PHI in Email: HIPAA Compliance Rules, Examples, and How to Send It Securely

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

PHI in Email: HIPAA Compliance Rules, Examples, and How to Send It Securely

Kevin Henry

HIPAA

January 11, 2026

7 minutes read
Share this article
PHI in Email: HIPAA Compliance Rules, Examples, and How to Send It Securely

Email can safely support clinical workflows, billing, and patient engagement—as long as you treat protected health information (PHI) with discipline. This guide explains the HIPAA rules for email, concrete examples of compliant and risky messages, and step-by-step practices to send PHI securely.

HIPAA Compliance for Email

HIPAA applies to covered entities and business associates whenever email contains PHI—any individually identifiable health information related to care, payment, or operations. If an email includes an identifier (such as a name, email address, phone number, or member ID) plus a health context, it is PHI.

What counts as PHI in email (examples)

  • “John Smith’s MRI is scheduled for 3/18 at 10 a.m.” — PHI, because it ties identity to a healthcare service.
  • “Attached: Jane Doe’s EOB for claim #12345.” — PHI, linking identity to payment information.
  • “Can you confirm Ms. K’s appointment?” — Likely PHI; even initials plus provider context can identify an individual within your organization.
  • “Newsletter about healthy eating” sent to a general list with no treatment relationship — typically not PHI.

Rules to anchor your program

  • Apply the Minimum Necessary Standard: include only the details required to achieve the task; avoid diagnoses or member IDs in subject lines.
  • Security Rule safeguards: transmission security (encryption), access controls, integrity, and audit controls sized to your risk.
  • Privacy Rule: disclose PHI only for treatment, payment, operations, or as authorized. Respect patient communications preferences.
  • Patient requests: if a patient asks for unencrypted email, warn them of risks and document their preference; still apply the Minimum Necessary Standard.
  • Breach Notification: misdirected emails may trigger investigation and notification depending on risk assessment.

Encryption Standards

Encryption reduces breach risk and demonstrates reasonable transmission security. While “addressable,” it is the norm for PHI over open networks.

In transit: Transport Layer Security

  • Use enforced Transport Layer Security (TLS) for server-to-server delivery. Prefer modern ciphers and TLS 1.2+ with certificate validation.
  • When counterparties lack strong TLS, route via a secure portal or force message pickup rather than fall back to cleartext.
  • Automate encryption triggers (e.g., keywords or DLP rules) to eliminate sender guesswork.

At rest: Advanced Encryption Standard

  • Protect mailboxes, archives, and backups with the Advanced Encryption Standard (AES-256) and strong key management.
  • Store keys in a hardened, access-controlled system; segregate duties so no single admin can decrypt mail without oversight.
  • Prefer FIPS-validated crypto modules when available to align with healthcare expectations.

User-level encryption options

  • S/MIME or PGP can deliver end-to-end encryption, but key exchange and usability often limit scale. Use where high assurance is needed.

Configuration checkpoints

  • Disable legacy protocols and weak ciphers; require modern authentication.
  • Encrypt attachments at rest; avoid sharing PHI via public links without access controls.
  • Log all encryption actions for verification and for Audit Logs.

Access Controls

Only authorized people should see PHI emails, and only when necessary for their role.

Identity and session controls

  • Assign unique user IDs and enforce least-privilege, role-based access.
  • Require Multi-Factor Authentication (MFA) for email, admin consoles, and remote access.
  • Set session timeouts, device encryption, and remote wipe for mobile email.
  • Block auto-forwarding to personal accounts; review shared mailboxes carefully.

Data loss prevention and validation

  • Use DLP to detect PHI patterns and trigger encryption or quarantine.
  • Enable address validation and “verify recipient” prompts for external sends.
  • Restrict bulk export and mass forwarding of PHI.

Audit Trails

Audit controls prove who accessed PHI, when, and how. They support investigations and continuous improvement.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

What to capture in Audit Logs

  • Message metadata: sender, recipients, timestamps, subject (not body), size, delivery route, encryption outcome.
  • User activity: logins, MFA success/failure, mailbox access, searches, exports, policy overrides.
  • Administrative actions: rule changes, permission grants, retention edits, connector changes.

Monitoring and response

  • Alert on anomalous patterns (sends to unusual domains, mass downloads, repeated bounces).
  • Retain logs long enough to investigate incidents and satisfy your Email Retention Requirements.
  • Time-synchronize systems to preserve event integrity across tools.

Business Associate Agreement

A Business Associate Agreement (BAA) is mandatory with vendors that create, receive, maintain, or transmit PHI on your behalf—such as cloud email hosts, encryption gateways, archiving providers, managed service providers, and support partners.

When you need a BAA

  • If the service can access PHI in any form (including backups and logs), you need a BAA.
  • Subcontractors that handle PHI also require a BAA downstream.

BAA essentials

  • Permitted uses/disclosures, privacy and security safeguards, breach reporting duties and timelines.
  • Subcontractor flow-down requirements, right to audit/assess, termination and return/destruction of PHI.
  • Expectation of encryption, access controls, Audit Logs, and cooperation during investigations.

Vendor diligence

  • Review security architecture, certifications, incident history, and data location.
  • Validate capabilities for encryption, MFA, DLP, and retention before signing.

Email Retention Policies

HIPAA requires you to retain policies, procedures, and related documentation for six years, but it does not set a universal retention period for all emails. Treat emails containing PHI according to your designated record set practices and applicable state medical record laws.

Designing defensible retention

  • Classify emails: medical record content, administrative/operational, transient. Map each class to retention rules.
  • If an email forms part of the designated record set, retain it as long as that record must be kept and accessible to the patient.
  • Enable legal hold for investigations or litigation; document holds and releases.
  • Apply secure, automated deletion after retention expires to reduce breach exposure.

Operational checkpoints

  • Centralize archiving with AES-encrypted storage and robust search.
  • Ensure retention rules extend to mobile devices and third-party integrations.
  • Document your Email Retention Requirements and train staff on when to archive versus delete.

Secure Email Practices

Translate policy into reliable daily behavior with standardized playbooks and automation.

Before you send

  • Confirm email is appropriate for the task; prefer secure portals for lengthy or sensitive exchanges.
  • Apply the Minimum Necessary Standard: keep subjects generic and content concise.
  • Verify recipient addresses, especially for similarly named patients or domains.
  • Trigger encryption automatically; avoid manual steps when possible.
  • Protect attachments with encryption; if using passwords, share them via a separate channel.

Sending methods

  • Direct delivery with enforced TLS to trusted partners.
  • Policy-based encryption that wraps the message for secure pickup when TLS assurance is unknown.
  • Patient communications honoring preferences; document acceptance if unencrypted email is requested.

Handling replies and forwarding

  • Ensure reply chains remain protected; avoid quoting excessive PHI in threads.
  • Block external auto-forward rules; log exceptions and approvals.

Incident playbook

  • If misdirected: attempt recall or secure follow-up, notify privacy team, and perform a risk assessment.
  • Use Audit Logs to determine exposure scope; document decisions and remediation.

Conclusion

Consistent encryption, disciplined access controls, actionable Audit Logs, a solid Business Associate Agreement, and clear Email Retention Requirements let you use email efficiently without compromising PHI. Design for the Minimum Necessary Standard, automate where possible, and train people to handle exceptions well.

FAQs.

What are the HIPAA requirements for sending PHI via email?

HIPAA permits email if you implement reasonable safeguards: encrypt transmissions over open networks, enforce access controls and Audit Logs, apply the Minimum Necessary Standard, honor patient communication preferences, and evaluate incidents under the Breach Notification Rule. A Business Associate Agreement is required with any vendor that handles PHI on your behalf.

How do encryption standards protect PHI in email?

Transport Layer Security encrypts messages in transit between mail servers, blocking eavesdropping. The Advanced Encryption Standard protects mailboxes, archives, and backups at rest. Together—with sound key management and policy-based enforcement—they reduce exposure from interception, lost devices, and unauthorized access.

What is the role of a Business Associate Agreement in email compliance?

A BAA contractually obligates vendors that create, receive, maintain, or transmit PHI to safeguard it, report incidents, flow down requirements to subcontractors, and support audits. It clarifies permitted uses of PHI and establishes security expectations such as encryption, Multi-Factor Authentication, and logging.

How long must PHI emails be retained according to HIPAA?

HIPAA does not mandate a single retention period for all emails. You must retain HIPAA-related documentation for six years. Emails that form part of the designated record set should follow your medical record retention schedule and applicable state laws. Define and document your Email Retention Requirements, then automate enforcement.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles