HIPAA-Compliant Email for Healthcare Practices
by Jon Lober | NOC Technology
What It Actually Takes

Email is the communication backbone of most medical and dental practices: appointment confirmations, referral coordination, lab results, billing questions. And it’s one of the most common sources of HIPAA violations. The gap between “we use Outlook” and “we have HIPAA-compliant email” is wider than most practice managers realize.
This guide covers what
HIPAA actually requires for email, what “compliant” really means for platforms like Microsoft 365 and Google Workspace, and what St. Louis healthcare practices need to have in place before treating email as a secure channel.
Why Standard Email Isn't HIPAA Compliant
HIPAA doesn’t prohibit email communication, but it does require that any electronic protected health information (ePHI) transmitted via email be safeguarded appropriately. Standard consumer email accounts don’t meet that bar for several reasons.
First, encryption: email in transit between mail servers is often unencrypted or uses opportunistic encryption that can’t be guaranteed. HIPAA requires you to protect ePHI “in transit” which means end-to-end or at-rest encryption you can verify and document.
Second, access controls: consumer accounts (free email–like gmail or outlook.com) don’t enforce the kind of role-based access controls, audit logging, and automatic logoff that HIPAA’s technical safeguard standards require.
Third, Business Associate Agreements: any vendor who handles ePHI on your behalf must sign a BAA with your practice. Free consumer email services don’t offer BAAs. Without one, using that service to transmit patient information is a HIPAA violation regardless of how secure the platform is technically.
What a Business Associate Agreement (BAA) Actually Is
A BAA is a legally binding contract between your practice and any vendor who processes, stores, or transmits ePHI on your behalf. It establishes the vendor’s responsibility to safeguard that information and report any breaches to you. Under HIPAA, you cannot use any service that handles patient data without a signed BAA.
Microsoft offers a BAA for Microsoft 365 Business and Enterprise plans, not for personal or consumer Microsoft accounts. Google offers a BAA for Google Workspace (formerly G Suite) Business and Enterprise plans. The BAA is a prerequisite, but signing one doesn’t automatically make your email setup compliant.
You still need to configure the platform correctly.
Making Microsoft 365 HIPAA Compliant
Microsoft 365 Business Premium and Enterprise plans can be configured for HIPAA compliance, but the default settings aren’t compliant out of the box. Here’s what needs to be configured:
- Sign the Microsoft HIPAA BAA (available through the Microsoft 365 admin portal under Service Trust Portal).
- Enable Microsoft Purview Message Encryption (formerly Office 365 Message Encryption) to encrypt outbound email containing ePHI.
- Configure Data Loss Prevention (DLP) policies to detect and block or encrypt outbound messages containing protected health information.
- Enable audit logging in the Microsoft 365 Security & Compliance Center.
- Configure multi-factor authentication for all accounts. This is a HIPAA technical safeguard requirement.
- Set automatic session timeouts and screen lock policies.
- Review and restrict external email forwarding rules that could expose ePHI.
The right Microsoft 365 license matters here. Microsoft 365 Business Basic doesn’t include the full DLP and compliance features. Business Premium or an E3/E5 Enterprise plan gives you the tools you need. If you’re on a lower-tier license, upgrading is part of the compliance equation.
Google Workspace as a HIPAA-Compliant Option
Google Workspace Business Starter and above support a HIPAA BAA, but like Microsoft, configuration matters. Key steps for Google Workspace compliance:
- Sign the Google Workspace HIPAA BAA through the Google Admin console under Account > Legal.
- Enable Gmail S/MIME encryption for messages containing ePHI (requires Business Plus or Enterprise).
- Configure Data Loss Prevention rules in the Admin console to flag or quarantine outbound messages with sensitive data.
- Enable audit logs for Gmail and Admin actions.
- Enforce two-factor authentication for all user accounts.
- Review which Google services are covered under the BAA—not all Google services are included, and using covered ePHI in an uncovered service is a violation.
Encryption: What You Actually Need
HIPAA requires “encryption and decryption” as an addressable safeguard for ePHI, which in practice means you need to encrypt email containing patient information. The two main approaches are:
Transport Layer Security (TLS): encrypts email in transit between mail servers. Both Microsoft 365 and Google Workspace support TLS, but it’s only effective when both the sending and receiving server support it. You can’t guarantee the recipient’s server does.
End-to-end encryption (S/MIME or message-level encryption): encrypts the message itself so only the intended recipient can read it, regardless of what servers it passes through. This is the more robust option for sensitive patient communications.
For most medical and dental practices, the practical approach is: use Microsoft’s built-in message encryption for outbound email containing ePHI, configure DLP policies to catch and encrypt messages that staff might send without thinking, and train staff on when to use encrypted communication.
Patient-Initiated Emails and the Consent Exception
If a patient emails you first using their personal Gmail or Yahoo account, they’ve accepted the risks of standard email for that communication. HIPAA allows you to respond via the same channel, provided you’ve warned the patient about the risks and they’ve consented to unencrypted communication.
This doesn’t mean patient-initiated emails give you blanket permission to skip encryption. It applies to individual exchanges where the patient has acknowledged the risk. If your practice routinely sends appointment reminders, lab results, or treatment plans via unencrypted email, that requires either documented patient consent for each communication or an encrypted email solution.
Staff Training and Policy
Technical controls reduce risk, but they don’t eliminate human error. Your staff need to understand what constitutes ePHI, when email is and isn’t appropriate for sharing patient information, and what to do if they accidentally send an unencrypted message containing patient data.
Practical training topics to cover:
- What counts as ePHI (patient name + any health information = ePHI, even if the health information seems minor)
- When to use the encrypted email option vs. standard email
- How to handle patients who email from personal accounts
- What constitutes a potential breach and how to report it internally
- The practice’s email retention and deletion policy
Email Retention Requirements Under HIPAA
HIPAA doesn’t specify a retention period for email specifically, but your retention obligations come from two sources: HIPAA’s requirement to retain policies and documentation for six years, and your state’s medical records retention law. In Missouri, medical records must be retained for a minimum of 10 years for adults. If your email contains patient records or clinical communications, those records fall under the longer retention requirement.
Practically, this means your email archiving solution needs to retain messages for at least six years (for HIPAA documentation) and up to 10+ years if the messages constitute patient records. Microsoft 365 and Google Workspace both have archiving and retention policy features—but they need to be configured. Default retention settings typically aren’t sufficient.
Getting Your Practice to Compliance
Here’s a practical checklist for a St. Louis medical or dental practice:
- Confirm you’re on a Microsoft 365 or Google Workspace plan that supports a HIPAA BAA.
- Sign the BAA with your email provider.
- Configure message encryption and DLP policies.
- Enable audit logging and review logs at least quarterly.
- Enforce multi-factor authentication across all accounts.
- Document your email security configuration as part of your HIPAA security risk analysis.
- Train all staff on email handling policies annually.
- Review your email archiving and retention settings against state and federal requirements.
We've set up HIPAA-compliant email for medical practices, dental offices, and healthcare organizations across Greater St. Louis. See how we support healthcare IT on our managed IT for medical and dental practices page, or check our pricing to see what’s included.






