Is Make.com HIPAA Compliant? What Healthcare Teams Need to Know
HIPAA Compliance Requirements
HIPAA governs how Covered Entities and their Business Associates handle Protected Health Information (PHI). To use any automation tool with PHI, you must ensure the vendor and your implementation satisfy the HIPAA Privacy Rule, the HIPAA Security Rule, and the Breach Notification Rule.
The HIPAA Privacy Rule limits permissible uses and disclosures of PHI. The HIPAA Security Rule requires safeguards to protect electronic PHI (ePHI). The Breach Notification Rule mandates timely Data Breach Notification to affected individuals and regulators when unsecured PHI is compromised.
- Administrative safeguards: risk analysis, policies and procedures, workforce training, vendor management, and contingency planning.
- Physical safeguards: facility security, device/media controls, and secure disposal of hardware and backups.
- Technical safeguards: access controls, unique IDs and MFA, audit controls, integrity monitoring, and encryption in transit and at rest.
Any platform that stores, processes, or transmits PHI on your behalf is a Business Associate and must meet these requirements contractually and operationally.
Business Associate Agreements
A Business Associate Agreement (BAA) is a contract that binds a vendor to handle PHI in compliance with HIPAA. If an automation platform will touch PHI—even transiently—it must sign a BAA before you use it in production.
- Defines permitted/required PHI uses and disclosures.
- Requires safeguards aligned to the HIPAA Security Rule, including audit logging and breach reporting.
- Flows down obligations to subcontractors and specifies termination and data return/destruction.
SOC 2 Certification can evidence a mature security program, but it is not a substitute for a BAA or for HIPAA-specific controls. Without a signed BAA, a tool cannot be used for PHI, regardless of other attestations.
Risks of Using Non-Compliant Platforms
Using a non-HIPAA-compliant automation platform for PHI creates regulatory, security, and operational exposure. Even a single workflow run that transmits identifiers can trigger obligations under the Breach Notification Rule.
- Regulatory and financial risk: OCR investigations, fines, corrective action plans, and mandatory notifications within prescribed timelines.
- Security risk: payloads may be retained in run histories, logs, caches, or support artifacts; multi-tenant processing and unmanaged sub-processors expand the attack surface.
- Contractual risk: no BAA means no enforceable HIPAA commitments, limited indemnification, and gaps in incident cooperation and audit rights.
- Operational risk: vendor terms may prohibit PHI, forcing sudden workflow shutdowns and costly remediations.
These risks apply even when data is “temporary” or “for testing.” If PHI is present, HIPAA applies.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentAlternatives to Make.com for Healthcare
If you need automation that can handle PHI, choose platforms that offer HIPAA-eligible environments and will execute a BAA. Validate capabilities against your security and compliance requirements before migrating workloads.
- Enterprise cloud automation: Microsoft Power Automate and Azure services under an executed BAA.
- Cloud-native orchestrations: AWS Step Functions/Lambda or Google Cloud Workflows using HIPAA-eligible services with a BAA.
- Enterprise iPaaS: vendors such as Workato or MuleSoft Anypoint Platform that provide HIPAA programs and sign BAAs.
- Healthcare-focused integration networks: solutions like Redox designed for Healthcare Automation Compliance and PHI exchange.
For any option, request documentation mapping controls to the HIPAA Security Rule, confirm breach response commitments, and test that sensitive payloads are excluded from logs by default.
Best Practices for PHI Security
- Minimize data: pass only the fields strictly required; de-identify or pseudonymize when possible.
- Protect transport and storage: enforce TLS 1.2+ in transit and strong encryption at rest; manage keys centrally with rotation.
- Harden integrations: use HMAC-signed webhooks, mutual TLS where supported, IP allowlists, and secret rotation.
- Control access: SSO with MFA, least-privilege roles, break-glass accounts, and periodic access reviews.
- Log safely: capture audit trails without PHI; set disciplined retention, monitoring, and alerting.
- Segment environments: isolate dev/test from prod; scrub fixtures to ensure no PHI in nonprod environments.
- Vendor risk management: require a BAA, review SOC 2 Certification and penetration tests, validate sub-processor lists, and confirm data residency/deletion.
- Prepare for incidents: maintain an IR plan aligned to HIPAA breach definitions and timelines; conduct tabletop exercises.
- Train teams: provide task-specific guidance for builders who design and operate automations touching PHI.
Overview of Make.com Platform
Make.com is a no-code integration and workflow platform that connects apps via visual “scenarios.” It triggers actions from webhooks or app events, transforms data in modules, and orchestrates multi-step flows with routers and iterators.
In typical operation, data passes through Make.com’s infrastructure and may appear in run histories or error logs for troubleshooting. Those behaviors, common to many iPaaS tools, can expose PHI if such data is sent through the platform.
As of February 5, 2026, Make.com does not offer a Business Associate Agreement and should be treated as not HIPAA compliant for PHI workflows. Covered Entities and Business Associates should not transmit or store PHI in Make.com scenarios. General security attestations alone do not change HIPAA obligations without a signed BAA and documented HIPAA controls.
Evaluating Automation Tools for Healthcare
- Contractual: Will the vendor sign a Business Associate Agreement and flow down terms to sub-processors?
- Data handling: Can you exclude PHI from logs, control retention, and guarantee timely deletion and export?
- Security controls: Encryption, key management, RBAC, MFA, SSO, audit logs, and segregation of duties mapped to the HIPAA Security Rule.
- Operational transparency: documented architecture, sub-processor inventory, data residency options, uptime SLAs, and RTO/RPO targets.
- Assurance: recent SOC 2 Certification (preferably Type II), independent testing, and a tested incident response with clear Data Breach Notification timelines.
- Usability and scale: developer experience, governance features, and support that can operate under HIPAA constraints.
Bottom line: without a BAA, a tool cannot be used for PHI. Select a HIPAA-eligible platform, sign the right agreements, and implement the safeguards above to achieve Healthcare Automation Compliance.
FAQs
Why is Make.com not HIPAA compliant?
Because it does not sign a Business Associate Agreement and does not provide a HIPAA-eligible environment with HIPAA-specific commitments. Its standard data handling (for example, run histories and logs) can expose payloads, which is unacceptable for PHI. As of February 5, 2026, healthcare organizations should treat Make.com as not suitable for PHI workflows.
What is a Business Associate Agreement?
A BAA is a contract required by HIPAA when a vendor handles PHI on your behalf. It defines permissible uses, mandates safeguards aligned to the HIPAA Security Rule, requires prompt breach reporting, and ensures subcontractors meet the same obligations. Without a BAA, you cannot lawfully share PHI with that vendor.
What are the risks of using non-HIPAA-compliant automation?
You risk regulatory penalties, costly Data Breach Notification, reputational damage, workflow shutdowns, and patient trust erosion. Technically, PHI can leak into logs, caches, and third-party sub-processors, and you lack the contractual leverage to audit, remediate, or compel secure deletion.
What are HIPAA-compliant alternatives to Make.com?
Consider platforms that offer HIPAA programs and will execute a BAA, such as Microsoft Power Automate with Azure services, AWS Step Functions/Lambda or Google Cloud Workflows with HIPAA-eligible services, enterprise iPaaS like Workato or MuleSoft, and healthcare-focused networks like Redox. Always validate the vendor’s HIPAA documentation and sign a BAA before handling PHI.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment