What Makes a Website HIPAA Compliant

Breaking down the specific technical, administrative, and physical safeguards your website must implement to satisfy HIPAA's Security Rule.

Published April 7, 2026 4 min read

The Three Safeguard Categories

HIPAA's Security Rule organizes requirements into three categories: administrative safeguards, physical safeguards, and technical safeguards. For websites, all three apply in different ways.

Administrative safeguards include policies, procedures, workforce training, and risk management programs. Physical safeguards cover data center security, workstation controls, and device disposal. Technical safeguards are the code-level and infrastructure controls most relevant to website compliance: access controls, audit controls, integrity controls, and transmission security.

Understanding which category each requirement falls into helps you assign ownership across your organization — IT owns technical controls, operations owns physical controls, and compliance/legal owns administrative controls.


Technical Safeguard Requirements

The technical safeguards in 45 CFR § 164.312 are the most directly relevant to website architecture. They require:

  • Access Controls (§164.312(a)(1)): Unique user identification, automatic logoff, and encryption/decryption of ePHI at rest
  • Audit Controls (§164.312(b)): Hardware, software, and procedural mechanisms to record and examine activity in systems containing ePHI
  • Integrity Controls (§164.312(c)(1)): Mechanisms to authenticate ePHI and ensure it has not been altered or destroyed improperly
  • Transmission Security (§164.312(e)(1)): Guards against unauthorized access to ePHI during transmission — this is where HTTPS/TLS requirements live

Each of these maps directly to specific website features that can be audited and verified.


Business Associate Agreements

Any third-party vendor that creates, receives, maintains, or transmits PHI on your behalf is a Business Associate and must sign a BAA before you share PHI with them. For websites, this covers a surprisingly broad range of vendors.

Common website vendors that typically require BAAs include: web hosting providers, form processing services, email marketing platforms (if health data is involved), analytics tools on authenticated pages, CDN providers serving ePHI, chat and scheduling tools, and CRM systems storing patient records.

Operating without a BAA where one is required is a direct HIPAA violation — even if no breach occurs. The OCR has levied fines against covered entities specifically for missing BAAs.


Authentication and Access Controls

Patient portals and any website section displaying PHI must implement robust authentication. HIPAA does not mandate multi-factor authentication by name, but it is considered an addressable implementation specification, meaning you must implement it or document a comparable alternative.

  • Enforce strong password policies (minimum length, complexity, expiration)
  • Implement automatic session timeout after periods of inactivity
  • Log all login attempts, including failures
  • Use role-based access controls to limit data exposure by user role
  • Disable or remove accounts immediately upon employee termination

For telehealth platforms and patient portals, MFA is effectively the industry standard and should be considered required in practice.


Data Minimization and PHI Handling

The Privacy Rule's minimum necessary standard requires that you only collect, use, and disclose the minimum amount of PHI necessary to accomplish the intended purpose. For websites, this translates into thoughtful form design and data architecture.

  • Only request fields you actually need — avoid collecting diagnoses or medication lists in general contact forms
  • Do not log PHI in standard web server access logs or error logs
  • Avoid storing PHI in URL parameters, which appear in server logs and browser history
  • Implement data retention policies and automate deletion of PHI that is no longer needed
  • Ensure database fields containing PHI are encrypted at the column level where possible
Check your site for free — Instant HIPAA compliance scan, no signup required.
Scan Now

Frequently Asked Questions

What is the difference between HIPAA Privacy Rule and Security Rule for websites?
The Privacy Rule governs how PHI can be used and disclosed and requires patient rights like access and amendment. The Security Rule specifically covers electronic PHI (ePHI) and mandates technical, administrative, and physical safeguards. Both apply to websites that handle health information, but the Security Rule is most directly relevant to website architecture and technical controls.
Do I need a BAA with Google Analytics?
If Google Analytics is deployed on pages where PHI is accessible — such as patient portals or appointment confirmation pages — then yes, you need a BAA with Google. Google offers a BAA through Google Workspace and certain Google Cloud products, but standard Google Analytics terms of service do not include one. Many healthcare organizations remove analytics tracking from authenticated sections entirely.
Is HIPAA compliance required for a healthcare marketing website?
A purely informational marketing website that collects no PHI (no appointment forms, no symptom checkers, no patient login) generally falls outside HIPAA scope. However, adding any contact form that asks health-related questions, or deploying tracking pixels that can identify users and correlate them with health conditions, brings the site into scope.
What documentation do I need to prove HIPAA compliance?
You need a written risk assessment, security policies and procedures, workforce training records, BAA copies, incident response and breach notification policies, and audit logs. Documentation must be retained for at least six years. During an OCR investigation, the ability to produce documentation is critical — undocumented controls are treated as non-existent.

Related Articles