private spaces; disable smart speakers; wear headphones; position cameras to avoid bystanders.
  • Securely store or avoid storing session recordings; never save to unsecured personal devices.
  • Control screen sharing and file transfers; restrict downloads that include PHI.

Physical Safeguards

Physical protections anchor your security program. Limit facility access, secure devices, and handle paper PHI carefully in therapy rooms, offices, and storage areas.

Physical checklist

  • Locked doors, visitor sign-in, and escorted access to treatment areas.
  • Clean desk policy; locked cabinets for paper charts and intake forms.
  • Privacy filters for reception and therapy room screens; auto-lock on idle.
  • Device and media controls: inventory, secure disposal, and documented chain of custody.
  • Shred or securely destroy paper, media, and labels containing identifiers.

Risk Assessments

A Risk Assessment identifies threats and vulnerabilities to your ePHI, estimates likelihood and impact, and drives your remediation plan. Repeat assessments at least annually and after major changes such as a new EHR or telehealth platform.

Risk Assessment workflow

  • Inventory assets: EHR, email, telehealth, mobile devices, backup systems, and recordings.
  • Map data flows for intake, treatment, billing, and coordination with schools or caregivers.
  • Analyze threats (loss, theft, ransomware, misdirected messages) and existing controls.
  • Rank risks, assign owners, set timelines, and track closure with evidence.
  • Review progress with leadership and update policies accordingly.

Incident Response Plan

Even strong controls cannot eliminate all risk. A documented Incident Response Plan ensures you detect issues quickly, contain damage, notify appropriately, and learn from events.

Incident Response Procedures

  • Preparation: assign roles, maintain contact lists, and keep offline copies of the plan.
  • Identification and analysis: triage alerts, preserve logs, and determine whether PHI was involved.
  • Containment, eradication, recovery: isolate affected systems, remove malware, restore from clean backups, and validate integrity.
  • Notification: follow the Breach Notification Rule—notify affected individuals without unreasonable delay (no later than 60 days after discovery). For incidents affecting 500+ residents of a state/jurisdiction, notify prominent media and the Secretary as required.
  • Post-incident: perform a root-cause review, update controls, retrain staff, and document closure.

Conclusion

By aligning your Notice of Privacy Practices, technical controls, staff training, vendor BAAs, and Risk Assessment cadence, you create a defensible HIPAA program that fits real speech therapy workflows. Treat recordings and communications with care, enforce Encryption Standards, and rehearse Incident Response Procedures so you can act decisively when it matters.

FAQs.

What are the key HIPAA privacy requirements for speech therapy clinics?

Provide and explain your Notice of Privacy Practices; use/disclose PHI only for treatment, payment, and operations unless you have a valid authorization; apply the minimum necessary standard; protect privacy in reception and therapy spaces; and honor patient rights to access, amend, and receive an accounting of disclosures.

How do speech therapy clinics secure electronic protected health information?

Implement role-based access, unique user IDs, strong authentication, automatic logoff, and audit logs; encrypt data in transit and at rest using accepted Encryption Standards; harden and manage mobile devices; back up data and test restoration; and document all safeguards in policies informed by a recurring Risk Assessment.

What is the role of Business Associate Agreements in HIPAA compliance?

A Business Associate Agreement contractually requires vendors that handle PHI to protect it, restricts how they may use or disclose information, mandates breach reporting, and extends HIPAA obligations to subcontractors. You must have a signed BAA before sharing PHI with a vendor.

How often should staff training on HIPAA be conducted in speech therapy clinics?

Train all workforce members at onboarding and at least annually, with additional refreshers after policy or technology changes and following any incident. Keep attendance logs, materials, and completion records for a minimum of six years.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles