Is Hushmail HIPAA Compliant? A Beginner’s Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Hushmail HIPAA Compliant? A Beginner’s Guide

Kevin Henry

HIPAA

April 25, 2025

6 minutes read
Share this article
Is Hushmail HIPAA Compliant? A Beginner’s Guide

Overview of HIPAA Email Compliance

What HIPAA expects from email

HIPAA regulates how you create, transmit, and store Protected Health Information (PHI). For email, the HIPAA Privacy Rule and Security Rule expect safeguards that keep PHI confidential, intact, and available only to authorized parties. In practice, you need strong access controls, Secure Email Transmission, encryption, user training, and policies that define when PHI may be emailed.

Compliance is a shared responsibility

No email service is “compliant” on its own. A solution can support compliance if you configure it properly and use it under written policies. With Hushmail, that means enabling encryption, limiting PHI in subject lines, managing retention, training staff, and having a signed Business Associate Agreement (BAA) that specifies each party’s duties.

Hushmail Encryption Technology

End-to-End Encryption options

Hushmail supports End-to-End Encryption between Hushmail users and partners who use compatible PGP keys. When a recipient is outside that ecosystem, Hushmail delivers messages through a secure web portal protected by a passphrase or security question so PHI never travels exposed over the open internet.

Secure Email Transmission and storage

For routine delivery, Hushmail uses TLS to provide Secure Email Transmission in transit when sending to modern mail servers. Messages stored in Hushmail’s environment are encrypted at rest, and administrators can require encrypted delivery methods for messages that contain PHI to recipients outside your organization.

Practical safeguards

You can minimize risk by keeping PHI out of subject lines, using the portal for external recipients, enabling two-step verification, and restricting access based on staff roles. These measures complement encryption to meet core HIPAA Security Rule expectations for confidentiality and integrity.

Business Associate Agreement Importance

Why a BAA matters

A Business Associate Agreement is mandatory when a vendor can access PHI. The BAA contractually binds the vendor to HIPAA safeguards, breach notification, and permitted uses of PHI. Without a signed BAA, you cannot treat the vendor’s tools as HIPAA-ready, even if they offer encryption.

Hushmail and the BAA

Hushmail offers a BAA for its healthcare-focused plans so you can lawfully store and transmit PHI through the service. You still must implement your own policies—such as user provisioning, minimum necessary access, and incident response—to ensure your organization actually operates in a compliant manner.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Secure Web Forms and E-Signatures

Collect PHI safely

Hushmail’s secure web forms let patients submit intake details, medical histories, and referrals directly into encrypted messages, reducing the need for paper or fax. Forms help you standardize data collection, apply the minimum necessary standard, and keep PHI inside protected channels from the start.

Electronic Signature Compliance

Hushmail supports electronic signatures for documents such as consent and disclosure forms. To support Electronic Signature Compliance under HIPAA, signatures should include signer authentication, integrity protections that prevent tampering, and an auditable record of when and how consent was captured.

Audit trail for signed forms

Each signed submission can include metadata—timestamps, signer identity details, and delivery confirmations—that forms part of your audit trail. This evidence helps you demonstrate that consents and acknowledgments were properly obtained and preserved.

Email Archiving and Audit Trails

Retention that fits healthcare

HIPAA requires you to retain certain documentation and maintain retrievable records. Hushmail’s archiving options help centralize copies of messages so they can be searched for audits, legal requests, and quality reviews without employees digging through personal inboxes.

Meeting Audit Trail Requirements

Effective audit trails show who accessed PHI, what changed, and when. Configure logging for sign-ins, message views, forwarded copies, and form submissions. Combine technology logs with written procedures so you can prove that oversight is continuous, not just enabled.

Healthcare Professional Use Cases

  • Private practices and clinics: Send referrals, care summaries, and billing inquiries with PHI through encrypted messages or secure portals while keeping subjects free of sensitive details.
  • Behavioral health and counseling: Collect intake forms, informed consent, and telehealth disclosures using secure web forms with e-signatures and maintain a clear audit trail of each acknowledgment.
  • Dental and allied health: Share treatment plans, X‑ray requests, and post‑op instructions securely with outside providers and patients who may not use encrypted email natively.
  • Care coordinators and case managers: Consolidate updates from multiple providers, limit access to minimum necessary, and archive communications for continuity and compliance reviews.

Setting Up Hushmail for HIPAA Compliance

Step 1: Choose the right plan and sign the BAA

Select a healthcare plan that includes a Business Associate Agreement and execute it before handling PHI through the system.

Step 2: Configure domains and user accounts

Provision accounts under your practice domain, enforce strong passphrases, enable two-step verification, and restrict admin roles to least privilege.

Step 3: Set encryption defaults

Require the secure portal for external recipients, keep PHI out of subject lines, and train staff to use protected forms for data collection.

Step 4: Build secure web forms

Create intake, consent, release-of-information, and payment forms. Use required fields sparingly to honor the minimum necessary standard and reduce data exposure.

Step 5: Enable e-signatures and verification

Activate signature fields and signer authentication. Ensure signed forms include timestamps and integrity protections to satisfy Electronic Signature Compliance expectations.

Step 6: Turn on archiving and retention

Enable email archiving, set retention periods that meet your state and specialty rules, and verify that archived copies are complete and searchable.

Step 7: Document policies and train users

Write procedures for Secure Email Transmission, external recipient handling, breach reporting, and access requests. Train staff and test understanding with realistic scenarios.

Step 8: Monitor audit trails

Review login, message access, and form submission logs regularly. Investigate anomalies and keep records to meet Audit Trail Requirements.

Step 9: Validate with periodic assessments

Conduct risk analyses, spot-check encryption behavior to non-Hushmail recipients, and update controls as your workflows evolve.

Conclusion

Hushmail can support HIPAA-compliant workflows when you sign a BAA, use End-to-End Encryption or the secure portal, collect PHI through protected forms with e-signatures, and retain auditable records. Pair the technology with sound policies, training, and monitoring to keep PHI secure and your practice compliant.

FAQs.

What makes Hushmail HIPAA compliant?

Hushmail supports HIPAA compliance by providing encryption in transit and at rest, End-to-End Encryption options, a secure portal for external recipients, access controls, archiving, and logging. When combined with your policies, training, and a signed BAA, these safeguards help protect Protected Health Information under the HIPAA Privacy Rule and Security Rule.

Does Hushmail sign a Business Associate Agreement?

Yes. Hushmail offers a Business Associate Agreement with its healthcare-focused plans. You should execute the BAA before creating, receiving, or transmitting PHI through the service.

How does Hushmail encrypt protected health information?

Between compatible users, Hushmail can use End-to-End Encryption with PGP. For other recipients, it routes messages to a secure web portal protected by a passphrase or security question. TLS protects Secure Email Transmission to modern mail servers, and PHI stored in the environment is encrypted at rest.

Yes. You can collect electronic signatures on forms such as consent and disclosures. Hushmail records signer details and timestamps to support Electronic Signature Compliance and provides an audit trail that demonstrates how and when consent was captured.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles