HIPAA Compliance Checklist for Telehealth Providers
Last updated: 2026-04-07 — ComplianceStack Editorial Team
The COVID-19 Public Health Emergency (PHE) enforcement discretion for telehealth ended in May 2023. OCR is now applying full HIPAA enforcement to virtual care platforms. If you adopted telehealth during the pandemic using consumer video tools without a BAA, you are out of compliance. This checklist covers the 15 requirements that telehealth providers must address now that enforcement discretion is over, from platform selection to interstate licensing complications.
HIPAA Compliance Checklist for Telehealth Providers
Switch to a HIPAA-compliant video platform with a signed BAA
The PHE enforcement discretion that allowed FaceTime, Skype, and consumer Zoom expired in May 2023. You must use a platform that signs a BAA and provides end-to-end encryption. Options include Zoom for Healthcare, Doxy.me, Teladoc Health, Amwell, SimplePractice Telehealth, and VSee.
Verify end-to-end encryption on your telehealth platform
Not all 'encrypted' platforms use end-to-end encryption. Verify that video, audio, chat, and file-sharing features within the platform are encrypted in transit and that the vendor cannot access unencrypted content. Request documentation from the vendor.
Conduct a Security Risk Assessment for your telehealth environment
Your SRA must cover the telehealth platform, patient portal, scheduling system, provider devices (home offices, mobile), network security, and any third-party integrations. Remote provider locations introduce risks that in-office environments do not.
Establish session recording consent policies
If you record telehealth sessions for quality assurance or clinical documentation, you must obtain explicit patient consent in advance. Thirty-eight states have specific recording consent laws (one-party vs. two-party). HIPAA requires the recording to be treated as PHI — encrypted, access-controlled, and included in your retention policy.
Address interstate licensing requirements for cross-state telehealth
Providers must be licensed in the state where the patient is located at the time of the visit. The Interstate Medical Licensure Compact (IMLC) covers 42 states for physicians. Psychologists have PSYPACT (41 jurisdictions). Verify your license covers every state where you see patients remotely.
Designate a HIPAA Privacy and Security Officer
For telehealth-only practices, the officer must understand both clinical privacy requirements and the technical security of remote delivery platforms. Document the designation in writing.
Secure provider home office environments
Providers conducting telehealth from home must ensure the session is private (no family members or visitors overhearing), the screen cannot be viewed by unauthorized persons, and the device is encrypted with a strong password. Develop a remote workplace security policy.
Implement patient identity verification for virtual visits
Unlike in-person visits, telehealth carries impersonation risk. Verify patient identity at the start of each session using at least two identifiers (name + date of birth, or photo ID on camera). Document your verification method.
Encrypt all devices used by providers for telehealth
Laptops, tablets, and smartphones used for virtual visits must have full-disk encryption enabled. This applies to both practice-owned and BYOD devices. A lost unencrypted device is a reportable breach.
Train all providers and staff on telehealth-specific HIPAA requirements
Training must cover platform security features, proper session setup (private location, headphones, locked screen), what to do if a session is interrupted or overheard, and how to handle technical failures that expose PHI.
Execute BAAs with all telehealth technology vendors
Every vendor in the telehealth stack needs a BAA: video platform, patient portal, scheduling software, EHR, secure messaging, cloud storage, and any analytics tools that process PHI. Audit your entire vendor list.
Develop a breach notification procedure for telehealth incidents
Telehealth breaches may involve session interception, unauthorized screen sharing, or platform vulnerabilities. Define investigation steps specific to virtual care, including how to determine if a session was compromised and notification timelines.
Ensure your patient intake and consent forms address telehealth-specific risks
Informed consent for telehealth should explain technology risks (connection failures, privacy limitations of the patient's environment), data storage practices, emergency procedures if the patient needs in-person care, and the patient's right to refuse virtual treatment.
Implement network security for telehealth connections
Providers should use secure, private Wi-Fi networks — never public Wi-Fi. If a VPN is available, require its use. Configure firewalls to restrict unnecessary traffic on devices used for patient care.
Review all telehealth policies annually and after platform changes
Telehealth technology evolves rapidly. Any platform migration, feature update, or new integration should trigger a policy review. Annual reviews should verify that all BAAs are current, encryption standards meet current recommendations, and state licensing is maintained.
See How Your Telehealth Provider Scores on HIPAA
Run a free gap analysis to find out which items you have covered and where the risks are.
Gap Analyzer → Training Tracker →Common Mistakes That Trigger Enforcement
Frequently Asked Questions
Is the COVID-era HIPAA telehealth enforcement discretion still in effect?
No. OCR's enforcement discretion for telehealth expired on May 11, 2023, when the COVID-19 Public Health Emergency ended. All telehealth providers must now use HIPAA-compliant platforms with signed BAAs. There is no grace period — enforcement is active.
Do I need a separate BAA for each telehealth tool I use?
Yes. Every vendor that stores, processes, or transmits PHI requires its own BAA. This means separate BAAs for your video platform, patient portal, scheduling tool, EHR, secure messaging app, and any cloud storage service. A single BAA cannot cover multiple unrelated vendors.
Can I use a VPN to make any video platform HIPAA-compliant?
No. A VPN encrypts network traffic but does not make the platform itself compliant. HIPAA compliance requires the vendor to sign a BAA, implement access controls, maintain audit logs, and accept responsibility for PHI protection. A VPN is a useful security layer but is not a substitute for a compliant platform.
✉ Save This Checklist
Enter your email and we'll send you a clean copy — plus updates when requirements change.
We also offer a free personalized gap analysis for your specific situation.
Related Resources
- Complete HIPAA Framework Guide
- HIPAA for Dental Practices
- HIPAA for Mental Health Providers
- HIPAA Penalty Tiers
- HIPAA Breach Notification Penalties
- HIPAA Compliance Checklist for Dental Practices
- HIPAA Compliance Checklist for Mental Health Providers
- HIPAA Compliance Checklist for Pharmacies
- Free Compliance Gap Analyzer
- Employee Training Tracker
- 5-Minute Compliance Quiz