Is eVisit HIPAA Compliant? Security, Privacy, and BAA Explained

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Is eVisit HIPAA Compliant? Security, Privacy, and BAA Explained

Kevin Henry

HIPAA

September 21, 2025

6 minutes read
Share this article
Is eVisit HIPAA Compliant? Security, Privacy, and BAA Explained

eVisit's HIPAA Compliance Standards

Whether eVisit is “HIPAA compliant” depends on both the platform’s controls and how you configure and use it. Under HIPAA, a telehealth vendor that creates, receives, maintains, or transmits electronic Protected Health Information (ePHI) is a Business Associate and must support safeguards aligned to the HIPAA Privacy Rule and the HIPAA Security Rule.

HIPAA compliance is not a one-time certification; it is an ongoing program. A compliant posture typically includes a signed Business Associate Agreement (BAA), documented risk management, workforce training, breach notification processes, and product features that help you enforce the minimum necessary standard.

What a HIPAA-ready platform should provide

  • Contractual commitments through a Business Associate Agreement.
  • Security controls that map to the HIPAA Security Rule’s administrative and technical safeguards.
  • Privacy practices that respect patient rights under the HIPAA Privacy Rule.
  • Transparent breach notification and incident response procedures.

Your role as the covered entity

  • Configure access controls, retention, and logging to meet your policies.
  • Distribute Notices of Privacy Practices and honor patient rights requests.
  • Train users and manage identities, devices, and third-party integrations.

Business Associate Agreement Requirements

The BAA is the legal foundation of eVisit HIPAA compliance. It allocates responsibilities between your organization (the covered entity) and the vendor (the business associate) for safeguarding ePHI and handling incidents.

Key BAA elements to confirm

  • Permitted uses and disclosures of ePHI, limited to the minimum necessary.
  • Obligations to implement administrative and technical safeguards aligned to the HIPAA Security Rule.
  • Breach notification duties, including timelines, investigation, and content of notices.
  • Requirements that subcontractors agree to the same restrictions and safeguards.
  • Support for access, amendment, and accounting of disclosures when you receive patient requests.
  • Procedures for return or destruction of ePHI upon contract termination.
  • Cooperation with audits or investigations by regulators when required.

Practical steps before signing

  • Map the BAA to your policies and risk register; clarify gray areas (e.g., log retention, data deletion SLAs).
  • Verify incident reporting contacts, breach notification triggers, and evidence preservation expectations.
  • Ensure the BAA references current service scope, including modules, APIs, and integrations you plan to use.

Technical and Administrative Security Safeguards

Technical safeguards to expect

  • Encryption in transit and at rest to protect ePHI during sessions, messages, files, and backups.
  • Strong authentication (e.g., MFA/SSO), role-based access control, and least-privilege provisioning.
  • Comprehensive audit logs of access, changes, and administrative actions with tamper-resistance.
  • Integrity controls, secure session management, and automatic logoff for inactive sessions.
  • Vulnerability management, secure software development practices, and regular penetration testing.

Administrative safeguards to verify

  • Documented risk analysis and risk management plans with periodic reassessment.
  • Security and privacy policies, workforce training, and sanction procedures.
  • Vendor and subcontractor oversight, including BAAs where ePHI is shared.
  • Incident response and breach notification playbooks with testing and post-incident reviews.
  • Contingency planning: data backups, disaster recovery objectives, and tested restoration procedures.

Privacy Policy Overview

A clear privacy policy shows how patient information is collected, used, shared, and retained. For eVisit HIPAA compliance, the policy should align with the HIPAA Privacy Rule and disclose practices in plain language.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

What to look for

  • Categories of data collected (account data, clinical notes, recordings, metadata) and purposes (treatment, payment, healthcare operations).
  • How patient rights are supported: access, amendments, restrictions, and confidential communications.
  • Rules for marketing, analytics, and tracking technologies, with explicit consent where required.
  • Retention and deletion timelines, de-identification practices, and data subject request workflows.
  • How breach notification will be handled and how you will be informed.

Terms and Conditions for Healthcare Providers

The provider-facing terms control how you use the platform and often assign responsibilities that affect your HIPAA posture. Review them with the same rigor as the BAA.

Clauses that matter

  • Data ownership, licensing, and rights to export ePHI during and after the engagement.
  • Acceptable use, configuration duties, and account lifecycle management requirements.
  • Security responsibilities for devices, networks, and user authentication within your environment.
  • Service levels, support response times, and maintenance windows that may impact care delivery.
  • Incident and breach cooperation, evidence handling, and joint communications protocols.

Data Storage and Geographic Location

Data residency influences risk, regulatory obligations, and your contracts. Confirm where ePHI, backups, and logs are stored and processed, and whether any cross-border transfers occur.

Questions to resolve

  • Primary and disaster recovery regions used for storage and compute.
  • Whether all ePHI and derived datasets remain within your required geography (e.g., U.S.-only).
  • Encryption and key management practices for databases, object storage, and backups.
  • Retention rules for recordings, chat transcripts, and audit logs, and options for accelerated deletion.
  • Data export formats and procedures upon termination or at your request.

Data Handling and Industry Practices

Evaluate the vendor’s broader security maturity alongside HIPAA requirements. Many healthcare organizations look for independent attestations and disciplined operational practices.

Benchmarks and good practices

  • Independent assessments (e.g., SOC 2 Type II, HITRUST) and regular third‑party penetration tests.
  • Secure SDLC, change management, and segregation of duties across environments.
  • Continuous monitoring, anomaly detection, and documented vulnerability remediation timelines.
  • Interoperability security for APIs and EHR integrations (e.g., FHIR/HL7), with scoped access and logging.
  • Clear positions on recording video visits, storing attachments, and limiting access to the minimum necessary.

Conclusion

eVisit can be used in a HIPAA‑compliant manner when you have a signed Business Associate Agreement, the platform’s controls align with the HIPAA Security Rule and HIPAA Privacy Rule, and your team configures and operates the service accordingly. Validate this by reviewing the BAA, security and privacy documentation, data residency details, and breach notification procedures before deployment.

FAQs

What is required for eVisit to be HIPAA compliant?

You need a signed Business Associate Agreement, platform features that support access control, encryption, logging, and incident response, and organizational policies that govern how your workforce uses the service. Compliance is shared: the vendor must safeguard ePHI, and you must configure and operate the platform to meet your risk and regulatory requirements.

How does a Business Associate Agreement affect HIPAA compliance?

The BAA contractually binds the vendor to protect ePHI, limit uses and disclosures, report incidents, flow down safeguards to subcontractors, and return or destroy data at termination. It clarifies who does what for patient rights requests, audits, and breach notification, turning high‑level HIPAA duties into enforceable obligations.

What security measures does eVisit implement to protect ePHI?

HIPAA‑ready telehealth platforms typically implement encryption in transit and at rest, multi‑factor authentication or SSO, role‑based access, detailed audit logs, vulnerability management, and tested incident response. Confirm the exact measures, configurations available to you, and evidence such as security summaries or third‑party assessments.

How does eVisit handle data storage and privacy policies?

Vendors should disclose where ePHI is stored and processed, how long it is retained, and whether data crosses borders. Their privacy policy should align with the HIPAA Privacy Rule, describe uses for treatment, payment, and operations, and explain patient rights. Ask for written details on residency, backups, deletion timelines, and breach notification procedures before go‑live.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles