Is Microsoft Teams HIPAA-Compliant for Telehealth? Requirements, BAA, and How to Use It Safely

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Microsoft Teams HIPAA-Compliant for Telehealth? Requirements, BAA, and How to Use It Safely

Kevin Henry

HIPAA

October 04, 2025

7 minutes read
Share this article
Is Microsoft Teams HIPAA-Compliant for Telehealth? Requirements, BAA, and How to Use It Safely

Yes—Microsoft Teams can be used for telehealth in a HIPAA-compliant manner when you execute a Business Associate Agreement (BAA) with Microsoft and configure the platform in line with HIPAA’s administrative, physical, and technical safeguards. This guide explains the requirements, the BAA, and practical steps to use Teams safely with Protected Health Information (PHI).

Business Associate Agreement Overview

A Business Associate Agreement is the contract that permits Microsoft to handle PHI on your behalf and defines each party’s responsibilities under HIPAA. Without a BAA, you should not store or transmit PHI in Teams.

  • Confirm your organization’s status as a covered entity or business associate and ensure the BAA with Microsoft is executed and retained with your compliance records.
  • Understand scope: the BAA applies to HIPAA-eligible Microsoft 365 services (including Microsoft Teams) when configured and used appropriately.
  • Clarify shared responsibilities: Microsoft secures the cloud infrastructure; you must configure controls, limit access, and enforce policies that protect PHI.
  • Embed the BAA into your vendor management and Risk Assessment process, documenting how PHI flows through Teams, OneDrive, and SharePoint.

Microsoft 365 Plan Requirements

Select licensing that supports the security and compliance features you plan to use. Teams is HIPAA-eligible when used with a BAA; however, certain safeguards and advanced controls require specific Microsoft 365 plans or add‑ons.

  • Core collaboration: Microsoft Teams with Exchange Online, SharePoint, and OneDrive for secure meetings, chat, and file storage.
  • Identity and access: Azure AD capabilities for Conditional Access and Multi-Factor Authentication (MFA) are essential.
  • Compliance and governance: auditing, eDiscovery, retention, and Data Loss Prevention (DLP) are available across plans, with advanced features and longer retention typically in higher tiers or compliance add‑ons.
  • Endpoint protection: mobile application management and device compliance (e.g., Intune) to keep PHI off unmanaged devices.

Work with your licensing partner to confirm SKUs that meet your requirements for auditing, DLP, retention, and encryption key options.

Data Encryption Practices

Encryption protects PHI in transit and at rest across Teams, meetings, chats, and files. Configure and verify encryption controls as part of your overall security baseline.

  • In transit: use TLS for signaling and SRTP for media sessions to protect audio, video, and screen sharing.
  • At rest: chats and channel messages are stored in Microsoft 365 and encrypted at rest; files shared in Teams are stored in OneDrive or SharePoint with encryption at rest.
  • Key management: Microsoft-managed keys are default; consider Customer Key or Double Key Encryption for heightened control over encryption keys.
  • End-to-end encryption: enable E2EE for one-to-one calls where appropriate, noting feature trade-offs and documentation needs for clinical workflows.
  • Information protection: apply sensitivity labels to automatically encrypt and restrict PHI when it is shared, downloaded, or accessed across devices.

Access Control Implementation

Limit PHI exposure through strong identity, device, and session controls. Enforce least privilege with Role-Based Access Control and protect every sign-in with MFA.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Multi-Factor Authentication: require MFA for all users handling PHI; use phishing-resistant methods where possible.
  • Conditional Access: allow access only from compliant, healthy devices; block risky sign-ins; require device encryption and screen lock.
  • Role-Based Access Control: grant the minimum Azure AD and Teams admin roles; use privileged access workflows and time-bound elevation for administrators.
  • External collaboration: restrict guest access and external federation; when patient participation is required, use lobbies, waiting rooms, and controlled presenter roles.
  • Meeting policies: limit who can record, share screens, or transfer files; disable cloud recording unless there is a documented clinical and legal need.
  • Endpoint controls: enforce mobile app protection (MAM) to prevent copy/paste or saving PHI to personal locations on unmanaged devices.

Audit Logging and Monitoring

HIPAA expects you to maintain traceability. Enable and routinely review Audit Logs to detect inappropriate access or data handling.

  • Unified audit: capture Teams events such as message posting, file access, meeting activities, and administrative changes.
  • Alerts and investigations: configure alert policies for anomalous downloads, external sharing, or disabled security settings; document incident response steps.
  • Retention: align log retention with regulatory and organizational requirements; preserve evidence for investigations and legal holds.
  • Analytics: integrate with your SIEM to correlate sign-in risk, device posture, and Teams activities for continuous monitoring.
  • Periodic review: schedule routine reviews of access patterns and admin changes, and record outcomes for compliance audits.

Data Loss Prevention Strategies

Prevent accidental or unauthorized transmission of PHI using layered Data Loss Prevention controls tuned to healthcare scenarios.

  • Teams DLP: inspect chat and channel messages and their attachments; trigger policy tips, block sends, or require business justification when PHI is detected.
  • Healthcare classifiers: use built-in or trainable classifiers to detect sensitive data (e.g., patient identifiers) and reduce false positives.
  • Sensitivity labels: auto-label content with “Confidential—PHI” to enforce encryption, watermarking, and restricted sharing across Teams and Office apps.
  • Information barriers: prevent cross-team communication where regulations or internal policy require separation (e.g., research vs. clinical operations).
  • Unmanaged devices: restrict file downloads and printing from browsers or mobile apps on noncompliant devices; enable view-only in the web experience.
  • Lifecycle controls: apply retention labels to clinical chats and meeting artifacts; define defensible deletion schedules to limit PHI exposure.

User Training and Compliance

Technology alone does not deliver compliance. Train users on safe telehealth practices and document compliance activities alongside your Risk Assessment.

  • Identity verification: confirm patient identity at session start; avoid sharing PHI until verification is complete.
  • Environment hygiene: use headsets, background blur, and private spaces; prevent family or bystanders from overhearing PHI.
  • Chat discipline: avoid placing sensitive clinical notes in chat; move PHI to approved systems of record and secure repositories.
  • Screen sharing: share specific windows, not entire desktops; close apps or notifications that may expose PHI.
  • Recording and transcripts: record only when policy allows; store recordings in approved locations with restricted access and retention.
  • Incident readiness: teach users how to report misdirected messages or files; practice containment and documentation steps.

In summary, Microsoft Teams can support HIPAA-compliant telehealth when you have a signed Business Associate Agreement, enforce encryption, implement MFA and Conditional Access, apply Role-Based Access Control, enable and review Audit Logs, deploy Data Loss Prevention, and provide ongoing user training tied to a documented Risk Assessment.

FAQs.

What is a Business Associate Agreement in Microsoft Teams?

A Business Associate Agreement is the contract that permits Microsoft to process PHI on your behalf within HIPAA-eligible services such as Microsoft Teams. It allocates responsibilities: Microsoft secures the cloud platform, while your organization configures access, policies, and oversight to protect PHI.

How does Microsoft 365 support HIPAA compliance?

Microsoft 365 provides HIPAA-eligible services and security capabilities—encryption in transit and at rest, MFA and Conditional Access, auditing, retention, and DLP. With an executed BAA and proper configuration, these features help you meet HIPAA’s safeguards across telehealth workflows.

What security features are required for HIPAA compliance in Teams?

Core requirements include a signed BAA, strong identity controls with Multi-Factor Authentication, Role-Based Access Control, encryption for data in transit and at rest, meeting and sharing restrictions, Audit Logs with monitoring, and Data Loss Prevention tuned to detect and protect PHI.

How can organizations monitor HIPAA compliance effectively?

Enable unified Audit Logs, set alert policies for risky activity, integrate telemetry with your SIEM, review admin and access changes on a schedule, and retain logs according to policy. Pair technical monitoring with documented reviews, user training, and an ongoing Risk Assessment.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles