HIPAA Telemedicine Compliance Checklist: Step-by-Step Requirements for Secure Virtual Care (2025)
Delivering virtual care in 2025 demands more than a video link. You need a disciplined, end-to-end program that protects patient privacy, secures PHI across systems, and proves compliance when audited. This HIPAA telemedicine compliance checklist walks you through practical, step-by-step requirements for secure virtual care.
Use the sections below to assess readiness, capture consent, harden security, finalize Business Associate Agreements, train your team, maintain documentation, and run ongoing risk assessments and security audits. Each step maps to core HIPAA expectations and telehealth-specific risks you face today.
Telemedicine Readiness Assessment
Define your program and scope
Start by defining which services you will offer via telehealth (e.g., acute care, behavioral health, chronic care management) and which modalities you’ll use (video, audio-only, asynchronous messaging). Clarify when in-person follow-up is required and how you will route emergencies.
Policy and licensure readiness
Confirm Telehealth Licensure Compliance for every state where patients will be located at the time of service. Align credentialing, supervision, and prescribing rules with your clinical model. Update your privacy notice and telemedicine policies so they match actual workflows.
Technology and workflow baseline
Inventory platforms that will touch PHI—EHR, video, messaging, storage, e-prescribing, and support tools. Map PHI data flows end to end to identify where PHI is created, viewed, stored, or transmitted. Establish PHI Access Controls and audit logging before you go live.
Readiness checklist
- Define telemedicine services, inclusion/exclusion criteria, and emergency routing.
- Verify licensure, prescribing, and supervision rules for each service area.
- Document data flows and third parties that handle PHI.
- Confirm access roles, audit trails, and minimum necessary standards.
- Choose a secure platform that supports Encrypted Data Transmission and recording controls.
Obtain and Document Patient Consent
What consent must cover
Your consent should explain telehealth benefits and limitations, privacy and security risks, participant roles, backup plans for outages, financial responsibility, and how to withdraw consent. Include how you secure data, how visits are recorded (or not), and what is shared with other providers.
How to capture consent
Use e-signature or attested verbal consent with a time stamp captured in the EHR. Record the patient’s location, identity verification method, modality used, and anyone else present. Provide patients a copy of the consent and your privacy practices in accessible formats.
Special cases
For minors or patients with proxies, verify authority and retain supporting documentation. Provide language access and disability accommodations, and document them. Re-consent if you materially change platforms or workflows that affect privacy or security.
Consent checklist
- Standardize consent text for all telemedicine services and modalities.
- Capture identity, location, modality, and participants in every encounter.
- Store consent and attestations with encounter notes for audit readiness.
- Re-consent when workflows, vendors, or data uses change.
Implement Privacy and Security Measures
Apply the HIPAA Security Rule
Implement administrative, physical, and technical safeguards that reflect telehealth realities. Administrative safeguards include policies, workforce training, and a documented risk analysis. Physical safeguards protect workstations and devices. Technical safeguards enforce access, integrity, auditability, and transmission security.
Strengthen PHI access controls
- Role-based access with least privilege and unique user IDs.
- Multi-factor authentication for remote access and admin roles.
- Automatic timeouts, session lock, and device encryption.
- Routine access reviews and removal of stale accounts.
Encrypted data transmission and storage
- Use Encrypted Data Transmission for all sessions and APIs.
- Encrypt PHI at rest across servers, databases, and endpoint devices.
- Harden mobile and BYOD with MDM, screen privacy, and remote wipe.
- Secure backups with tested restoration procedures.
Secure patient authentication
Adopt Secure Patient Authentication aligned to risk: strong portal credentials, second-factor verification, and pre-visit identity checks when needed (e.g., photo ID match or verification codes). Apply step-up authentication for sensitive actions like sharing visit recordings or releasing results.
Create an incident response plan
Maintain an Incident Response Plan that defines how you detect, triage, contain, investigate, and report security events. Pre-assign roles, escalation paths, and breach notification timelines. Rehearse the plan with tabletop exercises and capture lessons learned.
Operational privacy practices
- Use private spaces, headsets, and screen privacy filters for visits.
- Disable unnecessary recording; control screenshots and file transfers.
- Publish patient etiquette and safety instructions before visits.
- Monitor audit logs for anomalous access and export alerts.
Sign Business Associate Agreements
Identify business associates
Any vendor that creates, receives, maintains, or transmits PHI for your telemedicine program needs a Business Associate Agreement. Typical examples include video platforms, cloud storage, contact centers, e-prescribing, analytics, transcription, and IT support.
What to include in each BAA
- Permitted uses/disclosures and the minimum necessary principle.
- Safeguards aligned to the HIPAA Security Rule and subcontractor flow-downs.
- Breach and incident reporting requirements with timelines.
- Right to audit, data return/destruction, and termination provisions.
Vendor due diligence
Evaluate vendors’ security posture, PHI Access Controls, encryption practices, uptime commitments, and support processes. Confirm the platform’s capabilities for audit logs, role-based access, and Encrypted Data Transmission before signing.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
BAA checklist
- Inventory all vendors touching PHI and confirm BAA status.
- Review security controls, incident response, and subcontractor terms.
- Store executed BAAs centrally and track renewal dates.
Conduct Staff Training and Education
Training scope
Train all workforce members on privacy, the HIPAA Security Rule, phishing awareness, secure device use, and telehealth etiquette. Include scripts for identity verification, emergency escalation, and communicating limitations of virtual care.
Frequency and proof
Provide training at onboarding and refresh at least annually, with targeted updates after incidents or technology changes. Keep signed attestations, completion dates, and test scores to prove competency.
Role-based practice
Run scenario drills by role—front desk, clinicians, IT, and compliance. Practice downtime procedures, Secure Patient Authentication workflows, and containment steps from the Incident Response Plan.
Training checklist
- Standard curriculum covering privacy, security, and telemedicine workflow.
- Role-based simulations and documented drills.
- Annual refreshers and ad hoc updates after changes or findings.
Maintain Comprehensive Telemedicine Documentation
Clinical encounter documentation
For each visit, document consent, patient identity and location, modality, participants, time spent, clinical findings, orders, and follow-up. Note when in-person evaluation is recommended and any technical issues that affected care.
Program and compliance records
Maintain current policies and procedures, executed Business Associate Agreements, risk analyses, security audits, access reviews, and incident logs. Store training rosters, competency results, and corrective action plans in one retrievable repository.
Retention and access
Apply retention schedules that satisfy state, federal, and payer requirements. Control access to records using PHI Access Controls and document who can retrieve logs, recordings, or messages and under what circumstances.
Documentation checklist
- Encounter notes include consent, identity, location, modality, and participants.
- Central repository for policies, BAAs, risk assessments, and audits.
- Retention schedules and access controls documented and enforced.
Perform Regular Risk Assessments and Security Audits
Risk analysis process
Identify assets (platforms, endpoints, data stores), threats, vulnerabilities, and the likelihood and impact of each risk. Include remote workstations, personal devices, third-party services, and data integrations used in telehealth.
Security audits and tests
- Validate Encrypted Data Transmission and encryption at rest.
- Review access logs and administrative actions; test break-glass processes.
- Run vulnerability scans and periodic penetration tests on internet-facing systems.
- Execute phishing tests and tabletop exercises aligned to your Incident Response Plan.
Remediation and monitoring
Track findings to closure with owners, deadlines, and evidence of fix. Monitor for recurrence and update policies, training, or BAAs when changes affect risk. Document decisions where you accept residual risk and why.
Cadence
Perform a formal risk assessment at least annually and whenever you make material changes to platforms, vendors, locations, or workflows. Conduct routine security audits quarterly and targeted reviews after incidents.
Conclusion
Telemedicine compliance is a continuous program, not a one-time project. By validating licensure, obtaining robust consent, enforcing PHI Access Controls, using Encrypted Data Transmission, executing Business Associate Agreements, training your team, documenting thoroughly, and auditing regularly, you can deliver secure virtual care that meets HIPAA expectations in 2025.
FAQs.
What are the key HIPAA requirements for telemedicine?
Core requirements include safeguarding PHI under the HIPAA Security Rule, limiting access to the minimum necessary, using secure platforms with Encrypted Data Transmission, executing Business Associate Agreements with vendors, obtaining and documenting informed consent, verifying patient identity, maintaining audit logs, training staff, and performing periodic risk assessments with an Incident Response Plan ready to execute.
How do providers ensure secure patient authentication in telehealth?
Use a risk-based approach: strong portal credentials, multi-factor authentication for remote access, pre-visit identity checks (e.g., code sent to a verified device or photo ID match), and step-up verification for sensitive actions like releasing results or changing contact information. Enforce session timeouts, device encryption, and audit logs to detect suspicious access.
What documentation is required for HIPAA-compliant telemedicine services?
Document consent, identity verification, patient location, modality, participants, clinical notes, orders, and follow-up. Keep program records such as policies, executed Business Associate Agreements, risk analyses, security audits, training logs, access reviews, and incident reports. Retain these per applicable requirements and control retrieval via PHI Access Controls.
How often should risk assessments be conducted for telemedicine compliance?
Conduct a comprehensive risk assessment at least annually and whenever you introduce significant changes—new platforms, vendors, workflows, or locations. Follow up with quarterly security audits and targeted reviews after incidents, and track all remediation to closure.
Table of Contents
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.