HIPAA Rules for Psychologists: Key Requirements and Compliance Checklist

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Rules for Psychologists: Key Requirements and Compliance Checklist

Kevin Henry

HIPAA

December 29, 2025

10 minutes read
Share this article
HIPAA Rules for Psychologists: Key Requirements and Compliance Checklist

HIPAA Compliance for Psychologists

HIPAA rules for psychologists set national standards for safeguarding Protected Health Information (PHI) and electronic PHI (ePHI). If you provide health care services and transmit claims or use Electronic Health Records, you are typically a covered entity and must implement the Privacy Rule, the Security Rule, and the Breach Notification Rule.

Compliance is risk-based and ongoing. You are responsible for your workforce and for any vendors who handle PHI on your behalf, which is why a signed Business Associate Agreement is mandatory before sharing PHI with a third party.

Quick compliance checklist

  • Designate a privacy officer and a security officer; define roles and decision-making authority.
  • Complete and document an enterprise-wide risk analysis; implement risk management actions and track progress.
  • Publish a Notice of Privacy Practices; implement Privacy Rule Implementation procedures for uses, disclosures, and patient rights.
  • Harden your Electronic Health Records and connected systems with administrative, physical, and Technical Safeguards.
  • Execute a Business Associate Agreement with each vendor that creates, receives, maintains, or transmits PHI for you.
  • Train your workforce on the Minimum Necessary Standard, secure communication, and incident response; refresh at least annually.
  • Prepare for incidents with a written Breach Notification plan, response playbooks, and templated letters.
  • Document everything and retain required records for the legally mandated period.

Key terms you should know

  • Protected Health Information (PHI): Identifiable health information in any form. ePHI is PHI in electronic form.
  • Psychotherapy notes: Separate notes documenting or analyzing counseling sessions; they receive heightened protection.
  • Designated record set: Medical/billing records used to make decisions about individuals; patients have a right to access these.

HIPAA Privacy Rule

The Privacy Rule governs how you use and disclose PHI and how you honor patient rights. Effective Privacy Rule Implementation means translating policy into daily workflows at intake, during treatment, and when releasing information.

PHI and permitted uses/disclosures

  • You may use or disclose PHI without authorization for treatment, payment, and health care operations.
  • Most other disclosures require a valid, written authorization. Psychotherapy notes usually require a separate authorization.
  • Disclosures allowed or required by law include public health reporting, certain law enforcement requests, and serious threat mitigation.

Minimum Necessary Standard

Outside of treatment, access, use, and disclosure must be limited to the minimum necessary to accomplish the purpose. Configure role-based access in your EHR, redact unneeded elements before releasing records, and tailor routine reports so they contain only what recipients need.

Patient rights and required notices

  • Right of access: Provide access to the designated record set within 30 days (one permitted extension); offer electronic copies if readily producible.
  • Right to request amendment, restrictions, and confidential communications (for example, alternate addresses or phone numbers).
  • Accounting of certain disclosures not for treatment, payment, or operations.
  • Notice of Privacy Practices: Give and post your NPP; obtain and retain acknowledgments of receipt.

Privacy Rule Implementation roadmap

  • Standardize intake, consent, and authorization forms; separate psychotherapy notes from general records.
  • Create a release-of-information workflow with identity verification, review, and approval steps.
  • Map typical disclosures (insurers, care coordinators, family when authorized) and embed Minimum Necessary Standard controls.
  • Develop de-identification and limited data set procedures for training, research, or quality improvement.

HIPAA Security Rule

The Security Rule protects ePHI and requires administrative, physical, and technical safeguards. Some specifications are “required”; others are “addressable,” meaning you must implement them as stated or document an equivalent, reasonable alternative.

Administrative safeguards

  • Risk analysis and risk management with documented remediation plans and timelines.
  • Workforce security, authorization/clearance, and a sanctions policy for violations.
  • Security awareness training, including phishing/social engineering and secure telehealth practices.
  • Contingency planning: data backup, disaster recovery, and emergency mode operations, with periodic testing.
  • Vendor management and Business Associate Agreement oversight.

Physical safeguards

  • Facility access controls and visitor procedures; secure file rooms and networking closets.
  • Workstation security and screen privacy; clean desk policy for mixed paper/electronic settings.
  • Device and media controls: inventory, encryption, secure disposal, and re-use sanitization.
  • Telework controls for home offices, including locked storage and limited family access to devices.

Technical Safeguards

  • Unique user IDs, role-based access, and multi-factor authentication for Electronic Health Records and portals.
  • Automatic logoff, session timeouts, and strong password policies.
  • Encryption in transit and at rest; secure email and messaging solutions for PHI.
  • Audit controls and activity review; alerting for unusual access patterns.
  • Integrity controls, anti-malware, and timely patching of systems and mobile devices.

Contingency planning for Electronic Health Records

  • Daily encrypted backups stored offsite or in secure cloud environments.
  • Documented downtime procedures so you can treat patients when systems are unavailable.
  • Regular restore tests and tabletop exercises to validate recovery objectives.

Breach Notification Rule

A breach is an impermissible acquisition, access, use, or disclosure of unsecured PHI that compromises its security or privacy. If PHI is rendered unusable, unreadable, or indecipherable (for example, via strong encryption), notification may not be required.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

When notification is required

  • Conduct a risk assessment considering the nature of PHI involved, who received it, whether it was actually viewed, and mitigation actions taken.
  • If risk indicates compromise, notify affected individuals without unreasonable delay and no later than 60 calendar days from discovery.
  • Report breaches to the federal authority: for fewer than 500 individuals, no later than 60 days after the end of the calendar year; for 500 or more in a state or jurisdiction, notify within 60 days and inform prominent media.
  • Business associates must notify you of their incidents so you can meet deadlines; your BAA should set prompt internal reporting timeframes.

Breach response workflow

  • Identify and contain the incident; preserve logs and evidence.
  • Analyze scope, affected systems, and data elements; consult your risk assessment factors.
  • Mitigate harms (for example, misdirected fax retrieval, account lockouts, password resets).
  • Issue required notices with clear steps patients can take and what you are doing to prevent recurrence.
  • Document every decision and update your risk management plan and training.

Common breach scenarios in psychology practices

  • Misdirected email, fax, or portal message containing diagnosis or session details.
  • Lost or stolen unencrypted smartphone or laptop with therapy schedules or notes.
  • Unauthorized staff snooping in EHRs beyond their job role.
  • Vendor misconfiguration exposing appointment reminders or billing details.

Risk Assessment and Management

A HIPAA risk assessment identifies where PHI and ePHI live, the threats and vulnerabilities affecting them, and the likelihood and impact of those risks. Risk management then selects and implements reasonable and appropriate controls, tracking residual risk over time.

Practical steps

  1. Inventory systems handling PHI: Electronic Health Records, patient portal, email, cloud storage, billing, telehealth, and mobile devices.
  2. Map PHI data flows from intake to archival and disposal.
  3. Catalog threats (loss, theft, hacking, error) and vulnerabilities (weak passwords, shared accounts, unlocked offices).
  4. Score likelihood and impact; rank risks to prioritize remediation.
  5. Select controls: policy, process, and technology aligned to the Security Rule’s safeguards.
  6. Assign owners, deadlines, and success metrics; record decisions and alternatives for addressable items.
  7. Test controls, monitor effectiveness, and adjust after incidents or technology changes.
  8. Repeat at least annually and whenever you adopt new systems or workflows.

Common high-impact risks in psychology settings

  • Unencrypted mobile devices storing notes or voicemail transcripts.
  • Use of personal email or texting for PHI without secure solutions.
  • Overly broad EHR access that ignores the Minimum Necessary Standard.
  • Third-party scheduling or telehealth tools without a Business Associate Agreement.

Business Associate Agreements

A business associate is any vendor that creates, receives, maintains, or transmits PHI for you. Examples include EHR platforms, billing services, cloud storage, telehealth tools, IT providers, transcription, and shredding services. You must have a signed Business Associate Agreement before sharing PHI.

What a Business Associate Agreement must include

  • Permitted and required uses/disclosures and the Minimum Necessary Standard.
  • Safeguard obligations aligned to the Security Rule and incident reporting duties.
  • Prompt breach and security incident notification to you, with defined timelines.
  • Subcontractor flow-down: vendors must bind their own subcontractors to the same protections.
  • Individual rights support (access, amendment) and HHS access to records if needed.
  • Return or secure destruction of PHI at termination; remedies and termination rights for violations.

Managing business associate risk

  • Perform vendor due diligence: security features, encryption, audit logs, uptime, and breach history.
  • Maintain a current vendor inventory and BAA repository; track renewal dates.
  • Review SOC reports or security attestations when available and address findings.

Training and Documentation

Train all workforce members before they access PHI and refresh regularly. Cover the Privacy Rule, Security Rule, Breach Notification, secure telepsychology practices, social engineering, and your incident reporting channels.

Required documentation and retention

  • Policies and procedures, risk analyses, risk management plans, training records, BAAs, incident logs, and sanctions—retained for at least six years from the date created or last in effect.
  • Notice of Privacy Practices, acknowledgments, authorizations, and access request responses.
  • Asset inventories, system configurations, audit logs reviews, and contingency plan tests.

Operationalizing Privacy Rule Implementation

  • Embed identity verification, Minimum Necessary Standard checks, and approval steps into every release-of-information workflow.
  • Configure EHR templates to separate psychotherapy notes from the designated record set.
  • Standardize secure messaging for appointment reminders and limit content to the minimum necessary.

Compliance calendar and monitoring

  • Quarterly: access log reviews, phishing simulations, device inventory checks.
  • Annually: full risk assessment, policy updates, contingency plan tests.
  • Ongoing: vendor monitoring, incident drills, and corrective action tracking.

Conclusion

By aligning daily workflows with the Privacy Rule, fortifying systems under the Security Rule, and preparing for Breach Notification, you can protect patient trust and meet HIPAA’s expectations. Use the checklist, document your decisions, and revisit risks as your practice evolves.

FAQs

What are the main HIPAA rules psychologists must follow?

You must comply with three core rules: the Privacy Rule (who may access PHI and when), the Security Rule (how you safeguard ePHI through administrative, physical, and Technical Safeguards), and the Breach Notification Rule (how and when you notify after an incident). Effective compliance also requires Business Associate Agreements, workforce training, and thorough documentation.

How should psychologists conduct a HIPAA risk assessment?

Identify where PHI/ePHI resides, map data flows, and list threats and vulnerabilities. Rate likelihood and impact, prioritize the biggest risks, and choose reasonable controls. Document decisions—especially for addressable specifications—assign owners and deadlines, test controls, and repeat at least annually or after major changes.

When is breach notification required under HIPAA?

After an impermissible use or disclosure of unsecured PHI, perform a risk assessment. If there is a significant risk of compromise, notify affected individuals without unreasonable delay and no later than 60 days from discovery. For larger incidents, report to regulators within required timelines and, for 500 or more individuals in a jurisdiction, notify prominent media outlets.

What technical safeguards are required for electronic health records?

Implement unique user IDs, role-based access, multi-factor authentication, automatic logoff, encryption in transit and at rest, audit controls with regular review, integrity protections, and secure transmission methods. Patch systems promptly and restrict remote access. Where a safeguard is “addressable,” implement it or document an equivalent alternative and your rationale.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles