Patient ProtectPatient Protect

HIPAA compliant email

Email is the #1 source of HIPAA violations in healthcare.

43% of healthcare data breaches involve email. Encryption alone does not make email HIPAA compliant — and most practices are missing at least three of the seven requirements.

The risk

Why standard email fails HIPAA requirements.

Every email containing patient information is a potential breach vector. Standard email was designed for convenience, not security — and HIPAA was written for security, not convenience.

Unencrypted transmission

Standard email sends PHI in plaintext between servers. Any intermediary can read the content. TLS encryption only works if both sender and recipient servers support it — and there is no guarantee they do.

43% of healthcare breaches involve email (Verizon DBIR, 2024).

No access controls

Personal email accounts have no role-based access, no session timeouts, and no device management. Anyone with the password can read every message from any device, indefinitely.

Shared passwords on email accounts are flagged in 1 in 3 OCR audits.

No audit trail

Standard email providers do not log who accessed a message, when, or from where. When OCR requests evidence of your safeguards, you have nothing to show.

Failure to produce audit logs is a standalone HIPAA violation.

Indefinite retention

Emails sit in inboxes and trash folders indefinitely. Former employees retain access on personal devices. PHI accumulates in places your practice no longer controls.

Average email account contains 3+ years of unmanaged PHI.

What HIPAA requires

Seven requirements for HIPAA compliant email.

HIPAA does not ban email. It requires that email systems used for PHI meet specific technical and administrative safeguards. Missing any one of these can result in a violation.

  • 1

    Encryption in transit and at rest

    All email containing ePHI must be encrypted using TLS 1.2+ in transit and AES-256 at rest. If the recipient's server does not support TLS, the message must not be sent — or must use a portal-based secure delivery.

  • 2

    Business Associate Agreement

    Your email provider processes ePHI on your behalf, making them a business associate. You must have a signed BAA before any patient data flows through the system. Gmail, Outlook, and Yahoo personal accounts do not offer BAAs.

  • 3

    Access controls and authentication

    Each user must have a unique login. Multi-factor authentication (MFA) is required. Shared accounts, shared passwords, and auto-login on unmanaged devices are violations.

  • 4

    Audit logging

    Your email system must log who sent and received messages, when, and from what device. These logs must be retained for a minimum of six years per HIPAA requirements.

  • 5

    Data Loss Prevention (DLP)

    Rules must detect and block outbound messages containing PHI patterns (SSNs, MRNs, DOBs) sent to unauthorized recipients or personal accounts.

  • 6

    Retention and disposal policies

    Email retention periods must be defined and enforced. Deleted messages must be purged on schedule. Staff cannot maintain personal archives of patient communications.

  • 7

    Device management

    If staff access email from mobile devices, those devices must be managed — remote wipe capability, screen lock requirements, and encryption enforced.

Provider comparison

Which email providers support HIPAA compliance?

Not all email platforms are equal. Some can be made compliant with configuration. Others cannot be used for PHI under any circumstances.

ProviderBAAEncryptionDLPAuditNotes
Google WorkspaceYes (Business plans and above)TLS in transit, AES-256 at restYes (admin configuration required)Yes (Google Vault + Admin audit log)Must sign BAA in Admin Console. Free Gmail does not qualify.
Microsoft 365Yes (Business and Enterprise plans)TLS in transit, BitLocker at restYes (Microsoft Purview)Yes (Compliance Center audit log)Must sign BAA in Admin Center. Personal Outlook.com does not qualify.
Free Gmail / Yahoo / AOLNoTLS opportunistic (not guaranteed)NoNoNot HIPAA eligible. No BAA available. Cannot be used for PHI.
Hushmail for HealthcareYesTLS + OpenPGP, encrypted web formsLimitedBasic loggingPurpose-built for healthcare. Simpler than Google/Microsoft but limited features.
PauboxYesAutomatic TLS + fallback portalOptional add-onYesHITRUST CSF certified. Seamless encryption — no portals for TLS-capable recipients.

Common mistakes

Where practices get email compliance wrong.

  • Using personal email accounts (@gmail.com, @yahoo.com) for patient communication
  • Signing a BAA with Google Workspace or Microsoft 365 but not configuring DLP, MFA, or retention policies
  • Sending PHI to patients who reply from non-secure personal email — the return path is unencrypted
  • Forwarding patient emails to personal accounts for after-hours access
  • Not training staff on what can and cannot be sent via email
  • Using email subject lines that contain PHI (subject lines are never encrypted)
  • Assuming encryption covers the problem — encryption without access controls, audit logs, and policies is not compliance

Beyond email

Email is one surface. Your compliance program covers all of them.

Even with perfectly configured email, your practice still needs a risk assessment, workforce training, vendor BAA tracking, incident response procedures, and monitoring across every system that touches patient data. Patient Protect manages your full compliance posture — not just one communication channel.

FAQ

Common questions about HIPAA compliant email.

Is email HIPAA compliant?

Standard email is not HIPAA compliant. Email can be made compliant when sent through a platform with a signed BAA, encryption in transit and at rest, access controls, audit logging, and DLP policies configured. The platform alone is not enough — organizational policies and staff training are required.

Can I email patients under HIPAA?

Yes, if you use a HIPAA-compliant email system with proper encryption and have a signed BAA with your email provider. The patient should be informed that email carries inherent risks, and you should document their consent to receive communications via email. Never include PHI in subject lines.

Is Gmail HIPAA compliant?

Free Gmail is not HIPAA compliant — Google does not offer a BAA for personal accounts. Google Workspace (Business, Enterprise) can be HIPAA compliant after signing the BAA in the Admin Console and configuring DLP, MFA, and retention policies.

What is the penalty for sending PHI via unsecured email?

OCR penalties for email-related HIPAA violations range from $100 to $50,000 per violation, up to $1.5 million per year per violation category. Individual violations can be aggregated — a practice sending unencrypted emails daily could face penalties for each message.

Does encryption make email HIPAA compliant?

No. Encryption is one of several requirements. HIPAA also requires access controls, unique user authentication, audit logging, a signed BAA with the email provider, data retention policies, and staff training. Encryption alone does not equal compliance.

Do I need a separate HIPAA email provider?

Not necessarily. Google Workspace and Microsoft 365 can both meet HIPAA requirements when properly configured with a BAA. However, dedicated healthcare email providers like Paubox or Hushmail offer simpler setup and healthcare-specific features like encrypted web forms and automatic compliance.

Next step

Is your email putting patients at risk?

Most practices have at least one email-related HIPAA gap. The risk assessment shows you exactly where — and what to fix first.