HIPAA Rules for Physical Therapists: A Practical Compliance Guide

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Rules for Physical Therapists: A Practical Compliance Guide

Kevin Henry

HIPAA

March 27, 2026

6 minutes read
Share this article
HIPAA Rules for Physical Therapists: A Practical Compliance Guide

HIPAA Applicability to Physical Therapists

Most physical therapists are covered entities under HIPAA because they transmit health information electronically for billing, eligibility checks, or claims. If you conduct any of these standard transactions, you must comply with the HIPAA Rules for Physical Therapists across privacy, security, and breach notification requirements.

Protected Health Information (PHI) includes any individually identifiable health data you create, receive, maintain, or transmit in any form. Electronic PHI (ePHI) is the subset stored or sent electronically. Even small or solo practices must protect PHI if they are covered entities, and they remain responsible for vendors that handle PHI on their behalf through Business Associate Agreements.

Rare cash-only practices that never conduct covered transactions may fall outside HIPAA’s scope; however, state privacy laws, ethical duties, and patient trust still call for strong safeguards that mirror HIPAA standards.

HIPAA Privacy Rule

The Privacy Rule governs how you use and disclose PHI. You may use or disclose PHI without patient authorization for treatment, payment, and healthcare operations (TPO). Outside TPO, obtain a valid written authorization unless another narrow exception applies (for example, certain public health or legal requirements).

Apply the minimum necessary standard to limit PHI for non-treatment uses. Provide patients with a clear Notice of Privacy Practices that explains your uses, disclosures, and their rights. When possible, use de-identified information for training or research by removing direct identifiers or applying an expert determination method.

Operationalize privacy through role-based access, verification of requestors, discreet communication practices at the front desk, and consistent documentation of authorizations, restrictions, and disclosures.

HIPAA Security Rule

The Security Rule requires you to safeguard ePHI via administrative, physical, and technical safeguards. Start with a formal risk analysis and recurring risk assessments to identify threats, vulnerabilities, and the likelihood and impact of harm, then implement and document risk management actions.

Technical safeguards focus on Access Controls and system protections. Use unique user IDs, role-based permissions, automatic logoff, and multi-factor authentication. Enable audit controls to log access and changes, apply integrity protections to prevent improper alteration, and secure transmission with encryption. While some measures are “addressable,” you must implement them if reasonable and appropriate—or document an equivalent alternative.

Physical safeguards close gaps around devices and facilities. Secure workstations, control facility access, protect portable media, and maintain secure disposal processes for drives and documents.

HIPAA Breach Notification Rule

A breach is any impermissible acquisition, access, use, or disclosure of unsecured PHI that compromises privacy or security. You must perform a documented risk assessment considering: the nature and extent of PHI involved, the unauthorized recipient, whether PHI was actually viewed or acquired, and the extent of mitigation. If the risk is not low, notification is required.

Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. Report breaches to HHS, and if 500 or more residents of a state or jurisdiction are affected, notify prominent media. Business associates must notify your practice of breaches they discover so you can coordinate timely Breach Notification to individuals and regulators.

Encrypt ePHI at rest and in transit to take advantage of the “unsecured PHI” standard—properly encrypted data generally does not trigger breach notification if lost or stolen. Maintain incident response procedures, retain documentation, and test your processes.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Patient Rights Under HIPAA

Patients have the right to access their PHI in a designated record set within 30 days (with one permissible 30-day extension if needed). Provide it in the form and format requested if readily producible, including secure electronic delivery; charge only reasonable, cost-based fees.

They may request amendments to incorrect or incomplete PHI, ask for confidential communications (for example, by alternate address), and request restrictions on certain disclosures. Patients also have a right to an accounting of disclosures and to receive your Notice of Privacy Practices describing these rights.

Build workflows that verify identity, log requests, track deadlines, and deliver records securely. Train staff to communicate timeframes, fees, and denial/appeal options clearly and respectfully.

Business Associate Agreements

Business associates are vendors that create, receive, maintain, or transmit PHI for your practice—such as EHR and billing platforms, cloud storage providers, IT support, telehealth platforms, dictation services, and shredding vendors. Before sharing PHI, you must execute Business Associate Agreements (BAAs) that bind them to HIPAA-compliant safeguards and Breach Notification duties.

Each BAA should define permitted uses/disclosures, require compliance with the Security Rule, mandate prompt incident and breach reporting, flow HIPAA obligations down to subcontractors, and address return or destruction of PHI at termination. Maintain an up-to-date inventory of business associates, review BAAs periodically, and perform due diligence (for example, security questionnaires and independent attestations).

For vendors that never touch PHI (for example, a general office supply provider), a BAA is not required. When in doubt, map the data flows first, then scope BAAs precisely to actual PHI handling.

Administrative Safeguards

Administrative safeguards translate policy into daily practice. Appoint a security official, conduct an initial risk analysis, and repeat risk assessments regularly. Use findings to drive a prioritized remediation plan with clear owners and timelines.

  • Information access management: define role-based minimum necessary access and approve changes promptly.
  • Workforce security: screen new hires, authorize access, supervise appropriately, and revoke access at termination.
  • Security awareness and training: provide onboarding and ongoing training, phishing simulations, and reminders.
  • Security incident procedures: detect, report, contain, and investigate incidents; preserve logs and evidence.
  • Contingency planning: maintain data backups, disaster recovery, and emergency mode operations with periodic testing.
  • Evaluation: review technical, environmental, and regulatory changes; update policies and controls accordingly.
  • Sanction policy: enforce consequences for violations consistently to reinforce a culture of compliance.

Document everything—policies, procedures, Risk Assessments, training rosters, system activity reviews, and vendor oversight. Strong records demonstrate good-faith compliance and accelerate incident response, audits, or investigations.

Conclusion

By scoping applicability, honoring privacy principles, implementing robust Technical Safeguards and Access Controls, executing solid BAAs, and operationalizing Administrative Safeguards, you build a resilient HIPAA program. Treat compliance as an ongoing cycle of risk management, training, and improvement that protects patients and your practice.

FAQs.

What are the HIPAA requirements for physical therapists?

If you are a covered entity, you must follow the Privacy, Security, and Breach Notification Rules: protect PHI/ePHI, limit uses and disclosures, provide required patient rights, complete Risk Assessments, train your workforce, oversee vendors with Business Associate Agreements, and respond to incidents promptly.

How must physical therapists protect electronic PHI?

Secure ePHI through layered Technical Safeguards and Access Controls: unique IDs, role-based permissions, MFA, automatic logoff, encryption in transit and at rest, audit logging, integrity checks, regular patching, secure backups, and continuous risk management and monitoring.

What are the penalties for HIPAA violations?

Penalties range from corrective action plans to significant civil monetary penalties, which scale by the level of negligence and can reach substantial annual maximums. Violations may also trigger breach reporting, reputational harm, and contractual consequences under BAAs.

How do BAAs impact physical therapy practices?

BAAs contractually require vendors to safeguard PHI, report incidents, and flow HIPAA duties to subcontractors. They clarify responsibilities, reduce risk, and help you demonstrate due diligence—allowing you to use third-party services while maintaining HIPAA compliance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles