Is Spruce Health HIPAA Compliant? BAA, Security Features, and How It Protects PHI

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Is Spruce Health HIPAA Compliant? BAA, Security Features, and How It Protects PHI

Kevin Henry

HIPAA

March 28, 2026

6 minutes read
Share this article
Is Spruce Health HIPAA Compliant? BAA, Security Features, and How It Protects PHI

HIPAA Compliance Overview

HIPAA sets national standards for safeguarding Protected Health Information (PHI), with the HIPAA Security Rule governing electronic PHI (ePHI). No vendor is “certified HIPAA compliant” by the government; instead, platforms like Spruce Health can support compliance when you implement required safeguards and use the product appropriately.

In practice, Spruce Health can be used in a HIPAA-compliant manner when you execute a Business Associate Agreement (BAA), enable security controls, and adopt workflows that favor Secure Messaging over riskier channels. Compliance is shared: the platform supplies technical protections, and your organization supplies policies, training, and oversight.

Business Associate Agreement (BAA) Details

A Business Associate Agreement defines how a service provider safeguards PHI on your behalf. You should ensure your Spruce Health subscription supports a BAA and that it is fully executed before PHI is created, received, maintained, or transmitted through the platform.

  • Permitted uses/disclosures: clearly limit how PHI is handled and for what purposes.
  • Safeguards: require administrative, physical, and technical protections aligned with the HIPAA Security Rule.
  • Breach notification: define timelines, reporting duties, and cooperation requirements.
  • Subcontractors: require downstream BAAs and equivalent safeguards.
  • Access, return, and deletion: spell out data portability, retention, and secure destruction at termination.
  • Audit and verification: allow reasonable assurances of control effectiveness.

Operationally, confirm your legal entity name on the BAA, store the executed copy, designate a HIPAA Security Officer, and revisit the BAA if your scope, integrations, or data flows change.

Secure Communication Features

Secure Messaging and Telehealth

Secure Messaging centralizes patient conversations in a protected channel, reducing exposure compared with standard SMS or email. When both parties use the secure app or portal, you can exchange messages, attachments, and telehealth updates in one auditable thread while applying the minimum necessary standard.

Encryption, Storage, and Audit Controls

Look for strong encryption in transit (for example, TLS) and at rest for stored content. When available, prefer End-to-End Encryption for conversations confined to secure apps, so only intended participants can access message content. Complement encryption with role-based access, granular permissions, and activity logs that record who accessed PHI and when.

  • Retention governance: apply retention windows and archiving aligned to policy and law.
  • Least privilege: grant staff only the access needed for their roles.
  • Export controls: use governed exports to avoid uncontrolled copies of PHI.

Standard Communication Channels

Standard SMS and traditional email are not inherently HIPAA compliant because they typically lack End-to-End Encryption and robust access controls. Best practice is to avoid sending PHI over these channels and instead route patients to Secure Messaging using secure links or invitations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Patient preference: if a patient insists on SMS/email, obtain documented preference, share risks, and still apply the minimum necessary.
  • Content minimization: never include sensitive details in subject lines or message bodies; move promptly to a secure channel.
  • Voice and voicemail: treat recordings as PHI; prefer platform-managed calling with auditability over personal phones.

Two-Factor Authentication (2FA) Implementation

Two-Factor Authentication significantly reduces account-takeover risk. Enable 2FA for every user with access to PHI and, where possible, enforce it organization-wide. Favor phishing‑resistant methods (for example, security keys) or authenticator apps over SMS codes.

  • Enrollment: require at least two factors per user and store backup codes securely.
  • SSO: if available, integrate Single Sign-On with enforced 2FA and conditional access.
  • Operational hygiene: review login alerts, restrict new device sign-ins, and remove access immediately during offboarding.

Device Security Best Practices

Endpoints are often the weakest link. Any phone, tablet, or computer used to access Spruce Health should meet baseline protections to keep ePHI safe.

  • Full‑disk encryption (for example, FileVault or BitLocker), strong passcodes/biometrics, and short auto‑lock timers.
  • Mobile device management (MDM) for remote wipe, app restrictions, and inventory tracking.
  • Patch management: keep OS and apps updated; prohibit jailbroken or rooted devices.
  • Data handling: avoid local downloads of PHI, restrict notifications from showing sensitive details, and sign out on shared devices.
  • Network hygiene: use trusted Wi‑Fi, enable DNS/HTTPS protections, and prefer VPN where appropriate.

SOC 2 Type II Audits

A SOC 2 Type II Audit is an independent attestation that evaluates the design and operating effectiveness of security and related controls over a period of time. While not a HIPAA requirement, it complements HIPAA due diligence by mapping to trust service criteria such as security, availability, confidentiality, processing integrity, and privacy.

  • Scope verification: confirm the audited system matches the Spruce Health services you use.
  • Exceptions review: examine noted control exceptions and remediation plans.
  • Subservice organizations: understand responsibilities for cloud or telecom providers.
  • Timing: request the most recent report and any bridge letter covering gaps.

Conclusion

Spruce Health can support HIPAA‑compliant workflows when you sign a BAA, prioritize Secure Messaging, avoid PHI in standard SMS/email, enforce Two‑Factor Authentication, harden devices, and assess controls through evidence such as a recent SOC 2 Type II Audit. Pair these measures with staff training and clear policies to protect PHI end to end.

FAQs

Does Spruce Health require a BAA for compliance?

Yes. To handle PHI on the platform, you must have a fully executed Business Associate Agreement. The BAA allocates responsibilities, mandates safeguards aligned with the HIPAA Security Rule, and sets expectations for breach notification and data handling.

How does Spruce encrypt patient communications?

Communications are protected with encryption in transit and at rest. For the strongest protection, use Secure Messaging—where available with End‑to‑End Encryption—so only intended participants can read content. Combine encryption with access controls and audit logging to create layered defense.

Can standard SMS and email be HIPAA compliant with Spruce Health?

By default, standard SMS and email are not HIPAA compliant for PHI. The safer approach is to direct patients to Secure Messaging via a secure link. If a patient insists on SMS/email, obtain documented preference, share the risks, minimize content, and move the conversation to a secure channel as quickly as possible.

What security measures protect user devices on Spruce Health?

Enable Two‑Factor Authentication for all accounts, require strong passcodes and full‑disk encryption, manage devices with MDM for remote wipe, keep systems patched, and restrict PHI from appearing in device notifications. Avoid local storage of PHI and promptly revoke access for lost or deprovisioned devices.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles