Zoom HIPAA Compliance: Is Zoom HIPAA‑Compliant and How to Set It Up for Telehealth

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Zoom HIPAA Compliance: Is Zoom HIPAA‑Compliant and How to Set It Up for Telehealth

Kevin Henry

HIPAA

September 05, 2025

7 minutes read
Share this article
Zoom HIPAA Compliance: Is Zoom HIPAA‑Compliant and How to Set It Up for Telehealth

Select Eligible Zoom Plans

Zoom can support HIPAA obligations when you use an eligible plan that includes a Business Associate Agreement (BAA) and configure the platform correctly. Free or consumer-grade plans are not appropriate for handling Protected Health Information (PHI). Your first step is selecting a healthcare‑ready subscription that allows a BAA and offers administrative controls for Telehealth Security.

What to verify before purchase

  • Confirm the plan explicitly supports a BAA and HIPAA‑related features.
  • Ensure administrative tools for Access Controls, audit logs, and retention are available.
  • Check recording options (cloud vs. local), encryption capabilities (including End‑to‑End Encryption), and reporting.
  • Align plan limits with clinical operations: concurrent sessions, large meetings, and interpreter workflows.

Document your selection rationale as part of your procurement and Risk Analysis records. This evidence shows due diligence if you undergo Compliance Audits.

Execute Business Associate Agreement

A BAA is essential when a vendor can create, receive, maintain, or transmit PHI on your behalf. Without an executed BAA, you should not use Zoom for any care encounter that may involve PHI.

How to complete the BAA process

  • Designate an authorized signatory and privacy/security reviewers.
  • Request the Zoom BAA during plan purchase or through your account administration or sales channel.
  • Review scope: permitted uses/disclosures, breach notification timelines, subcontractor obligations, and data return/deletion.
  • Execute the agreement, archive the signed copy, and record effective dates and covered services.

Coordinate downstream obligations

If you use integrations, storage systems, or third‑party apps with Zoom, ensure each vendor relationship is covered by a BAA or is kept strictly free of PHI. Communicate BAA requirements to your workforce so PHI stays within approved systems.

Configure Security Settings

With an eligible plan and BAA in place, harden your account to minimize PHI exposure. Establish secure defaults at the account or group level, then lock settings so individual users cannot weaken them.

Account‑level controls

Meeting security baseline

  • Require meeting passcodes and enable Waiting Room; disallow “join before host.”
  • Restrict meetings to authenticated users; limit guest access unless clinically necessary.
  • Set screen sharing to “host only” by default; approve per‑session exceptions when needed.
  • Disable file transfer and private chat by default to reduce uncontrolled PHI exchange.
  • Use watermarking and prevent participants from saving chat unless required for documentation policy.

Recording and PHI safeguards

  • Default to “no recording” for clinical visits; permit recording only with documented clinical need and patient consent.
  • If using recordings, apply encryption at rest, strict access reviews, retention limits, and secure storage location controls.
  • Disable automatic cloud recording unless your storage and governance meet HIPAA requirements; restrict who can record locally.

Encryption options

  • Use strong encryption in transit for all sessions and consider End‑to‑End Encryption for highly sensitive encounters.
  • Be aware that E2EE can limit certain features (for example, cloud recording or live transcription). Decide per workflow and document compensating controls when E2EE is not feasible.

Establish Organizational Policies

Technology alone does not ensure HIPAA compliance. Clear, accessible policies guide consistent behavior across your organization and reduce the chance of accidental PHI exposure.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Telehealth workflows

  • Prohibit PHI in meeting titles and invitations; use internal identifiers when scheduling.
  • Verify patient identity, confirm location for emergency response, and obtain consent before discussing PHI or recording.
  • Coach patients on privacy (headphones, private space) to strengthen Telehealth Security.
  • Define “minimum necessary” rules for chat, screen sharing, and file exchange.

Device and data governance

  • Require managed devices with disk encryption, auto‑lock, and current patches.
  • Control clipboard and screenshot behavior when PHI is visible; secure backups.
  • Define retention/disposition for chat, transcripts, recordings, and logs.

Incident and vendor management

  • Maintain an incident response plan with clear reporting paths and timelines.
  • Review vendor BAAs annually and reassess integrations that could touch PHI.

Conduct Regular Training

Training builds user confidence and reduces error rates in virtual care. Make it practical, scenario‑based, and reinforced over time.

Frequency and scope

  • Train at onboarding and at least annually; add refreshers after incidents, feature changes, or audit findings.
  • Include clinicians, care coordinators, IT staff, and contractors who may handle PHI.

Core curriculum

  • Recognizing PHI and “minimum necessary” practices.
  • Secure meeting setup: passcodes, Waiting Room, authentication, and screen‑share hygiene.
  • Recording rules, consent, and documentation requirements.
  • Phishing awareness and device security for remote work.

Measure effectiveness

  • Use short assessments, spot checks of meeting configurations, and periodic drills.
  • Track completion rates and correlate results with incident trends.

Implement Risk Management

HIPAA expects an ongoing Risk Analysis and a plan to reduce risks to reasonable and appropriate levels. Make this a living practice, not a one‑time task.

Perform a structured Risk Analysis

  • Inventory PHI touchpoints: scheduling, intake, live video, chat, recordings, support tickets, and integrations.
  • Map data flows and identify threats and vulnerabilities across people, process, and technology.
  • Score likelihood and impact; document inherent and residual risk.

Create and execute a treatment plan

  • Decide to mitigate, avoid, transfer, or accept each risk with clear owners and due dates.
  • Prioritize high‑impact actions: stronger Access Controls, encryption, logging, and user training.
  • Track progress in a risk register and review status in governance meetings.

Safeguards to emphasize

  • Technical: MFA/SSO, E2EE where feasible, network segmentation, endpoint protection, and automated configuration baselines.
  • Administrative: policies, BAAs, sanction procedures, and vendor oversight.
  • Physical: secure workspaces, privacy screens, and device storage controls.

Maintain Compliance Monitoring

Continuous oversight validates that your controls work in real workflows. Monitoring also surfaces drift—misconfigurations, new integrations, or usage patterns that could expose PHI.

Operational monitoring

  • Review admin and meeting logs for anomalies (failed logins, unusual recording activity, permission changes).
  • Run periodic access certifications for admins, group owners, and users with recording privileges.
  • Conduct internal Compliance Audits and spot checks of meeting settings and recordings.

Metrics and reporting

  • Track key indicators: MFA coverage, training completion, time to revoke access, and patch currency.
  • Report incidents and corrective actions to leadership and compliance committees.

Documentation and evidence

  • Maintain the executed BAA, policies, Risk Analysis, training rosters, audit logs, and remediation records.
  • Retain evidence according to your records management schedule to support audits or investigations.

Conclusion

Zoom HIPAA compliance is achievable when you pair an eligible plan and signed BAA with hardened security settings, clear policies, focused training, disciplined risk management, and active monitoring. Treat these elements as a continuous program, and your telehealth service can protect PHI while delivering a smooth patient experience.

FAQs.

Is Zoom HIPAA-compliant for telehealth?

Zoom can support HIPAA‑compliant telehealth when you use an eligible plan, execute a BAA, and implement strong controls (encryption, Access Controls, logging, and policy enforcement). Compliance depends on your configuration and processes, not the software alone.

How do I sign a BAA with Zoom?

Select an eligible plan that offers a BAA, request the agreement through your account or sales channel, review terms with privacy and security stakeholders, have an authorized official sign, then archive the executed copy and record effective dates and covered services.

What security settings are required for HIPAA compliance?

Require passcodes and Waiting Room, disable join‑before‑host, limit meetings to authenticated users, restrict screen sharing, and disable file transfer/private chat by default. Keep recording off unless necessary and tightly controlled. Enforce SSO with MFA, RBAC, encryption in transit, End‑to‑End Encryption where feasible, audit logging, and defined retention policies.

How often should staff training be conducted?

Provide training at onboarding and at least annually, with short refreshers after incidents, major feature changes, or audit findings. Tailor content to roles so each learner understands how to handle PHI securely in telehealth workflows.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles