Part of our Compliance & Regulation series
Read the complete guideHIPAA Compliance for Digital Health Platforms
Digital health platforms — telehealth applications, patient portals, remote monitoring systems, health analytics tools, and EHR integrations — are subject to some of the most stringent privacy and security regulations in the world. HIPAA violations resulted in $145 million in civil monetary penalties in 2023 alone, with individual fines reaching $1.9 million per violation category. The Office for Civil Rights (OCR) has demonstrated willingness to pursue enforcement against healthcare app developers, cloud providers, and business associates — not just traditional healthcare providers.
Understanding exactly what triggers HIPAA obligations, and how to implement the Security Rule's technical safeguards in a modern digital health architecture, is essential for any team building in this space.
Key Takeaways
- HIPAA applies to Covered Entities and their Business Associates — digital health platforms are typically BAs
- Protected Health Information (PHI) includes 18 specific identifiers linked to health, treatment, or payment data
- The Security Rule requires administrative, physical, and technical safeguards for electronic PHI (ePHI)
- Business Associate Agreements (BAAs) are legally required before any PHI sharing with third parties
- HITECH (2009) increased penalties significantly and extended HIPAA obligations to BA subcontractors
- Breach notification to HHS and affected individuals is required within 60 days
- OCR audits increasingly target digital health companies, not just hospitals
- De-identification using Safe Harbor or Expert Determination methods removes HIPAA applicability
Who Must Comply with HIPAA
HIPAA (Health Insurance Portability and Accountability Act, 1996) and the HITECH Act (2009) define two primary categories of obligated entities:
Covered Entities (CE):
- Healthcare providers that transmit health information electronically (hospitals, clinics, physicians, pharmacies)
- Health plans (insurance companies, employer health plans, Medicare/Medicaid)
- Healthcare clearinghouses
Business Associates (BA): Any entity that creates, receives, maintains, or transmits PHI on behalf of a covered entity. Digital health companies typically fall here. Examples:
- EHR software vendors with access to patient records
- Telehealth platforms that facilitate provider-patient communications
- Medical billing and coding services
- Health data analytics platforms
- Cloud storage providers storing ePHI
- IT support companies with potential PHI access
HITECH expansion: The HITECH Act extended direct HIPAA liability to Business Associate subcontractors (sometimes called "subBAs"). If you are a BA and you use a cloud provider to store ePHI, that cloud provider is a subBA with direct HIPAA obligations.
Consumer health apps and HIPAA: A common misconception is that all health apps are subject to HIPAA. If a consumer downloads your app directly and inputs their own health data — with no involvement of a covered entity — HIPAA generally does not apply to that data. However, if a hospital deploys your app to its patients, you become a BA. The FTC Health Breach Notification Rule (updated 2024) applies to consumer health apps regardless of HIPAA status.
Protected Health Information: The 18 Identifiers
PHI is individually identifiable health information relating to an individual's past, present, or future physical or mental health condition, healthcare provision, or payment for healthcare. The following 18 identifiers, when combined with health information, constitute PHI:
- Names
- Geographic data smaller than state (addresses, ZIP codes, geocodes)
- Dates (except year) related to an individual (birth date, admission date, discharge date, death date)
- Phone numbers
- Fax numbers
- Email addresses
- Social Security numbers
- Medical record numbers
- Health plan beneficiary numbers
- Account numbers
- Certificate or license numbers
- Vehicle identifiers (VINs, license plates)
- Device identifiers and serial numbers
- Web URLs
- IP addresses
- Biometric identifiers (fingerprints, voiceprints)
- Full-face photos and comparable images
- Any other unique identifying number, characteristic, or code
De-identification removes all 18 identifiers and requires expert determination or statistical verification that re-identification risk is very small. De-identified data is not PHI and falls outside HIPAA's scope — this is an important architectural consideration for health analytics platforms.
The HIPAA Privacy Rule
The Privacy Rule (45 CFR Part 164, Subparts A and E) governs how PHI may be used and disclosed.
Permitted uses and disclosures without authorisation:
- Treatment, payment, and healthcare operations (TPO) — the core purpose exception
- Public health activities (disease reporting to state health departments)
- Victims of abuse, neglect, or domestic violence reporting
- Health oversight activities (CMS audits, OCR investigations)
- Judicial and administrative proceedings (with appropriate legal process)
- Law enforcement (limited circumstances)
- Serious threat to health or safety
- Essential government functions
Uses and disclosures requiring individual authorisation:
- Marketing using PHI
- Sale of PHI
- Most research uses (unless IRB waiver obtained)
- Any use not covered by the above permitted categories
Minimum Necessary Standard: When disclosing PHI for purposes other than treatment, you must make reasonable efforts to limit disclosure to the minimum necessary for the purpose. This applies to BAs as well — your platform should only process the PHI elements required for your specific function.
Patients' Rights under the Privacy Rule:
- Right to access their PHI (within 30 days; 2021 rule removed many access barriers and reduced fees)
- Right to amend PHI that they believe is inaccurate
- Right to an accounting of disclosures (outside TPO, for the past 6 years)
- Right to request restrictions on certain uses
- Right to confidential communications
- Right to opt out of facility directories
The HIPAA Security Rule
The Security Rule (45 CFR Part 164, Subparts A and C) applies specifically to electronic PHI (ePHI) and requires covered entities and BAs to implement administrative, physical, and technical safeguards.
Administrative Safeguards
Security Officer: Designate an individual responsible for HIPAA security policy development and implementation. Document this designation.
Workforce training: Train all workforce members on HIPAA policies and procedures. Maintain training records with completion dates.
Access management procedures: Document how workforce access to ePHI is authorised, established, modified, and terminated.
Security awareness training: Train all users on security topics relevant to their role: phishing recognition, password hygiene, reporting incidents.
Contingency planning: Develop a documented data backup plan, disaster recovery plan, emergency mode operation plan, and testing and revision procedures.
Evaluation: Conduct periodic technical and non-technical evaluations of how well your security safeguards meet the Security Rule requirements.
Physical Safeguards
Facility access controls: Implement policies limiting physical access to facilities and systems containing ePHI to authorised personnel. For cloud-based deployments, this obligation passes to your cloud provider (requiring a BAA).
Workstation use: Document appropriate functions performed on workstations with access to ePHI, and physical attributes of their surroundings.
Device and media controls: Document procedures for the movement of hardware and electronic media containing ePHI; data backup before movement; data erasure/destruction before disposal.
Technical Safeguards
Access controls: Implement technical mechanisms to allow only authorised persons to access ePHI:
- Unique user identification for all ePHI system users
- Emergency access procedures
- Automatic logoff after idle period
- Encryption and decryption capability
Audit controls: Implement hardware, software, and procedural mechanisms to record and examine access and activity in systems containing ePHI. Retain audit logs for at least 6 years.
Integrity controls: Implement mechanisms to corroborate that ePHI has not been altered or destroyed in an unauthorised manner. Checksums, digital signatures, or equivalent.
Transmission security: Implement technical security measures to guard against unauthorised access to ePHI being transmitted over a network. TLS 1.2+ for all ePHI transmission.
Encryption: While technically "addressable" (not unconditionally required), encryption of ePHI at rest and in transit is considered standard practice and de facto required given the alternative documentation burden. Use AES-256 for data at rest, TLS 1.2+ for transmission.
Business Associate Agreements
A BAA is a written contract required before any sharing of PHI with a business associate. It must include:
- Specification of permitted and required uses and disclosures of PHI by the BA
- Requirement that the BA does not use or disclose PHI except as permitted or required by the contract
- Requirement that the BA implement appropriate safeguards to prevent unauthorised use or disclosure
- Requirement to report to the CE any breach or suspected breach of PHI
- Requirement to ensure subcontractors agree to the same restrictions
- Access, amendment, and accounting rights for the CE
- At termination, return or destruction of all PHI (or if infeasible, continue protection)
Critical BAA gaps to avoid:
- No mention of subcontractor chain (your BA uses AWS — AWS must have its own BAA with you or your BA)
- BAA limited to specific services rather than all PHI received under the relationship
- No breach notification timeframe specified
- No explicit statement of permitted uses
- No destruction/return obligation at termination
Major cloud providers (AWS, Azure, Google Cloud) offer BAAs for their healthcare customers — AWS's BAA covers a specific list of HIPAA-eligible services. Verify that every service in your stack that touches ePHI is covered by a BAA.
Breach Notification Rule
Under the HITECH-amended Breach Notification Rule (45 CFR Part 164, Subpart D), covered entities must notify:
-
Affected individuals: Without unreasonable delay, within 60 calendar days of breach discovery. First-class mail (or email if individual opted in). Must include description of what happened, types of PHI involved, steps individuals should take, and contact information.
-
HHS (OCR): If breach affects 500+ individuals, notify simultaneously with individuals (within 60 days) via HHS web portal. If less than 500, maintain a log and submit annually by March 1 of the following year.
-
Media: If breach affects 500+ residents of a state or jurisdiction, notify prominent media outlets serving that area (alongside individual notice).
BAs must notify the covered entity without unreasonable delay and no later than 60 days after discovery.
Breach presumption: Under HITECH, any impermissible access, use, or disclosure of PHI is presumed to be a breach unless the CE or BA demonstrates a low probability that PHI was compromised using a four-factor risk assessment: (1) nature and extent of PHI, (2) who used or accessed it, (3) whether PHI was actually acquired or viewed, (4) extent to which risk has been mitigated.
Safe harbour for encryption: Breaches of encrypted ePHI where the decryption key was not also compromised are excluded from breach notification requirements — making encryption of ePHI at rest a particularly powerful risk mitigation strategy.
HIPAA Technical Implementation Checklist
- PHI inventory completed — all data elements, systems, and flows documented
- De-identification analysis completed — PHI minimised where de-identification is appropriate
- HIPAA Security Officer designated and documented
- Risk analysis completed and documented (required under §164.308(a)(1))
- Risk management plan implemented
- BAAs signed with all vendors handling ePHI (cloud providers, analytics tools, email services)
- Access control implemented with unique user IDs for all ePHI system users
- MFA enforced for all ePHI system access
- Audit logging enabled on all ePHI systems (retained 6 years)
- Automatic session timeout configured (15 minutes maximum)
- ePHI encrypted at rest (AES-256) and in transit (TLS 1.2+)
- Backup and disaster recovery procedures documented and tested
- Workforce HIPAA training completed and documented
- Incident response / breach notification procedure documented
- Privacy notices (NPPs) published and provided to patients
- Patient rights procedures implemented (access, amendment, accounting)
- Subcontractor agreements cascade HIPAA obligations appropriately
Frequently Asked Questions
Does our telehealth app need to comply with HIPAA?
If your telehealth app facilitates communication between patients and HIPAA-covered entities (physicians, hospitals, health plans), and you handle PHI in the process, you are almost certainly a Business Associate subject to HIPAA. The analysis turns on whether you create, receive, maintain, or transmit PHI on behalf of a covered entity. If users of your app interact only with each other (consumer wellness app with no CE involvement), HIPAA may not apply, but the FTC Health Breach Notification Rule likely does.
What is the penalty for HIPAA violations?
Civil monetary penalties under HIPAA are tiered by culpability: unknown violation ($100–$50,000 per violation, $25,000 annual cap); reasonable cause ($1,000–$50,000 per violation, $100,000 annual cap); willful neglect corrected ($10,000–$50,000, $250,000 annual cap); willful neglect uncorrected ($50,000 per violation, $1.5 million annual cap per identical violation category). Criminal penalties (via DOJ) can include up to 10 years imprisonment for knowing disclosure with intent to sell PHI.
Can we store ePHI in AWS or Azure?
Yes, with a BAA in place. Both AWS and Azure offer BAAs covering specific HIPAA-eligible services. For AWS, verify that every service in your architecture is listed in the AWS BAA Schedule of HIPAA Eligible Services — some services (like certain Lambda layers, some S3 features) may not be covered. Your team is still responsible for configuring those services securely; the BAA shifts some legal responsibility but does not automatically make your implementation compliant.
What is the minimum necessary standard and how does it affect app design?
The minimum necessary standard requires that you access, use, or disclose only the PHI elements required for the specific purpose. In practice, this means: if your analytics function needs only de-identified aggregate data, do not pull full patient records; if your billing function needs claim data, it should not have access to clinical notes. Design your system to enforce data minimisation by role and function, not just by policy. Role-based access control and data segmentation by function are the primary technical implementations.
How does HIPAA interact with GDPR for global digital health platforms?
They operate in parallel. HIPAA applies to US healthcare data regardless of where it is processed. GDPR applies to EU residents' personal data regardless of where the controller or processor is established. If you have EU patient data, both may apply simultaneously. GDPR's lawful bases and data subject rights are separate obligations from HIPAA's minimum necessary and patient rights provisions. The practical implication: you may need to satisfy both a HIPAA patient access request and a GDPR Subject Access Request for the same patient, using processes that comply with both frameworks.
Is our marketing analytics tool a HIPAA Business Associate?
Potentially yes, if it receives ePHI. Many digital health companies inadvertently share PHI with analytics tools (Google Analytics, Mixpanel, Amplitude) through URL parameters, event metadata, or user property tags containing PHI. This triggered significant OCR enforcement action in 2022–2023 against hospitals using tracking pixels that sent PHI to Meta and Google. Audit all analytics integrations, ensure no PHI flows to analytics tools without a BAA, and consider using privacy-preserving analytics that operate only on aggregated or de-identified data.
Next Steps
Building HIPAA-compliant digital health platforms requires careful architecture decisions from the start — retrofitting security and privacy controls into an existing system is significantly more expensive than building them in. ECOSIRE's team can help you design, implement, and document a HIPAA-compliant technical architecture for your digital health platform.
Our experience spans patient portal development, EHR integration architecture, telehealth backend systems, and health analytics platforms — all implemented with HIPAA compliance as a foundational design constraint.
Learn more: ECOSIRE Services
Disclaimer: This guide is for informational purposes only and does not constitute legal advice. HIPAA requirements are complex and fact-specific. Engage qualified healthcare legal counsel and a HIPAA compliance officer for guidance specific to your organisation.
Written by
ECOSIRE TeamTechnical Writing
The ECOSIRE technical writing team covers Odoo ERP, Shopify eCommerce, AI agents, Power BI analytics, GoHighLevel automation, and enterprise software best practices. Our guides help businesses make informed technology decisions.
ECOSIRE
Grow Your Business with ECOSIRE
Enterprise solutions across ERP, eCommerce, AI, analytics, and automation.
Related Articles
ERP for Chemical Industry: Safety, Compliance & Batch Processing
How ERP systems manage SDS documents, REACH and GHS compliance, batch processing, quality control, hazmat shipping, and formula management for chemical companies.
ERP for Import/Export Trading: Multi-Currency, Logistics & Compliance
How ERP systems handle letters of credit, customs documentation, incoterms, multi-currency P&L, container tracking, and duty calculation for trading companies.
Sustainability & ESG Reporting with ERP: Compliance Guide 2026
Navigate ESG reporting compliance in 2026 with ERP systems. Covers CSRD, GRI, SASB, Scope 1/2/3 emissions, carbon tracking, and Odoo sustainability.
More from Compliance & Regulation
Cybersecurity for E-commerce: Protect Your Business in 2026
Complete ecommerce cybersecurity guide for 2026. PCI DSS 4.0, WAF setup, bot protection, payment fraud prevention, security headers, and incident response.
ERP for Chemical Industry: Safety, Compliance & Batch Processing
How ERP systems manage SDS documents, REACH and GHS compliance, batch processing, quality control, hazmat shipping, and formula management for chemical companies.
ERP for Import/Export Trading: Multi-Currency, Logistics & Compliance
How ERP systems handle letters of credit, customs documentation, incoterms, multi-currency P&L, container tracking, and duty calculation for trading companies.
Sustainability & ESG Reporting with ERP: Compliance Guide 2026
Navigate ESG reporting compliance in 2026 with ERP systems. Covers CSRD, GRI, SASB, Scope 1/2/3 emissions, carbon tracking, and Odoo sustainability.
Audit Preparation Checklist: Getting Your Books Ready
Complete audit preparation checklist covering financial statement readiness, supporting documentation, internal controls documentation, auditor PBC lists, and common audit findings.
Australian GST Guide for eCommerce Businesses
Complete Australian GST guide for eCommerce businesses covering ATO registration, the $75,000 threshold, low value imports, BAS lodgement, and GST for digital services.