How to Email PHI Securely: HIPAA-Compliant Methods, Risks, and Examples

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Email PHI Securely: HIPAA-Compliant Methods, Risks, and Examples

Kevin Henry

HIPAA

September 14, 2024

7 minutes read
Share this article
How to Email PHI Securely: HIPAA-Compliant Methods, Risks, and Examples

Emailing Protected Health Information (PHI) is fast and convenient, but it introduces compliance and security risks. This guide explains how to email PHI securely using HIPAA-compliant methods, highlights common pitfalls, and gives practical examples you can adapt.

You will learn how to choose a HIPAA-ready email service with a Business Associate Agreement, apply end-to-end encryption and other technical safeguards, set policies and training, and prepare for incidents and a HIPAA compliance audit.

HIPAA-Compliant Email Service Selection

Core requirements to expect

  • Executed Business Associate Agreement (BAA) with clear responsibilities, breach cooperation, and termination terms.
  • Encryption in transit and at rest, with options for end-to-end encryption and secure messaging portal delivery.
  • Administrative controls: role-based access, multifactor authentication, conditional access, and least-privilege defaults.
  • Comprehensive logging, immutable audit trails, and exportable reports that support a HIPAA compliance audit.
  • Data Loss Prevention (DLP) policies that detect PHI patterns and automatically encrypt, quarantine, or block messages.
  • Archiving, retention, legal hold, and eDiscovery features aligned to recordkeeping obligations.
  • Mobile device management (MDM) to enforce device encryption, screen locks, and remote wipe.
  • Email authentication (SPF, DKIM, DMARC) to reduce spoofing and protect patients from phishing.

Vendor evaluation checklist

  • Confirm HIPAA program maturity: security certifications, risk management cadence, and incident response commitments.
  • Test TLS enforcement to common partner domains and ensure fallback to portal-based encryption when TLS is unavailable.
  • Review DLP templates for PHI identifiers and verify automated remediation workflows.
  • Assess key management: custody, rotation policies, and support for hardware-backed protection.
  • Pilot with a small group to validate usability, training needs, and support responsiveness.

Encryption and Transmission Safeguards

Transport vs. message-level protection

Use enforced TLS for SMTP to secure transmission between mail servers. When you need content to remain protected beyond transport, apply message-level security with S/MIME or PGP so only intended recipients can decrypt.

End-to-end encryption and secure portals

Enable end-to-end encryption for high-risk exchanges and for recipients outside your domain. If the recipient’s mail server does not support required TLS, auto-route the message to a secure messaging portal and notify the recipient to authenticate there.

Attachment and file safeguards

  • Encrypt files at rest (for example, AES-based options) and avoid sending unprotected spreadsheets with multiple patient records.
  • Share decryption passwords over a separate channel and expire access where possible.
  • Strip hidden metadata and verify that PDFs do not embed unintended PHI.

Integrity and authenticity

Digitally sign messages to prove integrity and sender identity. Combine SPF, DKIM, and DMARC to prevent spoofed senders that could trick patients into sharing PHI.

Automated controls

Use DLP to detect PHI tokens (e.g., medical record numbers) and trigger automatic encryption, quarantine, or manager approval. Log all actions for auditability and continuous improvement of technical safeguards.

Patient preferences and risk acknowledgment

HIPAA allows emailing PHI if you apply reasonable safeguards. When a patient requests unencrypted email, explain the risks in plain language, obtain written consent, and record their preference in the chart.

Minimum necessary standard

Limit PHI to the minimum necessary for the purpose. Avoid PHI in subject lines, and include only the identifiers required to ensure the message reaches the right person.

Authorization vs. TPO

For treatment, payment, and healthcare operations, disclosures generally do not require patient authorization. Uses beyond these purposes often do; follow policy and document decisions before sending any email that goes outside TPO.

Identity verification

Before emailing PHI to a patient, verify identity using two factors (for example, a known demographic plus a one-time code) or deliver via a secure messaging portal that performs identity checks.

Email Policy Development and Staff Training

Policy essentials

  • Define when email is permitted for PHI, when secure portals are mandatory, and who may approve exceptions.
  • Standardize subject lines (no PHI) and require a “[SECURE]” tag or automatic rule for messages containing PHI.
  • Require address verification, use of distribution lists approved for PHI, and double-checking attachments before sending.
  • Mandate encryption defaults, DLP coverage, and automatic journaling for compliance.
  • Set retention periods and rules for archiving, deletion, and legal holds.

Training focus areas

  • Recognize PHI and apply the minimum necessary principle in everyday email.
  • Use encryption options correctly, including portal delivery and digital signatures.
  • Prevent mistakes: verify recipients, review attachments, and avoid autofill errors.
  • Spot phishing and social engineering targeting healthcare workflows.
  • Follow the incident response playbook for misdirected or suspicious emails.

Secure Storage and Access Controls

Account and device protections

Enforce multifactor authentication, conditional access, and session timeouts. Require device encryption, screens locks, and MDM on any endpoint that accesses PHI.

Data governance

Apply retention schedules, immutable archiving, and backup protections so emails containing PHI are both recoverable and protected against tampering. Use role-based access and separation of duties for administrators.

Key and log management

Protect encryption keys with strong custody and rotation practices. Centralize logs, preserve audit trails, and regularly review them to support HIPAA compliance audits and internal oversight.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Risk Management and Incident Response

Continuous risk analysis

Maintain a living risk register for email threats such as misdelivery, forwarding to personal accounts, or unauthorized mailbox access. Map controls to each risk and track residual exposure.

Detection and response

  • Detect: monitor DLP alerts, anomalous logins, and bulk forwarding rules.
  • Contain: revoke tokens, disable compromised accounts, and recall messages or expire portal access.
  • Eradicate and recover: correct misconfigurations, rotate credentials, and restore clean data.
  • Notify: assess breach risk and notify affected parties without unreasonable delay and within regulatory deadlines.
  • Improve: run post-incident reviews, update policies, and retrain staff.

Practical Examples of Secure PHI Emailing

Appointment reminder to a patient

Subject: Appointment Reminder. Body: “Your appointment is scheduled for [date/time]. Please log in to the secure portal for details.” No diagnosis, no full DOB, and no medical record numbers in the email.

Provider-to-provider referral

Use enforced TLS or end-to-end encryption. Subject: “Referral: [Initials], [Year of Birth].” Body contains minimal clinical summary; attach encrypted PDF if needed, or send the summary through a secure messaging portal.

Patient-requested unencrypted delivery

After documenting informed consent, send only the requested records. Include a brief warning: “You asked us to send these records by regular email, which may not be fully secure.” Prefer portal delivery if the patient is willing.

Billing inquiry with identifiers

Verify identity before sharing details. Subject: “Billing Question.” Body: reference a ticket or portal message ID; avoid full account numbers or complete DOB. If specifics are required, move to the secure portal.

Misdirected email response

Immediately notify your privacy officer, attempt recall or portal expiration, ask the unintended recipient to delete the message, and document the event. Initiate the incident response workflow and update DLP rules to prevent recurrence.

Conclusion

To email PHI securely, pair a HIPAA-capable email platform and Business Associate Agreement with strong encryption, DLP, clear policies, and regular training. Reinforce these technical safeguards with ongoing risk management and audits, and route high-risk exchanges through a secure messaging portal.

FAQs.

Can I email medical records using standard email services?

Yes, if the service is configured for HIPAA compliance, a Business Associate Agreement is in place, and you enforce encryption, access controls, DLP, logging, and retention. If any of these are missing—or if the recipient cannot receive securely—deliver via a secure messaging portal instead.

What encryption standards are required for emailing PHI?

HIPAA is technology-neutral, but best practice is enforced TLS for transmission, message-level protection with S/MIME or PGP when needed, and strong at-rest encryption (for example, AES-based). Use trusted cryptographic libraries and manage keys securely; when feasible, prefer modules validated against recognized standards.

How should I respond to a misdirected email containing PHI?

Act immediately: contain the exposure (recall, expire portal access, disable forwarding), request deletion from unintended recipients, report to your privacy officer, assess breach risk, notify affected individuals as required, and remediate root causes through policy and control updates.

What patient identifiers should be limited in emails?

Limit names, full dates of birth, full addresses, phone numbers, email addresses, medical record numbers, account numbers, photos, and other unique identifiers. Keep subject lines free of PHI, use only the minimum necessary in the body, and prefer portal delivery for detailed identifiers.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles