Telehealth Security Requirements

This article explains IT compliance and security in a specific industry or context. It is not professional compliance advice. Consult with professionals for guidance specific to your situation.


Telehealth expanded healthcare access dramatically, and it also expanded the attack surface for patient data. A video consultation happens over the internet. Patient information is transmitted from their home, through their internet provider's network, to your facility, through your network, possibly through cloud servers, and potentially back to the patient's device. At each point in that journey, patient information could be intercepted, recorded, or compromised. The platforms that enable telehealth — video conferencing systems, patient portals, remote monitoring devices — have security vulnerabilities. And the people using them, both patients and providers, are often less technically sophisticated than enterprise IT users, making social engineering and configuration errors more likely.

The opportunity created by telehealth is real. Remote consultations reduce travel burden for patients, expand access to specialists, and make healthcare more efficient. The security risk is equally real. Unencrypted video consultations, weak authentication of participants, recording of sessions without disclosure, storage of patient data on consumer devices — these patterns became normalized during the rapid telehealth expansion. Security can't eliminate the efficiency gains, but it can prevent patient data from leaking while delivering those gains.

Video Conferencing and Privacy Concerns

Video conferencing platforms are the primary delivery mechanism for telehealth consultations, and the security and privacy implications depend entirely on which platform you use and how it's configured. Not all video platforms are suitable for healthcare. Consumer platforms like basic Zoom deployments, Skype, Google Meet, or standard Teams instances aren't designed to meet healthcare privacy requirements. Patient health information is sensitive and it's being transmitted in real time to a potentially untrusted platform.

The issues are multifaceted. The platform itself might not encrypt video between participants. The platform might record sessions without explicit disclosure. The platform might retain session data beyond what's necessary. The platform's terms of service might grant the vendor rights to use data for marketing or training purposes. The platform might be hosted outside the United States, subjecting patient data to different legal protections. The platform might not have business associate agreements with healthcare providers, creating ambiguity about liability if there's a breach.

For healthcare telehealth, platform selection matters enormously. HIPAA-compliant video platforms exist — Zoom for Healthcare, Microsoft Teams for healthcare, Cisco Webex for healthcare, and other vendors offer configurations specifically designed for healthcare that include appropriate encryption, audit logging, business associate agreements, and terms of service aligned with HIPAA. These platforms cost more than consumer versions, but the price difference is often small and the compliance protection is substantial.

The alternative is using consumer platforms with specific configurations that make them more suitable for healthcare. Zoom for example can be configured with encryption, can restrict recording, can require authentication, and has added BAA support. But the configuration is critical — the default Zoom setup is not healthcare-appropriate, and organizations have to deliberately change settings to make it suitable. The risk is misconfiguration: a meeting that seems secure but isn't, a recording that's created without disclosure, data retained beyond the retention period.

Patient perception of privacy matters alongside actual privacy. A patient might not know that their video consultation is being encrypted, that the platform has been configured appropriately, or that recording is disabled. They see a video platform and assume privacy is the vendor's responsibility. Healthcare organizations should be transparent with patients about what platform is being used, what privacy protections are in place, and how their data is handled.

Encryption and Transmission Security

Video data transmitted over the internet needs to be encrypted so that someone intercepting the traffic can't watch the consultation. Encryption in transit uses protocols like TLS to encrypt all data traveling between the provider's system, the video platform, and the patient's device. This is the baseline expectation for any video conferencing in healthcare.

The encryption needs to be end-to-end, meaning that the video platform vendor itself can't view the video without the encryption keys. End-to-end encryption is technically more complex than encryption that simply protects traffic in transit — in transit encryption protects data while it's moving but doesn't prevent the platform vendor from accessing it. For healthcare, end-to-end encrypted platforms like Jitsi, Wire, or Signal-based systems offer stronger privacy, though adoption in healthcare has been slower because those platforms require more technical sophistication to deploy.

The practical reality is that most HIPAA-compliant video platforms use encryption in transit rather than true end-to-end encryption. This is acceptable for healthcare compliance if the platform has a BAA, the vendor is subject to HIPAA's business associate rules, and the platform doesn't retain recordings or data beyond what's necessary for the consultation. The vendor's commitment to not accessing or using the data, formalized in the BAA, provides the privacy protection that end-to-end encryption would provide technically.

The encryption protocol matters. TLS 1.2 or higher should be enforced — older encryption protocols like SSL or TLS 1.0 have known vulnerabilities. The video platform configuration should enforce strong encryption with no option to disable it. Patients connecting over WiFi networks or public internet connections need to trust that their connection to the telehealth platform is encrypted and protected.

Testing the encryption is straightforward technically but often overlooked in practice. Network monitoring tools can verify that traffic between endpoints and the video platform is encrypted. Checking platform documentation and settings confirms that encryption is enabled. But many organizations deploy telehealth without actually verifying that encryption is working as expected.

Patient Authentication and Identification

Before a provider can consult with a patient over video, the provider needs to be certain they're talking to the right patient. In-person care achieves this through photo identification and face-to-face confirmation. Telehealth requires explicit authentication mechanisms to ensure that the person on the video call is actually the patient whose medical record the provider is about to discuss.

The baseline is asking security questions that only the patient would know — date of birth, medical record number, address on file, previous procedures, medication names. This confirms identity before the consultation begins. For sensitive procedures or new patients, stronger authentication might be required: requiring the patient to use a unique access code sent via text or email, requiring the patient to enter information from a previous medical bill, requiring video identification with a government-issued ID.

The risk of improper authentication is that a provider consults with someone other than the intended patient. In some cases, this is a minor issue — a family member sits in on a consultation that was meant to be private. In other cases, it's serious — someone impersonates a patient to get access to their medical records or to request prescription refills. The vulnerability increases when patients access telehealth from home devices that might be shared with family members or housemates.

Patient authentication should be documented. The consultation note should include confirmation of how the patient was authenticated and by whom. This documentation is important for liability if there's a dispute about whether the consultation was confidential or whether the right person received the service.

Multi-factor authentication for patient access to telehealth scheduling systems and patient portals is another layer. A patient creating a telehealth appointment might be required to authenticate with something they know (password) and something they have (phone for SMS or an authenticator app). This prevents someone else from scheduling a telehealth appointment on a patient's behalf or accessing their records through the patient portal.

Provider and Participant Authentication

Providers connecting to telehealth consultations need to be authenticated to the system. The baseline is a username and password, but that's often insufficient because passwords can be compromised, shared, or weak. Multi-factor authentication should be required for provider access — a password plus a code from an authenticator app, a security key, or SMS verification. MFA is especially important for remote access since the risk of compromise is higher when providers are connecting from outside the office.

The authentication should be tied to the provider's identity in the healthcare system. A provider logging into a telehealth system should be authenticated as a specific individual with specific privileges. Shared logins where multiple providers use the same account are problematic because audit logs don't show which provider performed which action. If there's a compliance question about who accessed a patient record or who conducted a consultation, shared logins make that investigation impossible.

For telehealth consultations involving multiple participants beyond the patient and the primary provider — a specialist, a nurse, a medical student, a family member — each person should be explicitly authenticated and their participation should be disclosed to the patient before the consultation. A patient doesn't expect a medical student to participate in their telehealth appointment unless they've been informed and consented. Explicit authentication and disclosure prevent unauthorized participants from joining consultations.

Session management is another authentication control. Once a provider logs into a telehealth system, their session should remain active for a reasonable period — perhaps for one shift or one workday. After that, they should need to re-authenticate. Sessions should also terminate if there's inactivity for a period of time, preventing someone from taking over an unattended workstation and accessing another provider's session.

Recording and Retention Requirements

Many telehealth consultations are recorded for clinical purposes — so the provider can review what happened, so the patient has a record of the guidance provided, so students can learn from the interaction. Recording is useful, but it creates data retention and privacy obligations. If a recording is made, the patient must be informed that it's being recorded and must consent. The recording must be stored securely with access controls limiting who can view it. The recording should be retained only for as long as it's clinically and legally necessary.

HIPAA requires that recordings of consultations containing protected health information be treated as part of the medical record. They're subject to the same access controls, retention requirements, and security safeguards as the medical record itself. A recorded consultation that's encrypted and stored in the EHR is compliant. A recording that's stored on a provider's personal device or a shared cloud drive without access controls is not.

The default should be that consultations are not recorded unless there's a specific clinical reason and explicit patient consent. Some organizations record all consultations by default and require patients to opt out if they don't want to be recorded. That approach creates compliance risk because patients might not see the opt-out option or might not realize what they're consenting to. The safer approach is to record only when there's a documented clinical reason and to obtain explicit informed consent before the consultation begins.

Retention policies for recordings should balance clinical utility against privacy. A recording of a psychiatric consultation is sensitive and shouldn't be retained longer than necessary. A recording of a procedure explanation might be appropriate for the patient to keep long-term. Many organizations set a default retention period — 90 days, one year — beyond which recordings are automatically deleted unless there's a specific reason to retain them longer.

Patient access to recordings is another consideration. Should a patient be able to request and receive a copy of their recorded consultation? HIPAA allows patients to request copies of their medical records, which might include recordings. Some organizations make recordings available to patients through patient portals. Others require an explicit request. Either approach is compliant as long as access is controlled and documented.

Compliance with Telehealth Regulations

Beyond HIPAA, telehealth is subject to additional regulatory frameworks that vary by jurisdiction. State medical boards have requirements about telehealth practice that vary by state. Some states require initial in-person consultation before telehealth follow-ups. Some states restrict which types of services can be delivered via telehealth. Some states require specific technology standards for telehealth platforms.

Telehealth across state lines adds complexity. A provider licensed in one state can't simply provide telehealth consultations to patients in another state — they need to be licensed or registered in the patient's state. The INOVA Compact, which streamlines telehealth licensing across multiple states, has expanded the ability to practice across state lines, but not all states participate. Organizations providing telehealth need to understand which states their providers are licensed in and what the requirements are for telehealth in each state.

DEA regulations around controlled substance prescribing by telehealth have specific requirements. A provider can't prescribe controlled substances via telehealth in most cases without an in-person consultation first. Some exceptions exist for established patients and maintenance prescriptions, but the requirements are specific and organizations need documented processes to ensure compliance.

Prescribing authority laws vary by state and by provider type. Some states allow nurse practitioners and physician assistants to prescribe via telehealth independently. Others require physician supervision. The prescribing systems used for telehealth need to reflect the legal authority of each provider type in each state.

Insurance coverage for telehealth varies by payer and by type of service. Some telehealth consultations are covered by insurance. Others are only covered during emergency periods. Organizations need to understand coverage requirements and communicate them to patients so there are no surprises about whether a telehealth visit is covered.

Platform Selection and Vetting

Selecting a telehealth platform is a procurement decision that should include security and compliance criteria. The decision shouldn't be made based on price or ease of use alone, though those factors matter. Healthcare organizations should evaluate whether a platform has a business associate agreement, what encryption and audit logging it provides, what its incident response process is, and what its data retention policies are.

Key evaluation criteria should include whether the platform is HIPAA-compliant, whether it offers encryption of data at rest and in transit, whether it provides audit logging of access and activities, whether it supports multi-factor authentication, whether it can export records in standard formats, what its uptime and availability guarantees are, and what its backup and disaster recovery capabilities are.

The platform's security posture should be verified through available documentation. Reputable vendors can provide security audit reports, SOC 2 certifications, or penetration testing results that demonstrate their security practices. Vendors should be able to explain their incident response process and their timeline for addressing security vulnerabilities.

Integration capabilities matter. Does the platform integrate with the EHR so that consultation notes automatically sync to the patient's medical record? Does it integrate with the billing system so that telehealth encounters are properly coded and billed? Does it integrate with patient portals so patients can schedule and access telehealth appointments in a single system? Integration reduces manual work and reduces the risk of data inconsistency.

The user experience matters because bad UX leads to workarounds. If the platform is difficult to use, providers might fall back to less secure alternatives like unencrypted video chat or email. If it's difficult for patients to access, they might use alternative platforms or skip consultations. The security requirements need to be balanced with usability.

Integration with EHR Systems

Most telehealth platforms need to integrate with the EHR so that consultation notes, orders, and results are recorded in the patient's medical record. The integration needs to be secure — only authorized data should be transmitted, data should be encrypted in transit, and audit logging should track what data is transmitted.

Single sign-on integration is common, allowing providers to authenticate to the EHR once and then access the telehealth platform without re-authenticating. This improves usability but requires secure implementation. The single sign-on protocol should use secure standards like OAuth or SAML, and the integration should be properly configured.

Patient data exchange between the EHR and telehealth platform needs to be handled carefully. The telehealth platform shouldn't have access to the entire EHR — it should have access only to the patient data relevant to the consultation. If a patient has a consultation with a specialist, the specialist's telehealth session should bring up the relevant labs, imaging, and notes. It shouldn't automatically expose sensitive information like psychiatric records or substance use history unless that's clinically relevant and the patient has consented.

The telehealth platform should be able to accept orders from the provider during the consultation — prescription orders, lab orders, imaging orders — and send those orders to the appropriate systems. The billing system should receive documentation of the telehealth encounter and process it for billing.

Testing the integration is critical because misconfigured integrations can cause data to be lost, transmitted to wrong systems, or exposed inappropriately. Before going live with a telehealth platform integration, organizations should test the full workflow: creating a test patient, scheduling a telehealth appointment, conducting a test consultation, verifying that notes and orders sync to the EHR, verifying that billing data is transmitted correctly, and verifying that audit logs capture all activity.


Fully Compliance provides educational content about IT compliance and cybersecurity. This article reflects general information about telehealth security practices as of its publication date. Regulations, technology standards, and security threats evolve — consult a qualified security professional and a compliance attorney for guidance specific to your organization.