How to Ensure Teletherapy HIPAA Compliance: Requirements, Best Practices, and Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Ensure Teletherapy HIPAA Compliance: Requirements, Best Practices, and Checklist

Kevin Henry

HIPAA

March 10, 2026

7 minutes read
Share this article
How to Ensure Teletherapy HIPAA Compliance: Requirements, Best Practices, and Checklist

HIPAA Compliance Requirements

Teletherapy HIPAA compliance centers on safeguarding Protected Health Information (PHI) across people, processes, and technology. You must apply the HIPAA Privacy Rule (how PHI may be used and disclosed), the Security Rule (how you protect electronic PHI), and the Breach Notification Requirements (how you respond and notify after a breach). Together, these rules define what you can share, how you secure it, and what to do if something goes wrong.

Key obligations include the minimum necessary standard, client rights to access and amendments, and written policies that match your actual teletherapy workflows. For electronic PHI (ePHI), you need administrative, physical, and technical safeguards—risk analysis, workforce training, device and facility protections, plus access controls, encryption, and audit capabilities.

Because teletherapy relies on third-party platforms, you must execute a Business Associate Agreement (BAA) with vendors that handle PHI. Your BAA should bind the vendor to HIPAA safeguards and breach handling, and should flow down to any subcontractors. Maintain documentation that proves what you implemented, when, and by whom.

Best Practices for Teletherapy

Before the session

  • Verify client identity and confirm the client’s physical location for emergency response planning.
  • Obtain informed consent for telehealth, covering technology risks, privacy limits, and contingency contact methods.
  • Send invitations securely; avoid public meeting links and require authentication to join.
  • Prepare an Incident Response Plan so you can quickly contain and report security issues.

During the session

  • Use a HIPAA-aligned platform configured with strong access controls, waiting rooms, and disabled public chat or file sharing unless needed.
  • Prohibit recording by default unless expressly authorized and documented in policy and the record.
  • Confirm each party’s environment is private; use headsets and neutral backgrounds to reduce inadvertent disclosures.
  • Share screens only when clinically necessary and free of unrelated PHI.

After the session

Telehealth Compliance Checklist

  • Select and configure a teletherapy platform that offers a BAA, encryption in transit and at rest, role-based access controls, and audit logs.
  • Execute BAAs with all vendors that create, receive, maintain, or transmit PHI (video, EHR, billing, storage, messaging).
  • Complete a documented Security Risk Assessment; rank risks by likelihood and impact; implement and track remediation.
  • Adopt Encryption Standards (e.g., modern TLS for data in transit; strong disk and database encryption for data at rest).
  • Require multifactor authentication (MFA), unique user IDs, periodic access reviews, and timely offboarding.
  • Implement an Incident Response Plan with clear roles, contact trees, playbooks, and evidence preservation steps.
  • Define Breach Notification Requirements and procedures; keep templates and decision logs ready.
  • Harden endpoints: full-disk encryption, automatic updates, anti-malware, secure backups, and remote-wipe capability.
  • Create teletherapy-specific policies (session setup, identity verification, no-recording default, environment privacy checks).
  • Train your workforce initially and at least annually; document attendance, quizzes, and follow-up coaching.
  • Maintain documentation: policies, procedures, BAAs, access logs, risk analyses, remediation evidence, and audit reports.

Securing Client Data Online

Encryption Standards

Use modern, standards-based encryption for data in transit and at rest. Ensure video, chat, and file transfer are protected by current TLS, and that stored PHI is encrypted on servers and devices. Manage keys securely and restrict who can decrypt.

Access Controls

Enforce least privilege through role-based access, MFA, and periodic entitlements reviews. Enable session timeouts and device auto-locks. Where available, use single sign-on for centralized governance and faster offboarding.

Secure storage and sharing

Keep PHI inside your approved EHR or secure repositories with auditing and retention policies. Use secure portals or in-app messaging for client communications; avoid standard email or SMS for PHI unless appropriately secured and permitted by policy.

Endpoint and network protection

Encrypt laptops and mobile devices, separate work and personal data, and enable remote wipe. Connect over trusted networks; consider VPN if accessing internal resources. Prohibit local downloads of PHI unless necessary and tracked.

Monitoring and logging

Turn on audit logs for access, configuration changes, and data exports. Review alerts for anomalous behavior and document responses. Keep logs for a defined period to support investigations and compliance reviews.

Implementing Business Associate Agreements

Identify and assess vendors

Inventory every service touching PHI—video platforms, EHRs, e-fax, storage, transcription, analytics. Perform due diligence on security practices and incident history before sharing data.

Core BAA provisions

  • Permitted uses/disclosures and the minimum necessary standard.
  • Administrative, physical, and technical safeguards aligned to HIPAA.
  • Breach Notification Requirements, timelines, and cooperation duties.
  • Subcontractor flow-down obligations and right to audit or attestations.
  • Data return/destruction at termination and continued protections afterward.
  • Reporting of security incidents and material changes that affect risk.

Governance practices

Store signed BAAs centrally, track renewal dates, and align each vendor’s configuration with your policies. Reassess vendors when services change, after incidents, or at least annually.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Conducting Security Risk Assessments

Method and scope

Start with an inventory of systems, users, data flows, and locations of ePHI. Map how PHI enters, moves, and leaves your environment, including teletherapy sessions, recordings (if any), chat, and shared files.

Analyze threats and controls

Identify threats (e.g., account compromise, misdirected invites, device loss, unauthorized recordings) and vulnerabilities (weak MFA, unpatched devices, overbroad permissions). Evaluate current safeguards and assign likelihood and impact ratings.

Plan and track remediation

Prioritize risks, set owners and deadlines, and verify completion with evidence. Reassess after major changes—new platforms, integrations, or workflows—and at regular intervals. Keep a clear narrative of decisions and trade-offs.

Teletherapy-specific focus areas

  • Meeting security: waiting rooms, meeting locks, authenticated participants.
  • Data minimization: avoid local storage and unnecessary artifacts.
  • BYOD and remote work: endpoint encryption, MDM, and acceptable use.
  • Audit and export controls: who can download, and how it is tracked.

Training and Documentation Procedures

Workforce training

Deliver role-based training on HIPAA fundamentals, phishing awareness, secure teletherapy setup, environment privacy checks, and incident reporting. Reinforce with scenarios, micro-learnings, and periodic phishing simulations.

Operational documentation

Maintain current policies and procedures, BAAs, Security Risk Assessments, access reviews, audit logs, and incident records. Version-control documents, record approvals, and capture evidence that controls are working as intended.

Continuous improvement

Use findings from audits and incidents to update policies, tighten access, and refine your Incident Response Plan. Schedule reviews so improvements don’t stall, and brief leadership on risk posture and metrics.

In short, teletherapy HIPAA compliance requires selecting secure tools, executing strong BAAs, enforcing access and encryption, assessing and fixing risks, and proving it all through training and documentation. When you operationalize these pieces, you protect clients and your practice while staying audit-ready.

FAQs

What platforms are considered HIPAA-compliant for teletherapy?

No platform is “HIPAA-compliant” by brand alone. Compliance depends on how you configure and use it, and whether the vendor will sign a Business Associate Agreement. Look for features such as strong encryption, access controls, audit logs, admin policy settings, and reliable support. Prefer solutions purpose-built for healthcare or EHR-embedded telehealth that provide a BAA and documented safeguards.

How should teletherapy sessions be documented to ensure compliance?

Document promptly in your EHR with date/time, modality, participants, consent status, presenting concerns, interventions, safety assessment, plan, and follow-up. Note any technology issues that affected care. Apply the minimum necessary standard, avoid storing PHI in personal notes or local folders, and keep documentation aligned with your retention policy and state licensing rules.

What are the key components of a telehealth security risk assessment?

Include an asset and data-flow inventory; identification of threats and vulnerabilities; evaluation of administrative, physical, and technical safeguards; risk scoring by likelihood and impact; a remediation roadmap with owners and timelines; validation of Encryption Standards and access controls; and ongoing monitoring with periodic reassessment after changes or incidents.

How can therapists manage breach notifications effectively?

Prepare in advance with an Incident Response Plan that defines detection, containment, investigation, legal review, and communication steps. Keep contact templates, decision logs, and an incident register. When a breach is confirmed, notify affected individuals and regulators as required by the HIPAA Breach Notification Requirements and applicable state laws, and document every action you take for audit readiness.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles