How Psychologists Can Avoid HIPAA Violations: Best Practices and a Compliance Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

How Psychologists Can Avoid HIPAA Violations: Best Practices and a Compliance Checklist

Kevin Henry

HIPAA

September 04, 2025

9 minutes read
Share this article
How Psychologists Can Avoid HIPAA Violations: Best Practices and a Compliance Checklist

HIPAA Compliance for Psychologists

HIPAA sets national standards for protecting patients’ health information and applies to solo psychologists, group practices, and larger clinics alike. Your goal is to prevent unauthorized access, use, or disclosure of protected health information while enabling effective treatment, billing, and operations.

Because you regularly document sensitive encounters, manage electronic protected health information, and work with third‑party vendors, you need a practical plan that translates regulations into daily routines your staff can follow.

Compliance Checklist

  • Assign a Privacy Officer and a Security Officer (one person may fill both roles) and document responsibilities.
  • Complete a written risk analysis covering electronic protected health information (ePHI); implement and document risk management actions.
  • Adopt policies for minimum necessary use, access control, retention, incident response, and patient rights workflows.
  • Provide and post your Notice of Privacy Practices; obtain and retain acknowledgment of receipt.
  • Execute business associate agreements before sharing any PHI with vendors or contractors.
  • Implement administrative safeguards, physical safeguards, and technical safeguards with periodic evaluations.
  • Maintain logs for access, disclosures, device inventory, and policy updates.
  • Establish a breach response plan aligned with the breach notification rule, including timelines and templates.
  • Train all workforce members at hire and periodically; record attendance and comprehension.
  • Test backups and recovery, audit user activity, and update plans after changes or incidents.

Common Pitfalls to Avoid

  • Texting PHI through unsecured apps or personal devices.
  • Uploading psychotherapy notes into the general clinical record or EHR.
  • Oversharing beyond the minimum necessary standard, especially with family or schools.
  • Using cloud tools without business associate agreements or proper configurations.
  • Leaving paper files, screens, or dictation devices visible to others.

Privacy Rule Requirements

The Privacy Rule governs when you may use or disclose PHI and grants patients rights over their information. For most routine care, disclosure is permitted for treatment, payment, and health care operations. Outside those purposes, you typically need a valid, specific patient authorization.

Core Principles

  • Minimum necessary: limit PHI shared to the least needed to accomplish the purpose.
  • Role‑based access: define who in your practice may access what PHI and why.
  • Patient rights: enable access, amendments, restrictions, confidential communications, and an accounting of certain disclosures.

Notice of Privacy Practices

Give each new patient your Notice of Privacy Practices (NPP) at the first encounter, make a good‑faith effort to obtain written acknowledgment, and keep it on file. Post the NPP prominently in your office and, if you maintain a website, make it available there as well. Update and redistribute the NPP when policies materially change.

Action Steps

  • Use standardized authorization forms for non‑routine disclosures; verify identity before releasing records.
  • Respond to access requests within 30 days; document reasons for any permissible extension.
  • Apply minimum necessary to routine workflows (e.g., billing details, school letters, care coordination).
  • De‑identify information when using cases for training, consultation groups, or presentations.

Security Rule Requirements

The Security Rule focuses on protecting ePHI through administrative safeguards, physical safeguards, and technical safeguards. Your implementation must be reasonable for your size and environment, but you must document decisions and periodically reevaluate them.

Administrative Safeguards

  • Risk analysis and risk management plan with review dates and owners.
  • Designated Security Officer; written policies; workforce security and termination checklists.
  • Security awareness training, phishing education, and sanctions for violations.
  • Contingency planning: data backup, disaster recovery, and emergency operations procedures.
  • Vendor oversight and business associate agreements; periodic evaluations and audits.

Physical Safeguards

  • Facility access controls, visitor sign‑in, and locked file/storage rooms.
  • Workstation placement to prevent shoulder surfing; privacy screens as needed.
  • Device and media controls: inventory, encryption, secure disposal (e.g., shredding, wiping), and safe transport of laptops or drives.

Technical Safeguards

  • Unique user IDs, role‑based permissions, and multi‑factor authentication.
  • Automatic logoff, session timeouts, and audit logs with periodic review.
  • Encryption in transit and at rest for email, EHR, backups, and portable devices.
  • Integrity controls, endpoint protection, timely patching, and secure remote access (e.g., VPN).

Security Checklist

  • Encrypt all practice devices and enable remote wipe on mobile devices.
  • Disable auto‑forwarding of clinical email to personal accounts; restrict copy/print.
  • Use secure telehealth platforms with access controls and session waiting rooms.
  • Review audit logs monthly; investigate anomalies and document outcomes.

Business Associate Agreements

Business associates are vendors who create, receive, maintain, or transmit PHI on your behalf. Common examples include EHR providers, billing services, transcriptionists, cloud storage, IT support, secure messaging tools, and shredding services.

When and Why BAAs Are Required

Execute business associate agreements before any PHI is shared. If your vendor uses subcontractors, require them to flow down the same protections. Do not rely on consumer‑grade tools that refuse to sign BAAs.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

What Strong BAAs Include

  • Permitted and required uses/disclosures and a commitment to minimum necessary.
  • Administrative, physical, and technical safeguards appropriate to the risk.
  • Prompt reporting of incidents and breaches, with cooperation on investigations.
  • Assurance that subcontractors are bound by equivalent terms.
  • Support for patient rights (access, amendments) when vendors hold ePHI.
  • Return or secure destruction of PHI at contract end and rights to audit/verify.

Practical Tips

  • Maintain a central repository of signed BAAs and renewal dates.
  • Document vendor due diligence (security posture, certifications, data locations).
  • Limit vendor access to only the systems and data needed for their tasks.

Breach Notification Procedures

A breach is an unauthorized acquisition, access, use, or disclosure of unsecured PHI that compromises privacy or security. Conduct a documented four‑factor risk assessment to determine whether there is a low probability of compromise or if notification is required.

Immediate Response Steps

  • Contain: disable accounts, recover misdirected messages, and secure devices.
  • Preserve: save logs, screenshots, and emails; avoid altering evidence.
  • Assess: evaluate what PHI was involved, who received it, whether it was viewed, and mitigation performed.
  • Encrypt retroactively where possible and implement corrective actions to prevent recurrence.

Whom to Notify and When

  • Individuals: without unreasonable delay and no later than 60 calendar days after discovery.
  • Department of Health and Human Services (HHS): for 500+ affected individuals, within 60 days; for fewer than 500, report within 60 days of the end of the calendar year.
  • Media: if 500+ residents of a state or jurisdiction are affected.
  • Law enforcement delay: permitted when notification would impede a criminal investigation; document the request.

Documentation Essentials

  • Maintain your risk assessment, decision rationale, notification letters, and mailing proofs.
  • Record remediation steps, staff retraining, and policy revisions.
  • Track all incidents, including those that did not meet the definition of a reportable breach.

Staff Training Requirements

HIPAA requires training for all workforce members as appropriate to their roles. New staff should be trained before accessing PHI, and everyone should receive periodic updates, especially after policy changes or security incidents.

Build a Practical Training Plan

  • Orientation: privacy basics, minimum necessary, reporting concerns, and workstation hygiene.
  • Security awareness: passwords, phishing, secure messaging, and device safeguards.
  • Role‑based modules: front desk release protocols, clinician documentation, telehealth etiquette.
  • Drills: breach tabletop exercises and simulated phishing campaigns.

Frequency and Proof

Provide training at hire and at least annually, with refresher sessions as needed. Keep records of dates, content covered, attendees, scores or attestations, and any corrective actions for staff who fall short.

Psychotherapy Notes Protocols

Psychotherapy notes are your personal notes documenting or analyzing the contents of counseling conversations. They are distinct from the clinical record and receive heightened protection under HIPAA.

What Counts—and What Does Not

  • Psychotherapy notes include your impressions, hypotheses, or process notes kept separate from the general medical record.
  • They do not include medication details, session start/stop times, modalities, frequencies, results of tests, diagnoses, treatment plans, or summaries needed for billing or care coordination.

Authorization and Limited Exceptions

Do not use or disclose psychotherapy notes without the patient’s specific authorization, except in limited circumstances such as training by the originator, defending yourself in legal actions, complying with certain legal obligations, or to regulators for compliance reviews.

Storage and Access Controls

  • Keep psychotherapy notes physically or logically separate from the designated record set.
  • Restrict access to the originator or a small, defined group; avoid storing them in standard EHR modules.
  • Apply strong technical safeguards, including encryption, unique user IDs, and audit logs.
  • Confirm your vendor’s handling of these notes in writing; include terms in business associate agreements if stored electronically.

Conclusion

Build compliance into daily practice: follow the Privacy Rule’s minimum necessary standard, implement layered Security Rule safeguards, lock down vendor relationships with strong BAAs, prepare for incidents under the breach notification rule, train your team, and handle psychotherapy notes with extra care. When policies, technology, or staffing change, revisit your risk analysis and update your plan.

FAQs.

What are common HIPAA violations among psychologists?

Frequent issues include unsecured texting or email containing PHI, failure to obtain acknowledgment of the Notice of Privacy Practices, missing or outdated business associate agreements, leaving paper files or screens exposed, over‑disclosure beyond the minimum necessary, and storing psychotherapy notes in the general record. Gaps in staff training and lax device security are also common contributors.

How should psychologists handle psychotherapy notes under HIPAA?

Keep psychotherapy notes separate from the clinical record, restrict access to the originator or a very limited group, and do not disclose them without a specific patient authorization except for narrow exceptions. Apply heightened technical safeguards if stored electronically and confirm vendor obligations in writing.

What steps should psychologists take after a data breach?

Contain the incident immediately, preserve evidence, and perform a four‑factor risk assessment. If notification is required, notify affected individuals without unreasonable delay and no later than 60 days, notify HHS based on the size of the breach, and notify the media if 500 or more residents of a state or jurisdiction are affected. Document actions, retrain staff, and remediate root causes.

How often must staff receive HIPAA training?

Train new workforce members before they access PHI and provide periodic refresher training—commonly at least annually. Conduct additional training whenever policies, technology, or risks change, and keep detailed records to demonstrate compliance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles