HIPAA Rules for Counselors: Key Requirements and Compliance Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Rules for Counselors: Key Requirements and Compliance Checklist

Kevin Henry

HIPAA

October 09, 2025

8 minutes read
Share this article
HIPAA Rules for Counselors: Key Requirements and Compliance Checklist

Counselors handle highly sensitive health information every day. This guide explains the HIPAA rules for counselors in plain language and gives you a practical compliance checklist to safeguard Protected Health Information (PHI) and electronic PHI (ePHI) across your practice.

Use it to confirm what the HIPAA Privacy Rule requires, how the Security Rule works, and what to do about psychotherapy notes, risk assessments, and breach notification requirements.

HIPAA Privacy Rule for Counselors

The Privacy Rule governs how covered entities—such as many counseling practices—may use and disclose PHI. You may use or disclose PHI for treatment, payment, and health care operations without authorization. For most other purposes, you must obtain a valid, written authorization from the client.

Apply the minimum necessary standard to non-treatment uses and disclosures, sharing only the least amount of PHI needed to accomplish the task. Maintain a current Notice of Privacy Practices that explains client rights and your duties, and make a good-faith effort to obtain written acknowledgment of receipt at intake.

Clients have important rights: to access and receive copies of their records (including electronic PHI (ePHI)), request amendments, ask for restrictions, request confidential communications, and obtain an accounting of certain disclosures. Verify identities before releasing information, and document all decisions.

  • Maintain and distribute an up-to-date Notice of Privacy Practices.
  • Use authorizations for non-TPO disclosures; track revocations and expirations.
  • Apply the minimum necessary standard to routine requests and workflows.
  • Honor client rights: access, amendments, restrictions, confidential communications, and accounting of disclosures.
  • Execute Business Associate Agreements (BAAs) before sharing PHI with vendors.

HIPAA Security Rule Safeguards

The Security Rule requires you to protect ePHI with administrative, physical, and technical safeguards that are reasonable and appropriate for your size, complexity, and risks. Begin with a documented risk analysis, then implement controls and policies to reduce identified risks to acceptable levels.

Train your workforce, monitor compliance, and keep written security policies and procedures. Ensure BAAs require business associates to safeguard ePHI and report incidents to you promptly.

  • Complete and document a Security Rule risk analysis and risk management plan.
  • Adopt written security policies, train staff, and enforce sanctions for violations.
  • Confirm BAAs cover security obligations, incident reporting, and subcontractors.
  • Review safeguards at least annually or when major changes occur.

Administrative Safeguards Implementation

Implement a security management process: perform risk analysis, choose risk treatments, and enforce a sanction policy for violations. Designate a security official to oversee the program and define workforce security processes for onboarding, role changes, and terminations.

Control information access through role-based permissions and need-to-know rules. Provide ongoing security awareness and training, including phishing awareness and secure telehealth practices. Establish incident response procedures to detect, contain, investigate, and document security events.

Develop contingency plans covering data backup, disaster recovery, and emergency-mode operations. Evaluate your program regularly to confirm it remains effective and aligned with your environment. Execute and manage BAAs with all relevant vendors.

  • Assign a security officer; define roles and access rules.
  • Document risk analysis, risk treatment decisions, and sanctions.
  • Train all workforce members initially and periodically.
  • Establish incident response and contingency planning procedures.
  • Put BAAs in place and review them routinely.

Physical Safeguards Best Practices

Limit facility access to areas where PHI is stored or discussed. Use visitor sign-ins, locked rooms or cabinets, and policies for after-hours access. Position workstations to reduce shoulder-surfing and use privacy screens in shared spaces.

Define workstation use and security rules for both on-site and remote work. Secure laptops and mobile devices with cable locks, safes, or locked drawers; avoid unattended devices in cars. Control device and media movements and maintain an inventory of where ePHI resides.

Dispose of paper and media securely—cross-cut shred paper, and wipe or destroy drives and portable media before reuse. Keep backup media protected and test recovery procedures.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Restrict and log physical access to ePHI locations.
  • Apply workstation placement, auto-lock, and privacy screens.
  • Inventory devices and media; track movements and returns.
  • Use secure disposal and media re-use procedures.
  • Protect and test backups stored on-site or off-site.

