writing · 9 min read

what HIPAA actually requires of an AI transcription tool.

most clinicians evaluating a transcription tool stop at "do you sign a BAA." that's the easy part. the harder parts are the safeguards the BAA assumes you're maintaining and the vendor practices the BAA can't actually verify.

we are not your compliance counsel. this is not legal advice. this is a long-form unpacking of how HIPAA's requirements interact with the workflow of using an AI transcription tool. for binding interpretations, ask your compliance officer or HIPAA-specializing counsel.

the BAA is necessary, not sufficient

a business-associate agreement is the document covered entities sign with their vendors that handle protected health information. if you're a clinician evaluating an AI transcription service, asking whether they sign a BAA is the right first question. but it's the first question, not the only one.

a BAA establishes a contractual obligation. it does not verify that the vendor's actual practices match the contract. it doesn't address the physical security of the device the audio was recorded on. it doesn't cover access controls inside your practice. it doesn't dictate the retention policies the vendor uses internally — those flow from the terms of the BAA but don't get audited automatically.

when a covered entity gets investigated by OCR (the HHS office for civil rights, which enforces HIPAA), the investigation looks at all of these. the BAA is one document in a stack. the rest of the stack is your responsibility, and some of it is structurally easier to handle if the audio never reaches a third party in the first place.

the four categories HIPAA actually cares about

HIPAA's security rule organizes safeguards into three categories — administrative, physical, and technical — plus a privacy rule that handles disclosure and consent. an AI transcription tool intersects all four.

1. administrative safeguards

your practice's policies about who can access PHI, how training is conducted, how breaches are responded to, how access is revoked when staff leave, and how risk assessments are conducted. when an AI transcription tool enters the picture, the administrative safeguards have to extend to:

most of these don't go away with on-device transcription — your practice still needs them. but several of them get structurally easier when there's no vendor in the chain. you don't manage a vendor that doesn't exist.

2. physical safeguards

the actual hardware. who has physical access to the device the PHI lives on. how lost or stolen devices are handled. how disposed-of devices are wiped.

for AI transcription, physical safeguards apply to:

on-device transcription doesn't change the physical safeguards story — the audio file still lives on a device, and you still have to control physical access to that device. but it does mean there's no vendor-side data center to add to the physical-safeguards inventory.

3. technical safeguards

encryption, access controls, audit logs. for AI transcription this is the most-discussed category and the one where vendor differences matter most.

the questions to ask any cloud-based transcription vendor:

for on-device transcription, most of these become moot — the audio doesn't leave your device, so vendor-side encryption, access controls, retention, and exfiltration detection don't apply. your laptop's full-disk encryption (FileVault, BitLocker) handles the at-rest piece. there's no in-transit piece because there's no transit. there are no vendor employees who can see your audio because there's no vendor.

this is the single biggest reduction in compliance surface that on-device transcription provides. it's also the reason the marginal value of an additional vendor BAA is much lower when on-device is an option.

4. privacy rule (consent and disclosure)

the privacy rule handles when PHI can be disclosed and to whom. for AI transcription this comes up around:

where on-device transcription removes whole categories of work

when the speech-recognition model runs in your browser:

what doesn't change: physical safeguards on your device, the rest of your practice's HIPAA posture (training, access management within your practice, patient consent for recording), state-specific recording-consent laws, and the minimum-necessary principle as it applies to what you record.

when cloud mode is the right answer despite this

on-device isn't always the right choice. cases where cloud mode (under a signed BAA) makes more sense:

for these, the BAA is necessary. so are the technical safeguards questions above. our cloud mode is BAA-eligible — write us if your practice needs the document and the technical-safeguards questionnaire.

what the BAA from a transcription vendor should include

if you're evaluating a transcription vendor's BAA, the shape worth looking at:

a BAA without these clauses is incomplete. some vendors will negotiate; some won't. the ones that won't are signaling something about their internal practices.

practical recommendation

for clinical audio specifically:

if you're stuck on the BAA question, the underlying frame is: the BAA is a contract that depends on the vendor's practices matching the contract. on-device removes the dependency. for some workflows that's worth a lot. for others, the BAA is fine.

related

lifetime deal while we're in beta.

join the waitlist to get a lifetime deal — your first month free, plus 50% off forever. private invite when we ship; no drip campaign.