Subpoena Gone Wrong is a real-world scenario from your file. A lawyer mailed “notice” letters and then pushed for records anyway. Some letters even suggested sending full records by regular email. That creates compliance and security risk for everyone. So let’s unpack what the rules really say and how to fix the workflow. HHS.gov
HIPAA allows sharing PHI for lawsuits only if strict steps are followed. The rule is in 45 C.F.R. § 164.512(e). You must either give proper legal notice to the patient or get a qualified protective order. HHS explains “satisfactory assurances” here in plain English: the requester must certify that notice was given or a protective order was sought, with proof attached. See HHS’s FAQ on subpoenas here. ECFRHHS.gov
Business Associates follow the same disclosure limits their Covered Entity follows. The contract rules live at 45 C.F.R. § 164.504(e) and the HHS overview is here. A BAA cannot give a BA more rights than the Covered Entity has. ECFRHHS.gov
A bare letter is usually not enough. The requester must show real efforts to notify the patient or to obtain a protective order. That proof should be written and specific. See the text of § 164.512(e) and HHS examples that explain the “satisfactory assurances” standard. If you lack those assurances, do not disclose. ECFRHHS.gov
If someone lies about notice or misuses email to pull records, that can raise fraud concerns. You can read the federal mail and wire fraud laws at 18 U.S.C. § 1341 and § 1343. Talk to counsel if you see red flags. Legal Information Institute+1
HIPAA allows email, but you must use safeguards. The Security Rule requires transmission security under 45 C.F.R. § 164.312(e)(1). HHS also confirms providers may email patients when they apply “reasonable safeguards,” and they explain it in this FAQ here. Patients can request unencrypted email to themselves after being warned of risks, but that exception does not cover routine transmission of full charts to lawyers or third parties. Use secure portals or encrypted exchange for those. ECFRHHS.gov
Also remember the minimum necessary rule. Send only what is needed for the stated purpose. See 45 C.F.R. § 164.502(b) and HHS’s guidance on “minimum necessary” here. ECFRHHS.gov
HIPAA is a federal floor. States can add stronger rules and deadlines. Your policy should assume both HIPAA and your state law apply.
In California, the Confidentiality of Medical Information Act (CMIA) adds strict confidentiality duties. Florida’s breach law, FIPA § 501.171, sets fast notice timelines. New York’s SHIELD Act expands security obligations and broadens “private information.” Washington’s My Health My Data Act regulates consumer health data far beyond HIPAA. Nevada’s SB 370 adds consent and policy duties for “consumer health data.” JustiaFlorida LegislatureNew York State Attorney GeneralWashington State LegislationNevada Legislature
HHS finalized a reproductive health privacy rule in 2024. It added limits on using or disclosing PHI to investigate lawful reproductive care. See the final rule summary here and the Federal Register entry here. In June 2025, a federal court in Texas vacated that rule nationwide. Track this litigation closely with counsel. HHS.govFederal RegisterHolland & Knight
Why this matters to patients and teams
For patients, a sloppy “notice” can move records without your knowledge. You can request an accounting of disclosures under § 164.528 and ask for corrections under § 164.526. You can also file a HIPAA complaint using HHS’s portal here. ECFRLegal Information InstituteHHS.gov
For providers and Business Associates, shortcuts invite breaches and fines. The HHS breach portal shows many large incidents, and HHS describes breach reporting rules and timelines here. Train staff, verify legal process, and document decisions. OCR PortalHHS.gov
Healthcare remains a top target for cyberattacks. Use the HHS 405(d) program’s free resources, including HICP, to harden defenses. Start with the 405(d) Resource Library here and the HICP hub here. Map your controls to NIST SP 800-66r2, which is available here. 405d.hhs.gov+1NIST Computer Security Resource Center
HHS has also proposed modernizing the Security Rule. The proposal highlights MFA, stronger encryption, and improved vendor oversight. Read the proposed rule here. Watch for updates before changing your policies. Federal Register
If you’re a patient or legal representative:
Ask the requester what satisfactory assurances they provided. Ask who got your PHI and why. Request an accounting of disclosures under § 164.528. If needed, file a complaint with HHS here. Legal Information InstituteHHS.gov
If you’re a provider or Business Associate:
Require documented assurances under § 164.512(e) before disclosing anything. Limit to the minimum necessary. Avoid unencrypted email to third parties; prefer secure exchange under § 164.312(e). Update your risk analysis using NIST 800-66r2 here and adopt 405(d) practices here. ECFR+1HHS.govNIST Publications405d.hhs.gov