What Makes an Email Service HIPAA Compliant?

by

An email service is HIPAA compliant when a HIPAA covered entity or business associate can use it to create, receive, maintain, and transmit electronic protected health information in a manner that supports compliance with the HIPAA Privacy Rule, the HIPAA Security Rule, and the HIPAA Breach Notification Rule through appropriate contractual terms, configuration controls, and documented safeguards.

A compliant arrangement starts with the vendor relationship. If the email service provider creates, receives, maintains, or transmits electronic protected health information on behalf of a HIPAA covered entity, the parties need a business associate agreement that describes permitted and required uses and disclosures, requires safeguards, requires breach reporting to the covered entity, and binds subcontractors that handle electronic protected health information. A vendor that will not sign a business associate agreement is not suitable for routine email containing electronic protected health information.

Security capabilities must support the covered entity’s security management process. The email service must allow administrative controls such as unique user identification, role-based access where applicable, and strong authentication options. Technical controls must support access management, account provisioning and deprovisioning, and separation of duties for administration functions. Audit controls must capture meaningful activity logs for message access and administrative changes, and logs must be retained long enough to support investigations and compliance monitoring.

Accredited HIPAA Certification

Transmission and storage protections must match the organization’s risk analysis and email use cases. Encryption in transit should be available and enforceable for connections between clients and servers and between mail servers. Encryption at rest should be available for stored messages and attachments. If an organization relies on encryption to render information unusable, unreadable, or indecipherable to unauthorized persons for breach analysis purposes, the email service must support encryption that the organization can control and validate, including encryption of backups where electronic protected health information is stored.

Operational controls determine whether the service can be used without creating routine misdirection events. The system should support address verification controls, restrictions on auto-forwarding, and controls for external sharing of attachments. Data loss prevention tools, secure portals, or enforced encryption rules can reduce the likelihood that protected health information is sent outside authorized channels. Mobile access features should support device security controls such as remote wipe, session timeouts, and restrictions on local message caching when required by policy.

Privacy Rule compliance also depends on how the service is used. The organization must be able to apply the HIPAA Minimum Necessary Rule for disclosures that are not for treatment, and it must have procedures to verify recipients, handle patient communication preferences, and document patient requests when the organization permits unencrypted email at the patient’s direction after advising of risk.

Breach Notification Rule readiness requires prompt detection and reporting paths. The provider must be able to notify the covered entity of security incidents and breaches involving unsecured protected health information within the time limits required by contract and regulation, and the covered entity must be able to obtain the information needed to complete a breach risk assessment and prepare required notices.

The HIPAA Text on Email Service Compliance

45 CFR 164.504(e)(2)(i) and 45 CFR 164.504(e)(2)(ii)(B) address when an email service provider operates as a business associate and what the required contract terms must cover. The regulation states “A contract between the covered entity and a business associate must (i) Establish the permitted and required uses and disclosures of protected health information by the business associate.” and it also states “Provide that the business associate will (B) Use appropriate safeguards and comply, where applicable, with subpart C of this part with respect to electronic protected health information, to prevent use or disclosure of the information other than as provided for by its contract.” This text is relevant because an email service that creates, receives, maintains, or transmits protected health information for a covered entity requires a business associate agreement that limits uses and disclosures and requires safeguards aligned with the HIPAA Security Rule.

45 CFR 164.312(a)(1) and 45 CFR 164.312(b) describe technical controls that an email service must support when it is used to maintain or transmit electronic protected health information. The regulation states “Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in § 164.308(a)(4).” and it also states “Implement hardware, software, and or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.” This text is relevant because HIPAA compliant use of an email platform depends on enforceable access controls and audit controls that allow an organization to limit access and review activity involving electronic protected health information.

45 CFR 164.312(d) covers identity verification for access to electronic protected health information. The regulation states “Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.” This text is relevant because email services that support electronic protected health information require authentication and account controls that reduce unauthorized access through compromised credentials, shared accounts, or misrouted administrative access.

45 CFR 164.312(e)(1) and 45 CFR 164.312(e)(2)(ii) address protection of electronic protected health information during transmission and the encryption decision. The regulation states “Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.” and it also states “Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate.” This text is relevant because email is a transmission channel, and HIPAA compliant deployment depends on transmission protections and an encryption mechanism that can be applied when the organization’s security analysis calls for it.

45 CFR 164.308(a)(1)(ii)(A) establishes the risk analysis requirement that drives configuration and safeguard selection for email workflows. The regulation states “Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the [organization].” This text is relevant because whether a particular email service and its settings support compliance depends on the risks in the organization’s environment, including routing, storage, administrative access, endpoint controls, and incident response capabilities.

45 CFR 164.410(a)(1) and 45 CFR 164.410(b) govern business associate breach notification duties that apply when an email service provider experiences a breach involving unsecured protected health information. The regulation states “A business associate shall, following the discovery of a breach of unsecured protected health information, notify the covered entity of such breach.” and it also states “a business associate shall provide the notification required by paragraph (a) of this section without unreasonable delay and in no case later than 60 calendar days after discovery of a breach.” This text is relevant because an email service that qualifies as a business associate must be able to detect and report breaches to the covered entity within the required timeframe so the covered entity can meet HIPAA Breach Notification Rule obligations.

James Keogh

James Keogh has been writing about the healthcare sector in the United States for several years and is currently the editor of HIPAAnswers. He has a particular interest in HIPAA and the intersection of healthcare privacy and information technology. He has developed specialized knowledge in HIPAA-related issues, including compliance, patient privacy, and data breaches. You can follow James on Twitter https://x.com/JamesKeoghHIPAA and contact James on LinkedIn https://www.linkedin.com/in/james-keogh-89023681 or email directly at [email protected]