Patient Communication and HIPAA: What's Allowed (and What's Not)

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Patient Communication and HIPAA: What's Allowed (and What's Not)

Kevin Henry

HIPAA

February 28, 2026

7 minutes read
Share this article
Patient Communication and HIPAA: What's Allowed (and What's Not)

HIPAA Regulations on Family and Friends Communication

HIPAA permits sharing Protected Health Information (PHI) with a patient’s family, friends, or others involved in their care or payment when the patient agrees, is given the chance to object and does not, or when professional judgment deems it in the patient’s best interests (for example, if the patient is incapacitated). Apply the Minimum Necessary Standard so you disclose only information directly relevant to that person’s role in care or payment.

A patient’s personal representative generally has the same rights of access as the patient. If you suspect abuse, neglect, or endangerment, you may limit disclosures consistent with law and professional judgment. For individuals not involved in care or for purposes beyond treatment, payment, and health care operations (TPO), obtain a signed Authorization for Disclosure before releasing PHI.

Practical safeguards

  • Confirm identity and relationship using reasonable steps (e.g., photo ID in person; call-back to a verified number).
  • Ask the patient who you may speak with and what you may share; record any limits using clear Consent Documentation.
  • Document disclosures in the record when material to care or required by policy.

Special situations

  • In emergencies or when the patient is incapacitated, share only what’s needed to facilitate immediate care or notification.
  • Be alert to stricter state or federal privacy rules that can further limit disclosures for sensitive services.

Secure Verbal Communication Practices

Verbal exchanges remain essential but must be safeguarded. Use private spaces for sensitive conversations, lower your voice in semi‑public areas, and avoid discussing PHI in elevators, hallways, or waiting rooms. Incidental disclosures may occur despite safeguards; keep them minimal and not reasonably preventable.

Telephone and voicemail

  • Verify identity before discussing PHI by asking patient-specific questions or using a call-back to a verified number.
  • Leave only limited details on voicemail per the patient’s stated preferences (for example, “Your clinic called; please return our call”), avoiding diagnoses or test results.
  • Record key communications and decisions in the patient’s chart.

In-person practices

  • Use sign-in sheets that omit clinical details and speak discreetly at check-in.
  • During bedside rounding, share only what involved family or caregivers need to know; ask the patient who should be present.

HIPAA-Compliant Text Messaging Solutions

Standard SMS lacks encryption and robust access controls, so avoid sending ePHI (Electronic Protected Health Information) over regular texting. Instead, use encrypted messaging platforms that provide end-to-end encryption, strong authentication, role-based access, remote wipe, message expiration, and comprehensive Audit Trails. Execute a Business Associate Agreement with the vendor and integrate messages that affect care into the medical record.

Patient texting workflow

  • Obtain the patient’s explicit opt-in for texting and capture Consent Documentation, including the approved number and communication limits.
  • For routine reminders, apply the Minimum Necessary Standard (e.g., date/time and clinic name without diagnosis). Include clear opt-out instructions.
  • When clinical content is needed, send via the secure app or portal; avoid PHI in Standard SMS. If a patient insists on unencrypted texting after being advised of risks, keep content minimal and document the patient’s preference.

Operational safeguards

  • Enable device protections (MFA, device lock, mobile device management) and implement retention rules aligned with recordkeeping policies.
  • Regularly review Audit Trails to monitor access, transmission, and disposition of messages containing ePHI.

Encrypted Email Communication Requirements

HIPAA allows email if you manage risks appropriately. Use strong encryption for ePHI in transit (such as TLS or message-level encryption) and at rest, or document an equivalent measure. Verify recipient addresses before sending, and keep PHI out of subject lines. Where feasible, deliver sensitive results through a secure portal and notify the patient without including PHI in the notification.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Provider–patient email

  • Offer secure email or portal messaging by default. If a patient prefers standard (unencrypted) email, first advise of risks and record that preference as Consent Documentation; then limit content to the Minimum Necessary.
  • Use password-protected attachments when appropriate and share passwords through a separate channel.

Administrative controls

  • Adopt data loss prevention, auto-encryption, and auto-redaction rules for PHI keywords.
  • Maintain Audit Trails of email access and transmission, and ensure a Business Associate Agreement with any email service handling ePHI.

Fax Transmission Protocols for PHI

Faxing PHI is permitted when safeguarded. Confirm the destination number with the recipient, pre-program frequently used numbers, and use cover sheets that reveal no PHI beyond sender/recipient details and a confidentiality notice. Transmit only the Minimum Necessary pages.

Sending and receiving controls

  • Call ahead for sensitive faxes and request confirmation upon receipt.
  • Position fax devices in secure areas; promptly retrieve incoming pages and store or shred according to policy.
  • For eFax services, require encryption, access controls, and a Business Associate Agreement; restrict forwarding to personal email accounts.

Misdirected fax response

  • Notify the unintended recipient, request secure destruction, and assess for breach notification duties.
  • Document the incident and any mitigation steps.

Utilization of Patient Portals

Patient portals provide a secure, convenient channel for results, visit summaries, refill requests, and bidirectional messaging. They support authentication, encryption, role-based permissions, and robust Audit Trails, making them a strong default for sharing ePHI.

Design and adoption

  • Onboard patients with identity verification and multi-factor authentication; set clear expectations for response times and appropriate use (not for emergencies).
  • Use notification emails or texts that contain no PHI and direct patients to log in for details.
  • Enable proxy access with policy-driven controls, and review proxy permissions regularly.

Operational excellence

  • Route messages using categories (clinical question, refill, billing) to ensure timely handling.
  • Store communication preferences and Consent Documentation in the portal profile and EHR.

For TPO, HIPAA does not require general consent, but you should record patient preferences for channels (portal, phone, text, email) and any limits on sharing with family or caregivers. When disclosures fall outside TPO or involve third parties not engaged in care or payment, obtain a signed Authorization for Disclosure.

What to capture and how to maintain it

  • Approved phone numbers and email addresses; texting opt-in/out; portal enrollment; designated family/friends and allowed topics.
  • Risks acknowledged for any unencrypted channel; revocation process; date/time and staff member documenting consent.
  • Centralize Consent Documentation in the EHR, review it periodically, and honor updates immediately.

Conclusion

Choose the most secure channel available, disclose only what’s needed, and match the method to the message. When in doubt, use encrypted options like portals or secure messaging, and back every decision with clear Consent Documentation and verifiable Audit Trails. This approach keeps communications patient‑centered while meeting HIPAA’s privacy and security expectations.

FAQs

What types of patient information can be shared under HIPAA?

You may share PHI for treatment, payment, and health care operations, and with family or friends involved in care when the patient agrees or when professional judgment supports it. Always apply the Minimum Necessary Standard and consider stricter laws for sensitive services. For purposes beyond TPO, obtain an Authorization for Disclosure.

How must healthcare providers secure electronic communications?

Protect ePHI with encryption in transit and at rest (or an equivalent, documented alternative), strong authentication, role-based access, device protections, and ongoing monitoring through Audit Trails. Use secure portals or encrypted messaging for clinical details, keep PHI out of subject lines and notifications, and execute Business Associate Agreements with any vendors handling PHI.

Record patient preferences for channels and contacts as Consent Documentation. Obtain a signed Authorization for Disclosure when sharing PHI beyond TPO. If a patient requests unencrypted email or standard texting, first advise of risks and document that preference, then limit information to the Minimum Necessary.

What are the risks of non-compliance with HIPAA in communications?

Risks include reportable breaches, regulatory investigations, civil and potential criminal penalties, required corrective action plans, financial costs, and loss of patient trust. Strong safeguards, minimum-necessary practices, clear Consent Documentation, and reliable Audit Trails reduce the likelihood and impact of violations.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles