Is Lyra Health HIPAA Compliant? What You Need to Know
HIPAA does not grant a formal “certification.” Instead, a company demonstrates HIPAA compliance by implementing required safeguards, signing Business Associate Agreements (BAAs), and maintaining evidence of ongoing risk management. Below is what you should review to determine whether Lyra Health meets those expectations and how to validate its program.
Lyra Health HIPAA Compliance Overview
What HIPAA requires
HIPAA centers on protecting Protected Health Information (PHI) through the Privacy Rule, Security Rule, and Breach Notification Rule. You should confirm that Lyra Health limits PHI use and disclosure, applies administrative, physical, and technical safeguards, and follows documented incident response and notification procedures.
Role and responsibilities
As a benefits platform connecting members to care, Lyra Health typically operates as a HIPAA business associate to employer health plans and may also support covered providers. Expect a signed BAA that spells out permitted uses of PHI, subcontractor obligations, and breach reporting timelines.
Program elements to verify
- Enterprise risk analysis and risk management plan updated at least annually.
- Access controls, audit logging, and encryption for PHI in transit and at rest.
- Workforce training, sanction policies, and vendor/subprocessor oversight.
- Documented policies for retention, disposal, and minimum necessary access.
HITRUST Certification and Annual Audits
HITRUST Common Security Framework
Many healthcare technology organizations adopt the HITRUST Common Security Framework to map controls to HIPAA and other regulations. If Lyra Health maintains HITRUST validation, request the current certification letter, scope, assessment type (e.g., r2), and expiration date, along with any interim or bridge letters.
Third‑party attestations and cadence
Independent assessments provide additional assurance. Ask for the most recent SOC 2 Type II Report (covering at least security, with availability and confidentiality where applicable) and any ISO 27001:2022 Certification details. Clarify audit frequency, remediation tracking, and how issues are communicated to customers.
- Confirm annual or ongoing monitoring of controls and penetration testing.
- Review management responses and closure evidence for any audit findings.
- Ensure subcontractors with PHI access meet comparable assurance levels.
Privacy Policy and Data Protection
Public privacy notice vs. internal safeguards
A public privacy policy explains what data is collected and how it’s used, while internal security policies govern how PHI is protected. Review both to confirm clear purposes, lawful bases, and limits on data sharing, alongside robust technical and organizational controls.
Technical and organizational controls to expect
- Encryption in transit (TLS) and at rest; strong key management practices.
- Role‑based access controls, least privilege, MFA, and session management.
- Data loss prevention, endpoint protection, and secure software development.
- Retention schedules, secure deletion, and de‑identification where feasible.
- Vendor due diligence, contractual safeguards, and ongoing monitoring.
Notice of Privacy Practices
A HIPAA‑compliant Notice of Privacy Practices describes permitted uses and disclosures of PHI, your rights (access, amendments, restrictions), and how to file complaints. If you receive clinical services through Lyra Health’s network, you should see an NPP from the provider delivering care, and—in some models—Lyra Health may also present its own NPP for services it furnishes.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment- Look for clear explanations of uses/disclosures for treatment, payment, and operations.
- Verify contact information for the Privacy Officer and complaint procedures.
- Confirm how marketing, research, or de‑identified data are addressed, if applicable.
Consent and Confidentiality Measures
Consent for Treatment and telehealth
Before care begins, you should receive Consent for Treatment covering the services provided, telehealth terms, and any recording or data sharing practices. This consent should outline your rights, the scope of services, and where to direct questions.
Confidentiality boundaries
Therapeutic confidentiality has important limits, such as concerns about imminent harm or suspected abuse, and any required disclosures by law. For substance use disorder treatment, 42 CFR Part 2 may impose additional protections and consent requirements beyond HIPAA.
Employer reporting safeguards
Because Lyra Health partners with employers, confirm that any reporting to plan sponsors is de‑identified or aggregated, avoiding disclosure of individual PHI without explicit authorization.
Security Documentation Access
Enterprises evaluating Lyra Health can typically access security documentation under NDA. Patients can request privacy information via the NPP. To streamline due diligence, ask for the documents most relevant to HIPAA assurances and control maturity.
- Executed BAA and a summary of the latest HIPAA risk analysis and remediation plan.
- Most recent SOC 2 Type II Report and any ISO 27001:2022 Certification evidence.
- HITRUST certification letter and scope statement, if maintained.
- Penetration test summaries, vulnerability management metrics, and patch SLAs.
- Policy excerpts (access control, encryption, incident response, retention).
- Subprocessor list and data flow diagrams showing PHI handling end to end.
Data Privacy Framework Adherence
Cross‑border data transfers
If your workforce spans multiple regions, confirm how Lyra Health supports international transfers. Participation in the EU‑U.S. Data Privacy Framework (and, where relevant, the UK Extension or Swiss‑U.S. framework) can facilitate transfers, often alongside Standard Contractual Clauses and robust technical measures.
Regional rights and agreements
For global deployments, request a Data Protection Addendum detailing roles, subprocessors, retention, and data subject rights. Ensure processes exist to honor access, deletion, or restriction requests without compromising HIPAA requirements.
Bottom line: determining whether Lyra Health is “HIPAA compliant” means verifying controls, contracts, and third‑party attestations. By reviewing the BAA, NPP, security reports (HITRUST, SOC 2 Type II, ISO 27001:2022 Certification), and documented safeguards for PHI, you can confidently assess alignment with HIPAA standards.
FAQs
What measures does Lyra Health use to protect PHI?
Expect layered safeguards: encryption in transit and at rest, role‑based access with MFA, audit logging, endpoint protection, secure development practices, vendor oversight, and documented retention and disposal. You can also ask for summaries of risk assessments, penetration tests, and incident response procedures addressing Protected Health Information.
How often does Lyra Health undergo compliance audits?
Many organizations schedule annual assessments, including a SOC 2 Type II audit cycle and periodic HITRUST validations, with ISO 27001:2022 surveillance audits typically occurring yearly after certification. Request the latest reports, dates, scopes, and any bridge letters to confirm continuous coverage.
What documentation does Lyra Health provide to demonstrate HIPAA compliance?
Common artifacts include an executed BAA, HIPAA risk analysis summaries, policy excerpts, SOC 2 Type II Report, HITRUST certification letter (if applicable), ISO 27001:2022 Certification evidence, penetration test summaries, and a current subprocessor list with data flow diagrams.
How can patients contact Lyra Health with privacy concerns?
Check the Notice of Privacy Practices for the Privacy Officer’s contact details and instructions for submitting requests or complaints. Patients can typically reach out through the member portal or designated email/phone listed in the NPP, and may also file a complaint with the U.S. Department of Health and Human Services if they believe their rights were violated.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment