HIPAA Compliance Checklist for Telehealth Providers

Last updated: 2026-04-07 — ComplianceStack Editorial Team

15 items
Progress 0 of 15 reviewed

The COVID-19 Public Health Emergency (PHE) enforcement discretion for telehealth ended in May 2023. OCR is now applying full HIPAA enforcement to virtual care platforms. If you adopted telehealth during the pandemic using consumer video tools without a BAA, you are out of compliance. This checklist covers the 15 requirements that telehealth providers must address now that enforcement discretion is over, from platform selection to interstate licensing complications.

Priority Legend:
● Critical ● High ● Medium ● Ongoing

HIPAA Compliance Checklist for Telehealth Providers

1

Switch to a HIPAA-compliant video platform with a signed BAA

Critical 1-3 days

The PHE enforcement discretion that allowed FaceTime, Skype, and consumer Zoom expired in May 2023. You must use a platform that signs a BAA and provides end-to-end encryption. Options include Zoom for Healthcare, Doxy.me, Teladoc Health, Amwell, SimplePractice Telehealth, and VSee.

45 CFR 164.502(e) (BAA requirement); OCR Notification of Enforcement Discretion Expiration (May 2023)
2

Verify end-to-end encryption on your telehealth platform

Critical 1 day

Not all 'encrypted' platforms use end-to-end encryption. Verify that video, audio, chat, and file-sharing features within the platform are encrypted in transit and that the vendor cannot access unencrypted content. Request documentation from the vendor.

45 CFR 164.312(e)(1) (Transmission Security); 45 CFR 164.312(a)(2)(iv) (Encryption)
3

Conduct a Security Risk Assessment for your telehealth environment

Critical 2-4 days

Your SRA must cover the telehealth platform, patient portal, scheduling system, provider devices (home offices, mobile), network security, and any third-party integrations. Remote provider locations introduce risks that in-office environments do not.

45 CFR 164.308(a)(1)(ii)(A)
4

Establish session recording consent policies

Critical 2 days

If you record telehealth sessions for quality assurance or clinical documentation, you must obtain explicit patient consent in advance. Thirty-eight states have specific recording consent laws (one-party vs. two-party). HIPAA requires the recording to be treated as PHI — encrypted, access-controlled, and included in your retention policy.

45 CFR 164.508 (Authorization for Uses and Disclosures); applicable state wiretapping/recording laws
5

Address interstate licensing requirements for cross-state telehealth

Critical 3-5 days

Providers must be licensed in the state where the patient is located at the time of the visit. The Interstate Medical Licensure Compact (IMLC) covers 42 states for physicians. Psychologists have PSYPACT (41 jurisdictions). Verify your license covers every state where you see patients remotely.

State medical practice acts; IMLC (interstate compact); PSYPACT for psychologists
6

Designate a HIPAA Privacy and Security Officer

High 1 day

For telehealth-only practices, the officer must understand both clinical privacy requirements and the technical security of remote delivery platforms. Document the designation in writing.

45 CFR 164.530(a)(1); 45 CFR 164.308(a)(2)
7

Secure provider home office environments

High 1-2 days

Providers conducting telehealth from home must ensure the session is private (no family members or visitors overhearing), the screen cannot be viewed by unauthorized persons, and the device is encrypted with a strong password. Develop a remote workplace security policy.

45 CFR 164.310(b) (Workstation Use); 45 CFR 164.310(c) (Workstation Security)
8

Implement patient identity verification for virtual visits

High Half day

Unlike in-person visits, telehealth carries impersonation risk. Verify patient identity at the start of each session using at least two identifiers (name + date of birth, or photo ID on camera). Document your verification method.

45 CFR 164.312(d) (Person or Entity Authentication)
9

Encrypt all devices used by providers for telehealth

High 1 day

Laptops, tablets, and smartphones used for virtual visits must have full-disk encryption enabled. This applies to both practice-owned and BYOD devices. A lost unencrypted device is a reportable breach.

45 CFR 164.312(a)(2)(iv)
10

Train all providers and staff on telehealth-specific HIPAA requirements

High 1 day

Training must cover platform security features, proper session setup (private location, headphones, locked screen), what to do if a session is interrupted or overheard, and how to handle technical failures that expose PHI.

45 CFR 164.530(b)(1); 45 CFR 164.308(a)(5)
11

Execute BAAs with all telehealth technology vendors

High 2-3 days

Every vendor in the telehealth stack needs a BAA: video platform, patient portal, scheduling software, EHR, secure messaging, cloud storage, and any analytics tools that process PHI. Audit your entire vendor list.

45 CFR 164.502(e); 45 CFR 164.504(e)
12

Develop a breach notification procedure for telehealth incidents

Medium 2 days

Telehealth breaches may involve session interception, unauthorized screen sharing, or platform vulnerabilities. Define investigation steps specific to virtual care, including how to determine if a session was compromised and notification timelines.

45 CFR 164.400-414
13

Ensure your patient intake and consent forms address telehealth-specific risks

Medium 1-2 days

Informed consent for telehealth should explain technology risks (connection failures, privacy limitations of the patient's environment), data storage practices, emergency procedures if the patient needs in-person care, and the patient's right to refuse virtual treatment.

State telehealth consent requirements; 45 CFR 164.520 (NPP update recommended)
14

Implement network security for telehealth connections

Medium 1 day

Providers should use secure, private Wi-Fi networks — never public Wi-Fi. If a VPN is available, require its use. Configure firewalls to restrict unnecessary traffic on devices used for patient care.

45 CFR 164.312(e)(1); 45 CFR 164.308(a)(1) (Security Management Process)
15

Review all telehealth policies annually and after platform changes

Ongoing 1-2 days per year

Telehealth technology evolves rapidly. Any platform migration, feature update, or new integration should trigger a policy review. Annual reviews should verify that all BAAs are current, encryption standards meet current recommendations, and state licensing is maintained.

45 CFR 164.530(j); 45 CFR 164.316(b)(2)(iii)

See How Your Telehealth Provider Scores on HIPAA

Run a free gap analysis to find out which items you have covered and where the risks are.

Gap Analyzer →   Training Tracker →

Common Mistakes That Trigger Enforcement

Continuing to use consumer Zoom or FaceTime after the PHE enforcement discretion ended
OCR is now enforcing HIPAA against telehealth platforms that lack a BAA. Every session on a non-compliant platform is a potential violation, and a breach on that platform leaves you with no contractual recourse.
Recording telehealth sessions without explicit patient consent
Session recordings are PHI. Recording without consent violates both HIPAA authorization requirements and state recording laws, which can carry criminal penalties in two-party consent states.
Treating patients in states where the provider is not licensed
Telehealth does not waive state licensing requirements. Practicing without a license in the patient's state is a state law violation, and any resulting HIPAA issues compound the regulatory exposure.
Providers conducting sessions in shared spaces without privacy controls
Family members, roommates, or coworkers overhearing a session from the provider's side is a HIPAA violation if reasonable safeguards were not in place.
Not updating the Notice of Privacy Practices for telehealth
Your NPP should describe how PHI is used and protected in virtual care. An outdated NPP that only references in-person care fails the HIPAA transparency requirement.

Frequently Asked Questions

Is the COVID-era HIPAA telehealth enforcement discretion still in effect?

No. OCR's enforcement discretion for telehealth expired on May 11, 2023, when the COVID-19 Public Health Emergency ended. All telehealth providers must now use HIPAA-compliant platforms with signed BAAs. There is no grace period — enforcement is active.

Do I need a separate BAA for each telehealth tool I use?

Yes. Every vendor that stores, processes, or transmits PHI requires its own BAA. This means separate BAAs for your video platform, patient portal, scheduling tool, EHR, secure messaging app, and any cloud storage service. A single BAA cannot cover multiple unrelated vendors.

Can I use a VPN to make any video platform HIPAA-compliant?

No. A VPN encrypts network traffic but does not make the platform itself compliant. HIPAA compliance requires the vendor to sign a BAA, implement access controls, maintain audit logs, and accept responsibility for PHI protection. A VPN is a useful security layer but is not a substitute for a compliant platform.

✉ Save This Checklist

Enter your email and we'll send you a clean copy — plus updates when requirements change.

We also offer a free personalized gap analysis for your specific situation.

Related Resources