Free Consultation
#compliance
#hipaa

HIPAA-Compliant Email Communication

July 16, 2024

HIPAA-Compliant Email Communication

Learn about security measures and best practices organizations should take to ensure HIPAA-compliant email communication  

Email is a quick and easy way to communicate electronically, but it is not secure by default. That is why it is essential to ensure security measures to protect sensitive information transmitted by emails are in place. Let’s see two examples of how a patient’s data privacy and security can be compromised due to insufficient email protection measures.  

In May 2021, Lafourche Medical Group, specializing in emergency medicine, occupational medicine, and laboratory testing, reported a data breach involving the protected health information (PHI) of 34,862 individuals. A hacker gained access to a corporate email account containing sensitive patients’ data following a response to a phishing email that spoofed one of the medical group’s owners.  

As appeared during an investigation, Lafourche Medical Group had not conducted a security risk assessment (as per HIPAA Security Rule – 45 C.F.R. § 164.308(a) and had not implemented procedures to regularly review records of information system activity (as per 45 C.F.R. § 164.308(a) of the same Rule). Insufficient implementation of HIPAA Security Rule safeguards cost the Lafourche Medical Group a $ 480,000 penalty - the first HIPAA penalty in a phishing attack investigation.  

In July 2023, an Eastern Connecticut Health Network employee sent an email with the PHI of 912 patients to multiple recipients without using the blind carbon copy (BCC) function (concealing their email address from all other recipients). The Eastern Connecticut Health Network reported the incident correctly and committed to retraining employees on proper email protocol and protecting sensitive data.  

Let’s examine what HIPAA-compliant email communication should look like and what security measures organizations should take to ensure the security of patients' PHI.  

What is a HIPAA-Compliant Email?

HIPAA-compliant email is an email in which senders properly protect patients’ privacy and ensure their PHI’s confidentiality, integrity, and availability. The examples above demonstrate HIPAA noncompliance in healthcare email communication practices. The first demonstrates the lack of proper employee training, phishing attack prevention, and, highly possibly, sufficient authentication. The second shows how the lack of awareness of email protocols compromised the confidentiality of the PHI.  

IMPORTANT! HIPAA-compliant email does not mean a fully secure and untouchable email. HIPAA compliance does not ensure you or your employees will never fall victim to a phishing attack, email compromise, or human error. Rather, it sets a minimum standard for securing email communications and helps mitigate the risks of impermissible disclosures and breaches of unsecured PHI.  

The HIPAA Security Rule does not stipulate the requirements for a HIPAA-compliant email. Instead, relevant standards and implementation specifications regulate PHI handling and transmission via all communication channels, including emails.  

So, let’s dive deeper into the requirements for making your email HIPAA-compliant.  

The Security Rule and HIPAA Email Compliance

The HIPAA Security Rule establishes national standards to protect individuals' electronic personal health information created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronically protected health information. Let’s review these safeguards and see what they say about HIPAA-compliant email communication.  

Administrative safeguards for a HIPAA-compliant email

These HIPAA administrative safeguards involve policies, procedures, and processes that manage the selection, development, implementation, and maintenance of security measures to protect ePHI. Here are key administrative safeguards to consider:

Read more about HIPAA administrative safeguards to protect PHI.  

Physical Safeguards for HIPAA Email Compliance

The HIPAA Physical Safeguards are highly significant for covered entities and business associates who host their email servers on-premises. Those who subscribe to hosted email services such as Google Workspace or Microsoft 365 can relax. According to a shared responsibility model, service providers are responsible for complying with physical HIPAA email security requirements, such as controlling access to where the mail server is stored, managing maintenance records for mail servers, and ensuring a continuity of service during a disaster or emergency. HIPAA-compliant hosted email service providers may also be responsible for the physical security of email backups and archives.  

Whether an email service is hosted internally or outsourced to a service provider, covered entities and business associates must:

Read more about HIPAA physical safeguards to protect PHI.  

Technical Safeguards for HIPAA Email Compliance

Compliance with technical safeguards depends on the results of a HIPAA risk assessment. This is because the risk assessments help identify areas of vulnerability that vary across organizations and thereby implement the most appropriate technical safeguards for PHI. Some of the common technical safeguards to perform to ensure a HIPAA-compliant email communication include:

The HIPAA technical safeguards for email security are better explained below.  Read more about HIPAA technical safeguards to protect PHI.  

Best Practices to Ensure HIPAA Compliance in Email Communication

Encrypt emails and attachments properly

The HIPAA encryption requirements are briefly mentioned within the Technical Safeguards of the Security Rule (45 CFR §164.312), yet they are among the most critical for preserving the confidentiality of electronic Protected Health Information (ePHI). Covered entities must encrypt all emails containing PHI in transit so that only the intended recipient and authorized personnel can access the messages. When emails are sent between different domains and service providers, the end-to-end encryption cannot be guaranteed. Using a secure email option is the only way to ensure that the message is transmitted over encrypted channels.  

Not all service providers offer encryption services, so using third-party encryption services is a common practice. They offer advanced encryption capabilities and generally use the highest encryption standards.  

Note that even when using encryption, never include PHI in the subject line of an email. This is because subject lines cannot be encrypted, and therefore when providers put PHI in an email subject line, they risk the PHI being viewed by an unauthorized individual.

Implement strong authentication and authorization

To ensure HIPAA compliance for email services, implement strong authentication through two-factor or multi-factor authentication and enforce complex password policies. Apply role-based access control (RBAC) to restrict access based on job responsibilities. Enable detailed activity logging and employ automated monitoring tools to detect anomalies and unauthorized access attempts. These measures enhance email security and protect ePHI, ensuring that the email service meets HIPAA requirements and maintains the integrity of organizational communications.

Install anti-phishing software

Anti-phishing software is designed to detect and prevent phishing attacks. It employs a combination of techniques, including URL and content analysis, email filtering, behavioral monitoring, machine learning, and other tools.  

For example, antiphishing software integrates with email systems to filter out phishing emails, often using spam filters and machine learning algorithms. It analyzes the links in emails for signs of phishing, such as redirects to suspicious websites or URLs that resemble legitimate sites but have slight misspellings (e.g., “paypa1.com” instead of “paypal.com”).  

The software can check URLs against a database of known malicious (blacklist) and trusted (whitelist) websites and analyze URLs such as suspicious domain names, the use of IP addresses instead of domain names, or unusual URL patterns and other malicious patterns.  

Anti-phishing software also performs behavioral analysis and detects unusual activity patterns, such as logging into a website from a new location or device.  

All these functions in combination with AI and machine learning, immediate alerts, user blocking and reporting make anti-phishing software a powerful tool for securing sensitive emails.  

Learn more tips to fight against phishing.  

Implement SPF, DKIM, and DMARC policies

SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance) are three key policies used to improve email security and protect against phishing and spoofing attacks. These technologies help authenticate email senders by verifying that emails come from the domain that they claim to be from. These three authentication methods are important for preventing spam, phishing attacks, and other email security risks.

Ensure your email service is configured correctly

Even with the most reliable email service providers, there is always a risk of misconfigurations that may lead to non-compliance and inadvertently violating HIPAA Rules. Proper configuration is always the customer’s responsibility. Verify that the email service offers features like encryption, access controls, audit logs, and data backups.  

HIPAA-compliant email providers like Google and Microsoft assist covered entities by offering implementation guides to ensure their services support HIPAA compliance. So, read the guidelines accurately to configure your email services properly.  

Ensuring HIPAA-compliant email communication with Planet 9 HIPAA compliance services

HIPAA-compliant email communication is only a part of an organization’s overall HIPAA compliance. Planet 9 can help address overall HIPAA compliance, including your email communication. Our experts can:

Depending on the client’s internal resources’ expertise and availability, Planet 9 can implement the entire road map, position the client to execute it independently, or supplement the client’s team.  

Contact Planet 9 to learn more about HIPAA compliance.  

Book a Free Consultation

Schedule a free consultation today to explore how Planet 9 can help you achieve your security and compliance goals.
Book Free Consultation

FAQs

How does a PTCISO service differ from hiring a full-time CISO?
A part-time CISO offers the same strategic oversight and expertise as a full-time CISO but on a flexible, cost-effective basis. It’s ideal for small to mid-sized businesses that need executive-level guidance without the overhead.
Is a virtual CISO service suitable for regulated industries like healthcare or finance?
Yes, virtual CISOs (or fractional CISOs) are especially valuable for industries with strict compliance requirements such as HIPAA, PCI DSS, or GLBA. They help ensure your organization meets regulatory standards and is prepared for audits.
What can I expect during a vCISO engagement?
Our vCISO service typically includes cybersecurity assessments, program development, compliance planning, incident response strategy, vendor risk management, and ongoing executive reporting tailored to your business.
How do I know if my business needs a CISO-as-a-Service?
If you lack in-house security leadership, struggle with compliance, or face growing cyber risks, a vCISO can fill that gap, providing strategic direction, improving resilience, and helping you make smarter security investments.

Related blog posts