ARTICLE
11 March 2026

Back To Basics: Adequate Protections For Protected Health Information In Email Systems

B
BakerHostetler

Contributor

Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
Unnecessary and legacy protected health information (PHI) in email systems continues to plague Health Insurance Portability and Accountability Act (HIPAA)-covered entities and business associates facing otherwise...
United States Food, Drugs, Healthcare, Life Sciences

Unnecessary and legacy protected health information (PHI) in email systems continues to plague Health Insurance Portability and Accountability Act (HIPAA)-covered entities and business associates facing otherwise minor business email compromise events. Due to enhanced security technologies and effective incident response policies, fast‑acting and diligent IT staff can often contain email incidents within hours or even minutes of an initial attack, limiting the number of accounts involved in an incident and sometimes preventing mailbox synchronization.

However, even when small numbers of emails are compromised, organizations often identify voluminous email attachments containing vast amounts of PHI. Sometimes, a mere handful of compromised emails can contain PHI for tens or hundreds of thousands of individuals. For organizations without an email archiving system, affected PHI may be attached to legacy emails no longer relevant to any operational or healthcare need that could have been archived years prior. These situations quickly transform a small incident into a major notification event, leading to larger class action suits and heightened regulatory scrutiny.

Although HIPAA does not prohibit using email to exchange PHI, the Department of Health and Human Services Office for Civil Rights has long required policies and procedures that guard against unauthorized access to PHI in email and adequate security protections for PHI stored in email systems. Yet healthcare organizations continue to underestimate the volume of PHI in their email systems and overestimate the security of those systems.

While complete elimination of PHI from email may be the most effective method of protecting PHI and limiting exposure, many healthcare organizations rely heavily on email for administrative and operational functions. For example, certain workflows related to scheduling, billing and discharge planning are well suited for email communication and may rely on large spreadsheets with numerous patient entries.

To significantly reduce exposure and enhance compliance, HIPAA-covered entities and business associates can implement straightforward and cost-effective security measures for email protection. These measures include archiving old emails and using secure email or encryption for any PHI shared by email, especially internal emails – which are frequently not subject to an organization's encryption or security requirements but typically contain the greatest volume of PHI. In addition, email filters can be implemented to detect PHI and alert users before an unsecured email is sent. These safeguards should apply to all patient information exchanged by email, regardless of volume or sensitivity, given the broad definition of PHI under HIPAA.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More