Payment Technology14 April 20266 min read

Healthcare Payment Processing and HIPAA Explained

Healthcare payments sit at the intersection of PCI DSS and HIPAA, two rulebooks that were never designed to talk to each other. Here's how they actually overlap, where PHI turns up in billing calls, and what a BAA with a payment vendor should look like.

Healthcare Payment Processing and HIPAA Explained

US healthcare has two big compliance rulebooks sitting over every billing call: PCI DSS for the card data and HIPAA for the patient data. They were drafted by different bodies for different reasons and they don't reference each other. They do, however, collide every single time a patient reads their card number out loud to a billing agent and the call is recorded.

Most of the confusion in the healthcare payment space comes from treating the two rulebooks as separate problems. They aren't. They overlap at the call, at the recording, at the CRM, and at the vendor contract.

Where PCI and HIPAA overlap

PCI DSS governs cardholder data: PAN, expiry, service code, CVV, PIN. HIPAA governs protected health information: anything that identifies a patient and relates to their health, treatment, or payment for treatment. The word "payment" in HIPAA includes billing, collections, and insurance eligibility, which is the exact workflow a patient billing call covers.

If your agent is on a call that discusses a specific procedure, diagnosis, or treatment AND takes a card payment, that call contains both PHI and CHD. The recording holds both. The CRM note holds both. The agent's desktop at the moment of the call holds both. Your vendor list needs to be PCI-compliant AND under a Business Associate Agreement, because either gap is a breach waiting to happen.

Our HIPAA versus PCI DSS explainer goes deeper on where the rules actually differ. The short version: both demand risk assessment, access controls, encryption, and audit logs, but HIPAA is prescriptive about who can see what and PCI is prescriptive about how the card data is stored and transmitted.

US medical billing clerk processing a patient payment at a hospital front desk

PHI in billing calls

The bit healthcare operators miss most often is how easily routine billing calls leak PHI into environments that shouldn't hold it. A patient calling to pay a specific invoice names the procedure code on the statement. They ask about the imaging they had last Thursday. They mention their insurance and why a claim was denied. All of that is PHI, and if your call recording captures it, your recording platform is now a HIPAA-regulated system.

That's fine if the vendor is a business associate under a signed BAA. It's a breach if they're not.

BAAs with payment vendors

A Business Associate Agreement is the contract HIPAA requires between a covered entity (hospital, clinic, billing company) and any vendor that creates, receives, maintains, or transmits PHI on the covered entity's behalf. Payment vendors can end up inside this definition for one of three reasons: they process recorded calls containing PHI, they receive CRM data that links a card to a specific patient and treatment, or they transmit payment data that's tagged with procedure codes.

Ask three questions of any vendor: do you sign a BAA, what does your BAA actually cover (subcontractors included), and what's your breach-notification commitment? A vendor that won't sign a BAA isn't a healthcare vendor, full stop.

HHS OCR breach notification

The HIPAA Breach Notification Rule, at 45 CFR §§164.400-414, requires covered entities to notify affected individuals and HHS when unsecured PHI has been breached. Breaches affecting 500 or more individuals must be reported to HHS within 60 days and disclosed to the media in the state or jurisdiction. Breaches affecting fewer than 500 individuals can be logged and reported annually.

The 500-person threshold drives a lot of operator behavior. A small billing-call recording compromise involving 300 patients is a different problem on paper from one involving 3,000, even though the underlying control failure is identical.

High-deductible health plans and the patient-as-payer era

Commercial health plan design has pushed more cost directly onto patients over the last decade. High-deductible health plans now cover well over half of commercial enrollees. That means the proportion of a healthcare provider's revenue collected directly from patients, rather than from insurers, has climbed sharply. Collection calls, payment plan setup, and co-insurance capture are all growing categories of patient contact.

Every one of those calls is a PCI and HIPAA touchpoint. This is why healthcare has become one of the biggest segments for secure phone payments in the US.

