Patient Referrals: Privacy Considerations and HIPAA Compliance Guide

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Patient Referrals: Privacy Considerations and HIPAA Compliance Guide

Kevin Henry

HIPAA

April 21, 2026

7 minutes read
Share this article
Patient Referrals: Privacy Considerations and HIPAA Compliance Guide

HIPAA Privacy Rule and Patient Referrals

Permitted uses and disclosures for treatment

The HIPAA Privacy Rule permits you to share Protected Health Information (PHI) for treatment purposes without obtaining patient authorization. Referring a patient, coordinating care, or consulting with another provider are all treatment activities, so disclosure of clinically relevant data for these purposes is allowed.

Scope of information and accountability

Share only the data that supports the referral: diagnoses, history, medications, allergies, recent labs and imaging, and pertinent social or functional factors. When you involve technology vendors or referral platforms that create, receive, maintain, or transmit PHI on your behalf, they are Business Associates and must be governed by a Business Associate Agreement (BAA) that specifies permitted uses and safeguards.

Security expectations alongside privacy

While the Privacy Rule governs when PHI may be shared, the HIPAA Security Rule requires you to protect electronic PHI (ePHI) during referral workflows with administrative, physical, and technical safeguards. Build your referral process so privacy and security controls operate together from point of capture to transmission and storage.

Minimum Necessary Standard

How the standard applies in referrals

The Minimum Necessary Standard requires limiting PHI to what is reasonably needed for the purpose. Although HIPAA does not require minimum-necessary limits for disclosures to another provider for treatment, applying the principle remains a best practice that reduces risk and improves focus in clinical handoffs.

Practical ways to minimize

  • Send a concise referral packet: problem list, current meds, allergies, recent results, and a brief summary rather than the full chart.
  • Use role-based Access Controls so staff can assemble referral materials appropriate to their job duties.
  • Template your referral notes to prompt inclusion of only clinically relevant data elements.
  • Exclude highly sensitive documents (for example, psychotherapy notes) unless clearly necessary and authorized.

Use of HIPAA-Compliant Communication Channels

Preferred channels

  • Secure Messaging Systems integrated with your EHR or health information exchange for encrypted, auditable transmissions.
  • Direct secure messaging or other standards-based encrypted email for provider-to-provider communication.
  • Patient portals for sharing referral instructions with the patient, not for provider-to-provider PHI unless the portal supports secure routing.

Safeguards to require

  • End-to-end encryption in transit and at rest, plus robust authentication (for example, multi-factor authentication) and session timeouts.
  • Access Controls and audit logs to monitor who sent, received, and opened referral documents.
  • BAAs with eFax, cloud storage, routing, and messaging vendors that handle PHI; ensure they support breach reporting and subcontractor flow-down requirements.
  • Address-verification steps (confirm recipient identity and destination), especially when using fax or email.

Documentation and Record Keeping

What to record for each referral

  • Purpose of the referral and data elements disclosed.
  • Recipient name, role, and organization; date and method of transmission.
  • Any patient authorization or special restrictions that apply.
  • Verification steps taken (for example, number/email confirmed) and delivery confirmation, if available.

Policy, procedure, and retention

Maintain written policies and procedures for referral workflows, BA management, incident response, and minimum-necessary practices. HIPAA requires you to retain required documentation (policies, BAAs, risk analyses, training records) for six years from creation or last effective date; state medical record retention rules may be longer for the medical record itself, so follow the stricter requirement.

Incident response and the Breach Notification Rule

Log and investigate misdirected faxes, emails, or other suspected incidents. If unsecured PHI is breached, follow the Breach Notification Rule: perform a risk assessment and provide notifications without unreasonable delay and no later than 60 calendar days after discovery, including required notices to affected individuals and, when applicable, to regulators and the media.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

When you need authorization

Provider-to-provider disclosures for treatment generally do not require patient authorization. Authorization is required for uses and disclosures not related to treatment, payment, or healthcare operations, for most marketing purposes, and for psychotherapy notes. Some categories of sensitive information may be subject to stricter federal or state laws; apply the most protective rule in your jurisdiction.

Honoring patient rights during referrals

  • Right of access: provide patients with copies of referral materials upon request.
  • Right to request restrictions: if a patient pays out of pocket in full, you must restrict disclosures to their health plan for that service unless a disclosure is required by law.
  • Right to request confidential communications: accommodate reasonable requests to use alternative addresses or contact methods.
  • Right to request amendments: if a referral includes disputed information, process amendment requests per policy and communicate updates downstream when appropriate.

Training and Policies for Compliance

Role-based, practical training

  • Train staff on assembling minimal, clinically relevant packets; verifying recipient identity; and using approved secure channels.
  • Cover real-world scenarios: texting between clinicians, forwarding lab results, misdirected fax remediation, and documenting referral decisions.
  • Refresh training when systems, policies, or roles change; periodic (often annual) refreshers are common practice.

Operational controls to enforce

  • Access Controls that enforce least privilege and unique user IDs, with timely termination of access.
  • Device and data protections: encryption, screen locks, remote wipe, and prohibiting PHI in uncontrolled personal apps.
  • Vendor due diligence and BAAs before onboarding referral or messaging tools.
  • Sanction policies for violations and clear escalation pathways for potential breaches.

Handling PHI in Electronic and Paper Referrals

Electronic referrals

  • Use standardized templates and structured data to reduce free-text oversharing.
  • Double-check attachments and auto-populated fields; remove entire chart exports unless explicitly justified.
  • Encrypt exports and use secure links with access expirations; avoid embedding PHI in subject lines.
  • Maintain audit trails for send/receive events and read confirmations when supported.

Paper and fax-based referrals

  • Verify destination numbers and addresses; use pre-programmed fax numbers and test pages as safeguards.
  • Apply cover sheets that mask PHI and state that misdirected documents must be reported and destroyed.
  • Seal and label envelopes discreetly; use trackable mail for sensitive packets.
  • Secure physical storage and transport with locked bins and limited access.

Practical quality checks

  • Match at least two patient identifiers on every page (for example, name and date of birth).
  • Include a concise clinical question to guide the receiving provider.
  • Note any patient-imposed restrictions or preferences prominently.

Conclusion

Effective patient referrals balance care coordination with robust privacy and security. Apply the Minimum Necessary Standard as a disciplined habit, use HIPAA-compliant channels with strong Access Controls, document consistently, honor patient rights, and keep staff well trained. Together, these practices align your referral workflow with the HIPAA Privacy Rule, HIPAA Security Rule, and Breach Notification Rule.

FAQs

What information can be shared during patient referrals under HIPAA?

You may share PHI needed for treatment without patient authorization. In practice, send a focused packet: relevant history, diagnoses, medications, allergies, recent labs and imaging, active problems, and the clinical question. Exclude unnecessary items and especially sensitive documents (for example, psychotherapy notes) unless clearly needed and, when required, specifically authorized.

How does the minimum necessary standard apply to referrals?

Although HIPAA’s Minimum Necessary Standard does not apply to disclosures to another provider for treatment, you should still limit what you send to information reasonably necessary to support the referral. The standard does apply when the purpose is payment, operations, or when requesting PHI from non-provider entities. Use templates, role-based Access Controls, and checklists to minimize excess data.

For provider-to-provider treatment referrals, HIPAA does not require patient authorization. Authorization is required for non-treatment uses or for categories like psychotherapy notes, and stricter state or federal laws may impose additional consent requirements for certain sensitive information. If a patient has requested and you agreed to a restriction, honor that restriction during the referral.

What are the best practices for securing electronic referral communications?

Use Secure Messaging Systems or encrypted Direct messaging; enforce multi-factor authentication and least-privilege Access Controls; verify recipient identity and addresses; avoid PHI in subject lines; encrypt attachments or use expiring secure links; maintain audit logs; have BAAs with all vendors; and monitor for, document, and remediate incidents under your Breach Notification Rule procedures.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles