Home / Insights / HIPAA-Compliant Billing
Compliance

HIPAA-Compliant Medical Billing: What Your RCM Partner Must Have

The essential compliance checklist for evaluating medical billing companies — from BAA requirements and encryption standards to security certifications and breach protocols.

When you outsource medical billing, you are handing a third party your patients' most sensitive data — names, Social Security numbers, diagnoses, treatments, and insurance information. HIPAA requires that any company handling this data meets specific security, privacy, and breach notification standards. Yet many practices select billing partners based solely on cost and collections performance, without verifying compliance.

That is a mistake that can cost millions. HIPAA penalties range from $100 to $50,000 per violation, and the provider is liable for choosing a non-compliant billing partner. This guide covers exactly what your medical billing partner must have to meet HIPAA requirements.

$1.5M
Max Annual HIPAA Penalty
725+
Major Breaches in 2025
60 Days
Breach Notification Deadline

The Business Associate Agreement: Non-Negotiable

A Business Associate Agreement (BAA) is the legal foundation of any relationship where PHI is shared. Under HIPAA, a medical billing company is a business associate — period. No BAA, no PHI sharing. If your billing company has not signed a BAA, you are already in violation.

A compliant BAA must include: permitted and required uses and disclosures of PHI, the requirement to implement appropriate administrative, physical, and technical safeguards, mandatory reporting of security incidents and breaches, requirements that subcontractors agree to the same restrictions, the provider's right to terminate the agreement for HIPAA violations, and requirements for return or destruction of PHI upon contract termination.

Review the BAA carefully. Some billing companies use generic or outdated BAA templates that miss required elements. Have your compliance officer or healthcare attorney review the BAA before signing.

Technical Safeguards Your Billing Partner Must Have

Encryption

All PHI must be encrypted both in transit and at rest. In transit means that data moving between your practice and the billing company — claims, patient records, reports — must be transmitted over encrypted channels (TLS 1.2 or higher for web-based connections, encrypted VPN for network connections). At rest means that PHI stored on the billing company's servers, workstations, and backup media must be encrypted using AES-256 or equivalent.

Access Controls

The billing company must implement role-based access controls (RBAC) that limit PHI access to only those employees who need it for their specific job function. A payment poster does not need access to clinical notes. A coder does not need access to financial reports. Ask the billing company to describe their access control model — if the answer is "everyone has access to everything," that is a serious red flag.

Audit Trails

HIPAA requires audit logs that track who accessed PHI, when, and what they did with it. The billing company must maintain detailed audit trails for all system access, with regular review of access logs for unauthorized or unusual activity. Ask how long audit logs are retained (minimum 6 years per HIPAA) and who reviews them.

Multi-Factor Authentication

All remote access to systems containing PHI should require multi-factor authentication (MFA). Single-factor authentication (password only) is insufficient for healthcare data. MFA combines something the user knows (password) with something they have (phone, token) or something they are (biometric). If the billing company's employees can access your patient data with just a username and password, the system is not adequately secured.

Revenue Synergy's compliance framework

We maintain HIPAA compliance, ISO 27001 certification, and HITRUST CSF alignment with annual third-party audits, AES-256 encryption, role-based access controls, and a dedicated compliance team.

Request Our Compliance Documentation →

Administrative Safeguards

Employee Training

Every billing company employee who handles PHI must receive HIPAA training at onboarding and annually thereafter. Training should cover PHI handling procedures, breach identification and reporting, social engineering and phishing awareness, physical security requirements, and incident response procedures. Ask the billing company for their training program documentation and completion records.

Risk Assessment

HIPAA requires a documented risk assessment that identifies threats to PHI confidentiality, integrity, and availability. This assessment must be conducted regularly (annually is standard) and updated when significant changes occur — new systems, new office locations, new third-party vendors. Ask for the most recent risk assessment summary and the corrective action plan for any identified risks.

Incident Response Plan

The billing company must have a documented incident response plan that covers breach identification, containment, investigation, notification, and remediation. Under HIPAA, breaches affecting 500 or more individuals must be reported to HHS and the media within 60 days. Smaller breaches must be reported to HHS annually. Your BAA should specify the billing company's obligation to notify you of any breach or security incident involving your patients' PHI — ideally within 24-48 hours of discovery.

Physical Safeguards

Physical security is often overlooked in billing company evaluations, but it matters — especially for companies with offshore operations. Key requirements include facility access controls (badge access, visitor logs, security cameras), workstation security (locked screens, privacy filters, clean desk policies), device controls (encrypted laptops, prohibited use of removable media like USB drives), and secure disposal of PHI (shredding, degaussing, or certified data destruction for electronic media).

If the billing company has offshore operations, verify that the offshore facility meets the same physical security standards as the U.S. operations. HIPAA applies to PHI regardless of where it is processed or stored.

Security Certifications to Look For

  • ISO 27001: International standard for information security management systems. Requires a comprehensive security framework with regular internal and external audits. This is the gold standard for demonstrating security maturity.
  • HITRUST CSF: Healthcare-specific security framework that maps to HIPAA, NIST, and ISO 27001. HITRUST certification is increasingly expected by large health systems and payer organizations. It demonstrates healthcare-specific security competence beyond general IT security.
  • Third-Party HIPAA Risk Assessments: An independent assessment of the billing company's HIPAA compliance posture. Not a certification, but provides objective validation that the company meets HIPAA requirements.

Red flags to watch for: No signed BAA before PHI sharing, inability to provide security documentation when requested, no named HIPAA Security Officer, offshore operations without documented security standards, use of consumer-grade tools (Gmail, Dropbox) for PHI transmission, and no documented incident response plan. Any of these should disqualify a billing company from consideration.

The Compliance Evaluation Checklist

Before signing with any billing company, verify the following:

  1. Signed Business Associate Agreement with all required elements
  2. Current HIPAA risk assessment (completed within the last 12 months)
  3. Named HIPAA Privacy Officer and Security Officer
  4. Documented employee HIPAA training program with completion records
  5. AES-256 encryption for PHI at rest and TLS 1.2+ for PHI in transit
  6. Role-based access controls with documented access review procedures
  7. Multi-factor authentication for all remote access
  8. Audit trail capabilities with 6+ year retention
  9. Documented incident response and breach notification plan
  10. ISO 27001 or HITRUST certification (or documented third-party risk assessment)
  11. Physical security controls at all facilities
  12. Subcontractor management procedures (ensuring downstream business associates are also compliant)

The Bottom Line

HIPAA compliance is not a nice-to-have — it is a legal requirement that carries severe financial and reputational penalties for violations. When you outsource billing, you extend your compliance perimeter to include the billing company and all of its systems, employees, and subcontractors. The cheapest billing company is not a bargain if it exposes your practice to a data breach.

Evaluate billing partners on their security posture with the same rigor you apply to their billing performance. Your patients' data — and your practice's financial viability — depend on it.

Related: How to Choose an RCM Company · Medical Billing Outsourcing Guide · Billing & AR Management

Need a HIPAA-compliant billing partner? Revenue Synergy maintains HIPAA, ISO 27001, and HITRUST-aligned security with annual third-party audits. Schedule a free consultation to review our compliance documentation and discuss your billing needs.