Is RingCentral HIPAA Compliant? Here’s What to Know About BAAs and Security

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is RingCentral HIPAA Compliant? Here’s What to Know About BAAs and Security

Kevin Henry

HIPAA

May 21, 2025

7 minutes read
Share this article
Is RingCentral HIPAA Compliant? Here’s What to Know About BAAs and Security

HIPAA-Compliant RingCentral Solutions

What “HIPAA‑compliant” really means

There’s no official government “HIPAA certification” for cloud services. Whether RingCentral is HIPAA compliant for your organization depends on two things: a signed Business Associate Agreement (BAA) covering the services you use and the way you configure and operate those services. With the right contract and controls, RingCentral can support workflows that handle Protected Health Information (PHI) in line with the HIPAA Security Rule.

Core capabilities relevant to PHI

RingCentral’s voice, video, messaging, and fax capabilities can be deployed in environments where PHI is present. Key features—role‑based access control, multifactor authentication, audit logging, granular recording policies, and administrative content controls—help you restrict who can access PHI and how it is stored, transmitted, and retained.

Configuration essentials aligned to the HIPAA Security Rule

  • Enable SSO/MFA, least‑privilege roles, and strict device/session policies.
  • Limit or disable features that may expose PHI (for example, voicemail transcription, SMS for patient content, or automatic file download).
  • Define recording policies and announce recordings; restrict who can access and share them.
  • Set retention and legal hold rules before onboarding users who will handle PHI.
  • Plan for incident response and ongoing risk management, not just initial setup.

Understanding Business Associate Agreements

A Business Associate Agreement is the contractual backbone of HIPAA compliance for any cloud service that creates, receives, maintains, or transmits PHI on your behalf. It allocates responsibilities, defines permitted uses/disclosures, and mandates safeguards, breach notification, and termination requirements.

What your BAA should cover

  • Exactly which RingCentral products, features, and data types are in scope for PHI.
  • Security obligations mapped to the HIPAA Security Rule, including administrative, physical, and technical safeguards.
  • Encryption requirements in transit and at rest, and restrictions on email/SMS involving PHI.
  • Subcontractor management, data residency/processing locations, and breach notification timelines.
  • Data retention, deletion, and return of PHI at contract end, plus audit rights to review security reports.

How to obtain and operationalize the BAA

  • Request a BAA from your account team and confirm eligibility of the specific services you plan to use.
  • Execute the BAA before storing or transmitting any PHI through the platform.
  • Map internal policies and user training to the BAA’s scope and limitations.
  • Review the BAA annually and whenever you add new features or integrations.

Security Certifications and Standards

Independent assessments offer assurance that a provider’s controls are designed and operating effectively. While they don’t replace HIPAA obligations, they help you evaluate alignment with the HIPAA Security Rule.

Evidence to request and review

  • HITRUST CSF Certification for applicable services, including the latest certification letter and scope.
  • SOC 2+ Audit reports that extend standard SOC criteria with HIPAA mappings or related controls.
  • Executive summaries of recent penetration tests and vulnerability management practices.
  • Bridging letters or interim updates that address the period since the last report.

How to interpret certification and audit reports

  • Confirm the services and regions in scope versus those explicitly excluded.
  • Check report dates, control maturity, and any exceptions or remediation items.
  • Map tested controls to your risk register and compensating measures.

Practical limits

Certifications and audits validate controls at a point in time. They are not a blanket guarantee for every use case, and they do not substitute for a signed BAA or your own administrative safeguards.

Data Encryption Practices

Encryption in transit

Secure transport protocols are fundamental. RingCentral deployments commonly use TLS for signaling and management APIs and SRTP for real‑time media, protecting sessions against interception and tampering while PHI is in motion.

Encryption at rest

Strong cryptography (such as AES‑256) is typically applied to stored content like recordings, messages, and backups. Effective key management—segregated keys, rotation, and restricted access—is critical for maintaining confidentiality and integrity of PHI.

Email, fax, and notifications

When you allow email notifications or fax‑to‑email, enforce SMTP/TLS Encryption end‑to‑end. Better yet, avoid sending PHI in email bodies or attachments; prefer secure portals or in‑app access. Configure fax and notification settings so PHI is never exposed on unsecured channels or shared devices.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Practical encryption tips

  • Require TLS for all external connections; prevent protocol downgrades.
  • Disable PHI in email notifications or restrict to de‑identified content.
  • Control mobile and desktop cache settings; require device encryption and screen locks.

Data Retention Policies

Retention determines how long PHI persists across messages, recordings, voicemail, analytics, and logs. Aim for “minimum necessary,” balancing clinical, legal, and operational needs with risk reduction.

Setting retention by content type

  • Apply distinct retention periods for team messages, SMS/MMS, files, voicemail, and call recordings.
  • Turn off features that auto‑create PHI (for example, voicemail transcription) if not required.
  • Document who can extend, export, or purge content and under what approvals.

Archiving and discovery

Use Compliance Export APIs to journal regulated content to your archive, DLP, or eDiscovery platform. Define legal hold workflows that suspend deletion for specific users or conversations while preserving chain of custody.

Deletion and destruction

Automate deletion at end of life and verify destruction of backups according to policy. Keep administrative and security logs long enough to support forensics, but separate them from user‑accessible content.

Third-Party Security Audits

Independent audits and tests validate that controls operate as intended and that vulnerabilities are identified and remediated. They complement internal risk assessments and continuous monitoring.

What to expect from a mature audit program

  • Recurring SOC 2+ audits and periodic HITRUST CSF assessments for in‑scope services.
  • Regular external penetration testing and continuous vulnerability scanning.
  • Formal risk treatment plans with tracked remediation and executive oversight.

What to ask your provider

  • Recent executive summaries, remediation status, and timelines for any findings.
  • Scope details for each report, including services, regions, and customer‑facing features.
  • Change management and incident response practices that affect PHI.

Integration with Healthcare Communications

Unified communications can streamline telehealth, care coordination, and patient engagement. To keep PHI safe, ensure every integration, feature, and workflow is in the BAA’s scope and configured for least privilege.

Common healthcare use cases

  • Virtual visits and care team huddles with recording controls and lobby/privacy features.
  • Contact center for patient scheduling, triage, and follow‑ups with restricted data views.
  • Secure internal messaging for clinicians; avoid PHI over SMS when alternatives exist.
  • Fax workflows for referrals and authorizations with enforced SMTP/TLS Encryption.

Integration patterns

  • EHR/EMR connectors, scheduling hooks, and event webhooks that avoid storing PHI unnecessarily.
  • Archiving via Compliance Export APIs to supervision, DLP, and records systems.
  • Enterprise SSO, SCIM provisioning, and device posture checks for endpoint security.

Conclusion

RingCentral can support HIPAA requirements when you have a signed BAA, apply encryption in transit and at rest, enforce rigorous access controls, and tailor retention to the minimum necessary. Verify service scope, review third‑party attestations, and continuously monitor configurations to protect PHI across every workflow.

FAQs

Does RingCentral provide a BAA for HIPAA compliance?

Yes—RingCentral offers a Business Associate Agreement for eligible plans and services. You must request and execute the BAA before handling PHI, and you should confirm exactly which products and features are included in scope for your deployment.

What security certifications does RingCentral hold?

RingCentral makes third‑party attestations available for applicable services—commonly including HITRUST CSF Certification and SOC 2+ Audit reports. Always request the current documents, verify the scope and dates, and review any noted exceptions alongside your internal risk controls.

How does RingCentral ensure data encryption for healthcare communications?

Deployments support encryption in transit (for example, TLS for signaling and SRTP for media) and encryption at rest (such as AES‑256). For email notifications and fax‑to‑email, enforce SMTP/TLS Encryption or disable PHI in emails altogether. Confirm specifics for each service you enable.

What data retention policies does RingCentral implement for PHI?

Retention is administrator‑defined. You can set distinct timelines for messages, files, voicemail, and call recordings; apply legal holds; and export regulated content via Compliance Export APIs to your archive. Align these settings to “minimum necessary” requirements and your legal/regulatory obligations.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles