Is Proton Mail HIPAA Compliant? BAA Requirements and What to Know

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Proton Mail HIPAA Compliant? BAA Requirements and What to Know

Kevin Henry

HIPAA

May 15, 2025

6 minutes read
Share this article
Is Proton Mail HIPAA Compliant? BAA Requirements and What to Know

Proton Mail's HIPAA Compliance

HIPAA compliance is not a single feature you toggle on; it is a program of administrative, technical, and physical safeguards. Proton Mail offers strong privacy controls—most notably End-to-End Encryption and Zero-Access Encryption—that can help you protect Protected Health Information (PHI).

However, using any email service with PHI requires the right contracts and configurations. Under HIPAA, a vendor that creates, receives, maintains, or transmits PHI for you is a Business Associate and must sign a Business Associate Agreement (BAA). Without a signed BAA and proper controls, you should not use Proton Mail to store or transmit PHI.

When properly contracted and configured, Proton Mail can be part of a HIPAA-aligned stack. Your policies, staff training, access controls, and risk management complete the picture and determine whether your overall use is compliant.

BAA Availability and Process

A Business Associate Agreement allocates HIPAA responsibilities between you and the vendor. It must cover permitted uses and disclosures, breach notification, subcontractor management, and termination and return or destruction of PHI.

To pursue a BAA with Proton Mail, follow a structured intake process and document each step:

  • Identify your use cases for PHI (who sends, receives, and stores it, and what data elements are involved).
  • Confirm BAA availability for your plan and region, and request the vendor’s standard BAA for legal review.
  • Map the BAA to your policies: access control, incident response, minimum necessary, and data retention.
  • Verify coverage of subprocessors and any add-ons (e.g., gateways, archival, or desktop clients).
  • Negotiate breach notification timelines, encryption expectations, and termination/return-or-destroy obligations.
  • Execute the BAA, retain a copy, and record the effective date for renewal and audit tracking.

Encryption Standards for Data Protection

Proton Mail’s security model centers on End-to-End Encryption for mailbox contents and Zero-Access Encryption at rest, designed so even the provider cannot read message bodies and attachments. Transport-layer encryption (TLS) protects messages in transit between servers.

In practice, you should validate which data elements are encrypted at each stage and avoid exposing PHI in unencrypted metadata. Many organizations adopt stricter handling rules for subjects, headers, and routing data to minimize risk.

  • At rest: Zero-Access Encryption protects stored message content and attachments.
  • In transit: TLS with modern ciphers; use message-level encryption for external recipients when possible.
  • End-to-end: Public-key cryptography (e.g., OpenPGP) secures message content between sender and recipient.
  • External recipients: Use password-protected or link-based secure messages and share passphrases out-of-band.
  • Key management: Establish procedures for key generation, rotation, recovery, and revocation.

Data Security and Physical Safeguards

HIPAA requires layered defenses beyond encryption. Configure Proton Mail and your environment to enforce least privilege, detect anomalies, and protect endpoints where decrypted PHI may reside.

Your security program should also account for facilities, devices, and business continuity measures that affect PHI confidentiality, integrity, and availability.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Identity and access: Strong MFA (preferably security keys), role-based access, and rapid offboarding.
  • Endpoint protection: Full-disk encryption, MDM, and screen-lock policies for any device accessing PHI.
  • Client integrations: If you use desktop clients or connectors, validate local storage encryption and policies.
  • Monitoring: Session management, audit logging, and alerting for suspicious access or forwarding rules.
  • Resilience: Backup, disaster recovery, and tested incident response plans for email availability and breaches.
  • Physical safeguards: Controlled facilities, hardware protection, and documented equipment disposal procedures.

Compliance Certifications and Audits

Independent attestations help you evaluate a vendor’s controls but do not by themselves make a service HIPAA compliant. Request current evidence such as ISO 27001 Certification or a SOC 2 Type II Audit report, and review the in-scope systems and control coverage.

Map the vendor’s controls to HIPAA’s Security Rule standards. Maintain your own risk assessment, document compensating controls where needed, and ensure the BAA aligns with the realities reflected in the audits.

  • Obtain and review summary reports (e.g., ISO 27001 Statement of Applicability, SOC 2 Type II report).
  • Confirm encryption, access control, change management, and incident response controls are in scope.
  • Validate subcontractor oversight and data center controls relevant to PHI handling.
  • Track report periods and renewals to keep evidence current for audits.

Sending HIPAA-Compliant Emails

Create a standard operating procedure for emailing PHI that minimizes exposure and ensures consistent protection. Train staff on when to use message-level encryption and how to verify recipient identity.

Adopt the minimum necessary standard for each message. When possible, use patient portals or secure file transfer for rich datasets, reserving email for brief notifications or summaries.

  • Do not place PHI in subject lines or unencrypted headers; keep subjects generic.
  • Use end-to-end encrypted messages or secure links for external recipients, with out-of-band passphrase exchange.
  • Verify addresses before sending; enable safeguards against auto-forwarding to personal mailboxes.
  • Apply DLP-style checks where available; redact identifiers when feasible.
  • Log transmissions involving PHI to support investigations and patient accounting of disclosures.

Email Retention and Privacy Rule Compliance

The HIPAA Privacy Rule emphasizes the minimum necessary use of PHI and requires you to retain certain documentation for at least six years. While HIPAA does not mandate a universal email retention period, your retention should reflect clinical, legal, payer, and state requirements.

Define a retention and deletion schedule for messages containing PHI, and ensure backups and archives follow the same rules. Use cryptographic erasure (destroying encryption keys) and verified purge procedures to render data unreadable when disposal is required.

  • Classify messages that contain PHI and route them to compliant archival if needed for records management.
  • Set retention periods by record type; apply legal holds when litigation or investigations arise.
  • Ensure backups and replicas inherit encryption and deletion policies.
  • Document deletion workflows, including post-termination return-or-destroy obligations under your BAA.

In short, Proton Mail’s strong encryption can support a HIPAA program, but true compliance depends on a signed Business Associate Agreement, disciplined configurations, user training, and documented retention and security controls.

FAQs

Does Proton Mail sign a Business Associate Agreement for HIPAA compliance?

BAA availability can depend on your plan, use case, and region. You must obtain a signed Business Associate Agreement before using any email service to create, receive, maintain, or transmit PHI. If a BAA is not available for your deployment, do not use Proton Mail for PHI.

What encryption methods does Proton Mail use to protect data?

Proton Mail relies on End-to-End Encryption for message content and attachments, Zero-Access Encryption for data at rest, and TLS for transport. This combination protects mailbox contents from unauthorized access while safeguarding messages as they move between servers.

How does Proton Mail ensure data is securely deleted after contract termination?

A HIPAA-aligned approach uses documented return-or-destroy procedures under the BAA, plus technical measures like cryptographic erasure—rendering data unreadable by destroying encryption keys—along with verified deletion from backups per defined retention schedules. Request these commitments in the BAA and verify them during offboarding.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles