How do you send PHI via email and still follow HIPAA? And how do you send encrypted email in Gmail? These are two of the most common questions we get.
It’s an understandable question. Email has become the communication tool of choice in the digital age. Most workplaces rely on it heavily.
If you’re a HIPAA-regulated business, email use gets a lot more complicated. It’s even more complicated when you want to email PHI, or Protected Health Information.
Good news: it is possible to send PHI via HIPAA compliant email encryption, and we’re going to tell you exactly what it takes!
But before we jump right in, let’s review the basics.
What is PHI?
PHI stands for “Protected Health Information.”
PHI is anything that can identify an individual and provide information about their healthcare.
Think of it this way. If you’re emailing ANYTHING that someone can use to figure out medical information, it’s PHI.
For healthcare providers and business associates, PHI is everywhere. Even in places that you wouldn’t think to look, like notes on a calendar or files in a “Downloads” folder. This infographic does an awesome job demonstrating all of the different places where PHI can hide.
Hint: there are a lot of them.
What is Encryption?
So, you get it: PHI is important. PHI is everywhere. So what do you do?
First, you need to understand the basics of encryption.
Encryption is at the heart of many of today’s data protection tools. It’s an effective way to shield data from prying eyes.
It’s not important to understand how encryption works.
All you need to know is that you start with an ultra-important secret message:
Be sure to drink your Ovaltine.
When it gets emailed out, it looks like this to anyone who tries to intercept it:
—–BEGIN PGP MESSAGE—–
Version: BCPG C# v126.96.36.199
—–END PGP MESSAGE—–
But then when your patient or customers gets the email, it automatically decrypts it to deliver Ovaltine joy!
Not too complicated, right?
Fine, I’m drinking my Ovaltine, but why does all this matter?
Under HIPAA, there are strict rules for sending PHI over email. There are two choices:
- You either need to be 100% sure that ONLY your recipient gets the email, or
- You need to get permission to send insecure email AND tell them about the risks.
#2 is a hassle. HIPAA compliant email encryption is the only way to guarantee #1. Period.
If you want to send PHI over email, you need to make sure that data is encrypted.
So how do you send secure email?
Like many things in life, it isn’t as straightforward as you might think.
Also like many things in life, it’s a perpetual trade-off between cost and convenience.
When you’re choosing a solution, think about ease-of-use in both sending and receiving. Sure, there are encryption solutions out there that are free or low cost.
But they aren’t worth it if they’re going to be inconvenient or disruptive.
The available solutions fall all over that spectrum. It’s up to you to decide which one will fit your needs best.
Here are a few options:
1) Get consent to email PHI
In a moment, we’ll get into some more complicated encryption solutions. But first, we want to note that HIPAA actually does give patients autonomy over their own data.
This means that there is one way that you can send PHI to a patient in an unencrypted email.
You have to:
- Inform your patient of the risks associated with sending their PHI in an unencrypted email.
- Get their explicit permission to with them through unencrypted email. Here’s an example of the kind of consent form they would have to sign.
Be careful, though. You have to be absolutely 100% sure that you never accidentally email someone who hasn’t opted in. Because that, my friend, is a breach.
Want to explore this option? Here’s a great article that explains it in better detail.
2) The free options (don’t bother)
Unfortunately, our favorite email and productivity suite (Gmail) doesn’t support sending encrypted emails. That’s a must-have when it comes to sending PHI, but it will work fine if you want to just email non-PHI.
We did find one way to send encrypted email through Gmail, but it’s a huge pain. The tool, SecureGmail, requires you to give the recipient a password via a non-email method.
That sort of defeats the whole purpose of using email for patient communication. It may be just fine for sporadic personal use, but it’s definitely not scalable in a business setting.
Your mileage may vary, but we don’t recommend it.
There’s only one other completely free option, and that’s to not send PHI via email at all. You can use email for things like setting up appointments, but handle PHI only through phone calls and snail mail.
Unfortunately, those are your only solutions in the $0 price range.
3) An ugly option Microsoft fans: Office 365
Office 365 can send encrypted emails but, I warn you, it’s very clunky.
Here’s how this works:
First, get Office 365.
Next, you have to pay more to add on the Azure Rights Management upgrade.
Your IT person will have to log into the admin console and build a simple rule like this one.
When you send the email, it looks like this:
When your patient gets the email, it looks like this — here’s where it gets to be a real pain in the neck.
Your patient or customer will have to download the attachment, THEN log in with their Microsoft account (if they have one), and only then can they see the email.
We’ve set a few medical practices up with this system (they insisted), and they’ve all been unhappy with it. The part where you need to download a file is very confusing for patients.
4) The most heavily advertised: Virtru
Search online for “secure email,” and you’ll inevitably see the company Virtru mentioned.
If you’re a Gmail user, the Virtru add-on is pretty easy to add to your account.
Once you install it, here’s how it works:
Your Gmail looks like this:
When the patient gets the email, here’s what it looks like:
Next, the user has to click the “Unlock Message” button.
Here’s where it gets a little annoying — the user then gets another email, which supposedly verifies that this is the correct email address. Only after clicking the second email can your user access the actual message that was sent.
This double email is a double-edged sword. On the one hand, it’s nice that they’re not making you remember yet-another username and password. On the other hand, this “double email” approach is still pretty confusing for non-technical users.
On the sending side, we’ve also found that medical practices can find the add-ons (they also make one for Microsoft Outlook) to be pretty confusing to install. And you have to install yet another app if you want to send from your mobile phone.
Lastly, some of our customers have told us that the lowest-priced plan for which they will sign a HIPAA Business Associate agreement is for over $500/year, which puts them out of the reach of some small practices. That’s not a lot to pay for HIPAA compliance, but it’s a lot to pay for just secure email.
5) The option from your IT guy
If you work with an IT company, they might be giving you a secure email add-on.
Companies with names like Proofpoint, Mimecast, and Reflexion primarily focus on email security. More specifically, they protect you from phishing attacks, viruses, and ransomware emails.
All of these companies are excellent at keeping your email safe (our favorite, Proofpoint, is what we recommend to clients), but they’re not that great at SENDING secure emails.
Here’s how most of them work:
When you want to send someone a secure email, you’ll use a keyword (like “[SECURE]”) in your subject line. That’s the signal to the system to encrypt the email.
Here’s an example in Gmail, though it looks the same in whatever email service you use. In fact, you can even do this on your mobile phone!
After sending it, you’ll get a nice confirmation back:
When your recipient gets the email, it will look like this:
The recipient clicks on the “View Encrypted Email” button.
Sounds easy, right?
Well, not so fast. Your patient still needs to sign up for (and remember) a username and password. Patients can find this confusing.
After they log in, they will see the secure email you sent. They can also respond to it.
This one was near the top of our list, but when we tried it with medical practices, we had too many people complain about having to remember usernames and passwords. It can work for a really small practice that almost never sends sensitive data over email, but what if you forget to type in “secure”? It’s too easy to make a mistake.
6) Not safe for HIPAA – SendSafely
SendSafely is another secure email service. It specializes in enterprise email encryption and secure file sharing. It can integrate directly with your Gmail or Office 365 account. Alternately, you can send email through their internal portal.
We’ll be blunt: we don’t recommend this option for healthcare providers or HIPAA covered entities. SendSafely doesn’t seem to mention HIPAA anywhere on their website. So, we doubt that they would sign a HIPAA business associate agreement.
Still, we’ll give you a tour of how it works ― in case you’re curious or if you’re looking for a solution for non-HIPAA reasons.
After you install and activate SendSafely, two little buttons are added to the Gmail user interface:
Instead of encrypting the whole email, SendSafely just encrypts the attachment:
They do give you an interesting option to enable SMS verification. If you have your patient’s phone number, this could be useful. SMS verification is a great way to ensure the identity of the user. Keep it in mind if you want to go the extra mile in your email security.
On the receiving side, here’s what it looks like:
As we said, we don’t recommend SendSafely for HIPAA-related purposes, because HIPAA just doesn’t seem to be a focus of theirs. There are better options for compliance-specific email.
But it’s a good one to keep in mind for comparison or for other future uses.
Tired of spending so much time researching HIPAA solutions? We can help! Get our 42-point checklist to make HIPAA simple!.
7) The easiest, best solution: Paubox
Paubox is an excellent service that will automatically encrypt all of your emails. You’ll need a little help setting it up. But once it’s in place, it’s definitely the easiest for both you and your patients.
The trick with Paubox is that you don’t have to tell it which emails to encrypt. It automatically encrypts every email you send.
If your patient uses a modern email system like Gmail or Office365, they won’t even have to click anything. The email will appear in their inbox just like any other.
Paubox uses a trick called TLS encryption to transparently encrypt every email. Actually, over 85% of the emails sent to or received from Gmail are actually encrypted already, according to Google. Paubox manages the rest.
If your patient is using an older email system or an email system that isn’t set up the right way, however, they’ll either need to click a link or sign up for a username or password (your choice). But compared to the alternatives, this is still an extremely convenient option.
Bonus: it works with Google Mail or Office 365, too. And mobile! Not to steal Apple’s tagline, but it’s our favorite because “it just works.” Easy for the patient, easy for the doctor.
We also really liked this service while researching this article, and decided to make it part of the solution that we implement for practices who become our clients.
Information around HIPAA, email, and PHI has always been a bit murky. Lots of businesses aren’t sure whether they can safely email PHI.
As we’ve outlined above, the definitive answer is yes. It’s definitely possible to safely and securely send PHI via email.
But that’s only if you’re willing to put the time and money into finding a reliable method. Hopefully, this article has given you a clear overview of your options.
It may be a bit more complicated than sending a day-to-day personal email. And sure, it’s a bit more inconvenient. But with experimentation and research, lots of businesses have found encrypted email solutions that work wonderfully for them.
Still feeling a bit overwhelmed?
Get some free help! Check out our free 42-Point Checklist for ways to make your practice HIPAA compliant.
Talk to us!
Have questions or feedback? Please share them in the comments below.
Like this article? Share it!