Technical Safeguards Overview

Enforce access control with unique user IDs, least-privilege permissions, and, where feasible, multi-factor authentication. Configure emergency access procedures and automatic logoff on idle systems to reduce unauthorized viewing.

Implement audit controls to log access, changes, and transmissions involving ePHI. Regularly review logs for suspicious activity and retain them according to policy. Protect data integrity with patching, anti-malware, and safeguards that prevent unauthorized alteration.

Authenticate users and systems before granting access, and secure data in transit with TLS or VPN. Encrypt ePHI at rest on servers, laptops, and mobile devices to mitigate risk if a device is lost or stolen, and enable remote wipe on portable devices.

  • Unique IDs, least privilege, MFA, and automatic session lock.
  • Audit logging with routine review and alerting.
  • Integrity protections: patching, anti-malware, and change controls.
  • Encryption for ePHI at rest and in transit; remote wipe on mobiles.
  • Secure telehealth platforms under BAAs.

Psychotherapy Notes Protection

Psychotherapy notes—your separate, personal notes analyzing a counseling session—receive heightened protection. Store them apart from the general record, and require a specific authorization for most uses or disclosures beyond narrow exceptions. Clients generally do not have a right of access to psychotherapy notes.

Do not include diagnosis, treatment plans, medications, session start/stop times, test results, or progress summaries in psychotherapy notes. Those elements belong in the designated record set and are subject to standard Privacy Rule access rights and the minimum necessary standard for non-treatment purposes.

  • Maintain psychotherapy notes separately from the medical record.
  • Use specific authorizations before most disclosures of psychotherapy notes.
  • Train staff on the distinction between psychotherapy notes and the regular record.
  • Limit storage locations and tighten access controls for these notes.

Risk Assessment Procedures for HIPAA Compliance

A Security Rule risk analysis maps where ePHI lives, the threats and vulnerabilities it faces, and the likelihood and impact of adverse events. Use the results to prioritize safeguards and document risk management decisions, timelines, and responsible owners.

Follow a repeatable process: identify systems and data flows, catalog threats and weaknesses, evaluate existing controls, score likelihood and impact, determine residual risk, and select remediation steps. Reassess after technology or workflow changes and at least annually.

For potential breaches of unsecured PHI, conduct a breach risk assessment. HIPAA presumes a breach unless you can show a low probability that PHI was compromised based on factors such as the nature of PHI, who obtained it, whether it was actually viewed, and the extent of mitigation. Some states reference a “risk-of-harm assessment”; align with any state law while meeting HIPAA’s four-factor analysis.

  • Document a formal risk analysis and keep it current.
  • Track remediation tasks, owners, and deadlines to closure.
  • Run breach assessments promptly and preserve all evidence.
  • Bake assessments into change management for new tools and vendors.

FAQs.

What are the core HIPAA Privacy Rule requirements for counselors?

Provide a Notice of Privacy Practices, limit non-treatment uses and disclosures to the minimum necessary, obtain authorizations when required, and respect client rights to access, copy, and amend records, request restrictions, request confidential communications, and receive an accounting of certain disclosures. Maintain policies, train staff, and execute BAAs with vendors that handle PHI on your behalf.

How should counselors secure electronic PHI under the Security Rule?

Perform a risk analysis, implement administrative, physical, and technical safeguards, and keep policies current. Use least-privilege access, unique IDs, MFA, automatic logoff, encryption in transit and at rest, logging with routine review, secure backups, and remote wipe on mobile devices. Train staff, test your contingency plan, and confirm BAAs require vendors to protect ePHI.

What steps must be taken if a HIPAA breach occurs?

Contain and investigate the incident, then complete a breach risk assessment. If unsecured PHI was compromised, notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. Report to HHS as required, and if 500 or more residents of a state or jurisdiction are affected, notify prominent media. Follow your BAAs for business associate reporting, offer mitigation (such as credit monitoring when appropriate), and document actions taken to satisfy breach notification requirements.

How are psychotherapy notes treated differently under HIPAA?

Psychotherapy notes are given special protection: they must be stored separately, are generally excluded from the client’s right of access, and usually require a specific authorization for use or disclosure beyond limited exceptions. Keep clinical information like diagnoses, treatment plans, and progress notes out of psychotherapy notes and in the standard record subject to typical Privacy Rule provisions.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles