Is Airtable HIPAA Compliant? BAA, PHI, and Security Explained

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Airtable HIPAA Compliant? BAA, PHI, and Security Explained

Kevin Henry

HIPAA

May 27, 2025

5 minutes read
Share this article
Is Airtable HIPAA Compliant? BAA, PHI, and Security Explained

HIPAA Compliance at Airtable

Whether Airtable is “HIPAA compliant” for your organization depends on two things: (1) a signed Business Associate Addendum (BAA) that brings the service into scope and (2) the way you configure and use the platform. Without a BAA in place, you should not store or process Protected Health Information (PHI) in Airtable.

Think of HIPAA as a shared-responsibility model. Airtable must provide appropriate safeguards and clearly document what is covered. You must enforce policies such as least-privilege access, Single Sign-On (SSO), monitoring via Audit Logs, and strict data handling rules. Review current compliance certifications to understand control maturity, but remember that certifications do not equal HIPAA compliance on their own.

  • Vendor responsibilities: security controls, service scope, reliability, and documented safeguards.
  • Your responsibilities: execute the BAA, limit PHI to in-scope features, enforce SSO and access controls, monitor Audit Logs, and train users.

Business Associate Addendum

A Business Associate Addendum is the legal instrument that allows a cloud vendor to handle PHI on your behalf. The BAA defines permitted uses and disclosures of PHI, requires administrative, physical, and technical safeguards, and sets breach-notification and cooperation obligations.

Typical BAA clauses also address subcontractors, data return or deletion on termination, and the exact services and features that are “in scope.” Expect Airtable’s BAA (when available to eligible customers) to specify configuration prerequisites—such as SSO enforcement, role-based access, and logging—and to clarify which integrations or extensions are excluded.

Protected Health Information Overview

Protected Health Information is any individually identifiable health information about a person’s past, present, or future health status or payment for care. In digital systems, this is electronic PHI (ePHI). Even common fields—names, email addresses, phone numbers, IP addresses, appointment dates, or claim numbers—can become PHI when linked to health context.

Apply the “minimum necessary” standard: only collect the fields you truly need, de-identify where possible, and keep identifiers separate from clinical or billing details. When in doubt, treat a data element as PHI and handle it with HIPAA-grade safeguards.

Security Measures for PHI

Configure security controls before any PHI enters Airtable. Enforce Single Sign-On through your identity provider and require multi-factor authentication at the IdP. Use granular permissions and least privilege so users only see the bases, views, and fields they need.

Continuously monitor Audit Logs for sign-ins, sharing changes, and data access, and route logs to your SIEM for alerting. Validate that encryption in transit and at rest is enabled by the service, and align your retention, backup, and deletion practices with your HIPAA policies.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Access and identity: SSO, SCIM provisioning (if available), strong role design, and periodic access reviews.
  • Data governance: field-level restrictions, private views, and controlled sharing—avoid public links for anything related to PHI.
  • Operational controls: change management, incident response playbooks, and documented data handling SOPs.

Limitations on PHI Usage

Be explicit about what you will not do with PHI. Do not use public share links, anonymous forms, or broadly shared views for datasets containing PHI. Treat third-party extensions, scripts, and external automations as out of scope unless your BAA and risk assessment say otherwise.

Handle attachments carefully. If attachments are stored via a content delivery network or accessed through public URLs, do not place PHI in those files. Prefer linking to a HIPAA-eligible repository that is covered by a BAA, or store only de-identified documents. Avoid sending PHI through email or unsecured webhooks; use secure messaging solutions that support HIPAA obligations.

Enterprise Key Management

Enterprise Key Management (EKM) lets you control encryption keys—often held in your own KMS—so you can rotate, revoke, and monitor key usage. When offered on your Airtable plan, EKM adds a strong layer of tenant isolation and gives you a “kill switch” to restrict data access in emergencies.

Evaluate EKM capabilities end to end: per-tenant keys, supported KMS providers, rotation cadence, access logging for decrypt events, and procedures for emergency key revocation. Confirm how EKM interacts with backups, search indexes, and exports so there are no blind spots.

Data Loss Prevention Integration

Data Loss Prevention (DLP) tools help detect and block PHI leaving approved boundaries. Integrate your CASB/DLP with identity and sharing controls so policies follow the user and the data. Use pattern matching for common identifiers (for example, medical record numbers) and quarantine violations for review.

Strengthen results by labeling sensitive fields, restricting exports, and alerting on risky behaviors in Audit Logs. Combine DLP with EKM, SSO, and least-privilege design to reduce both accidental exposure and malicious exfiltration. In short, treat DLP as a guardrail that complements—not replaces—sound governance.

FAQs

What does Airtable's Business Associate Addendum cover?

A BAA typically covers permitted uses and disclosures of PHI, required safeguards, breach-notification duties, subcontractor obligations, and the return or destruction of PHI at termination. It also defines which Airtable services and features are in scope and what configuration (for example, SSO, access controls, and logging) you must maintain.

How does Airtable protect electronic PHI?

When HIPAA-eligible features are enabled for an account covered by a BAA, protection generally includes encryption in transit and at rest, administrative and technical safeguards, Single Sign-On enforcement, granular permissions, and comprehensive Audit Logs. Many enterprises add Enterprise Key Management and Data Loss Prevention to strengthen control and visibility.

Who qualifies for HIPAA features in Airtable?

HIPAA capabilities are typically available to eligible Enterprise customers subject to a signed Business Associate Addendum and specific configuration requirements. Availability, scope, and prerequisites can vary by plan and region, so you should confirm eligibility with sales, security, and legal teams before handling PHI.

Can PHI be emailed using Airtable?

Do not send PHI via regular email or basic automation emails. If your workflow requires notifications, either exclude PHI from the message, use tokens that reference records, or route through a HIPAA-eligible secure messaging service that will sign a BAA. Pair this with DLP rules to prevent accidental leakage.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles