Is Mend HIPAA Compliant?

by

Mend can be used in a HIPAA compliant manner when a HIPAA Covered Entity or Business Associate executes a HIPAA Business Associate agreement with Mend, limits use to the services and configurations covered by that agreement, and implements administrative, physical, and technical safeguards for electronic protected health information under the HIPAA Privacy Rule, HIPAA Security Rule, and HIPAA Breach Notification Rule.

A telehealth and patient engagement platform can create, receive, maintain, or transmit electronic protected health information through scheduling data, appointment links, patient demographic fields, intake content, chat, reminders, and video visit metadata. HIPAA compliance depends on the regulated entity’s risk analysis and risk management decisions, the platform configuration, and the organization’s procedures for workforce access, patient verification, and incident response. A platform designation or feature list does not replace the regulated entity’s obligation to control disclosures and limit access to authorized users.

Mend presents its telehealth positioning as aligned with regulated use and includes security-oriented statements about the telehealth session itself, including the statement, “An encrypted video feed is a must to keep telehealth visits secure.” Encryption in transit supports confidentiality, but HIPAA compliance also depends on identity and access management, account provisioning, authentication controls, session management, device security, and governance of patient facing links to limit unauthorized entry.

Accredited HIPAA Certification

Mend indicates willingness to enter into a HIPAA Business Associate agreement for customers using the service for regulated workflows. The agreement scope should be reviewed to confirm which Mend products, features, integrations, support channels, and subcontractor relationships are included. Protected health information should be restricted from features or connected services that are outside the agreement scope, including any optional analytics or messaging pathways that are not covered.

Operational controls remain with the regulated entity. Policies should address permitted uses, patient consent workflows where applicable, retention of visit artifacts, handling of screenshots and recordings, and staff procedures for conducting visits in private locations. Technical controls should include role-based access, unique user identification, secure configuration, audit capability where available, and routine review of configuration changes that affect how electronic protected health information is transmitted or stored.

James Keogh

James Keogh has been writing about the healthcare sector in the United States for several years and is currently the editor of HIPAAnswers. He has a particular interest in HIPAA and the intersection of healthcare privacy and information technology. He has developed specialized knowledge in HIPAA-related issues, including compliance, patient privacy, and data breaches. You can follow James on Twitter https://x.com/JamesKeoghHIPAA and contact James on LinkedIn https://www.linkedin.com/in/james-keogh-89023681 or email directly at [email protected]