Is Hushmail HIPAA Compliant? Your Guide to Requirements, Best Practices, and Tips

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Hushmail HIPAA Compliant? Your Guide to Requirements, Best Practices, and Tips

Kevin Henry

HIPAA

April 25, 2025

8 minutes read
Share this article
Is Hushmail HIPAA Compliant? Your Guide to Requirements, Best Practices, and Tips

Short answer: you can use Hushmail in a HIPAA‑compliant manner when you sign a Business Associate Agreement (BAA) and configure the service to protect Electronic Protected Health Information (ePHI) in line with the HIPAA Privacy Rule and HIPAA Security Rule. This guide translates those requirements into practical steps you can implement today.

Email Encryption Standards

HIPAA expects “reasonable and appropriate” safeguards for ePHI, which in email means strong Data Encryption at Rest and In Transit, robust key management, and policies that ensure encryption is used consistently. Your goal is to make interception or unauthorized access highly unlikely and quickly detectable.

Protection in transit

Require Transport Layer Security (TLS) for all server‑to‑server connections and block downgrade to insecure protocols. When you cannot guarantee the recipient’s server supports TLS, use message‑level encryption so that content remains protected beyond the transport layer.

Message‑level encryption with OpenPGP

OpenPGP Encryption provides end‑to‑end protection that travels with the message and attachments. For recipients without keys, use a secure portal or passphrase‑protected delivery so ePHI never appears in plaintext. Publish guidance for patients on how to open encrypted messages safely.

Encryption at rest

Ensure stored mailboxes, archives, and backups are encrypted at rest with strong algorithms and protected keys. Pair platform encryption with endpoint safeguards so downloaded messages on laptops and phones remain protected if a device is lost or stolen.

Practical steps to enforce encryption

  • Set policies to always use TLS and require message‑level encryption whenever ePHI is present or recipient security is unknown.
  • Automate encryption triggers based on keywords, forms, or designated addresses to reduce user error.
  • Harden key management: rotate keys, restrict access, and document procedures for recovery and revocation.
  • Train staff to verify recipients and to avoid sending ePHI in subject lines or unencrypted attachments.

Secure Web Forms Implementation

Secure web forms let patients submit ePHI without exposing it over standard email. To satisfy the HIPAA Security Rule, pair encrypted submission, controlled access, and logging with least‑data collection under the HIPAA Privacy Rule’s “minimum necessary” standard.

Design and data minimization

Collect only what you need for care or operations, and label fields that may carry ePHI. Present a clear notice about how information will be used and stored, and obtain consent when appropriate. Use input validation to prevent injection risks and remove free‑text fields when structured options will do.

Secure transmission and delivery

Enforce HTTPS with modern TLS and HSTS for all form pages. Store submissions encrypted at rest and deliver results to staff through an encrypted channel or secure portal rather than plaintext email. Redact ePHI from notification emails and require authentication to view full submissions.

Administration and monitoring

Limit who can create or edit forms, enable spam and abuse protections, and log access to each submission. Map logs to your Audit Trail Requirements so you can trace who viewed, exported, or deleted entries and when.

Email Archiving Procedures

Archiving preserves messages for clinical continuity, legal defensibility, and compliance reviews. While HIPAA does not mandate a specific email retention period, it requires audit controls and retention of compliance documentation—many entities keep related records for at least six years.

Policy and retention

Set written retention rules that consider state medical record laws, payer contracts, and organizational needs. Distinguish between clinical records stored in the EHR and operational email retained for compliance and eDiscovery. Define who can place legal holds and how they are released.

Technical controls for compliant archiving

Use journaling or immutable storage to capture all messages, including attachments, in near real time. Index messages for rapid search, apply role‑based access, and make archives tamper‑evident. Ensure archives remain encrypted at rest and during export.

Operational procedures

  • Document ingestion, retention, and disposal workflows with approvals and timestamps.
  • Test restorations regularly so you can produce messages quickly during audits or litigation.
  • Log access and export events to satisfy Audit Trail Requirements and support investigations.

Return or destruction of ePHI

On vendor change or contract termination, follow the BAA to return or securely destroy archived ePHI, documenting the method and verification.

Business Associate Agreement Importance

A Business Associate Agreement (BAA) is mandatory before any vendor handles ePHI on your behalf. Without a signed BAA, you cannot rely on a service for HIPAA‑regulated workflows, regardless of its technical features.

What a sound BAA should include

  • Permitted uses/disclosures and prohibition on secondary use without authorization.
  • Administrative, physical, and technical safeguards aligned to the HIPAA Security Rule.
  • Breach notification duties, timelines, and cooperation obligations.
  • Subcontractor flow‑down requirements for any downstream service providers.
  • Right to receive compliance attestations or summaries of audits as appropriate.
  • Return/secure destruction of ePHI at termination and data portability provisions.
  • Expectations for encryption, logging, and support for Audit Trail Requirements.

Implementation tips

Confirm your plan includes a BAA and execute it before using ePHI. Keep a countersigned copy, map it to your vendor inventory, and review it during annual risk assessments. Train staff on what the BAA permits so daily operations match contractual obligations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Compliance Risk Management

HIPAA is risk‑based: you identify foreseeable threats to ePHI and mitigate them with reasonable and appropriate controls. A repeatable program protects patients, reduces fines, and streamlines audits.

Risk analysis essentials

Inventory where ePHI flows: inboxes, archives, web forms, mobile apps, and backups. For each location, assess threats such as mis‑addressed emails, phishing, account takeover, lost devices, or misconfigured retention. Rate likelihood and impact, then prioritize treatment.

Control selection and mapping

Map safeguards to the HIPAA Security Rule’s administrative, physical, and technical categories. Examples include policies and training, facility and device protections, encryption, multi‑factor authentication, role‑based access, and continuous logging that meets Audit Trail Requirements.

Continuous monitoring

Track control effectiveness with metrics like phishing failure rates, time to revoke access on termination, and incident response times. Re‑evaluate risks when workflows change, new features are enabled, or regulations evolve.

User Access Controls

Strong access controls prevent unauthorized viewing or alteration of ePHI. Combine identity assurance, least privilege, and monitoring to meet Security Rule expectations for unique IDs, automatic logoff, and access review.

Identity and authentication

Issue unique user IDs and enforce MFA for all administrative and ePHI‑handling accounts. Where possible, use SSO to centralize lifecycle management and reduce password sprawl. Set standards for password strength and rotation based on risk.

Authorization and provisioning

Apply role‑based access so users see only what they need. Use documented request and approval workflows, and review entitlements quarterly. Immediately revoke access when roles change or employment ends.

Session and device safeguards

Enable automatic logoff and short session timeouts on shared workstations. Require device encryption, screen locks, and remote wipe on mobile endpoints that sync email. Prohibit local caching of ePHI where not necessary.

Auditing and review

Monitor sign‑ins, message access, exports, and admin actions. Investigate anomalies promptly and retain logs long enough to support investigations and compliance validation.

Incident Response Planning

Even with strong controls, mistakes and attacks happen. A tested incident response plan limits harm to patients and your organization and helps you meet Breach Notification Rule obligations.

Your response playbook

  • Detect: monitor alerts from mail security, DLP, and sign‑in risk signals.
  • Contain: revoke access, reset credentials, quarantine affected mailboxes, and halt risky automations.
  • Eradicate and recover: remove malicious rules, re‑image devices as needed, and restore from clean archives.
  • Communicate: coordinate with privacy, legal, and leadership; document actions and decisions in real time.

Breach assessment and notifications

Perform the four‑factor risk assessment: the nature/extent of ePHI, the unauthorized party, whether data was actually acquired or viewed, and whether risk was mitigated. If a breach is confirmed, notify affected individuals without unreasonable delay and no later than 60 days, and fulfill HHS and media notifications as required by incident size.

Testing and improvement

Run tabletop exercises at least annually that simulate mis‑sent emails, credential compromise, and lost devices. After action, update procedures, playbooks, and training, and feed lessons learned back into your risk register.

Conclusion

Hushmail can support HIPAA compliance when you pair encryption, secure web forms, defensible archiving, a signed BAA, ongoing risk management, tight access controls, and a proven incident response plan. Treat compliance as a continuous program, and you will communicate efficiently while protecting patient trust.

FAQs.

What makes Hushmail HIPAA compliant?

Hushmail can be used in a HIPAA‑compliant way when you sign a Business Associate Agreement (BAA) and configure controls that align with the HIPAA Security Rule and HIPAA Privacy Rule. That includes enforcing encryption, restricting access to ePHI, maintaining audit trails, training users, and documenting policies that govern how the service is used.

How does Hushmail handle email encryption?

Hushmail supports encrypted transmission with TLS and offers message‑level protection so content and attachments remain unreadable if transport security fails. You can use OpenPGP Encryption or a secure portal/passphrase approach for recipients without keys, achieving Data Encryption at Rest and In Transit across your workflow.

Does Hushmail provide a Business Associate Agreement?

Yes—eligible healthcare plans include a Business Associate Agreement (BAA). You must have an executed BAA in place before exchanging ePHI through the service, and you should retain a countersigned copy with your compliance documentation.

How can healthcare providers ensure secure communication with Hushmail?

Sign the BAA, require encryption by default, and use secure web forms for patient intake. Enforce MFA and role‑based access, retain tamper‑evident archives, monitor logs to meet Audit Trail Requirements, and train staff on ePHI handling. Review risks periodically and test incident response so you can act quickly if something goes wrong.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles