Transcranial Magnetic Stimulation (TMS) Records Privacy: What Patients Need to Know

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Transcranial Magnetic Stimulation (TMS) Records Privacy: What Patients Need to Know

Kevin Henry

HIPAA

February 26, 2026

6 minutes read
Share this article
Transcranial Magnetic Stimulation (TMS) Records Privacy: What Patients Need to Know

HIPAA Compliance

Your TMS treatment file is considered Protected Health Information (PHI). Most TMS clinics are HIPAA “covered entities,” which means they must follow the HIPAA Privacy Rule, the Security Rule, and the Breach Notification Rule when handling your records.

The Privacy Rule limits how PHI is used and disclosed, applying a “minimum necessary” standard for most non-treatment activities. It also allows sharing for treatment, payment, and health care operations without your written permission, while requiring tighter controls for other purposes.

HIPAA also requires documented Security Safeguards and signed Business Associate Agreements with vendors that handle PHI (for example, EHR, billing, and cloud services). State laws may add stricter protections, and additional federal rules can apply in certain programs.

Patient Rights

Under HIPAA, you have clear Data Access Rights. You can inspect or obtain copies of your TMS records—often through a portal or by written request—in the form and format you prefer if readily producible, typically within 30 days. Reasonable, cost-based copy fees may apply.

  • Request an amendment to correct or clarify information; your provider must add the amendment or explain in writing why a request is denied.
  • Ask for an accounting of certain disclosures made outside treatment, payment, and operations.
  • Request restrictions on disclosures; if you pay a service in full out-of-pocket, the provider must restrict disclosure of that item to your health plan.
  • Choose confidential communication methods (for example, alternate address or phone).
  • Receive a Notice of Privacy Practices and file a privacy complaint without retaliation.

Data Collection Practices

TMS records typically include demographics, contact details, medical and psychiatric history, medications, safety screenings (for seizure risk or metal implants), and consent documentation. They also capture scheduling, billing, and insurance information relevant to payment.

TMS-specific entries can include baseline assessments, device parameters (motor threshold, coil position, pulse frequency), session logs, adverse event notes, and outcome measures over time. Providers may also retain secure message threads, call notes, and audit trails documenting who accessed your file and when.

Clinics gather information from you, referring clinicians, health plans, and diagnostic labs as needed. As part of operations, they may create de-identified statistics for quality improvement that no longer qualify as PHI.

Data Sharing Policies

Clinics share PHI for treatment (coordination with your other clinicians), payment (claims, prior authorization), and health care operations (quality review, audits) under HIPAA’s allowances and the minimum necessary principle. Business associates (for example, EHR or billing vendors) may receive PHI under contract.

Outside these purposes, clinics generally need your written Authorization for Disclosure. Authorizations specify what information may be shared, with whom, for what purpose, an expiration date or event, your signature and date, and your right to revoke in writing going forward.

Where possible, providers may use a limited data set or de-identified data for analytics and research. Marketing uses, most sales of PHI, or research without an IRB waiver typically require a specific authorization.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Data Security Measures

TMS providers implement layered Security Safeguards to protect your electronic PHI. These include administrative policies, technical controls, and physical protections designed to prevent unauthorized access, alteration, or loss.

  • Technical: encryption in transit and at rest, role-based access, multi-factor authentication, strong passwords, device hardening, network segmentation, secure backups, and detailed audit logs.
  • Administrative and physical: risk analyses, workforce training, vetted vendor contracts, facility access controls, clean-device practices, and secure disposal of media.

Effective Breach Notification Procedures require assessing any incident that could expose unsecured PHI. If a breach occurs, you should be notified without unreasonable delay and no later than 60 days after discovery, with details about what happened, what information was involved, steps taken to mitigate harm, and how you can protect yourself. Larger breaches also trigger regulatory reporting and, in some cases, media notices.

At or before your first visit, you receive a Notice of Privacy Practices describing how your PHI may be used and your rights. Routine treatment, payment, and operations typically do not require separate consent, but clinics often ask you to acknowledge receipt of the notice.

When disclosure falls outside HIPAA’s standard allowances, clinics must obtain an Authorization for Disclosure. A valid authorization identifies the information to be released, the recipient, purpose, expiration date/event, your signature/date, statements about your right to revoke, and a reminder that information shared may be re-disclosed by the recipient.

TMS consent documents also explain what data the clinic collects during therapy (for example, session parameters and outcome measures), how reminders and telehealth communications work, and any optional data uses. For minors, a parent or legal guardian typically signs; certain sensitive topics may have additional state-specific rules.

Record Retention and Deletion

HIPAA requires keeping privacy and security documentation for at least six years, but it does not set universal medical Record Retention Periods. Medical record retention is driven by state law and payer rules, so timelines vary by clinic and jurisdiction.

  • Adults: commonly 6–10 years after the last encounter (state rules vary).
  • Minors: often until the age of majority plus additional years.
  • Some payers and programs require longer retention (for example, up to 10 years).

HIPAA does not grant a general right to deletion. Instead, you can request amendments or restrictions. When records reach the end of the clinic’s retention schedule or when disposal is legally permitted, providers must use secure destruction methods (for example, shredding or cryptographic erasure) and account for backups and legal holds.

Conclusion

Transcranial Magnetic Stimulation (TMS) Records Privacy rests on HIPAA’s Privacy Rule, strong Security Safeguards, and clear patient rights. By understanding how your data is collected, shared, secured, and retained, you can make informed choices, exercise your rights, and partner with your clinic to keep your information protected.

FAQs

What privacy regulations protect TMS patient records?

TMS records are protected primarily by HIPAA’s Privacy Rule, the Security Rule, and the Breach Notification Rule. HITECH strengthened enforcement and breach duties. State privacy laws may provide added protections, and specific federal rules can apply in certain specialized programs.

How can patients access their TMS treatment records?

Submit a request to your clinic’s records custodian or use the patient portal. Under your Data Access Rights, you can receive an electronic or paper copy within about 30 days, designate a third party to receive it, and be charged only a reasonable, cost-based fee for copies.

What are patients’ rights regarding the sharing of their TMS data?

You can authorize or decline disclosures that are not required for treatment, payment, or operations. You may request restrictions, opt for confidential communications, obtain an accounting of certain disclosures, and revoke an Authorization for Disclosure at any time for future releases.

How do TMS providers secure patient information?

Clinics combine administrative, physical, and technical Security Safeguards: encryption, access controls, multi-factor authentication, audit logging, vendor oversight, workforce training, and secure disposal. They also maintain Breach Notification Procedures to promptly inform you and regulators if unsecured PHI is compromised.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles