← All Resources

HIPAA Compliance for Telehealth: What's Required Now That Enforcement Is Back

For about three years, telehealth providers operated under an unofficial safety net. In March 2020, the Office for Civil Rights announced it would exercise “enforcement discretion” for telehealth — meaning providers could use platforms like FaceTime, Skype, and consumer Zoom without fear of HIPAA penalties. The pandemic demanded rapid adoption, and OCR wasn’t going to stand in the way.

That discretion ended. First temporarily in May 2023, and then permanently as OCR made clear that all telehealth services must fully comply with the HIPAA Privacy, Security, and Breach Notification Rules. If your practice adopted telehealth during the pandemic and never upgraded your setup, you are now operating out of compliance.

This isn’t theoretical. OCR is actively investigating telehealth-related complaints, and the proposed 2026 Security Rule changes will tighten requirements further. Here’s what you need to know.

The Enforcement Discretion Is Over — What That Actually Means

During the enforcement discretion period, OCR said it would not impose penalties for good-faith use of non-public-facing communication platforms for telehealth. Providers could use Apple FaceTime, Facebook Messenger video, Google Hangouts, Zoom (consumer version), and Skype. The only platforms explicitly excluded were public-facing ones like TikTok Live or Facebook Live.

That was always a temporary measure. Now, the standard HIPAA requirements apply to telehealth exactly as they apply to any other method of creating, receiving, maintaining, or transmitting electronic protected health information (ePHI).

That means:

If your practice stood up telehealth quickly in 2020 and hasn’t revisited it since, now is the time. OCR has made clear that the pandemic grace period is behind us.

Which Video Platforms Are HIPAA Compliant (and Which Are Not)

This is the question providers ask most often, and the answer depends on more than just the platform itself. A platform is HIPAA compliant only if (1) it offers the necessary security features and (2) the vendor will sign a BAA with you.

Platforms That Can Be HIPAA Compliant

These platforms offer HIPAA-eligible configurations and will sign a BAA:

Platforms That Are NOT HIPAA Compliant

These platforms do not offer BAAs and cannot be used for telehealth under current HIPAA requirements:

The key distinction: the platform’s security features are only half the equation. Without a signed BAA, even an encrypted, secure platform is not HIPAA compliant for telehealth use.

The BAA Requirement: What It Actually Covers

A Business Associate Agreement is a contract between your practice (the covered entity) and the technology vendor (the business associate) that establishes:

A BAA is not optional. Under the HIPAA Privacy Rule, you may not disclose ePHI to a business associate without a BAA in place. And a telehealth video session absolutely involves the disclosure of ePHI to the platform vendor — patient faces, clinical conversations, potentially screen-shared medical records.

If a vendor refuses to sign a BAA, you cannot use their product for telehealth. Full stop.

One common mistake: assuming that a BAA exists because you’re paying for a business account. Payment does not equal a BAA. You need an actual signed agreement. Most compliant vendors make this available through their admin portal or during enterprise onboarding — but you need to verify it exists in writing.

Home Office Requirements for Telehealth Providers

The shift to telehealth also meant a shift to home offices, and this is where HIPAA compliance gets personal. Your living room is not automatically a compliant clinical environment.

OCR has not issued specific “home office” rules, but the HIPAA Security Rule’s administrative, physical, and technical safeguard requirements apply regardless of where you deliver care. In practical terms, this means:

Screen Visibility

Your screen must not be visible to unauthorized individuals during a telehealth session. If your spouse, children, roommates, or anyone else can see your screen while you’re treating a patient, that’s a potential unauthorized disclosure. Position your monitor so it faces a wall or use a privacy screen filter.

Shared Computers

If you use a shared family computer for telehealth, you have a problem. HIPAA requires unique user identification and access controls. Your teenager logging into the same computer and potentially accessing your telehealth platform, browser history, or saved credentials is a compliance violation. Use a dedicated device for clinical work, or at minimum, use separate user accounts with strong passwords and automatic session lockout.

Audio Privacy

Family members or roommates overhearing a telehealth session constitutes an unauthorized disclosure of PHI. Conduct sessions in a private room with the door closed. Use headphones. If you can’t guarantee audio privacy, you can’t conduct telehealth from that location.

Network Security

Your home Wi-Fi network should be encrypted (WPA2 or WPA3), password-protected, and ideally segmented so your clinical device is on a separate network from your family’s devices. Public Wi-Fi at a coffee shop is never acceptable for telehealth.

Physical Security

If your home office computer stores any ePHI (session recordings, notes, downloaded files), it must be physically secured when unattended. That means locking the room or locking the device — not leaving a laptop open on the kitchen table.

These are not hypothetical concerns. OCR investigators will ask about your physical environment when investigating a complaint, and “I was working from home” is not a defense for inadequate safeguards.

HIPAA itself does not require specific written consent for telehealth. The HIPAA Privacy Rule’s consent provisions (which are optional for treatment, payment, and healthcare operations) don’t change based on the delivery method.

However, there are layers of consent that may apply:

Most states require providers to obtain informed consent before delivering care via telehealth. This is a state requirement, not a HIPAA requirement, but it’s essential. The consent should cover:

Notice of Privacy Practices

Your Notice of Privacy Practices (NPP) should address telehealth. If your NPP was written before you offered telehealth, it likely doesn’t mention video sessions, chat-based communication, or remote monitoring. Update it to reflect how ePHI is created and handled during telehealth encounters.

State-Specific Requirements

State requirements vary significantly. Some states require verbal consent documented in the chart. Others require signed written consent. Some require consent to be renewed periodically. Check your state medical board’s telehealth guidelines — this is an area where state law frequently exceeds HIPAA’s requirements.

Recording Telehealth Sessions

Recording a telehealth session creates an ePHI-rich digital asset that must be managed under the HIPAA Security Rule. If you record sessions, you must address:

The safest approach for most small practices: do not record telehealth sessions unless there’s a specific clinical need. The less ePHI you create, the less you have to protect.

Chat and Messaging Within Telehealth Platforms

The chat function in your telehealth platform — yes, it generates ePHI. If a patient types their symptoms, medication list, or any health information into the chat window, that’s protected health information.

This means:

Check your telehealth platform’s settings. Some platforms retain chat logs by default. Others delete them after the session. Know what your platform does, and make sure it aligns with your policies.

Similarly, if you use a separate messaging platform to communicate with patients outside of scheduled visits (appointment reminders, follow-up questions, prescription notifications), that platform also needs a BAA and must comply with the Security Rule.

Telehealth Across State Lines

Telehealth frequently crosses state lines, and this creates compliance complexity. HIPAA is federal and applies uniformly, but state privacy and telehealth laws vary.

The general rule: the state where the patient is physically located at the time of the visit governs the encounter. This means:

For practices that serve patients across multiple states, this requires maintaining awareness of each state’s telehealth and privacy regulations. Multi-state telehealth compacts have simplified licensure in some cases, but they don’t override state-specific privacy requirements.

Mobile Apps and Patient-Facing Telehealth Portals

If your practice uses a patient-facing mobile app or portal for telehealth — whether it’s a dedicated app from your telehealth vendor, a patient portal through your EHR, or a custom solution — HIPAA applies to the ePHI handled by that app.

Key considerations:

If you’ve developed or commissioned a custom app, it must undergo a security assessment. Off-the-shelf solutions from reputable vendors are generally safer, but you’re still responsible for verifying their compliance.

The Proposed 2026 Security Rule Changes and Telehealth

The proposed HIPAA Security Rule update published in early 2026 has significant implications for telehealth. While the rule is not yet final, practices should begin preparing now. Key proposed changes affecting telehealth include:

For a deeper look at the proposed rule changes, see our full analysis in What the 2026 HIPAA Security Rule Changes Mean for Your Practice.

These changes aren’t final, but they signal OCR’s direction. Practices that start implementing these measures now will avoid a scramble when the final rule is published. Our HIPAA compliance assessment can help you identify where your current telehealth setup falls short.

Real Enforcement: What OCR Has Done

OCR enforcement actions related to telehealth and electronic communications provide concrete examples of what goes wrong:

The pattern across enforcement actions is consistent: the violations are rarely about the telehealth platform itself failing. They’re about the practice failing to assess risks, implement safeguards, and maintain policies that account for telehealth.

Telehealth HIPAA Compliance Checklist

Use this checklist to evaluate your telehealth setup. If you can’t check every box, you have work to do.

Platform and BAA

Access Controls

Physical Environment

Documentation and Policies

Patient-Facing Requirements

Recordings and Communications

For a complete, downloadable compliance checklist covering all HIPAA requirements (not just telehealth), visit our HIPAA compliance checklist.

How ComplyMD Helps With Telehealth Compliance

Telehealth compliance isn’t a separate category — it’s an extension of your overall HIPAA program. But it introduces specific technology, physical environment, and documentation requirements that many practices haven’t addressed.

ComplyMD is built to handle this. Our platform walks you through:

The proposed 2026 Security Rule changes are going to raise the bar for every practice offering telehealth. The time to prepare is now, not when the final rule drops.

Start your free compliance assessment to see where your telehealth setup stands, or join our early access list to be first in line when ComplyMD launches.

Ready to simplify your HIPAA compliance?

ComplyMD helps small healthcare practices build and maintain a complete HIPAA compliance program — without the consultant price tag.

Join the Waitlist