YundraBlog
← All articles

HIPAA Compliance for Solo Therapists: The Complete 2026 Guide

14 min read

If you run a solo therapy practice, HIPAA compliance probably feels like one of those topics you know you should understand better but keep putting off. You're not alone. Most solo therapists end up with a vague sense that they're "probably mostly compliant" — a Notice of Privacy Practices copied from a template years ago, an EHR that came with some HIPAA features built in, a policy of not using Gmail for anything sensitive — and a quiet worry in the back of their mind that if the Office for Civil Rights ever knocked on the door, they wouldn't know what to show them.

This guide is the article we wish existed when we started looking into this. It's written specifically for solo and very small private practices, in plain English, with real 2025-2026 enforcement data. No legal jargon, no scare tactics, no upselling you on a $15,000 consultant package. Just what HIPAA actually requires of you in 2026, what's changed recently, and what you need to do about it.

The short version, if you only read one paragraph

Yes, HIPAA almost certainly applies to you, even if you're cash-only and even if you only see a handful of clients. The biggest enforcement focus in 2025 was the Security Risk Analysis — every single one of the ten resolution agreements OCR announced in the first five months of 2025 cited a failure to conduct one. There's a hard regulatory deadline that just passed in February 2026 requiring you to update your Notice of Privacy Practices. Multi-factor authentication and 256-bit encryption are now mandatory, not optional. Solo practices are being fined: Manasa Health Center settled for $30,000 in 2024 specifically because OCR concluded that practice size offers no immunity from enforcement. The good news: compliance is genuinely achievable without hiring a consultant, if you know what to focus on. The rest of this article tells you what to focus on.

Does HIPAA actually apply to me?

This is the question almost every solo therapist asks first, and the answer surprises a lot of people: yes, almost certainly.

HIPAA applies to you if you are a "covered entity" — and you become a covered entity the moment you transmit any health information electronically in connection with one of the standard transactions HHS has defined. In practice, this means: if you bill insurance electronically, you're covered. If you use any EHR or practice management system that touches insurance, you're covered. If you use a third-party billing service, you're covered. Even if you're entirely cash-only and proud of it, the moment you use email, telehealth, or digital billing of any kind, you're almost certainly triggering the rule.

The most common myth in solo practice is "I'm cash-only so HIPAA doesn't apply to me." This is wrong about 90% of the time. State laws like California's CMIA impose nearly identical requirements regardless. And the second you accept a single insurance reimbursement, refer a patient to another covered entity electronically, or use any digital tool that handles a single piece of patient information, you're in scope — and once you're in scope for any reason, the entire practice has to comply, not just the part of it that triggered the rule.

The second most common myth is "I'm too small for OCR to bother with me." Also wrong. According to recent enforcement data, the overwhelming majority of HIPAA investigations now target private practices, including solo therapists. Mental health records are particularly attractive targets for both regulators and bad actors because of how sensitive they are.

What HIPAA actually requires: the three rules

HIPAA isn't one rule, it's three. Most articles muddle this together. Here's the cleanest possible breakdown.

The Privacy Rule governs how you can use and disclose patient information. It tells you what you can share, with whom, when, and what you need patient permission for. The big practical pieces for solo practices are: providing every patient with a Notice of Privacy Practices, getting written authorisation before disclosing information for anything outside treatment/payment/operations, the special protections around psychotherapy notes, and patients' right to access their own records within 30 days of a request.

The Security Rule governs how you protect electronic protected health information (ePHI). This is where most of the technical requirements live: risk assessments, access controls, encryption, audit logs, workforce training, incident response. As of 2026, multi-factor authentication and 256-bit encryption at rest are mandatory, not optional. The Security Rule is also where OCR is doing the vast majority of its enforcement right now.

The Breach Notification Rule governs what you have to do if something goes wrong. If patient information is accessed or disclosed in an unauthorised way, you have specific obligations: notify affected patients, notify HHS, and in some cases notify the media. Most solo practices have no breach response plan in place. This is a problem.

The 2026 changes you need to know about

A few things have changed recently that almost no solo therapist is aware of, and at least one of them creates immediate non-compliance for most practices.

The February 16, 2026 Notice of Privacy Practices update. This was a hard deadline. Every covered entity was required to update their Notice of Privacy Practices to reflect new protections for substance use disorder records (aligning with 42 CFR Part 2) and reproductive health information. If your NPP is the same one you've been using for years, it's almost certainly out of compliance right now, today, as you read this.

MFA is now mandatory. Under the 2026 Security Rule update, multi-factor authentication moved from "addressable" to "required" for systems accessing ePHI. If your EHR, your email, or any system that touches patient data doesn't have MFA enabled, that's a finding waiting to happen.

Encryption at rest is now mandatory at 256-bit standards. Same deal — moved from addressable to required. Your laptop, your phone, your backups, your cloud storage, all of it.

Telehealth pandemic enforcement discretion has ended. During COVID, OCR exercised discretion on telehealth tools that weren't strictly compliant. That ended. If you're still using a telehealth platform that hasn't signed a BAA with you, that's a problem.

Standard SMS texting is non-compliant for clinical communication unless the patient has signed a specific unencrypted communication waiver acknowledging the risks. Texting reminders is fine if they're not clinical. Texting clinical content to a patient without that waiver is a violation.

What OCR is actually fining people for

This is the part that should focus your attention. OCR doesn't fine people randomly. They fine people for a very specific set of things, and the pattern in 2024-2025 is remarkably consistent.

Failure to conduct a Security Risk Analysis. This is the number one thing. In the first five months of 2025, every single resolution agreement OCR announced cited this. It's not a check-the-box item. OCR expects a thorough, documented, enterprise-wide assessment of where your ePHI lives, how it's protected, and what the risks are. Most solo practices have either never done one or did one once five years ago and never updated it.

Missing written policies and procedures. When OCR investigates, the first thing they ask for is documentation. If you don't have written policies covering Privacy Rule compliance, Security Rule compliance, and breach notification, that alone can constitute a violation.

Failure to provide timely access to records. The Right of Access initiative has produced 46 enforcement actions between 2019 and 2025. Patients have a right to their records within 30 days of requesting them. Practices have been fined as little as $22,500 and as much as $200,000 for failing to do this. A solo practice was fined $100,000 specifically because the practitioner ignored OCR's initial outreach when a complaint came in.

Missing or unsigned Business Associate Agreements. Every vendor you use that touches PHI needs a signed BAA on file. EHR, email provider, telehealth platform, billing service, transcription service, cloud storage, AI tools, the lot. Most solo practices have signed exactly zero BAAs.

Real solo-practice example: Manasa Health Center. In 2024, OCR settled with Manasa Health Center for $30,000. The case is widely cited as proof that small practice size offers no immunity. The takeaway from compliance attorneys is consistent: if it can happen to Manasa, it can happen to anyone.

The cost reality

Here's where the article gets honest about money. Hiring a HIPAA consultant to walk a solo practice through compliance typically runs several thousand dollars upfront, plus annual fees. The free government tools (the HHS Security Risk Assessment Tool) exist, but they were clearly built by lawyers for IT departments — most solo practitioners try them once, get confused, and give up.

Meanwhile, the cost of getting it wrong: Manasa's $30,000. The dental practices fined $22,500-$80,000 under Right of Access. The podiatrist fined $100,000 for ignoring OCR. And the indirect costs — the corrective action plans, the legal fees, the reputational damage — are usually larger than the fine itself.

The realistic answer for most solo practices is somewhere between "free DIY with a lot of confusion" and "$15,000 consultant." That gap is exactly where modern compliance software lives. You don't need a consultant. You need a structured way to work through the requirements once and then maintain them quietly.

What you actually need to do, in order

If you're reading this and feeling the quiet panic of "I think I might be non-compliant right now," here's the order of operations.

1. Update your Notice of Privacy Practices. February 2026 deadline has passed. Get this done. A current NPP needs to address SUD records and reproductive health information specifically.

2. Conduct a Security Risk Analysis. This is the single highest-value compliance activity you can do. Document where your ePHI lives, who has access to it, how it's protected, and where the gaps are. Update annually.

3. Write down your policies. Privacy Rule policies, Security Rule policies, breach notification procedures. They don't need to be 200 pages. They need to exist, in writing, and reflect what you actually do.

4. Sign BAAs with every vendor that touches PHI. Make a list of every tool you use. For each one, ask: does this vendor handle patient information in any way? If yes, do you have a BAA? If you don't, request one.

5. Enable MFA everywhere. Your EHR, your email, your telehealth platform, your cloud storage. Everywhere.

6. Verify encryption. Your laptop, your phone, your tablets, your backups, your cloud storage. All of it should be encrypted at rest.

7. Stop using standard SMS for clinical content. Either get a written waiver from each patient or use a HIPAA-compliant messaging tool.

8. Document everything. OCR's first request in any investigation is for written documentation. If you can't show them the documents, you can't prove you complied.

Where Yundra fits in

Yundra was built specifically because the gap between "free government tools that don't work" and "$15,000 consultant" is enormous, and solo therapists are stuck in the middle of it. It walks you through your risk assessment in plain English, generates the policies you need based on your answers, tracks your vendors and BAAs, and gives you a 15-minute monthly check-in to keep everything current. We never see your patient data — we manage your compliance program, not your records.

If any of this article made you nervous about your current state of compliance, that's the right reaction, and it's also fixable. Join the waitlist below to be first in line when Yundra launches.

Join the waitlist

Be first in line when Yundra launches. Compliance that takes 15 minutes a month, not 15 hours.