Call recording plus PHI

Call recording in healthcare is useful for training, dispute resolution, and payment authorization evidence. It's also a compounded risk. A recording of a billing call typically contains the patient's name, their account number, the procedure code or statement line item, the card number they read out, the CVV, and the agent's handling notes. Every one of those is regulated.

The cleanest design drops the card digits out of the recording entirely using DTMF suppression, so the recording keeps the PHI-containing conversation for legitimate HIPAA purposes but never captures CHD. The CRM note keeps a tokenized reference, not a PAN. The agent environment drops out of PCI scope, and the HIPAA audit only has to cover the PHI side.

US hospital patient making a card payment at a reception desk

HIPAA-friendly versus HIPAA-compliant

This distinction trips up a lot of buyers. There is no HHS "HIPAA-compliant" certification for vendors. HHS certifies nobody. A vendor is HIPAA-compliant if and only if they sign a BAA, meet the Security Rule standards, and handle PHI correctly in practice.

"HIPAA-friendly" is marketing. It usually means the vendor has some of the controls but won't sign a BAA, which for a healthcare buyer is a deal-breaker. If the question "will you sign a BAA" gets a vague answer, the product isn't fit for your environment regardless of what the brochure says. We've covered the nuance in more depth in a separate guide on HIPAA-compliant credit card processing.

IRS 213(d), HSA, and FSA cards

A growing share of patient payments come from Health Savings Accounts and Flexible Spending Accounts, funded pre-tax and restricted by IRS §213(d) to qualifying medical expenses. From a payments perspective they behave like any other card, but the merchant category code matters: 213(d)-eligible expenses have to be tagged correctly so the card issuer can substantiate the purchase. Get the MCC wrong and the card declines, or the patient gets a letter from their plan administrator six weeks later.

Our HSA and FSA card payments glossary entry covers the IIAS rules and the substantiation logic in more detail.

Putting it together

The workable pattern for US healthcare billing calls: signed BAA with every vendor in the call path, DTMF masking to drop CHD out of the recording, correct MCC coding for HSA/FSA acceptance, tight access controls on the CRM that holds the PHI, and a breach-notification runbook that knows the 60-day clock starts the moment you discover a breach. HIPAA payment compliance isn't a one-line answer; it's a whole-workflow answer. Get the workflow right and both rulebooks line up.

A subtlety that catches a lot of practices. Offering a patient a payment plan over the phone and enrolling them in a recurring card debit is a payments activity, but the conversation about why they need the payment plan (the treatment cost, the insurance coverage gap, the procedure) is HIPAA-regulated. Split the recording or mask the card portion, but don't try to keep the treatment conversation out of scope by claiming it's "just billing." Billing discussions about a specific patient are PHI under HIPAA's definition, and OCR has been consistent about that in enforcement actions.

The cleanest workflow is the agent confirms the patient identity, discusses the plan terms on a recorded line that's backed by a BAA with the telephony and recording vendors, then hands off to a masked card entry for the payment authorization. That keeps the billing-conversation recording inside a HIPAA-compliant environment and the CHD out of scope entirely.

What enforcement actually looks like

OCR enforcement against healthcare providers has tilted increasingly toward systemic risk-assessment failures rather than single-incident data leaks. Recent resolution agreements have focused on providers that hadn't done a proper security risk analysis, or whose BAAs with subcontractors were missing or outdated, or whose breach-notification processes didn't trigger within the required window. The common thread is that the vendor and contract hygiene is as important as the technical control. If your payment vendor doesn't sign a BAA, if your recording vendor's BAA references subcontractors that have changed, or if your security risk analysis is more than 12 months old, those are the gaps OCR will find first in an investigation.

Related Articles

Ready to take secure payments?

Get started in minutes, not months. No hardware, no software installs, no changes to your phone system. Just secure, PCI-compliant payments.

PCI DSS Level 1
Cyber Essentials Plus

Trusted by law firms, insurers, healthcare providers and regulated businesses worldwide. Learn more about Paytia