
Telehealth Security for Small Clinics: HIPAA-Compliant Setup Guide (2026)
Telehealth has moved from a pandemic-era workaround into a permanent component of modern healthcare delivery. More than 80 percent of healthcare organizations now offer some form of virtual care, and over 60 percent of patients expect telehealth options from their providers. But every virtual visit creates security risks that do not exist in a traditional exam room — patient data traverses public networks, providers connect from home environments, and personal devices replace locked-down clinical workstations.
The end of the COVID-19 Public Health Emergency (PHE) in May 2023 permanently changed the compliance picture for telehealth security for small clinics. The enforcement discretion period that allowed providers to use consumer-grade platforms like FaceTime, Zoom without a Business Associate Agreement (BAA), and Skype has expired. The Office for Civil Rights (OCR) has resumed full enforcement of the HIPAA Security Rule for all virtual care activities. Small clinics that continued using non-compliant platforms after the PHE termination are operating in violation of federal law, with penalties ranging from $100 to $50,000 per violation.
For small clinics with limited IT resources, building a secure telehealth program can feel overwhelming. The requirements are achievable: select a HIPAA-compliant platform with a signed BAA, implement technical safeguards on provider and patient endpoints, establish secure workflows for virtual visits, and train staff on telehealth-specific risks. This guide walks through the specific technical controls, platform selection criteria, and operational procedures needed to meet the HIPAA Security Rule under 45 CFR §164.308, §164.310, and §164.312 — and to protect the patient trust your practice depends on.
Telehealth Security By The Numbers
Verizon Data Breach Investigations Report 2025
IBM Cost of a Data Breach Report 2024 — highest of any industry
AMA survey: practices with fewer than 10 providers
Telehealth Security Risks That Threaten Patient Privacy
Each virtual visit creates multiple exposure points that do not exist in a traditional in-office encounter. Video streams can be intercepted if the connection lacks end-to-end encryption. Screen recordings — whether from malware or an accidental screen share — can capture protected health information (PHI) displayed during the visit. Unauthorized individuals in the patient's or provider's physical environment may overhear sensitive conversations without either party realizing it.
The device and network environment compounds these risks. Home WiFi networks are frequently shared with family members and consumer IoT devices — smart speakers, streaming sticks, home assistants — that can be compromised and used to eavesdrop on network traffic. Personal laptops often lack the full-disk encryption, access controls, and endpoint security software the HIPAA Security Rule requires. Without proper controls, PHI is exposed at every stage: during transmission, on the provider's device, on the patient's device, and in temporary files or browser cache that persist after the session ends.
The integration of telehealth with electronic health record (EHR) systems creates additional data flow risk. Patient information moves between the telehealth platform, the EHR, secure messaging systems, and potentially cloud storage — each handoff is a potential exposure point. According to the 2025 Verizon Data Breach Investigations Report, 68 percent of healthcare breaches involve a human element such as credential misuse, and 13 percent specifically involve misconfigured cloud storage or data transfer vulnerabilities.
Unauthorized session access is a category of risk unique to telehealth. Sessions using predictable meeting IDs or missing waiting room controls can be accessed by uninvited parties through what security researchers call "meeting hijacking" attacks. Without proper authentication, an attacker who obtains or guesses a meeting link can observe an entire patient encounter. Session recordings retained beyond their useful period, stored without encryption, or saved to personal cloud accounts create long-term PHI exposure risk that persists years after the visit.
Small clinics face disproportionate exposure because they typically lack dedicated IT security staff and may rely on individual providers' judgment about security measures. A 2024 American Medical Association survey found that 42 percent of small practices — those with fewer than 10 providers — do not have a written telehealth security policy, and 38 percent have never verified that their telehealth platform vendor has signed a BAA. These gaps leave clinics vulnerable to both security incidents and regulatory enforcement. Understanding the full scope of telehealth risk is the first step toward addressing it — for a broader view of how healthcare cyberattacks unfold, see our overview of HIPAA cybersecurity requirements for medical practices.
PHE Enforcement Discretion Has Ended
The COVID-19 Public Health Emergency enforcement discretion period expired in May 2023. OCR now fully enforces the HIPAA Security Rule for all telehealth activities. Consumer platforms used without a signed BAA — including personal Zoom accounts, FaceTime, and Skype — constitute active HIPAA violations with penalties up to $50,000 per incident. If your clinic has not yet transitioned to a HIPAA-compliant platform with a signed BAA, that transition is overdue.
Choosing a HIPAA-Compliant Telehealth Platform
The single most important requirement for any telehealth platform is a signed Business Associate Agreement. Under 45 CFR §164.502(e), covered entities may not disclose PHI to business associates unless a BAA is in place that establishes the associate's permitted uses and disclosures of PHI and requires appropriate safeguards. Using any platform for patient visits without a signed BAA violates HIPAA regardless of the platform's technical security features. Verbal assurances and website claims of HIPAA compliance are not sufficient — OCR requires a written, executed agreement.
Beyond the BAA, evaluate platforms on encryption standards. Look for end-to-end encryption where video and audio streams are encrypted from the provider's device to the patient's device and cannot be accessed by the platform provider or any intermediary. Platforms should use AES-256 encryption for data at rest and Transport Layer Security (TLS) 1.2 or higher for data in transit, consistent with NIST SP 800-52 Rev. 2 guidance on secure communication protocols.
Access control features are non-negotiable. The platform must generate unique meeting links for each session — not static room IDs that can be reused or leaked. Waiting room functionality prevents patients from entering the session until the provider explicitly admits them. Session locking allows the provider to seal the session once all expected participants have joined. These three features together address the most common telehealth access control failures cited in OCR enforcement cases.
Audit logging is required under 45 CFR §164.312(b). Logs must capture session start and end times, participant identities, IP addresses, authentication events, and any access to recorded sessions. These logs must be retained for at least six years under 45 CFR §164.316(b)(2)(i) and reviewed regularly — monthly at minimum — for anomalies or unauthorized access attempts.
Platform vendors commonly offering signed BAAs and HIPAA-compliant configurations include Doxy.me, Zoom for Healthcare, Microsoft Teams for Healthcare, Cisco Webex Health, VSee, and SimplePractice Telehealth. The consumer versions of these platforms — personal Zoom accounts, Microsoft Teams personal edition — do not include BAAs and are not HIPAA-compliant. Verify your specific subscription tier and configuration directly with the vendor, and obtain a signed BAA before conducting any patient visit. If your practice records telehealth sessions for clinical documentation, confirm that the recording storage is covered by your BAA and that the platform supports compliant retention and destruction policies consistent with your state's medical records requirements.
Securing the Provider Environment
Platform selection is only half the equation. The security of the provider's physical and technical environment during telehealth sessions directly determines whether PHI remains protected — and whether your practice meets the HIPAA Security Rule's physical safeguard requirements at 45 CFR §164.310.
Providers should conduct telehealth visits from private, enclosed spaces with a door that can be closed and locked during sessions. Open offices, shared workspaces, hallways, or public locations like coffee shops do not meet the physical safeguard standard. Position the monitor so it is not visible through windows or open doorways. Install privacy screens on monitors in spaces that are sometimes visible to others outside of session hours.
Network security is equally important. Use a wired Ethernet connection whenever possible — it is more stable and substantially harder to intercept than WiFi. When WiFi is unavoidable, protect all traffic with a VPN (Virtual Private Network) configured to your clinic's network standards. See our guide to choosing a VPN for healthcare settings for implementation details. Ensure the WiFi network used for telehealth uses WPA3 encryption with a strong, unique password, and is isolated from guest networks and consumer IoT devices that share the same physical space.
Device security requires the same rigor applied to in-office workstations. Use dedicated devices for telehealth whenever possible rather than personal laptops also used for family activities, shopping, or social media. When personal devices are unavoidable, deploy mobile device management (MDM) software that enforces encryption, screen locks, remote wipe capability, and application controls. Install Endpoint Detection and Response (EDR) software — not just traditional antivirus — on every device used for telehealth. EDR goes beyond signature-based detection to identify behavioral anomalies and actively contain threats in progress. For a broader look at how advanced threats target clinical endpoints, see our analysis of EDR killers and BYOVD attacks in 2026.
Apply operating system and application patches promptly. The 2025 Verizon DBIR found that 15 percent of healthcare breaches involved exploitation of known vulnerabilities for which patches were available but not applied. Configure all devices to lock automatically after five minutes of inactivity per 45 CFR §164.312(a)(2)(iii). Enable multi-factor authentication (MFA) on the telehealth platform, EHR, and any other system accessed during virtual visits — MFA is one of the highest-impact, lowest-cost security controls available to small clinics and directly addresses the credential misuse that drives the majority of healthcare breaches.
Role-based access controls (RBAC) are another layer that many small clinics overlook. Not every staff member needs access to the telehealth platform's administrative panel, session recordings, or audit logs. Restrict permissions to the minimum required for each role — front desk staff need scheduling access, not recording access. This principle of least privilege is codified in the NIST Cybersecurity Framework and directly supports HIPAA's minimum necessary standard under 45 CFR §164.514(d).
Patient-Side Security Requirements
You cannot control a patient's home network or device, but you can establish minimum security expectations and give patients the tools to meet them. Clear, actionable guidance provided before the first visit reduces both security risk and last-minute technical problems that delay care.
Instruct patients to join telehealth visits from private locations where they will not be overheard. Public WiFi networks in coffee shops, libraries, airports, and hotel lobbies are frequently unencrypted and subject to passive eavesdropping. If a patient must connect from outside the home, recommend using a personal mobile hotspot rather than shared public WiFi — patients with smartphones on a cellular data plan have a safer option readily available.
Provide written pre-visit instructions that cover how to verify they are connecting to the correct provider — not a phishing site mimicking your practice — how to test audio and video before the session, what to do if they experience technical difficulties, and how to securely end and close the session. Include explicit guidance not to share the meeting link with others and to ensure no one else is present in the room unless the patient has explicitly authorized that person's participation in the clinical encounter. For context on how phishing attacks target healthcare, see our overview of phishing attack tactics and defenses.
Verify patient identity at the start of each session using at least two identifiers — typically full name and date of birth. This satisfies the authentication requirement at 45 CFR §164.312(d) and prevents unauthorized individuals from impersonating patients to obtain medical information. Visual confirmation via video can serve as an additional factor, but should not be the only verification method used.
Recognize that digital literacy and technology access vary significantly across patient populations. Offer technical support by phone before the first visit to help patients download the platform app, test their connection, and troubleshoot issues. Maintain alternative appointment formats — phone-only or in-person — for patients who cannot meet minimum security requirements or who are uncomfortable with video visits. Document the patient's consent to telehealth and acknowledgment of security considerations in the medical record, consistent with your state's telehealth consent requirements.
Securing a Telehealth Session: Start to Finish
Pre-Visit Setup (24 Hours Before)
Send appointment confirmation and pre-visit security instructions to the patient. Include the meeting link no earlier than 15–30 minutes before the scheduled time to reduce the window for link interception or misuse.
Device and Environment Check (15 Minutes Before)
Close all unnecessary applications and browser tabs. Confirm you are on an encrypted network connection. Verify your EDR and MDM software are active. Lock your physical space and install any pending platform updates.
Session Open and Patient Verification
Open the waiting room before the patient arrives. Once the patient enters, verify identity using full name and date of birth. Ask the patient to confirm they are in a private location with no unauthorized parties present.
Session Lock and Screen Share Controls
Lock the session immediately after the patient joins to prevent additional entries. If screen sharing is needed, close all other windows first to prevent accidental PHI exposure from other patient records.
Session Close and Cleanup
Formally end the session rather than just closing the window. Clear temporary files, browser cache, and clipboard memory. If the session was recorded, confirm it uploaded to encrypted, BAA-covered storage — not a local or personal cloud account.
Post-Visit Documentation
Document the encounter in the EHR including date, time, patient location (city and state), platform used, participants present, and clinical content. Review any session audit log entries for anomalies within 24 hours.
Securing Your Telehealth Workflow End to End
Operational security for telehealth security for small clinics extends well beyond platform selection and device configuration. The workflows surrounding scheduling, session management, documentation, and data retention create their own set of HIPAA exposure points that must be addressed systematically.
Schedule telehealth appointments through your practice management system — not via personal email, text message, or consumer scheduling apps that lack BAAs. Send appointment reminders that do not include the meeting link until 15 to 30 minutes before the appointment. This reduces the window during which an intercepted or forwarded link could be used by an unauthorized party to join the session.
When screen sharing is necessary for patient education or reviewing test results, close all other applications and browser tabs before sharing to prevent accidental display of other patients' PHI. Use the platform's built-in annotation tools rather than opening additional files. End screen sharing immediately when clinical discussion resumes and verify that no shared content remains visible.
After each session, clear temporary files, browser cache, and clipboard memory. If sessions are recorded for documentation purposes, store recordings in encrypted, access-controlled storage covered by your BAA. Establish a documented retention and destruction policy for telehealth session data consistent with your state's medical records retention requirements — typically six to ten years for adult patients.
Document every telehealth encounter in the patient's EHR, including the date and time, patient location (city and state), technology platform used, participants present, any technical issues encountered, and the clinical content of the visit. Many state medical boards require specific documentation elements for telehealth visits, including patient consent, provider location, and the technology platform used. Review your state's telehealth regulations for jurisdiction-specific requirements, as these vary considerably and are updated frequently.
For practices managing dental office HIPAA compliance alongside telehealth, the same BAA and access control principles apply across all patient communication channels — not just video visits.
Bottom Line
Telehealth security for small clinics requires three non-negotiable foundations: a signed BAA with your platform vendor, end-to-end encryption with per-session unique meeting links, and MFA on every clinical system. Get these three right before addressing anything else — they address the majority of OCR enforcement findings in telehealth-related cases.
Staff Training and Security Awareness for Virtual Care
Technology controls alone cannot secure a telehealth program. The 2025 Verizon DBIR finding that 68 percent of healthcare breaches involve a human element makes clear that staff behavior is as consequential as software configuration. Every provider and staff member with access to the telehealth platform, scheduling system, or patient EHR needs role-specific training before participating in virtual care delivery.
Training for telehealth security for small clinics should cover four areas. First, platform security: how to generate and distribute meeting links, how to use the waiting room and session lock features, how to verify patient identity, and what to do when an unexpected participant appears in a session. Second, device and network hygiene: the difference between a clinic-managed device and a personal device, why home WiFi requires a VPN, and how to recognize signs that a device may be compromised. Third, phishing and social engineering: telehealth session invitations are an increasingly common lure in healthcare-targeted phishing campaigns. Staff need to recognize spoofed meeting links and suspicious requests for login credentials. For healthcare-specific phishing patterns, see our resource on phishing attack recognition. Fourth, incident response: staff need to know exactly what to do — and who to notify — if a session is accessed by an unauthorized party, a device is lost or stolen, or they suspect a security incident has occurred.
Document training completion for every staff member with a date and content record. HIPAA requires training under 45 CFR §164.308(a)(5) and OCR routinely requests training records during investigations. Annual refreshers are the minimum — conduct additional training whenever you change platforms, add new workflow steps, or become aware of a new threat targeting telehealth systems. The security awareness training program at Bellator Cyber Guard is designed for healthcare teams that need role-appropriate, compliance-ready training without a full-time security trainer on staff.
Building a Sustainable Telehealth Security Program
Telehealth security is not a one-time configuration — it is an ongoing program that must evolve alongside emerging threats, regulatory updates, and changes to your clinical workflows. Small clinics that treat security as a setup task rather than a continuous discipline are the ones that appear in OCR enforcement case resolutions. Healthcare cyberattacks have surged over the past three years, with medical records commanding premium prices on criminal markets because they contain both clinical and financial data in a single record.
Establish a formal review cycle. At minimum, conduct an annual review of your platform contract and BAA, security configurations, audit log summaries, incident reports, and staff training completion records. Update your telehealth risk assessment whenever you change platforms, add new clinical workflows, expand to new provider locations, or experience a security incident. The HIPAA Security Rule at 45 CFR §164.308(a)(1) requires that risk assessments be kept current — a single assessment conducted at program launch does not satisfy this requirement.
Stay current on OCR guidance and enforcement trends. OCR publishes case resolutions on HHS.gov, many of which involve telehealth-related violations including missing BAAs, insufficient access controls, and inadequate risk assessments. These published cases provide direct insight into enforcement priorities and what OCR expects to find during investigations. The Cybersecurity and Infrastructure Security Agency (CISA) and the HHS Health Sector Cybersecurity Coordination Center (HC3) both publish healthcare-specific threat briefings and vulnerability alerts — subscribe to these services to receive timely notifications about exploits targeting telehealth platforms.
Consider engaging a managed security partner for periodic assessments of your telehealth program. External assessments identify configuration weaknesses, policy gaps, and compliance deficiencies before they result in a breach or OCR investigation. Penetration testing of your telehealth platform and supporting network infrastructure can reveal vulnerabilities that would not surface in an internal review — especially valuable for small clinics that lack in-house security expertise.
Documentation is a compliance requirement, not an administrative formality. The HIPAA Security Rule at 45 CFR §164.316(b)(1) requires written documentation of your security program and its components. OCR routinely requests documentation packages during investigations — policies and procedures, risk assessments, BAAs, training records, audit log reviews, incident reports, and assessment findings. Failure to produce required documentation can result in penalties even when your technical security measures are adequate. Retain all documentation for at least six years from the date of creation or the date it was last in effect, whichever is later.
Small- to mid-sized healthcare organizations are targeted nearly four times as often as larger enterprises by cybercriminals who know that limited IT staff and inconsistent security practices create exploitable gaps. Telehealth security for small clinics is not a smaller version of enterprise security — it requires the same technical controls with more efficient implementation because there are fewer people available to manage them. A managed security partner with healthcare-specific experience can help small clinics maintain documentation standards, continuous monitoring, and incident response capability without dedicating full-time staff to compliance administration. To explore how managed endpoint security for healthcare practices addresses these gaps, review what a purpose-built program covers.
Schedule Your Telehealth Security Review
Our healthcare cybersecurity experts will evaluate your telehealth platform configuration, BAA coverage, endpoint security, and HIPAA documentation — and provide a prioritized action plan for your clinic.
Frequently Asked Questions
Yes. HIPAA applies to all locations where a covered entity creates, receives, maintains, or transmits PHI — including a provider's home office. The HIPAA Security Rule at 45 CFR §164.310 requires physical safeguards wherever PHI is accessed. For home-based telehealth, this means a private space, a secure network connection (VPN over home WiFi), and a compliant device with encryption and EDR software.
No. Personal Zoom accounts do not include a Business Associate Agreement and are not HIPAA-compliant for telehealth. You must use Zoom for Healthcare — a separate subscription tier that includes a signed BAA and healthcare-specific security configurations. Using a personal account for patient visits constitutes an active HIPAA violation. The same applies to consumer-tier accounts from any platform vendor.
A Business Associate Agreement (BAA) is a written contract required under 45 CFR §164.502(e) between a covered entity (your clinic) and any vendor that creates, receives, maintains, or transmits PHI on your behalf. The BAA establishes how the vendor may use PHI, requires them to implement appropriate safeguards, and obligates them to report breaches. Without a signed BAA, using any third-party platform for telehealth is a HIPAA violation regardless of the platform's technical security features.
HIPAA requires security documentation to be retained for six years under 45 CFR §164.316(b)(2)(i). Telehealth session recordings that are part of the medical record are subject to your state's medical records retention law, which typically ranges from six to ten years for adult patients. Recordings must be stored in encrypted, access-controlled storage covered by your BAA — not on local hard drives, personal cloud accounts, or the platform vendor's default storage if that storage is not covered by your BAA.
Meeting hijacking occurs when an unauthorized party joins a telehealth session by obtaining or guessing the meeting link or ID. Prevention requires three controls: unique per-session meeting links (not static room IDs), waiting room functionality that holds participants until the provider admits them, and session locking after all expected participants have joined. Platforms that offer only static room IDs without waiting room features are not appropriate for HIPAA-covered telehealth.
Yes. Small- to mid-sized healthcare organizations are targeted disproportionately because attackers know they typically have limited IT security staff, inconsistent patch management, and fewer detective controls than larger systems. Medical records are among the most valuable data on criminal markets — they contain both clinical and financial information, making them more monetizable than financial records alone. Telehealth security for small clinics requires the same technical controls as larger organizations, implemented efficiently with fewer staff.
HIPAA does not mandate specific encryption algorithms, but OCR guidance and NIST SP 800-52 Rev. 2 establish the industry standard: AES-256 for data at rest and TLS 1.2 or higher for data in transit. For video and audio streams, end-to-end encryption — where only the participants' devices can decrypt the content, not the platform provider — provides the strongest protection. Confirm the platform's encryption standards with the vendor before signing a BAA.
The HIPAA Security Rule at 45 CFR §164.308(a)(1) requires risk assessments to be kept current. OCR guidance states that assessments should be updated whenever there is a change to the environment — including platform changes, new clinical workflows, new provider locations, staff turnover in security-sensitive roles, or after a security incident. At minimum, conduct a full review annually. A single assessment conducted at program launch does not satisfy the ongoing requirement.
HIPAA-required security awareness training under 45 CFR §164.308(a)(5) must be documented and role-appropriate. For telehealth, training should cover: platform security features (waiting room, session lock, identity verification), device and network hygiene for remote access, recognizing phishing attacks disguised as telehealth invitations, and your clinic's incident response procedure for security events during or after a virtual visit. Training records must be retained and are routinely requested by OCR during investigations.
Yes. A managed security provider with healthcare experience can cover the areas most challenging for small clinics: 24/7 endpoint monitoring and EDR management, security risk assessments documented to HIPAA standards, staff security awareness training with completion tracking, BAA review and vendor security evaluation, and incident response support. This gives small clinics enterprise-grade security operations without the cost of a full-time internal security team.
Schedule
Worried about HIPAA compliance?
Our healthcare cybersecurity team can assess your risks and build a protection plan.



