HIPAA resource center
Securing mobile devices

Today, we are accustomed to quick communication across a variety of platforms: chat, text, email, and more. The convenience of mobile technology in health care sells itself, but when we use electronic communications to send patient information, called Protected Health Information (PHI), federal law requires safeguards to protect patient privacy. Noncompliance could result in compromised PHI and hefty fines. Use this guidance to ensure you are communicating securely.
Necessity of a Business Association Agreement (BAA)
Only use communications platforms that are compliant with HIPAA. The simplest way to tell if a vendor complies with HIPAA is to determine whether it signs Business Associate Agreements (BAAs). The BAA is a contractual commitment by the vendor to follow HIPAA as a business associate (BA). Vendors that offer communications for health care usually provide a BAA online, with digital signatures for convenience. Alternately, you can use the Academy’s BAA template (PDF). Keep a copy of the BAA for at least six years, as HIPAA requires.
Application of general HIPAA requirements to mobile devices
Ensure your policies and technology follow HIPAA requirements:
Access to PHI must be limited to authorized users who require the information to do their jobs.
Software must keep a log of who accesses PHI, and your policies should require regular review of the log to detect unauthorized access.
Users must use a unique username and password or PIN to gain access.
PHI transmitted beyond an organization’s internal firewall must be encrypted.
PHI stored on a mobile device should always be encrypted.
HIPAA-compliant vendors
Do not use your general texting app or email app in your phone as they do not usually have the recommended level of encryption, which prevents unauthorized access to the information. Even if they do encrypt, these vendors have not signed BAAs with your organization. As a result, using such a service to send PHI violates privacy law and breaches the transmitted patient data.
Many patient portals and EHRs offer apps that support compliant communication. But you can also use a stand-alone platform. Here are some popular HIPAA-compliant communication vendors*:
Texting/chat vendors: Tiger Connect, OhMD, DrFirst, Spok
Email vendors: Google Workspace, Office 365, Virtru, GoDaddy
* These vendors are shared on an informational basis only, as this in no way represents an endorsement/recommendation by the Academy. Please feel free to compare, evaluate, and consider which ones best meet your needs.
These vendors typically use cloud technology to provide their services. Cloud storage provides a variety of security functions in comparison to on-site servers. Cloud technology can encrypt your data before or after it is transmitted. Data encryption adds another layer of protection to PHI. Another added benefit of a cloud system is the ability to implement Single Sign-On (SSO) and Multi-Factor Authentication (MFA).You can find information about the vendors’ HIPAA compliance on their websites, or speak to a representative.
HIPAA technical and policy tips
Follow the policy and technical tips below to reduce your vulnerability to violations and breaches.
1. Establish appropriate institutional policies and procedures for mobile access to PHI.
People often think of HIPAA as a technology problem, but most of its requirements have to do with setting proper policies. In fact, most breaches of PHI are caused by human error, either because of inadequate policies or because staff did not follow the policies. Outline clear policies and procedures and provide regular staff training.
2. Require lock screens and timeouts on all phones that access PHI.
If staff access PHI on their personal phones, ensure that the phones are reasonably secure. Phones must use lock screens that authenticate access by password, PIN, or biometrics. Phones must also lock automatically after a period of inactivity.
3. Use only secure mobile applications from vendors that have signed BAAs.
Policy should require staff to access PHI only through designated apps, such as EHR or patient portal apps, telehealth apps, or HIPAA communications platforms. Apps should encrypt data in transit and at rest (stored). Staff should not download medical photos or other PHI to their phones, because these may be backed up automatically to a cloud service such as iCloud or Google photos, which breaches the PHI.
4. Require encryption of all data stored on any mobile device that accesses PHI.
Most phones encrypt their storage by default, but confirm that any device used to access PHI is encrypted. Devices that are encrypted do not have to be reported as HIPAA breaches if they are lost or stolen.
5. Regularly update phones and sensitive applications with security patches.
Policy should require that staff regularly update phones with security patches from the service provider or manufacturer. Install security updates as soon as possible. Having the most current updates minimizes your vulnerability to malware. Keep applications updated for the same reasons, especially apps that access PHI.
6. Develop processes to ensure backup of all PHI obtained through remote devices.
Destroying the only copy of PHI is a HIPAA violation, even if that PHI is on a mobile device. If you use a patient portal or EHR app, these generally backup PHI automatically, if the data is ever stored on the mobile device at all. Check with your vendor to be sure.
7. Implement multifactor authentication (MFA) and single sign-on (SSO) for sensitive applications.
MFA requires more than just a username/password to access PHI, which makes it more difficult for hackers to access your accounts. For example, to complete login, MFA might require the user to enter an additional authentication code sent by text. SSO allows users to log on to the network only once, rather than requiring logins for each individual program. Along with improved accessibility, SSO allows for easier monitoring of device access.
8. Terminate user access as soon as the user leaves the organization.
Many breaches have been caused by failure to terminate a user’s access after they have left the organization. Even if staff access PHI through their personal phones, you must still be able to terminate their access upon their departure.
9. If your phone is connected to Wi-Fi, ensure you are connected to a secure platform that requires a password.
If you are using public Wi-Fi, consider adopting a virtual private network (VPN). A VPN allows you to make a private wi-fi connection from any location and control who can access the data. A VPN conceals your IP address and encrypts your data, which makes your device more secure.
10. Consider implementing network segmentation and an intrusion prevention system (IPS).
Configure your secure network to restrict access to known devices authorized to access PHI. Segment applications that access and store PHI from other applications. This can help limit cyberattacks from spreading across your network. Working in tandem with a firewall, an IPS can detect security threats and take action to defend against the attack.
Get expert compliance help
Find training guides to help you and your staff comply with HIPAA, CLIA, and more in the AAD Store.
Related Academy resources
Ideal for educating new hires or for annual recertification of current staff on HIPAA, OSHA, and CLIA.
Learn how to comply with OSHA, the policies required, and how to handle an inspection.
Learn how to comply with CLIA regulations and how to handle an inspection.
Use our online form to contact practice management staff with questions or concerns.
Find a Dermatologist
Member directory
AAD Learning Center
2026 AAD Annual Meeting
Need coding help?
Reduce burdens
Clinical guidelines
Why use AAD measures?
New insights
Physician wellness
Joining or selling a practice?
Promote the specialty
Advocacy priorities