Is Emailing Patients HIPAA Compliant? What You Can and Can’t Do

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Emailing Patients HIPAA Compliant? What You Can and Can’t Do

Kevin Henry

HIPAA

March 01, 2026

6 minutes read
Share this article
Is Emailing Patients HIPAA Compliant? What You Can and Can’t Do

Emailing patients can be HIPAA compliant when you apply the right technical and administrative safeguards, document patient preferences, and train your workforce. The key is protecting Protected Health Information (PHI) with reasonable safeguards, secure email transmission, and policies that prevent avoidable exposure.

HIPAA Requirements for Email Communication

HIPAA permits email for PHI if you implement appropriate security measures. Under the Security Rule, you must conduct a risk analysis, apply reasonable safeguards, and maintain policies for electronic communication security, incident response, and access management. The Privacy Rule’s minimum necessary standard should guide what you include, limiting PHI to what’s needed.

Encryption is an “addressable” specification—meaning you must evaluate the risk and implement it where reasonable and appropriate. Given email’s exposure points, encryption is strongly recommended. You should also verify recipient identity, confirm addresses before sending, and use message recall only as a backstop, not a primary control.

If an email service provider can access PHI, you need a Business Associate Agreement (BAA) that covers storage, transmission, breach reporting, and deletion. Maintain audit logs, disable auto-forwarding to personal accounts, and set retention consistent with your record policies and state rules. Reinforce all of this through HIPAA Compliance Training and periodic drills.

You do not need a special authorization to email patients for treatment, payment, or healthcare operations, but you must respect patient preferences and security risks. If a patient asks for unencrypted email, you should explain the risks in plain language and document their choice. Always verify the patient’s address and identity before sending PHI.

Best practice is to collect communication preferences at intake and update them regularly. Provide options—secure portal messaging, encrypted email, or paper mail—and note any opt-outs. For particularly sensitive topics, encourage secure alternatives even when a patient prefers standard email. For proxies or minors, confirm legal authority before sharing PHI.

Implementing Email Encryption

Use a layered approach to secure email transmission. At minimum, enforce TLS so messages are encrypted in transit between mail servers. Configure policies to require TLS for external domains that handle PHI or else queue, bounce, or route messages through a secure channel.

For stronger protection, add end-to-end encryption such as S/MIME or PGP so only intended recipients can decrypt content. Remember that some metadata may remain exposed, so keep PHI out of subject lines. When sending highly sensitive results or large attachments, prefer portal-based delivery with an email notification that contains no PHI.

Round out encryption with device protections: full-disk encryption on laptops and phones, mobile device management, enforced screen locks, and remote wipe. Pair technical controls with user checks—double-check recipients, use delayed send, and require a second review for bulk emails.

Selecting Secure Email Providers

Choose providers that will sign a Business Associate Agreement and support healthcare-grade controls. Look for enforced TLS, encryption at rest, optional end-to-end encryption, robust admin controls, multifactor authentication, and detailed audit trails. Data loss prevention (DLP), outbound content scanning, and quarantine workflows help prevent accidental PHI exposure.

Evaluate retention, journaling, and eDiscovery features, plus options to disable auto-forwarding and block insecure third-party connectors. Avoid consumer email services that won’t execute a BAA. Test configurations regularly and document them as part of your electronic communication security program.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Managing Internal and External Emails

Treat internal emails with the same care as external ones. Distribution lists, shared mailboxes, and forwarding rules can leak PHI just as easily. Use role-based access, least-privilege permissions, and named accounts for accountability. For external recipients, validate addresses, prefer secure channels, and keep messages brief and purpose-driven.

Standardize procedures: pre-approved templates, delayed send, and a second set of eyes for mass outreach. Train staff to spot address autocompletion errors, confirm attachments, and avoid reply-all mistakes. Incorporate incident response steps—contain, assess risk, notify when required—into HIPAA Compliance Training and tabletop exercises.

Avoiding PHI in Subject Lines

Subject lines and previews are easily exposed through notifications, logs, and shared screens. Even with encryption, subjects are often not end-to-end protected and can appear on lock screens. Keep subjects generic and place all sensitive details in the secured body or portal message.

  • Good: “New message from your care team” or “Secure message available in the patient portal.”
  • Avoid: “Your MRI shows a herniated disc” or “HIV lab result attached.”
  • Use internal tags or message IDs that reveal nothing about the condition or service.

Utilizing Patient Portals

Patient portals provide authenticated, encrypted messaging with audit trails, making them ideal for PHI. Send email only as a nudge—“You have a new message”—without clinical details. Portals streamline file sharing, consent capture, and two-way communication while centralizing records and reducing inbox risk.

Enable multifactor authentication, set notification preferences, and integrate with your EHR so messages route to the right team. For non-urgent outreach, use portal broadcasts rather than mass emails. Reserve email for logistics and reminders that contain no PHI whenever possible.

Summary

Email can be HIPAA compliant when you pair reasonable safeguards with encryption, obtain and document patient preferences, keep PHI out of subject lines, use secure providers under a BAA, and steer sensitive exchanges to your patient portal. Policies, technology, and ongoing training work together to keep PHI protected.

FAQs.

What steps must be taken to ensure emailing patients is HIPAA compliant?

Complete a risk analysis, enforce TLS and prefer end-to-end encryption for PHI, keep PHI out of subject lines, verify recipient identity and addresses, limit content to the minimum necessary, use a provider under a BAA, log and monitor access, disable auto-forwarding, and train staff on reasonable safeguards and incident response.

If a patient requests standard (unencrypted) email after you explain the risks, you may honor that preference and document it. Always verify addresses, confirm identity, and steer sensitive topics to encrypted channels or the portal. Keep a record of communication preferences and allow changes at any time.

Are patient portals required for HIPAA-compliant messaging?

Not strictly required, but portals are the most secure, auditable default for PHI. They provide authentication, encryption, and access controls that standard email lacks. Use email primarily for non-PHI logistics or portal notifications, reserving PHI exchanges for the portal or for encrypted email when necessary.

What are the risks of including PHI in email subject lines?

Subjects can appear in notifications, mailbox previews, and logs, and are often not protected end-to-end. Including PHI risks unauthorized disclosure even if the message body is encrypted. Use neutral subjects and place sensitive details in the secured message or patient portal.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles