✨ Announcing Simbie AI’s SOC 2 Type 2 Certification. Our commitment to your data security, verified.

A Guide to Making Microsoft Teams HIPAA Compliant in 2026

Table of contents

Join the healthcare efficiency movement

Follow us for daily tips on:

Let's get straight to the point: Yes, Microsoft Teams can be made HIPAA compliant. But here’s the critical part—it is not compliant right out of the box. Just switching it on doesn't automatically protect patient health information (PHI). You have to actively configure it to be secure.

Can You Trust Microsoft Teams With Patient Data?

A modern office reception with a tablet, vault-like glass door, and a woman at a desk.

Think of it like getting the keys to a brand-new, high-tech building for your clinic. Microsoft built the secure foundation, installed reinforced doors, and put a state-of-the-art alarm system in place. That’s their side of the deal. But you are the one who decides who gets a keycard, which rooms they can access, and who monitors the security cameras.

This is the core idea behind the Shared Responsibility Model. If you only take one thing away from this guide, let it be this. So many healthcare organizations get this wrong, assuming the software handles everything, which can lead to serious security gaps and potential breaches.

Quick Guide to Teams HIPAA Compliance Responsibility

To make this crystal clear, here’s a simple table breaking down who does what. It’s a partnership where both you and Microsoft have distinct but equally important roles to play.

Compliance AreaMicrosoft’s ResponsibilityYour Organization’s Responsibility
Infrastructure SecuritySecuring the physical data centers, network hardware, and underlying cloud services.
Data EncryptionProviding encryption for data both in transit and at rest within their environment.
Access ControlProviding the tools to manage user permissions and access.Configuring user roles, enforcing strong passwords, and setting up Multi-Factor Authentication (MFA).
Data GovernanceOffering features for data loss prevention (DLP) and retention policies.Implementing policies to control how PHI is shared, stored, and deleted.
User & Device ManagementManaging who can access Teams, from which devices, and ensuring those devices are secure.
Staff TrainingEducating your team on HIPAA rules and secure communication practices within Teams.
Auditing & MonitoringProviding audit logs and activity reports.Actively monitoring logs for suspicious activity and conducting regular security audits.

Ultimately, you hold the final responsibility for how your team uses Teams and how PHI is handled inside the platform.

What This Really Means for Your Practice

In day-to-day terms, this means your IT and compliance staff can't just set it and forget it. A Microsoft 365 subscription is the starting line, not the finish line. You're the one in charge of setting up user permissions, making sure everyone uses multi-factor authentication, and putting policies in place to stop sensitive data from accidentally walking out the digital door.

This guide will give you a clear roadmap for handling those responsibilities. As you build out your secure toolkit, you might also be looking at other technologies. Our overview of HIPAA-compliant AI tools can offer more perspective on creating a fully secure tech stack.

First things first, though. Let's cover the absolute non-negotiable first step: the Business Associate Agreement.

Your Non-Negotiable First Step: The Business Associate Agreement

A healthcare professional points to a document as a patient signs, with a laptop in the background, emphasizing to 'SIGN BAA FIRST'.

Before a single patient-related message ever gets sent through Microsoft Teams, there's one step you absolutely cannot skip. It’s not a setting, a feature, or an internal policy—it's a legally binding contract. That document is the Business Associate Agreement (BAA), and without it, using Teams for any patient data is an immediate HIPAA violation. Full stop.

Think of the BAA as a formal promise from Microsoft. By providing it, Microsoft acknowledges its role as your "Business Associate" and legally agrees to protect any patient health information (PHI) that flows through its systems. It's the official handshake that makes a compliant partnership possible in the first place.

Using Teams for PHI without a signed BAA is like hiring a world-class security firm but never telling them they’re supposed to be guarding the vault. No matter how capable they are, they haven't legally agreed to the job. This is exactly why the Office for Civil Rights (OCR) comes down so hard on this issue.

Why the BAA Is Your Compliance Bedrock

A signed BAA is the foundation of your entire compliance strategy. All the fancy security settings and detailed user policies in the world mean absolutely nothing to auditors if this agreement isn't in place first.

Failing to get a BAA signed is not a minor slip-up; the consequences are severe. The OCR regularly fines organizations for this exact oversight. A small clinic could easily face tens of thousands of dollars in penalties just for using a third-party service to handle PHI without a BAA—even if no data breach ever happened.

The OCR sees the lack of a BAA as a fundamental failure of due diligence. In recent enforcement actions, we’ve seen penalties starting at $50,000 for this violation alone. It's a clear signal that this is a high-priority item for auditors.

This one document shifts a significant part of the legal responsibility for protecting PHI onto Microsoft. It ensures that if a breach occurs on their end of the system, they share in the accountability. Without it, all the liability lands squarely on your organization's shoulders.

Which Plans Include a BAA and How to Sign It

The good news is that getting a BAA from Microsoft is pretty straightforward, as long as you have the right subscription plan. Microsoft includes a BAA by default with most of its business-grade plans.

Here’s the breakdown:

  • Eligible Plans: Microsoft offers a BAA for its commercial-level cloud services. This covers popular plans like Microsoft 365 Business Basic, Standard, and Premium, along with all Enterprise plans (E3, E5).
  • Ineligible Plans: Personal or home plans, such as Microsoft 365 Family, do not qualify and can never be used in a compliant way. The free version of Teams also lacks both the BAA and the necessary security controls.

For eligible plans, the BAA is typically accepted as part of the main terms of service when you sign up. Your administrator can then verify and manage this agreement right from the Microsoft 365 admin center. Once that's done, you have the legal framework you need to start configuring Teams for secure, compliant communication.

How To Configure Teams for HIPAA Technical Security

A man works on a laptop to set up Secure Teams, with the setup title displayed on a large background screen.

Alright, you’ve signed the Business Associate Agreement (BAA) with Microsoft. That’s the legal handshake, but now it’s time for the real work: configuring Teams to actually protect patient data. Think of the BAA as the blueprint for a secure house; now you have to build the walls, lock the doors, and set the alarm.

These technical safeguards are all managed within the various Microsoft 365 admin centers. It’s not a single "HIPAA-compliant" switch you can flip. Instead, it's a series of specific, deliberate settings that align Teams with the HIPAA Security Rule. Skipping this step is like signing a security contract but leaving your clinic’s front door wide open.

The numbers show just how critical this is. A massive 79% of all reported data breaches happen in healthcare. What’s worse is that 34% of those breaches are due to unauthorized access—often because a tool like Teams wasn't locked down correctly. For more on these trends, you can dig into this HIPAA statistics report.

Enforce Multi-Factor Authentication

Your first and most powerful move is to turn on Multi-Factor Authentication (MFA) for everyone. Passwords get stolen all the time, but MFA adds a critical second step, like a code sent to a user’s phone. It's simple, but it's proven to block over 99.9% of account compromise attacks.

Head straight to the Microsoft 365 admin center and require MFA for every single user who might come into contact with PHI. This ensures that even if a doctor's password gets phished, a hacker can't just log in and access patient files. Honestly, this isn't just a best practice—it's an absolute must for any system touching health data.

From the admin dashboard, you can drill down into policies for messaging, meetings, and user access, turning a general-purpose tool into a secure environment for patient care.

Lock Down Guest and External Access

Teams makes it incredibly easy to collaborate with people outside your organization, which is great for productivity but a huge risk for PHI. By default, these settings are pretty open, so you need to tighten them up immediately.

  • Guest Access: This lets you invite outsiders into specific teams. You'll want to severely limit what guests can do, like blocking them from sharing files or adding other people.
  • External Access: This controls who your staff can chat with from other companies. The safest bet is to block everyone by default and create a specific "allow list" of trusted partner domains.

For most healthcare practices, the simplest and safest rule is to disable guest access entirely. Only enable it for a specific, documented reason. For external chats, only permit communication with vetted partners who also have a BAA with your organization.

Implement Data Loss Prevention Policies

Think of Data Loss Prevention (DLP) policies as automated security guards that patrol your Teams environment. You can set up these rules in the Microsoft Purview compliance portal to automatically find, monitor, and protect sensitive information in chats and channels.

For example, a good DLP policy can be configured to:

  1. Spot PHI: The system can recognize patterns like Social Security numbers, medical record numbers, or specific diagnosis codes.
  2. Block Sharing: If a user tries sending a message with this kind of PHI to someone outside your organization, the policy can block it instantly.
  3. Train Users in Real-Time: A small pop-up can appear, letting the user know why their message was blocked and reminding them of the company’s data handling policies.

These policies are fantastic for catching human error and making sure PHI stays put. As you think about digital security, don't forget the physical side of the data lifecycle. That includes having a solid plan for HIPAA/NIST compliant secure data destruction when it's time to retire old hard drives and computers. And while you're securing Teams, you might also find some helpful tips in our guide to building a HIPAA-compliant note-taking app for other areas of your workflow.

Building Your Human Firewall With Administrative Safeguards

Even the most securely configured software can’t stop a well-meaning employee from making a simple, costly mistake. All the technical bells and whistles are just one piece of the puzzle. The real-world-tested part of your HIPAA compliance strategy for Microsoft Teams comes down to your administrative safeguards—the policies, procedures, and training that guide your people.

This is what we call the "human firewall," and it's exactly where auditors and regulators focus their attention.

Believe it or not, this is where most healthcare organizations stumble. A staggering report found that over 70% of them still don't perform adequate HIPAA Security Risk Assessments (SRAs). That failure is the single most common reason for getting hit with an Office for Civil Rights (OCR) enforcement action. As you can learn from the SRA report findings, if you haven't properly assessed the risks of using a tool like Teams, you're leaving the door wide open for trouble.

Conduct a Specific Security Risk Assessment for Teams

Your first step is to perform a Security Risk Assessment (SRA) that looks specifically at how your organization uses Microsoft Teams. This isn’t your general, check-the-box IT audit. It’s a deep dive into the real-world ways your team handles PHI within the platform.

Get down to the nitty-gritty by asking pointed questions:

  • How are our providers actually running telehealth appointments?
  • What sensitive information is being shared in our internal team channels?
  • Do we have a process for bringing in external users, like specialists from another practice?
  • How are we securing PHI accessed on personal devices by our remote staff?

The goal here is to spot potential weak spots—like a channel carelessly named "Dr. Smith's Oncology Patients"—and then build concrete policies to fix them. An auditor will almost certainly ask to see your SRA, and having one that explicitly covers your communication tools is non-negotiable.

Develop Clear and Practical Policies

Once you know where your risks are, you need to create policies that are clear, practical, and easy for everyone to follow. Forget dense, legalistic documents nobody will read. These should be simple rules for everyday work.

Make sure your policies cover these key areas:

  • Telehealth Sessions: Outline the exact steps for starting calls, verifying a patient's identity, and making sure the room is private on both sides of the screen.
  • Internal Collaboration: Set clear boundaries on what can (and can't) be discussed in chats, always reinforcing the "minimum necessary" rule.
  • Channel and Team Naming: Implement a strict, no-exceptions policy against using patient identifiers in any team or channel name. Think "Cardiology Case Review Team" instead of something patient-specific.
  • File Sharing: Give clear instructions on where files with PHI must be stored (like a dedicated, locked-down SharePoint site) compared to general documents.

A simple but powerful rule to drill into your team is this: "Treat every Teams chat like it could be part of a patient's permanent medical record." This simple mindset shift encourages staff to pause and think before they type, reinforcing compliant habits.

Implement Comprehensive Staff Training

Policies are useless if your team doesn't know about them or, more importantly, why they matter. Regular, role-specific training isn't just a good practice; it's a HIPAA requirement. Your training needs to go beyond a generic "don't share PHI" warning and provide scenarios your staff will actually encounter.

Use real-world examples to show what to do and what to avoid:

  • Do: Use the "Share Screen" feature during a telehealth call to review a lab result directly with a patient.
  • Don't: Type those same lab results into the chat window, where they'll be saved as a permanent text log.
  • Do: Create a private channel for a specific care team to discuss patient cases, making sure only authorized members have access.
  • Don't: Post about that same case in a general department-wide channel where dozens of people who aren't involved can see the discussion.

While setting up software correctly is key, a strong "human firewall" also includes managing the physical side of data security. For example, knowing the right way to handle HIPAA Compliant Electronics Recycling is essential for protecting patient data on old computers and devices. A truly complete compliance strategy accounts for data no matter where it exists.

Staying Compliant With Audits, Logs, and Monitoring

A professional office desk with a computer showing a spreadsheet, documents, a magnifying glass, and a binder, with an 'Audit & Monitoring' overlay.

Getting your Microsoft Teams environment configured for HIPAA is a huge accomplishment, but it's a mistake to think of it as a one-and-done project. Compliance isn't a finish line you cross; it's a discipline you practice every single day.

Think of it like the security camera system at your clinic. You wouldn't just install it and forget about it. You have to actually watch the footage and make sure the system is recording properly. The same principle applies here. Microsoft 365 gives you the tools for this constant vigilance, and knowing how to use them is what separates a truly secure practice from one that’s just checking boxes.

Your Digital Paper Trail: The Unified Audit Log

The heart of your ongoing compliance effort is the Microsoft Purview Unified Audit Log. This is your definitive digital paper trail. It records just about every significant action that happens not just in Teams, but across your entire Microsoft 365 world. For any healthcare organization, this isn't just a nice-to-have feature—it's a core requirement of the HIPAA Security Rule.

When auditors show up, they won’t just take your word for it that you have security policies in place. They will ask for proof. The audit log is your evidence, providing a complete, timestamped history of who accessed PHI, what they did with it, and when.

This kind of proactive monitoring is more important than ever. The Office for Civil Rights (OCR) is increasing enforcement, with projections showing a rise to over 50 penalty cases by 2026. A common finding in these cases is the failure to conduct ongoing risk management, and your audit logs are your first and best line of defense.

What to Watch For: Key Activities to Monitor

Just having the log isn't enough—you have to know what to look for. By regularly reviewing the logs and, more importantly, setting up automated alerts for risky behavior, you can spot trouble before it escalates.

Here are the critical activities you should be monitoring to keep your Teams environment secure:

  • File Access and Sharing: Keep a close eye on who views, downloads, or shares any file that could contain PHI. An alert for an unusual number of downloads by one person in a short time frame could be a sign someone is trying to walk out the door with patient data.
  • External User Invitations: Every time a new guest is added to a Team, it should be a monitored event. You need to be able to confirm that every external user has a legitimate reason to be there and that a BAA is on file.
  • Changes to Security Policies: Any tweak to a Data Loss Prevention (DLP) policy, sensitivity label, or retention rule is a major event. You need to be alerted immediately to ensure the change was authorized.
  • Unusual Login Activity: The system can flag "impossible travel" (like a login from New York followed five minutes later by one from Tokyo) or a flurry of failed login attempts. These are classic red flags for a compromised account.

I always tell clients to think of these alerts as digital smoke detectors. You hope you never need them, but they have to be working perfectly to give you that critical warning at the first sign of trouble. That warning gives you the time to put out a small fire before it becomes a devastating breach.

Setting up these alerts in the Microsoft Purview compliance portal turns your audit log from a passive history book into an active security system. For a step-by-step guide on implementing these safeguards and more, our HIPAA compliance checklist provides a practical framework to get you started.

Frequently Asked Questions About Teams and HIPAA Compliance

When it comes to using Microsoft Teams in a healthcare setting, the details really matter. Let's walk through some of the most common questions we hear from practices trying to get it right.

Which Microsoft 365 Plans Are Best for HIPAA Compliance?

Not every Microsoft 365 plan will work for healthcare. The absolute must-have is a plan that Microsoft will back with a Business Associate Agreement (BAA). Without that legal document, you’re not compliant, full stop.

The good news is most of their business-oriented plans qualify. You're generally covered with:

  • Microsoft 365 Business Basic
  • Microsoft 365 Business Standard
  • Microsoft 365 Business Premium
  • All Enterprise plans (like E3 and E5)

For practices that want the tightest security possible, we almost always point them toward Business Premium or Enterprise E5. These plans come with heavy-duty features like Data Loss Prevention (DLP) and advanced threat protection, giving you far more control over how PHI is handled in your Teams environment.

Can I Use the Free Version of Microsoft Teams for Healthcare?

The answer here is a hard no. The free version of Microsoft Teams is absolutely not HIPAA compliant and should never, ever be used for anything involving Protected Health Information (PHI).

There are two big reasons why. First, Microsoft won't sign a BAA for the free version. Using it for patient data without that contract is an instant HIPAA violation and puts your practice at massive risk.

Second, the free version is stripped of all the essential security and admin tools. You get no unified audit log, no DLP policies, and no advanced access controls. Without those, it's simply impossible to meet the standards of the HIPAA Security Rule.

What Are the Biggest HIPAA Mistakes to Avoid in Teams?

Even with the best intentions, it's easy to make a misstep that creates a serious compliance gap. From what we've seen, these are the most common—and costly—mistakes organizations make with Teams:

  1. Forgetting the BAA: Jumping the gun and using Teams for patient matters before you have a signed Business Associate Agreement with Microsoft. This is the most basic error you can make.
  2. Leaving Guest Access Wide Open: The default settings are often too permissive. If not locked down, guest access can become a backdoor for a data breach.
  3. Neglecting Employee Training: Your tech is only as good as the people using it. Untrained staff will inevitably make mistakes and mishandle PHI.
  4. Skipping a Risk Analysis: Failing to perform a Security Risk Assessment specifically for your Teams setup means you’re flying blind to your own weak spots.
  5. Ignoring Audit Logs: If you're not actively monitoring who is accessing what, you can't prove you're compliant—or spot a breach as it's happening.

The key takeaway here is that avoiding these mistakes isn't just about technology. It demands a mix of smart configuration, clear internal policies, and consistent training.

Does Using Teams Automatically Make My Practice HIPAA Compliant?

No, it doesn't. This is probably one of the most dangerous myths about using any cloud software in healthcare. Subscribing to a HIPAA-eligible tool like Microsoft Teams is just the first step.

Compliance is a shared responsibility. Microsoft provides a secure platform, but your organization is the one responsible for using it correctly. That means your practice has to:

  • Sign the BAA with Microsoft.
  • Configure all the security and access settings properly.
  • Develop clear policies for how your team should use it.
  • Train every single staff member on those policies.
  • Continuously monitor activity to make sure the rules are being followed.

Think of it this way: Microsoft gives you a high-tech vault, but your practice is still in charge of setting the combination, deciding who gets a key, and watching the door.


Are you looking to reduce administrative burdens and enhance patient communication without adding to your staff's workload? Simbie AI offers clinically-trained voice agents that automate tasks like patient intake, scheduling, and prescription refills, all while maintaining HIPAA compliance. Discover how you can save up to 60% on administrative overhead and free your team to focus on what matters most—patient care. Learn more at https://www.simbie.ai.

See Simbie AI in action

Learn how Simbie cuts costs by 60% for your practice

Get smarter practice strategies – delivered weekly

Join 5,000+ healthcare leaders saving 10+ hours weekly. Get actionable tips.
Newsletter Form

Ready to transform your practice?

See how Simbie AI can reduce costs, streamline workflows, and improve patient care—all while giving your staff the support they need.