Top HIPAA Violations Massage Therapists Should Know About (and How to Avoid Them)

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Top HIPAA Violations Massage Therapists Should Know About (and How to Avoid Them)

Kevin Henry

HIPAA

February 04, 2026

8 minutes read
Share this article
Top HIPAA Violations Massage Therapists Should Know About (and How to Avoid Them)

Massage therapy practices increasingly handle client intake forms, treatment notes, and scheduling data that qualify as Protected Health Information. Understanding the top HIPAA violations massage therapists face—and the practical steps to prevent them—helps you safeguard client trust, avoid fines, and run a compliant, efficient practice.

This guide explains when HIPAA applies to massage therapists, the most common problem areas under the HIPAA Privacy Rule and Security Rule, and the policies, Access Control Policies, Encryption Standards, and Business Associate Agreements you need. It also highlights Breach Notification Requirements and State Regulatory Compliance considerations you should factor into day-to-day operations.

HIPAA Applicability to Massage Therapists

When HIPAA applies

HIPAA applies if you are a covered entity (for example, you bill health plans electronically using standard transactions) or a business associate that handles PHI on behalf of a covered entity. Many independent, cash-pay massage therapists are not covered entities; however, HIPAA can still apply if you contract with a clinic, hospital, or insurer, or if your vendors store or process client PHI on your behalf.

Key concepts to know

  • Protected Health Information (PHI): Any health-related information that can identify a client, including ePHI in digital systems.
  • Minimum Necessary: Access and disclose only what is reasonably needed for the task.
  • Business Associate: A vendor or contractor that creates, receives, maintains, or transmits PHI for you (cloud storage, EHR, billing, telehealth, shredding services).

State Regulatory Compliance

Even if you are not a HIPAA covered entity, state privacy, record retention, and breach notification laws may still apply—and many are stricter than HIPAA. Align your policies with both federal requirements and your state’s rules to ensure full compliance.

Common HIPAA Violations

  • Discussing clients in public or posting on social media (even de-identified anecdotes can reveal identity in small communities)—avoid by using private spaces and removing all identifiers before any educational sharing.
  • Unencrypted email or SMS containing PHI—use secure portals or encrypted email; obtain and document client preference if they insist on unencrypted communication.
  • Leaving paper files, schedules, or treatment notes visible—store records in locked cabinets and apply a clean-desk policy.
  • Using shared logins or weak passwords—enforce unique user IDs, strong passphrases, and multi-factor authentication as part of your Access Control Policies.
  • Lost or stolen devices without encryption—enable full‑disk encryption and remote wipe on all laptops and mobile devices that store ePHI.
  • Sending PHI to the wrong recipient—verify addresses and phone numbers, use confirmation steps, and limit details in voicemails and appointment reminders.
  • No Business Associate Agreements with vendors—execute BAAs before any PHI flows to a vendor.
  • Insufficient client access processes—have a documented workflow to verify identity and provide records within required timeframes.
  • Improper disposal of records—use secure shredding for paper and certified wiping for devices and drives.
  • Lack of risk analysis and documentation—perform periodic security risk assessments and document mitigation steps.

Consequences of HIPAA Violations

Regulatory and financial impact

HIPAA enforcement is handled by the HHS Office for Civil Rights. Outcomes can include investigations, corrective action plans, and civil monetary penalties that scale based on the level of negligence. Willful neglect and repeated issues carry significantly higher exposure.

Criminal liability

Knowingly obtaining or disclosing PHI without authorization can lead to criminal penalties in severe cases, especially when done for personal gain or malicious intent.

Breach Notification Requirements

If an impermissible use or disclosure of PHI creates more than a low probability of compromise, you must provide individual notifications and notify HHS. For breaches affecting 500 or more residents of a state or jurisdiction, you must also notify prominent media outlets. Many states impose additional or faster timelines, so review State Regulatory Compliance carefully.

Business and professional fallout

Violations may trigger contract termination by payers or partners, increased insurance premiums, licensing board scrutiny, and loss of client trust. The indirect costs of response, remediation, and downtime often exceed fines.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Employee Training and Policies

Build a policy foundation

  • Privacy and Security Policies: Define how you collect, use, disclose, and safeguard PHI; include sanctions for violations.
  • Access Control Policies: Role-based access, unique credentials, session timeouts, and procedures for provisioning/deprovisioning users.
  • Incident Response: How to identify, contain, investigate, and document incidents; include Breach Notification Requirements.
  • Data Retention and Disposal: Specify retention periods and secure destruction methods per State Regulatory Compliance.

Deliver targeted training

  • Onboarding: Train every new workforce member on the HIPAA Privacy Rule, Security Rule basics, and your local procedures before they handle PHI.
  • Periodic refreshers: Provide annual updates and whenever policies, systems, or laws change.
  • Documentation: Record attendance, content covered, and acknowledgement of policies and sanctions.
  • Drills: Conduct brief tabletop exercises on misdirected emails, lost devices, or suspicious calls.

Secure Communication Methods

Email

  • Use encrypted email or a client portal for PHI; if a client opts for unencrypted email after being informed of risks, document their preference.
  • Limit message content to the minimum necessary and attach password‑protected documents when feasible.

Texting and chat

  • Avoid standard SMS for PHI; use secure messaging solutions that support encryption, access controls, and audit logs.
  • For reminders, include minimal details (date/time only, no diagnosis or treatment specifics).

Phone, voicemail, and fax

  • Verify identity before sharing PHI by phone; for voicemail, leave minimal information.
  • When faxing, confirm numbers, use a cover sheet, and position devices to prevent unauthorized viewing.

Telehealth and video

  • Use HIPAA‑ready platforms that provide Business Associate Agreements and strong Encryption Standards (e.g., TLS for transit, robust encryption at rest).
  • Ensure private spaces, headphones, and screen‑sharing hygiene to prevent incidental disclosures.

Device Security Measures

  • Encryption Standards: Enable full‑disk encryption on computers and mobile devices; use strong device passcodes and biometric unlock with a passcode fallback.
  • Access controls: Unique logins, least‑privilege permissions, auto‑lock after inactivity, and multi‑factor authentication for remote access.
  • Patch and protect: Keep operating systems and apps updated; use reputable endpoint protection.
  • Mobile device management: Enforce policies for BYOD, including remote wipe, no local PHI downloads by default, and app whitelisting.
  • Backups: Maintain encrypted, tested backups; separate credentials from production systems.
  • Asset lifecycle: Inventory all devices, securely wipe or shred drives at end‑of‑life, and document disposal.
  • Physical safeguards: Lock rooms and cabinets; never leave devices visible in vehicles or shared spaces.

Business Associate Agreements

When you need a BAA

Execute a Business Associate Agreement before any vendor creates, receives, maintains, or transmits PHI for you. Common examples include EHR or practice management systems, cloud storage, email encryption services, appointment reminder platforms, billing companies, telehealth providers, IT support with system access, and records destruction firms.

What to require

  • Permitted uses and disclosures: Define exactly how the vendor may handle PHI.
  • Safeguards: Require administrative, physical, and technical controls aligned to the Security Rule and your Access Control Policies.
  • Breach Notification Requirements: Set clear timelines and the information the vendor must provide.
  • Subcontractors: Ensure downstream vendors are bound by the same obligations.
  • Return or destruction of PHI: Specify what happens when the contract ends.
  • Right to audit and termination: Preserve the ability to verify compliance and exit on material breach.

Due diligence tips

  • Review security whitepapers, SOC 2 or similar attestations, and encryption details for data at rest and in transit.
  • Confirm how the vendor handles identity and access, logging, backups, and incident response.
  • Document selection criteria and risk acceptance decisions for State Regulatory Compliance records.

Conclusion

Staying compliant comes down to three habits: limit PHI exposure, secure your systems and communications with strong Encryption Standards and Access Control Policies, and lock in trustworthy partners with solid Business Associate Agreements. When in doubt, apply the minimum necessary standard, document your decisions, and align with both HIPAA and your state’s requirements.

FAQs

What are the most frequent HIPAA violations among massage therapists?

The most common issues include unencrypted messaging or email containing PHI, conversations about clients in public areas, visible schedules or files, shared logins or weak passwords, lost devices without encryption, missing Business Associate Agreements, misdirected messages, and delayed responses to client record requests.

How can massage therapists ensure HIPAA compliance in their practice?

Start with a written privacy and security program that maps how you collect, use, disclose, and store PHI. Implement Access Control Policies, enable full‑disk encryption and secure messaging, train staff at onboarding and annually, document all procedures and training, execute Business Associate Agreements with vendors, perform periodic risk assessments, and align with Breach Notification Requirements and State Regulatory Compliance.

What are the penalties for HIPAA violations by massage therapists?

Penalties range from corrective action plans to significant civil monetary penalties based on the level of negligence, and criminal penalties in egregious cases. Costs also include investigation time, mandatory training, potential contract losses, higher insurance premiums, reputational harm, and breach response expenses.

When is a Business Associate Agreement required?

You need a BAA whenever a vendor or contractor will create, receive, maintain, or transmit PHI on your behalf—such as EHR platforms, billing and claims services, telehealth tools, cloud storage or email security providers, IT support with system access, and document destruction companies. Always execute the BAA before sharing any PHI.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles