Is Mend HIPAA Compliant? BAA, Security Measures, and Patient Privacy Explained

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Mend HIPAA Compliant? BAA, Security Measures, and Patient Privacy Explained

Kevin Henry

HIPAA

April 27, 2025

7 minutes read
Share this article
Is Mend HIPAA Compliant? BAA, Security Measures, and Patient Privacy Explained

HIPAA Compliance Overview

What HIPAA requires for telehealth vendors

HIPAA sets national standards for protecting Protected Health Information (PHI). For a telehealth platform, compliance centers on the HIPAA Security Rule for ePHI, the Privacy Rule for permissible uses and disclosures, and the Breach Notification Rule for incident response. A platform like Mend must enable covered entities and business associates to meet these requirements without creating unnecessary risk.

Is Mend HIPAA compliant?

Mend can support HIPAA compliance when you operate it under a signed Business Associate Agreement, configure privacy and security features appropriately, and manage your workforce and devices responsibly. No single vendor “confers” compliance; it is a shared program that combines technology, policies, training, and oversight.

Shared responsibility model

Mend is responsible for securing the platform, while you control user provisioning, Access Controls, consent capture, and day‑to‑day privacy practices. Your compliance posture depends on how you deploy the product, restrict access to PHI, and document procedures.

PHI scope and data flows

Identify all PHI moving through Mend—appointment details, intake forms, chat transcripts, video/audio sessions, e‑signatures, and billing data. Map where ePHI is created, transmitted, and stored so you can apply the minimum necessary standard, set retention schedules, and prepare accurate Compliance Documentation.

Business Associate Agreement (BAA) Details

Why the BAA matters

A Business Associate Agreement is required whenever a vendor handles PHI on your behalf. The BAA contractually binds the vendor to safeguard PHI, follow the HIPAA Security Rule, limit uses and disclosures, and notify you of security incidents and breaches within agreed timeframes.

What to verify in Mend’s BAA

  • Permitted uses/disclosures and explicit prohibition on secondary use of PHI for marketing without authorization.
  • Security obligations mapped to the HIPAA Security Rule, including encryption, Access Controls, and audit controls.
  • Breach and incident notification timelines, cooperation duties, and investigation expectations.
  • Subcontractor flow‑down requirements so all downstream providers protect PHI to the same standard.
  • Data return/destruction at termination, plus secure media disposal requirements.
  • Right to receive Compliance Documentation relevant to the services and to conduct reasonable due diligence.

Execution timing and updates

Execute the BAA before any PHI is exchanged. Review it at renewal or when services change, ensuring new features (e.g., messaging, e‑forms, recordings) are in scope and subject to the same safeguards.

Security Measures and Encryption Protocols

Encryption protocols in transit and at rest

Strong Encryption Protocols protect ePHI during transmission and storage. Best practice includes TLS 1.2+ with modern cipher suites for web traffic, DTLS‑SRTP for real‑time audio/video, and AES‑256 for data at rest. Apply perfect forward secrecy and certificate lifecycle management to reduce interception risks.

Key management and separation of duties

Use a hardened key management service (KMS), rotate keys regularly, restrict access by role, and maintain tamper‑evident logs. Separate duties so no single administrator can both export data and access keys without oversight.

Access Controls and authentication

  • Enforce unique user IDs, strong passwords, and multi‑factor authentication.
  • Enable SSO via SAML/OIDC to centralize lifecycle management and reduce orphaned accounts.
  • Apply least‑privilege, role‑based Access Controls so staff see only the PHI required for their job.
  • Configure automatic session timeouts and device lock policies to prevent unattended access.

Audit controls, monitoring, and integrity

Enable detailed audit logs for logins, view/download events, administrative changes, and PHI access. Forward logs to a monitoring system for alerting and retention. Use checksums or hashing to verify data integrity and detect tampering, and ensure backups are encrypted and periodically tested.

Vulnerability and patch management

Adopt routine vulnerability scanning, timely patching, and third‑party testing aligned to your risk profile. Track remediation in a risk register so fixes are prioritized based on potential impact to PHI.

Collect informed consent for telehealth services and clearly disclose how PHI will be used and shared. When using SMS or email, capture explicit patient consent for those channels and avoid including sensitive PHI in notifications unless necessary and permitted.

Notices and authorizations

Provide your Notice of Privacy Practices and secure authorizations when using PHI for purposes beyond treatment, payment, and healthcare operations. Maintain signed records within Mend or your EHR and link them to the patient’s encounter history.

Identity verification and minimum necessary

Verify patient identity at intake and prior to sessions, especially for high‑risk encounters. Configure workflows to expose only the minimum necessary PHI to staff and to mask identifiers in waiting rooms, reminders, and chat previews.

Special considerations

Account for minors, guardians, sensitive services, and applicable federal or state confidentiality rules. Ensure consent forms, disclosures, and retention policies reflect these requirements and are captured with a verifiable audit trail.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Administrative and Technical Safeguards

Risk Assessments and risk management

Conduct an enterprise‑wide risk analysis that covers Mend’s use cases, data flows, and integrations. Document threats, likelihood, and impact; then implement risk‑based controls and track remediation to closure with clear ownership and timelines.

Workforce security and training

Provision users through centralized identity systems, require onboarding/offboarding checklists, and review Access Controls at least quarterly. Deliver role‑based HIPAA training and maintain attendance and acknowledgment records for audit readiness.

Contingency planning and incident response

Define backup, disaster recovery, and business continuity objectives (RPO/RTO) for telehealth operations. Establish an incident response plan with triage steps, evidence handling, breach assessment, and notification procedures aligned to HIPAA.

Secure development and change control

When using custom forms or integrations, follow a secure SDLC with code review, dependency scanning, and segregation of environments. Use change management to assess risk, obtain approvals, and document production releases.

Technical safeguards to enforce policy

  • Automatic logoff, IP allow‑listing/geo‑fencing where feasible, and device posture checks.
  • Data loss prevention rules to deter unauthorized export of PHI.
  • Scoped API keys, mTLS for service‑to‑service calls, and rate limiting for resilience.

Physical Safeguards Implementation

Facility and environmental controls

Limit physical access to systems that store or process PHI. For cloud‑hosted environments, rely on vetted data centers with strong facility access controls and monitor provider attestations as part of vendor oversight.

Workstations, laptops, and mobile devices

Encrypt devices (full‑disk), enforce screen locks, and manage assets through MDM/EMM with remote wipe. Define secure use guidelines for telehealth sessions to prevent shoulder‑surfing and unauthorized recordings in shared spaces.

Media handling and disposal

Track removable media, disable it where possible, and sanitize or destroy media using a documented process before reuse or disposal. Maintain certificates of destruction for audit evidence.

Compliance Documentation and Risk Management

Core Compliance Documentation

Maintain written policies and procedures, the executed Business Associate Agreement, Risk Assessments and risk register, system inventory, data flow diagrams, access review logs, training records, incident response runbooks, and change control tickets. Keep versions and approval dates current.

Third‑party oversight and due diligence

Evaluate Mend and other vendors with security questionnaires, review of security whitepapers, and confirmation of controls aligned to the HIPAA Security Rule. Track issues to resolution and update BAAs when service scope evolves.

Continuous improvement and audit readiness

Schedule periodic internal audits, tabletop exercises, and scenario‑based tests of breach workflows. Use metrics such as time‑to‑revoke access, patch cadence, and log coverage to demonstrate ongoing program maturity.

Conclusion

In practice, Mend can be used within a HIPAA‑compliant program when you execute a BAA, enable robust encryption and Access Controls, capture patient consent properly, and maintain thorough Compliance Documentation backed by continuous Risk Management. Treat compliance as an ongoing discipline, not a one‑time checkbox.

FAQs.

What makes Mend HIPAA compliant?

A signed Business Associate Agreement, strong encryption in transit and at rest, granular Access Controls, audit logging, and a documented security and privacy program aligned to the HIPAA Security Rule. Your administrative, physical, and technical safeguards complete the compliance picture.

Mend supports electronic consent collection for telehealth and communications. You can present disclosures, capture signatures or acknowledgments, and retain time‑stamped records and audit trails tied to the patient’s encounter.

What security measures does Mend implement?

Standard measures include TLS/DTLS‑SRTP for transport security, AES‑256 for storage, MFA/SSO, role‑based Access Controls, detailed audit logs, encrypted backups, and structured incident response. These controls help protect PHI throughout its lifecycle.

Does Mend provide Business Associate Agreements?

Yes. Healthcare customers execute a Business Associate Agreement with Mend before exchanging PHI. Ensure the BAA reflects your use of features—messaging, forms, recordings—and keep it updated as your deployment evolves.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles