A Single Telehealth Claim Triggered a $1.5 Million Investigation

A mid-size behavioral health practice in the Southeast thought they had telehealth billing figured out. They used a popular video platform, connected it to their billing clearinghouse, and sent claims electronically. Then a patient complained to OCR that her therapy session details appeared on an Explanation of Benefits sent to her estranged spouse's address. The investigation didn't just uncover a routing error — it exposed an entire billing pipeline with no Business Associate Agreements, no encryption in transit, and no risk analysis on file.

That's the world we're living in right now. HIPAA compliance for medical billing solutions in telehealth isn't a theoretical exercise. It's a live wire that connects your clinical platform, your billing workflow, your clearinghouse, and every vendor in between. Miss one connection, and the whole chain fails under scrutiny.

I've spent years reviewing billing workflows for covered entities, and I can tell you: the practices that get into trouble aren't the ones ignoring HIPAA entirely. They're the ones that assume their telehealth vendor or billing software "handles all that." It doesn't. Not without your direct involvement.

Why Telehealth Billing Creates Unique HIPAA Risks

Traditional in-office billing is risky enough. Telehealth multiplies the attack surface. You've got PHI flowing through video platforms, EHR systems, coding software, claims clearinghouses, and patient portals — sometimes all in a single encounter.

Every one of those touchpoints generates or transmits ePHI. And every one of them falls under the HIPAA Security Rule's administrative, physical, and technical safeguard requirements. The moment a diagnosis code leaves your telehealth platform and enters a billing system, you're accountable for how that data moves, who sees it, and where it lands.

The Business Associate Problem Nobody Talks About

Here's what I see constantly: a practice signs up for a telehealth platform, separately contracts with a medical billing company, and uses a third-party clearinghouse. Three vendors. Three separate streams of PHI. And often, zero Business Associate Agreements connecting the dots.

Under 45 CFR § 164.502(e), a covered entity must have a BAA with every business associate that creates, receives, maintains, or transmits PHI on its behalf. That means your telehealth vendor, your billing solution, your clearinghouse, and even the IT company that maintains the servers. I've audited practices with six or seven business associates in the billing chain and not a single signed BAA.

OCR doesn't consider ignorance a defense. When they investigated North Memorial Health Care of Minnesota, the $1.55 million settlement hinged partly on the organization's failure to have a BAA with a major business associate. That case didn't involve telehealth, but the principle is identical — and telehealth billing multiplies the number of associates involved.

What Does HIPAA Compliance for Medical Billing in Telehealth Actually Require?

If you're searching for a straight answer, here it is. HIPAA compliance for medical billing solutions in a telehealth environment requires four things working together:

  • A current, documented risk analysis that specifically covers your telehealth and billing technology stack — not a generic template from 2019.
  • Signed Business Associate Agreements with every vendor that touches PHI in your billing chain, including sub-contractors.
  • Technical safeguards including encryption of ePHI in transit and at rest, access controls, audit logs, and automatic logoff for billing workstations.
  • Workforce training that addresses the specific risks of telehealth billing — not just general HIPAA awareness.

Skip any one of these, and you've built a compliance house on sand.

The Risk Analysis: Your First and Most Important Step

HHS requires covered entities to conduct a thorough risk analysis under 45 CFR § 164.308(a)(1)(ii)(A). For telehealth billing, this means mapping every system where PHI is created, stored, or transmitted during the billing lifecycle. Your telehealth platform captures the encounter. Your EHR stores it. Your coding software processes it. Your clearinghouse transmits it. Your billing vendor manages denials and resubmissions.

Each handoff is a potential failure point. I've seen practices where the telehealth platform encrypted data beautifully — but the billing team downloaded encounter summaries to an unencrypted shared drive to manually enter codes. That single step vaporized every upstream security measure.

HHS provides a Security Risk Assessment Tool and guidance that walks you through the process. Use it. Or hire someone who will. But don't skip it.

Encryption Isn't Optional — It's Expected

I hear this constantly: "HIPAA doesn't technically require encryption." Technically true — it's listed as an "addressable" specification under the Security Rule. But "addressable" doesn't mean "optional." It means if you don't implement it, you must document why and implement an equivalent alternative.

In practice, no equivalent alternative exists for ePHI transmitted between a telehealth platform and a billing system. OCR has made this clear in multiple enforcement actions. When Premera Blue Cross settled with OCR for $6.85 million in 2020, one of the key findings was failure to implement adequate encryption alongside other security failures.

Your medical billing solution should encrypt data at rest and in transit using AES-256 or equivalent standards. If your billing vendor can't confirm this in writing, find one who can.

Workforce Training: The Gap That Costs Millions

You can deploy the best telehealth billing technology on the market and still fail a compliance audit if your staff doesn't understand the rules. HIPAA's administrative safeguards require workforce training under 45 CFR Part 164, Subpart C, and that training must be specific to each employee's role.

A front-desk coordinator handling telehealth scheduling has different risks than a billing specialist submitting claims. A coder working remotely on a personal laptop has different risks than one working in your office on a locked-down workstation. Generic annual training doesn't cut it.

I recommend starting with a structured foundation. Our HIPAA Introduction Training 2026 course gives your entire workforce the baseline knowledge they need, covering PHI handling, breach notification, and the Security Rule fundamentals that directly apply to billing and telehealth workflows.

Remote Billing Staff: The Overlooked Risk

Telehealth didn't just move patient encounters online — it moved billing staff home. Remote medical billers and coders access ePHI from home offices, shared apartments, and coffee shops. Every one of those environments introduces risks that your compliance program must address.

At minimum, remote billing staff need:

  • VPN access to your billing systems — no direct internet connections to ePHI databases.
  • Multi-factor authentication on every login.
  • Device-level encryption on laptops and workstations.
  • Clear policies prohibiting PHI on personal devices, printed documents at home, or screenshots of billing screens.

Document these requirements. Train on them. Audit for them. I've watched practices assume remote workers "know the rules" — until a laptop gets stolen from a car and 4,000 patient records are exposed.

Breach Notification: When Your Billing Chain Breaks

Under the Breach Notification Rule (45 CFR §§ 164.400-414), a covered entity must notify affected individuals, HHS, and in some cases the media within 60 days of discovering a breach. But here's the complication with telehealth billing: the breach might happen at your business associate's system, not yours.

Your billing vendor gets ransomwared. Your clearinghouse has an exposed API. Your telehealth platform's server gets compromised. In each case, the business associate must notify you "without unreasonable delay" — and your BAA should specify that timeline in days, not vague language.

I've worked with practices that didn't learn about a billing vendor breach for four months because their BAA said "in a timely manner" instead of "within 10 business days." By the time they found out, they'd already blown past the 60-day HHS notification window. The HHS Breach Portal is full of these cases. Don't become one of them.

Choosing a Billing Solution That Doesn't Sink Your Compliance

When evaluating medical billing solutions for your telehealth practice, HIPAA compliance shouldn't be a checkbox on page nine of the vendor's FAQ. It should be the first conversation you have.

Ask these questions before signing anything:

  • Will you sign a BAA that specifies breach notification timelines?
  • Where is ePHI stored, and is it encrypted at rest and in transit?
  • Do you conduct independent security audits, and will you share the results?
  • How do you handle workforce training for your own staff who access our PHI?
  • What happens to our data if we terminate the contract?

If a vendor hesitates on any of these, walk away. There are plenty of billing solutions built for HIPAA-regulated environments. Your job is to verify — not to trust.

Building a Compliance-First Billing Workflow

HIPAA compliance for medical billing solutions in telehealth isn't a one-time project. It's a continuous cycle of risk analysis, policy enforcement, training, and vendor management. The practices that get it right treat compliance as infrastructure, not an afterthought.

Start with your risk analysis. Map every system. Sign every BAA. Encrypt everything. Train everyone — and make sure that training reflects the actual work they do, not a generic slideshow from five years ago. Our full training catalog offers role-specific options to help you build that culture from the ground up.

Telehealth isn't going away. Neither is the billing complexity that comes with it. The only question is whether your compliance program keeps pace — or whether you're the next case study on the OCR enforcement page.