← Reference Deep-Dives Reference Deep-Dive · 12 min read

HIPAA-Compliant Research: What Healthcare Teams Need to Know

By Kevin

Healthcare insights teams operate under constraints that most research organizations never encounter. When the participants in your study are patients, and the data you collect touches diagnoses, treatments, or health outcomes, HIPAA transforms qualitative research from a methodological challenge into a regulatory one. The penalties for noncompliance are not abstract: the Office for Civil Rights has imposed settlements exceeding $100 million since 2003, with fines reaching $16 million for individual violations.

Yet the need for qualitative research in healthcare has never been greater. Health systems trying to reduce readmissions need to understand patient experiences between visits. Digital health companies need to validate whether their interfaces actually support medication adherence. Payers need to understand why members avoid preventive care. These questions require the kind of depth that only conversations can provide—but those conversations must happen within a compliance framework that most research teams find intimidating.

This guide provides a practical reference for running qualitative research that satisfies HIPAA requirements without sacrificing the depth and scale that modern healthcare organizations need.

HIPAA Fundamentals for Research Teams

HIPAA’s Privacy Rule and Security Rule apply to covered entities (health plans, healthcare clearinghouses, and healthcare providers who transmit health information electronically) and their business associates. If your organization falls into one of these categories, or if you’re conducting research on behalf of one, HIPAA governs how you collect, store, analyze, and share data from patient interviews.

The central concept is Protected Health Information (PHI): individually identifiable health information that relates to a person’s past, present, or future physical or mental health condition, the provision of healthcare, or payment for healthcare. PHI becomes the compliance trigger. A recording of someone describing their experience with a knee replacement is PHI. A de-identified transcript of the same conversation, stripped of all identifiers, may not be.

Understanding this distinction is the foundation of compliant research design. Your goal is not to avoid collecting PHI entirely—that would make most healthcare research impossible—but to minimize what you collect, protect what you must retain, and de-identify or destroy data according to defined timelines.

The 18 Identifiers and Safe Harbor De-Identification

HIPAA provides two methods for de-identifying health information: Safe Harbor and Expert Determination.

Safe Harbor is the more commonly used method in research contexts. It requires the removal of 18 specific categories of identifiers: names; geographic data smaller than a state; all date elements (except year) directly related to an individual, including birth date, admission date, discharge date, and date of death; telephone numbers; fax numbers; email addresses; Social Security numbers; medical record numbers; health plan beneficiary numbers; account numbers; certificate and license numbers; vehicle identifiers and serial numbers; device identifiers and serial numbers; web URLs; IP addresses; biometric identifiers including finger and voice prints; full-face photographs and comparable images; and any other unique identifying number, characteristic, or code.

Additionally, the covered entity must have no actual knowledge that the remaining information could be used, alone or in combination, to identify an individual.

Expert Determination requires a qualified statistical or scientific expert to determine that the risk of identifying any individual from the dataset is very small. This method is more flexible but requires documented expert analysis and is typically reserved for large-scale quantitative datasets rather than qualitative transcripts.

For most qualitative research teams, Safe Harbor is the practical path. It provides a clear checklist that can be applied systematically to transcripts, recordings, and analysis outputs.

IRB Requirements: When You Need Review and When You Don’t

The Common Rule (45 CFR 46) governs research involving human subjects at institutions receiving federal funding. HIPAA adds a separate layer of requirements that applies regardless of funding source. Research teams often conflate the two, creating unnecessary delays. Understanding where they overlap and where they diverge is essential for efficient study planning.

When IRB Review Is Required

If your research meets the regulatory definition of human subjects research—a systematic investigation designed to develop or contribute to generalizable knowledge, involving living individuals about whom you obtain data through intervention or interaction—IRB review is required at institutions holding a Federal-Wide Assurance. Most hospitals, health systems, and academic medical centers fall into this category.

When Studies May Be Exempt

The revised Common Rule (2018) expanded exemption categories. Several are directly relevant to healthcare qualitative research:

Category 2 covers research involving surveys, interviews, or observation of public behavior where the information recorded cannot readily identify subjects, or where disclosure outside the research would not place subjects at risk. Many customer experience and product feedback studies in healthcare settings qualify here, provided responses are recorded without direct identifiers.

Category 3 covers research involving benign behavioral interventions with adult subjects who prospectively agree to participate, where data are recorded without identifiers or disclosure would not create risk.

Even exempt studies typically require a formal exemption determination from the IRB. Do not assume exemption—submit the determination request and let the IRB confirm. This documentation protects you if compliance questions arise later.

HIPAA Authorization vs. IRB-Approved Waiver

When research involves PHI, HIPAA requires individual authorization from each participant—unless the IRB (or a Privacy Board) grants a waiver. The waiver criteria are specific: the research could not practicably be conducted without the waiver, the research could not practicably be conducted without access to the PHI, the privacy risks are reasonable relative to the anticipated benefits, the research plan includes adequate protections for PHI, the PHI will not be reused or disclosed except as required by law or permitted for additional research, and there is an adequate plan to destroy identifiers at the earliest opportunity.

For prospective qualitative research where you’re recruiting participants and conducting new interviews, individual authorization is almost always the cleaner path. Waivers are more commonly used for retrospective studies analyzing existing records.

HIPAA authorization for research is more detailed than standard informed consent. It must include specific elements that go beyond typical research consent forms.

Required Elements of HIPAA Authorization

The authorization must describe the PHI to be used or disclosed in a specific and meaningful way. Vague language like “health information related to your care” is insufficient. Specify: “recordings and transcripts of this interview, which may include your descriptions of your diagnosis, treatment experiences, and interactions with healthcare providers.”

It must identify who is authorized to make the disclosure (the participant), who will receive the information (your research team and any vendors processing the data), and the purpose of the disclosure (the specific research study). It must include an expiration date or event—not “indefinite.” It must state the individual’s right to revoke authorization in writing, including any exceptions. And it must warn that information disclosed pursuant to the authorization may be subject to redisclosure by the recipient and may no longer be protected by HIPAA.

Lengthy consent forms reduce comprehension. Research on consent documents consistently shows that shorter, plain-language forms produce better understanding than comprehensive legal disclosures. For qualitative research, consider a layered approach: a concise summary covering the essential elements on the first page, with detailed provisions available as an appendix.

For AI-moderated interviews, consent language must also address the automated nature of the interaction. Participants should understand that they are speaking with an AI system, that their responses will be recorded and processed by software, and how the AI-generated transcripts and analyses will be handled. This transparency is both ethically necessary and practically beneficial—participants who understand the format provide more candid responses.

Platforms like User Intuition handle consent capture as part of the interview flow, collecting authorization before the conversation begins and storing consent records alongside study data for audit purposes.

De-Identification Standards for Transcripts and Recordings

Raw transcripts from patient interviews almost certainly contain PHI. Participants mention their doctors by name, reference specific dates of procedures, describe their geographic location, and share details that—in combination—could identify them. Your de-identification process must be systematic, documented, and verifiable.

Building a De-Identification Protocol

Start with automated passes. Natural language processing tools can flag and redact common identifier patterns: names, dates, locations, phone numbers, and email addresses. Automated tools catch the obvious instances but miss contextual identifiers—a participant mentioning “my surgeon who was on that TV show last year” doesn’t contain a name but could still enable identification.

Follow automated passes with human review. Train reviewers on the 18 Safe Harbor categories and provide them with a structured checklist. Every transcript should be reviewed by someone who did not conduct the interview, reducing the risk of familiarity blindness.

For audio and video recordings, de-identification is substantially harder. Voice itself can be a biometric identifier under Safe Harbor. If you need to retain recordings, consider whether voice-altered versions are sufficient for your analysis needs. If original recordings are necessary, they must be treated as PHI for their entire lifecycle, with corresponding access controls, encryption, and retention limits.

Handling Incidental PHI

Participants in qualitative research routinely disclose information you did not ask for. A study about medication adherence might yield unsolicited disclosures about mental health diagnoses, substance use, or family medical history. Your protocol must account for incidental PHI—information that exceeds the scope of your authorized collection.

Document in your protocol how incidental disclosures will be handled: whether they will be redacted from transcripts, excluded from analysis, or retained under the existing authorization. If your authorization language is broad enough to cover incidental disclosures, document that determination. If it is not, you may need to re-contact participants for supplemental authorization or redact the incidental PHI before analysis.

Data Security Requirements

HIPAA’s Security Rule requires administrative, physical, and technical safeguards for electronic PHI (ePHI). For research teams, this translates to specific infrastructure and process requirements.

Technical Safeguards

Encryption is the most critical control. Data must be encrypted both in transit (TLS 1.2 or higher for all data transmission) and at rest (AES-256 or equivalent for stored data). If you’re recording interviews, the recordings must be encrypted from the moment of capture. If you’re using a cloud-based research platform, confirm that the platform encrypts data at rest in their infrastructure—not just in transit to their servers.

Access controls must follow the minimum necessary principle: each team member should have access only to the PHI they need for their specific role. An analyst reviewing de-identified transcripts should not have access to original recordings. A recruiter scheduling interviews should not have access to completed transcripts. Role-based access control (RBAC) is the standard implementation pattern.

Audit trails must record who accessed PHI, when, and what they did with it. This is not optional under HIPAA—it is a required addressable specification, meaning you must implement it or document why an alternative measure provides equivalent protection. Modern research platforms generate audit logs automatically, but verify that your platform’s logs capture sufficient detail.

Automatic session timeouts prevent unauthorized access when researchers step away from their workstations. Set timeout periods appropriate to your environment—15 minutes is a common standard.

Administrative Safeguards

Workforce training on HIPAA requirements must be documented and refreshed annually. This applies to everyone with access to PHI, including external research partners and temporary staff. Training should cover your specific research protocols, not just general HIPAA principles.

Incident response procedures must be documented before you begin collecting data. If a researcher’s laptop is stolen, or a transcript is accidentally emailed to the wrong recipient, your team needs a clear protocol for breach assessment, notification, and remediation. HIPAA requires notification to affected individuals within 60 days of discovering a breach, with notification to HHS for breaches affecting 500 or more individuals.

Business Associate Agreements must be executed with every vendor that will access, store, or process PHI on your behalf. This includes your research platform, transcription services, cloud storage providers, and any analysis tools that process identifiable data. The BAA must specify permissible uses, required safeguards, breach notification obligations, and data return or destruction requirements at the end of the engagement.

Physical Safeguards

For research conducted in clinical settings, physical safeguards include controlled access to areas where interviews occur, secure storage for any physical materials containing PHI, and proper disposal procedures for printed transcripts or consent forms. For remote research—increasingly the norm—physical safeguards focus on endpoint security: encrypted devices, secure home office requirements, and policies prohibiting the use of personal devices for accessing PHI.

How AI-Moderated Platforms Handle Compliance

AI-moderated research platforms introduce efficiency gains that are particularly valuable in healthcare research, where participant time is limited and the cost of traditional moderated interviews is high. But they also introduce compliance considerations that teams must evaluate before deployment.

The core question is not whether AI moderation is compatible with HIPAA—it is—but whether the specific platform you choose has implemented the necessary safeguards.

What to Evaluate in a Platform

BAA availability. If the vendor will not sign a BAA, they cannot process PHI. Full stop. Some research platforms explicitly support HIPAA-covered research; others disclaim any responsibility for compliance. Confirm BAA availability before investing time in evaluation. User Intuition, for example, is built to support HIPAA-compliant research workflows and will execute BAAs for healthcare customers.

Encryption architecture. Verify that the platform encrypts data at rest and in transit, and confirm the encryption standards used. Ask whether recordings are encrypted at the point of capture or only after upload.

Access control granularity. Can you restrict access at the study level, the transcript level, or only at the account level? Healthcare research often requires study-level access controls where different team members have access to different studies based on their role and authorization.

Audit logging. Does the platform maintain logs of all access to PHI? Can you export these logs for your compliance records? Are logs tamper-evident?

De-identification capabilities. Does the platform offer automated de-identification of transcripts? Can you configure de-identification rules to match Safe Harbor requirements? Is there a review workflow for verifying de-identification before data is shared with analysis teams?

Data residency and retention. Where is data stored? Can you specify data residency requirements (e.g., US-only storage)? Does the platform support automated data deletion at the end of a defined retention period?

Subprocessor transparency. The platform likely uses subprocessors—cloud infrastructure providers, AI model providers, monitoring services. You need visibility into who these subprocessors are and confirmation that BAAs extend through the subprocessor chain.

Common Compliance Mistakes

Healthcare research teams consistently encounter the same compliance failures. Recognizing these patterns helps you avoid them.

Treating de-identification as a one-time step. De-identification must be applied not just to final transcripts but to every derivative: analysis notes, presentation excerpts, verbatim quotes used in reports, and data stored in insight repositories. A de-identified transcript that gets re-identified through a verbatim quote in a presentation deck is a compliance failure.

Relying on verbal consent. HIPAA authorization must be documented in writing (or electronically with appropriate e-signature controls). A participant verbally agreeing to the interview is not sufficient authorization for the use and disclosure of PHI.

Failing to account for combined datasets. Individual data elements that are not PHI in isolation can become PHI when combined with other information. A de-identified transcript paired with a recruitment screener that contains the participant’s name creates an identifiable record. Your de-identification protocol must consider all data sources in the study, not just the interview transcripts.

Assuming cloud storage is automatically compliant. Major cloud providers (AWS, Google Cloud, Azure) offer HIPAA-eligible services, but eligibility is not the same as compliance. You must configure services correctly, execute BAAs with the provider, and ensure that your specific usage pattern meets HIPAA requirements.

Neglecting data destruction. HIPAA requires that PHI be retained only as long as necessary. Many research teams collect data diligently but never establish destruction timelines. Define retention periods before the study begins, document them in consent forms, and implement automated deletion where possible.

Checklist: Launching a HIPAA-Compliant Qualitative Study

Use this checklist to ensure your study meets HIPAA requirements before the first participant is recruited.

Pre-Study Planning

  • Determine whether your study involves PHI and confirm HIPAA applicability
  • Submit IRB application or exemption determination request
  • Define the minimum PHI necessary for the study objectives
  • Establish data retention and destruction timelines
  • Identify all vendors and confirm BAA execution with each

Consent and Authorization

  • Draft HIPAA authorization form with all required elements
  • Include AI moderation disclosure if using automated platforms
  • Establish consent capture and storage procedures
  • Plan for incidental PHI disclosure handling

Technical Infrastructure

  • Confirm encryption at rest and in transit for all data stores
  • Configure role-based access controls with minimum necessary permissions
  • Verify audit logging is active and capturing required events
  • Test automatic session timeout settings
  • Confirm data residency meets any geographic requirements

De-Identification Protocol

  • Document your de-identification method (Safe Harbor or Expert Determination)
  • Configure automated de-identification tools
  • Establish human review workflow for automated results
  • Define procedures for de-identifying derivatives (quotes, summaries, presentations)

Operational Readiness

  • Complete HIPAA training for all team members with data access
  • Document incident response procedures
  • Establish breach notification contacts and timelines
  • Create data access request and revocation procedures
  • Brief the research team on incidental disclosure protocols

Post-Study

  • Execute data destruction according to defined timelines
  • Archive consent records and audit logs per retention policy
  • Document any incidents or protocol deviations
  • Update procedures based on lessons learned

Healthcare qualitative research under HIPAA is not inherently more difficult than non-regulated research—it simply requires more deliberate planning and infrastructure. Teams that invest in compliant workflows upfront find that the structure actually improves research quality: clearer consent produces more engaged participants, systematic de-identification forces disciplined data handling, and audit trails create accountability that strengthens the credibility of findings. The compliance framework, approached correctly, becomes a quality framework.

Frequently Asked Questions

If you use any third-party platform or vendor that will access, store, or process PHI on behalf of a covered entity, you need a BAA in place before the first interview. This includes transcription services, AI moderation platforms, cloud storage providers, and analysis tools. The BAA must specify permissible uses, security obligations, breach notification procedures, and data return or destruction requirements.
Yes, provided the platform meets HIPAA's administrative, physical, and technical safeguard requirements. Key capabilities include end-to-end encryption, role-based access controls, audit logging, automatic de-identification options, and the vendor's willingness to sign a BAA. The AI moderation itself is not the compliance risk—the data handling infrastructure around it is what matters.
IRB review is required when research involves human subjects and is conducted or funded by an institution that holds a Federal-Wide Assurance. However, many healthcare customer experience and product research studies qualify for IRB exemption under 45 CFR 46.104, particularly if they involve surveys or interviews where responses are recorded without identifiers and disclosure would not place subjects at risk. Consult your institution's IRB office early—even exempt studies typically require a formal exemption determination.
The Safe Harbor method requires removing 18 categories of identifiers: names, geographic data smaller than a state, dates (except year) related to an individual, phone numbers, fax numbers, email addresses, Social Security numbers, medical record numbers, health plan beneficiary numbers, account numbers, certificate or license numbers, vehicle identifiers, device identifiers, URLs, IP addresses, biometric identifiers, full-face photographs, and any other unique identifying number or code.
HIPAA itself does not specify a maximum retention period for research data, but it requires that PHI be retained only as long as necessary for the purpose it was collected. Most institutions set retention policies between 6 and 10 years for research records, aligned with state medical record retention laws and IRB requirements. Define your retention period before the study begins, document it in your consent forms, and ensure your research platform supports automated deletion at the end of the retention window.
Get Started

Put This Research Into Action

Run your first 3 AI-moderated customer interviews free — no credit card, no sales call.

Self-serve

3 interviews free. No credit card required.

Enterprise

See a real study built live in 30 minutes.

No contract · No retainers · Results in 72 hours