Is Microsoft Teams HIPAA Compliant? A Beginner’s Guide to Requirements, BAA, and Safe Use

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Microsoft Teams HIPAA Compliant? A Beginner’s Guide to Requirements, BAA, and Safe Use

Kevin Henry

HIPAA

April 17, 2025

7 minutes read
Share this article
Is Microsoft Teams HIPAA Compliant? A Beginner’s Guide to Requirements, BAA, and Safe Use

Microsoft Teams can support HIPAA-compliant workflows when you combine the right Microsoft 365 licensing, a signed Business Associate Agreement (BAA), and rigorous configuration that protects Protected Health Information (PHI). This guide explains the essentials so you can assess requirements, confirm the BAA, and use Teams safely.

Microsoft Teams HIPAA Compliance Overview

HIPAA centers on safeguarding PHI through administrative, physical, and technical controls defined by the HIPAA Security Rule. Teams is a collaboration platform that, when properly licensed and configured, can help you implement these controls without becoming a compliance shortcut on its own.

Start with a HIPAA Risk Analysis that inventories how PHI enters Teams (chat, channels, files, meetings, recordings, apps) and evaluates threats such as unauthorized access, oversharing, and data exfiltration. Use the results to drive policies for access, retention, and monitoring across Microsoft 365.

  • Confirm that Teams is within the scope of your organization’s BAA with Microsoft.
  • Limit PHI to in-scope services and approved workloads.
  • Apply least privilege, strong identity protections, data loss prevention, and auditing.

Understanding Business Associate Agreements

A Business Associate Agreement (BAA) documents the privacy and security obligations between a covered entity or business associate and Microsoft. Microsoft offers HIPAA terms through its Data Protection Addendum (DPA), which incorporates the BAA for in-scope Online Services such as Microsoft Teams.

Review the BAA/DPA carefully to understand shared responsibilities. The BAA does not automatically make your use of Teams compliant—you must configure access controls, retention, encryption features, and monitoring, and you must train your workforce. Exclude third-party apps or connectors that are not covered by the BAA, or assess them separately.

  • Keep a copy of your accepted BAA/DPA with contract records.
  • Confirm the list of covered services and your obligations for breach notification and incident response.
  • Document how your internal policies map to the BAA and HIPAA Security Rule requirements.

Required Microsoft 365 Plans for Compliance

No plan alone guarantees compliance, but certain licenses provide the controls you need. Choose a SKU that brings Teams into the BAA’s scope and enables key safeguards such as Data Loss Prevention (DLP), auditing, retention, and eDiscovery.

Common baselines

  • Microsoft 365 E3 or Office 365 E3: core security, compliance, and Teams workload; add compliance capabilities as needed.
  • Microsoft 365 Business Premium: suitable for smaller organizations; assess add-ons to meet DLP/eDiscovery requirements for Teams.
  • Education (A3/A5) and Government (GCC/GCC High/DoD) equivalents: select the edition that aligns with your sector’s requirements.

Advanced controls often needed for PHI

  • Microsoft 365 E5 or Microsoft 365 E5 Compliance add-on for stronger DLP in Teams chat and channel messages, advanced auditing, retention, and eDiscovery.
  • Information Protection and governance features to label, encrypt, and retain PHI consistently across Teams, SharePoint, and OneDrive.

Decide on licensing after your HIPAA Risk Analysis so you buy only what you need to mitigate identified risks.

Data Encryption Standards in Teams

Teams protects data in transit with Transport Layer Security (TLS) and media encryption protocols, and encrypts data at rest using the Advanced Encryption Standard (AES). This layered model helps safeguard chat, meetings, and files that may contain PHI.

  • In transit: signaling traffic is protected with TLS; real-time audio and video use secure media protocols that incorporate AES-based encryption.
  • At rest: service-side encryption uses AES (commonly AES-256) for Teams data, with files stored in SharePoint/OneDrive and protected accordingly.
  • Optional features: end-to-end encryption for certain call scenarios can increase confidentiality but may disable compliance features like recording; evaluate trade-offs before enabling for PHI workflows.

Encryption is necessary but not sufficient; combine it with access controls, device protection, and continuous monitoring.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Utilizing Audit Logs for Compliance

Auditing demonstrates accountability for PHI. Enable and regularly review Microsoft 365’s unified audit logging to capture Teams activities such as team creation, membership changes, messaging, file access, meetings, and external sharing.

Operationalizing audit

  • Turn on the unified audit log and verify that Teams events are flowing.
  • Define alerting for high-risk actions (external sharing, policy changes, anonymous meeting joins, mass deletions).
  • Use standard auditing for day-to-day oversight; consider premium/advanced auditing for longer retention and richer event detail when your risk profile or regulations require it.
  • Integrate audit reviews with incident response and HIPAA breach assessment procedures.

For investigations, apply eDiscovery to search and preserve Teams chat, channel messages, and related files, aligning holds and retention with HIPAA and your data governance policies.

Secure Data Storage Practices

PHI in Teams typically resides in chat/channels, meeting chat, and files stored in SharePoint or OneDrive. You should design storage and lifecycle controls that minimize exposure while keeping required records.

  • Retention: create Microsoft Purview retention policies for Teams messages, meeting transcripts/recordings, and files; align timelines to clinical, legal, and billing needs.
  • DLP: apply DLP policies to detect and block oversharing of PHI in Teams chat and file sharing, including messages to guests or external domains.
  • Sensitivity labels: encrypt and label documents containing PHI so access follows the file, even outside Teams.
  • Access control: use Conditional Access, multifactor authentication, and device compliance checks; require app protection policies on mobile devices.
  • External collaboration: restrict default link types, control guest access, and vet external sharing through B2B collaboration settings.
  • Information barriers and scoped directory: limit who can communicate where separation of duties or clinical boundaries are required.

Risks and Mitigation of Misconfiguration

Most HIPAA exposures stem from configuration gaps rather than platform flaws. Address these common risks before enabling PHI in Teams.

High-impact misconfigurations

  • Unrestricted external or guest access that allows PHI to leave your tenant.
  • “Anyone with the link” file sharing and unmanaged device downloads.
  • Unvetted third-party apps or bots that store data outside the BAA’s scope.
  • Meeting recordings or transcripts auto-shared beyond the care team.
  • Insufficient retention, auditing, or alerting to detect and investigate incidents.

Mitigations

  • Enable MFA, Conditional Access, and device governance before permitting PHI.
  • Constrain external collaboration with allow/block lists, guest governance, and scoped sharing links.
  • Use DLP for Teams chat/files; label and encrypt PHI; restrict downloads on unmanaged devices.
  • Define meeting policies for recording, transcription, and captions; route recordings to controlled storage with retention.
  • Continuously monitor audit logs; test incident response; review configurations after system or policy changes.

Key takeaways

Teams can be used compliantly when you have a BAA through Microsoft’s Data Protection Addendum, select licensing that delivers the necessary controls, and enforce strong identity, encryption, auditing, and governance. Your HIPAA Risk Analysis should drive which features you enable and how you configure them.

FAQs.

What is required for Microsoft Teams to be HIPAA compliant?

You need three pillars: a signed Business Associate Agreement (via Microsoft’s Data Protection Addendum), appropriate Microsoft 365 licensing that brings Teams into scope and unlocks governance controls, and configuration aligned to the HIPAA Security Rule. Practically, this means strong identity protections, retention and DLP for PHI, encryption, audit logging, and documented policies and training supported by a HIPAA Risk Analysis.

How does Microsoft provide a BAA for Teams users?

Microsoft offers HIPAA terms within its Data Protection Addendum, which functions as the BAA for in-scope Online Services, including Microsoft Teams. Your organization accepts these terms through its Microsoft 365 agreement. Keep the accepted BAA/DPA with your compliance records and confirm that only covered services are used for PHI.

What security measures protect PHI in Microsoft Teams?

Teams uses Transport Layer Security (TLS) for data in transit and AES-based encryption for data at rest, with secure media protocols for audio/video. Beyond encryption, you should enforce multifactor authentication and Conditional Access, apply DLP to chat and files, use sensitivity labels for encryption and access control, enable audit logging, and set retention for messages, recordings, and documents.

How can healthcare organizations mitigate risks of misconfiguration?

Begin with a HIPAA Risk Analysis to pinpoint where PHI is used in Teams. Then restrict external and guest sharing, require managed or protected devices, apply DLP and retention, control meeting recordings and transcripts, review third-party apps against the BAA’s scope, and monitor audit logs with alerts for anomalous activity. Reassess configurations regularly and after platform or policy changes.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles