Is Google Workspace Email HIPAA-Compliant? BAA, Requirements, and Setup

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Google Workspace Email HIPAA-Compliant? BAA, Requirements, and Setup

Kevin Henry

HIPAA

June 10, 2025

8 minutes read
Share this article
Is Google Workspace Email HIPAA-Compliant? BAA, Requirements, and Setup

Yes—Google Workspace Email can be used in a HIPAA-aligned program when you execute a Business Associate Agreement (BAA), restrict Protected Health Information (PHI) to covered services, and configure security controls appropriately. Compliance depends on your administrative setup, Access Controls, Data Encryption, and ongoing governance, not the software alone.

Business Associate Agreement Requirements

What the BAA is and why it matters

A Business Associate Agreement is a contract required by the HIPAA Security Rule when a vendor handles PHI on your behalf. Google’s BAA outlines shared responsibilities: Google provides specified safeguards for covered services, while you implement administrative, physical, and technical controls within your tenant.

Preconditions to sign

  • You are a HIPAA Covered Entity or Business Associate and will store or transmit PHI in Google Workspace.
  • You use eligible Google Workspace editions and agree to limit PHI to services identified as covered in the BAA.
  • A super administrator is authorized to accept the BAA on behalf of your organization.

What you commit to

  • Apply least-privilege Access Controls, strong authentication, and appropriate User Permission Settings.
  • Encrypt data in transit and at rest and, where appropriate, add enhanced Data Encryption (e.g., S/MIME or client-side encryption).
  • Train your workforce with role-based Compliance Training and maintain policies, incident response, and breach reporting procedures.

How to accept Google’s BAA

In the Admin console, a super admin reviews and accepts the HIPAA BAA under the legal and compliance settings. Document the acceptance, the date, editions in scope, and the list of services marked as covered for your tenant.

Eligible Google Workspace Plans

Google offers the HIPAA BAA for eligible, paid Google Workspace editions. Many organizations choose higher-tier plans to gain controls that simplify HIPAA compliance.

Edition considerations

  • Business-tier plans: Suitable for smaller teams when PHI is limited and controls are carefully enforced; verify availability of essentials like Vault (retention) and advanced mobile management.
  • Enterprise-tier plans: Recommended for robust programs needing DLP, S/MIME, client-side encryption, context-aware access, Security Center, and granular investigation tools.
  • Education and nonprofit variants: May be eligible when functioning as Covered Entities or Business Associates; confirm features and BAA eligibility for your edition.

Match the edition to your risk profile and the HIPAA Security Rule’s safeguard expectations (e.g., auditability, minimum necessary, rapid incident response).

Covered Google Workspace Services

Under a signed BAA, Google designates specific Workspace “core services” as covered for PHI. Always confirm the current list in your Admin console and BAA.

Commonly covered core services (examples)

  • Gmail and Google Calendar
  • Google Drive and the Editors (Docs, Sheets, Slides)
  • Google Meet and Google Chat
  • Google Sites
  • Google Vault (eDiscovery and retention)

Coverage can evolve; treat the BAA and Admin console indicators as your source of truth and keep an internal register of services authorized for PHI.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Excluded Google Workspace Services

Unless explicitly identified as covered in your Admin console and BAA, do not create, store, or process PHI in the following:

  • “Additional Google services” such as YouTube, Google Photos, Google Maps, Blogger, Google Analytics, Google Ads, and similar consumer-focused products.
  • Experimental, preview, or consumer-only features not labeled as covered.
  • Third-party Marketplace apps and add-ons without a separate BAA or contractual safeguards.

Enforce technical blocks and user communication to prevent PHI from leaking into excluded services.

Steps to Achieve HIPAA Compliance

  1. Determine applicability: Confirm you are a Covered Entity or Business Associate and define the PHI workflows that will use Google Workspace Email and Drive.
  2. Risk analysis: Map threats, vulnerabilities, and impact for email, file storage, sharing, mobile access, and third-party integrations; document required controls per the HIPAA Security Rule.
  3. Select editions: Choose plans that provide the controls your analysis requires (e.g., DLP, Vault, client-side encryption, advanced MDM).
  4. Execute the BAA: Have a super admin review and accept Google’s BAA; record versions, dates, and services in scope.
  5. Restrict scope: Allow PHI only in covered services; disable or restrict “Additional Google services” and unapproved add-ons.
  6. Email protections: Enforce TLS for trusted partners, consider S/MIME for sensitive exchanges, configure SPF/DKIM/DMARC, and create content compliance rules to flag or block unsecured PHI transmission.
  7. Data Loss Prevention: Implement Gmail and Drive DLP policies for common PHI patterns; alert, quarantine, or block as appropriate.
  8. Access governance: Apply least privilege via roles and groups, restrict external sharing, require strong 2‑step verification or security keys, and use context-aware access.
  9. Device security: Enroll devices in endpoint management, require screen locks and storage encryption, and enable remote wipe.
  10. Retention and auditing: Configure Vault retention, legal holds, and audit logs; test search, export, and incident investigation workflows.
  11. Vendor management: Limit OAuth scopes, review Marketplace apps, and obtain BAAs with any downstream service that handles PHI.
  12. Training and documentation: Provide role-based Compliance Training, publish procedures, test incident response, and review controls at least annually.

Security Configuration Best Practices

Access Controls

  • Use groups-based provisioning and least-privilege admin roles; avoid super admin use for daily tasks.
  • Mandate 2‑step verification (prefer hardware security keys) and block legacy IMAP/POP unless strictly required and controlled.
  • Restrict external sharing by default; allow exceptions through managed groups with documented approvals.

Data Encryption

  • Require TLS for SMTP with known partners; add S/MIME for message-level protection where both ends support it.
  • Consider client-side encryption for Gmail and Drive when you need to keep encryption keys outside Google’s control.
  • Encrypt endpoints and mobile storage; enforce disk encryption and secure lock screens via device policies.

User Permission Settings

  • Default Drive sharing to “restricted,” disable public links, and allow external sharing only to approved domains.
  • Limit Drive download/print/copy for sensitive files; apply labels to drive DLP rules for PHI handling.
  • Disable auto-forwarding of email containing PHI; require manager or compliance review for exceptions.

Email-specific safeguards

  • Publish SPF, DKIM, and DMARC to prevent spoofing and to improve deliverability of secure mail.
  • Create Gmail compliance rules to warn, encrypt, quarantine, or block messages containing PHI indicators sent outside your domain.
  • Avoid relying on Gmail “Confidential mode” as a sole control; it is not end-to-end encryption.

Auditing and incident response

  • Enable admin and user activity logs; route critical events to a SIEM for alerting and retention.
  • Use Vault for retention, holds, and discovery; test export and preservation for PHI-related matters.
  • Document breach response steps, on-call roles, and timelines; perform tabletop exercises.

Endpoint and mobile security

  • Require device enrollment, OS patch levels, and malware protection; block access from noncompliant devices.
  • Enable remote wipe for lost or deprovisioned devices and remove cached Workspace data.

Staff Training and Policy Implementation

Compliance Training should translate HIPAA Security Rule requirements into daily workflows. Teach “minimum necessary,” secure sharing, phishing awareness, proper email use, and how to report incidents quickly.

  • Publish acceptable-use and PHI handling policies; require annual attestation and track completions.
  • Standardize onboarding/offboarding, role changes, and quarterly access reviews across admins and users.
  • Run simulated phishing and just‑in‑time coaching to address risky behaviors in email and file sharing.
  • Maintain auditable records: BAA acceptance, risk analyses, training logs, incident reports, and vendor BAAs.

Conclusion

Google Workspace Email can support HIPAA programs when you sign the BAA, confine PHI to covered services, and rigorously apply Access Controls, Data Encryption, DLP, auditing, and training. Treat compliance as an ongoing process—monitor, test, and iterate to keep risk within acceptable bounds.

FAQs.

What is required to sign Google's BAA for HIPAA compliance?

A super administrator must review and accept the BAA in the Admin console on behalf of a Covered Entity or Business Associate. You agree to limit PHI to covered services and implement safeguards such as Access Controls, encryption, and workforce training, and to meet breach-notification obligations.

Which Google Workspace services are covered under the HIPAA BAA?

The BAA applies only to services Google designates as covered (commonly Gmail, Calendar, Drive and the Editors, Meet, Chat, Sites, and Vault). Always confirm the current list in your Admin console and document which services your organization authorizes for PHI.

Can Google Workspace Email be used for transmitting PHI?

Yes, when the BAA is in place and you configure protections such as enforced TLS to trusted partners, optional S/MIME or client-side encryption for sensitive exchanges, DLP rules, and robust authentication. Train staff to send only the minimum necessary PHI and verify recipients before sending.

How should organizations configure Google Workspace to maintain HIPAA compliance?

Follow a defense-in-depth approach: accept the BAA, restrict PHI to covered services, enforce 2‑step verification, least-privilege roles, Drive and Gmail DLP, SPF/DKIM/DMARC, TLS/S‑MIME policies, device management with encryption, Vault retention, logging and alerting, and recurring Compliance Training with documented reviews.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles