Real-World Scenarios: How to Make Zoom, Microsoft Teams, Webex & Google Meet HIPAA Compliant

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Real-World Scenarios: How to Make Zoom, Microsoft Teams, Webex & Google Meet HIPAA Compliant

Kevin Henry

HIPAA

March 22, 2025

8 minutes read
Share this article
Real-World Scenarios: How to Make Zoom, Microsoft Teams, Webex & Google Meet HIPAA Compliant

When video visits involve Protected Health Information, you must configure platforms deliberately and document how you protect privacy. This guide walks you through practical steps to make Zoom, Microsoft Teams, Webex, and Google Meet HIPAA compliant in day-to-day use. It is informational and not legal advice.

Obtain Business Associate Agreements

A signed Business Associate Agreement (BAA) with each vendor is the foundation for lawful handling of PHI. Without a BAA, you should not transmit or store PHI on the service.

Zoom

  • Use a HIPAA-eligible plan and request the vendor’s Business Associate Agreement through your account representative or admin portal.
  • Confirm which features are covered under the BAA (e.g., meetings, chat, recordings) and disable any excluded features for clinical users.
  • Real-world scenario: a behavioral health group limits accounts to Zoom users on the covered plan and stores the executed BAA alongside internal policies.

Microsoft Teams

  • Ensure your Microsoft 365 subscription includes HIPAA-eligible services and execute the BAA as part of your enterprise agreement.
  • Map Teams features (meetings, chat, files) to your PHI workflows so staff know where PHI may lawfully reside.
  • Scenario: a multi-site clinic uses Teams only within the covered tenant and prohibits guest access for PHI encounters.

Webex

  • Confirm your Webex subscription is HIPAA-eligible and obtain a BAA from the vendor.
  • Document which Webex components you will use with PHI (Meetings, Messaging) and restrict any non-covered features.
  • Scenario: a surgery center enables only Meetings under the BAA and disables file transfer in clinical spaces.

Google Meet

  • Use Google Workspace editions that support a BAA and complete the BAA in the admin console.
  • Clarify that consumer Gmail/Meet accounts are not permitted for PHI; only Workspace accounts under the BAA may host clinical visits.
  • Scenario: a pediatrics practice hosts Meet sessions from Workspace calendars in the covered domain only.

Configure Security Settings

Once the BAA is signed, harden each platform so default behaviors align with privacy-by-design. Use standardized templates so every new meeting inherits compliant settings.

Zoom

  • Require waiting rooms and passcodes; disable “join before host.”
  • Restrict screen sharing to host by default; allow per-session elevation when needed.
  • Disable file transfer and limit in-meeting chat to host/clinician when PHI is discussed.
  • Turn off cloud recording for PHI sessions, or route recordings to an approved repository with retention controls.
  • Enable End-to-End Encryption for highly sensitive encounters when feature trade-offs are acceptable.
  • Scenario: for group therapy, use unique meeting IDs, waiting room vetting, and no recording or chat attachments.

Microsoft Teams

  • Enable lobbies, disable anonymous join, and apply meeting policies to clinical security groups.
  • Limit who can record; apply retention and eDiscovery to PHI-containing recordings and transcripts.
  • Constrain chat in clinical meetings; consider disabling file uploads where PHI would leave the encounter.
  • Use End-to-End Encryption for sensitive one-to-one calls when appropriate; otherwise enforce strong in-transit encryption.
  • Scenario: nurse triage uses channel meetings with lobby controls and no guest access; only charge nurses can record.

Webex

  • Require strong meeting passwords and auto-lock rooms after start.
  • Disable attendee file transfer, annotations, and remote control by default.
  • Limit recording and store only in approved locations with retention and access review.
  • Offer End-to-End Encryption meetings for cases requiring maximum confidentiality.
  • Scenario: pre-op consults run in locked meetings; the host admits patients individually after identity verification.

Google Meet

  • Disable “Quick access” so only invited participants can join; restrict external participants for PHI visits.
  • Control chat, reactions, and screen sharing; allow clinicians to elevate privileges when needed.
  • Use client-side encryption for sessions with sensitive PHI when organizational keys are required.
  • Limit recording and store outputs in restricted Google Drive folders with least-privilege access.
  • Scenario: postpartum follow-ups require host controls, no recording, and CSE enabled for high-sensitivity calls.

Conduct Staff Training

Technology alone is insufficient; staff must know how to handle PHI in live calls. Deliver role-based training and validate skills with brief drills.

  • HIPAA basics: what counts as PHI, minimum necessary, and when to pause or stop a session if privacy fails.
  • Identity verification: confirm patient identity before sharing PHI; avoid full PHI in chat.
  • Environment hygiene: private rooms, headsets, blurred backgrounds, and screen privacy to prevent incidental disclosure.
  • Platform drills: starting secure sessions, using waiting rooms/lobbies, locking meetings, and ending recordings.
  • Incident response: how to report a misdirected invite, unauthorized attendee, or recording error immediately.

Scenario: schedulers use a checklist to send unique links; clinicians practice admitting the correct patient and documenting consent before the exam begins.

Perform Regular Security Audits

Schedule recurring Security Audits and a formal Risk Assessment to prove ongoing compliance and catch configuration drift.

  • Quarterly: review admin baselines, meeting templates, recording policies, and guest access; sample real sessions for policy adherence.
  • Monthly: spot-check audit logs for unusual joins, failed logins, or unauthorized recordings.
  • Annually (or after major changes): conduct a Risk Assessment covering data flows, encryption posture, access paths, and vendor updates.
  • Evidence: keep BAAs, policy documents, screenshots of key settings, and remediation tickets linked to findings.

Scenario: the privacy officer audits 10 randomly selected visits per month and validates that recordings are disabled where required.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Implement Access Controls

Access Control enforces who can schedule, host, record, and retrieve data. Apply least privilege across users, devices, and sessions.

  • Identity and MFA: require SSO and multi-factor authentication for all clinical users.
  • Role-based policies: only clinicians can host PHI meetings; only designated roles may record or download artifacts.
  • Session controls: waiting rooms/lobbies for admission, no anonymous join, and host-only screen sharing by default.
  • Device posture: allow access only from managed, encrypted devices; block jailbroken or unmanaged endpoints.
  • Data boundaries: disable file transfer and external chat where PHI could escape; apply retention to meeting artifacts.

Scenario: a health system uses conditional access to limit PHI meetings to corporate laptops with full-disk encryption and current patches.

Monitor and Log Activities

Logs prove accountability and help you detect misuse. Centralize them and review routinely.

  • Capture: meeting start/stop times, attendees, join methods, recording on/off events, chat usage, and file transfer attempts.
  • Alerting: notify on external participant spikes, repeated failed joins, or unauthorized recording attempts.
  • Retention: keep audit logs per policy; ensure they are immutable and accessible for investigations.
  • Integration: forward platform logs to your SIEM for correlation with identity, endpoint, and network signals.

Scenario: the security team receives alerts when any clinical group member enables recording and must approve or remediate within a defined SLA.

Enforce Data Encryption Policies

Define how Data Encryption works end to end so staff know what to use when. Distinguish routine encryption from elevated protections.

  • In transit and at rest: ensure TLS for sessions and encrypted storage for recordings, transcripts, and chat artifacts.
  • End-to-End Encryption: enable for highly sensitive encounters, understanding that some features (like cloud recording) may be unavailable.
  • Client-side encryption and key control: where supported, manage your own keys to limit vendor access to meeting content.
  • Backups and exports: encrypt backups, exports, and any downloaded files; restrict who can decrypt and access keys.
  • Mobile safeguards: require device encryption and screen-lock policies before allowing clinical app use.

Scenario: a mental health clinic mandates E2EE for psychiatry sessions and forbids recording; for routine follow-ups, it uses strong in-transit encryption with recordings disabled by policy.

Conclusion

HIPAA-ready video visits require more than a checkbox. Secure your foundation with BAAs, lock down settings, train staff, audit routinely, enforce Access Control, monitor logs, and apply strong Data Encryption—using End-to-End Encryption or client-side encryption when needed. With these steps, you can run Zoom, Microsoft Teams, Webex, and Google Meet confidently for PHI.

FAQs

What is a Business Associate Agreement and why is it required?

A Business Associate Agreement is a contract that obligates a vendor to safeguard PHI in line with HIPAA. It defines permitted uses, breach notification, and security responsibilities. You must have a signed BAA before storing, transmitting, or processing PHI on that vendor’s platform.

How can encryption be enabled on video conferencing platforms?

Enable platform encryption in admin settings and apply meeting templates that enforce it. Use End-to-End Encryption or client-side encryption for the most sensitive encounters when available, and ensure recordings, transcripts, and backups remain encrypted at rest with controlled key access.

What training is necessary for staff to ensure HIPAA compliance?

Provide HIPAA basics, platform-specific workflows, identity verification, environment privacy, incident reporting, and practical drills (admitting participants, locking meetings, managing recordings). Validate competency with periodic refreshers and audit results.

How often should security audits be performed to maintain compliance?

Perform monthly log reviews, quarterly configuration audits, and an annual Risk Assessment, plus targeted reviews after major platform updates or incidents. Document findings and remediation to demonstrate continuous compliance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles