Awareness article
HIPAA and Wearable Devices: When Fitbit and Apple Watch Data Is PHI
Consumer wearables are not covered entities. But when a clinic receives wearable data and incorporates it into patient care, that data becomes PHI. Remote patient monitoring creates new compliance obligations that many small clinics have not addressed.
Short answer
Wearable health devices generate health data, but consumer wearable vendors are not covered entities and are not subject to HIPAA on their own. HIPAA applies when a covered entity receives and uses that data for treatment. When that threshold is crossed, normal PHI obligations apply — including the requirement for a BAA with any vendor transmitting the data to the clinic.
Fitbit, Apple Watch, Garmin, and Oura are not covered entities. They are consumer electronics companies. They do not transmit your patients’ health data to you as part of a covered health care transaction. On their own, they are outside the boundaries of HIPAA.
That changes the moment your clinic steps in.
When a clinic receives wearable data from a patient and incorporates it into that patient’s care — uses it to adjust a medication, reviews it during a visit, stores it in the EHR — the data enters your covered entity’s custody. At that point, HIPAA’s full framework applies. The data is PHI. The people and systems handling it are subject to the minimum necessary standard, access controls, audit logging, and breach notification requirements.
Remote patient monitoring has made this more than a theoretical concern. Clinics running RPM programs are receiving continuous streams of patient biometric data. The compliance obligations attached to that data often have not kept pace with the clinical workflows that produce it.
When Wearable Data Becomes PHI
PHI is defined as individually identifiable health information that is created, received, maintained, or transmitted by a covered entity or business associate. The definition has two prongs that both must be met: the information must be individually identifiable AND it must be in the hands of a covered entity or business associate.
A patient wearing an Apple Watch and having Apple store their heart rate, sleep, and activity data in their personal Health app has not yet triggered HIPAA. The data is theirs, stored on a consumer platform, controlled by them. Apple is not their physician’s business associate.
The moment the patient shares that data with your clinic — exports it, sends it through an RPM platform that forwards it to your EHR, or brings a printed summary to an appointment — the situation changes:
- If the data is reviewed and noted in the medical record, it has been “received” by a covered entity and is now PHI.
- If it informs a clinical decision — a change in treatment, a follow-up test order — the connection to health care provision is explicit.
- If it is stored in your EHR alongside the patient’s other health records, it is PHI maintained by a covered entity.
The transition is not always a formal act. A physician who pulls up a patient’s wearable data from a shared portal during a visit and enters an observation in the EHR has turned that data into PHI without any special intent.
Vendor Obligations: When a BAA Is Required
The BAA requirement applies to business associates — entities that create, receive, maintain, or transmit PHI on behalf of a covered entity. A wearable platform becomes a business associate when it:
- Transmits patient wearable data directly to the clinic’s EHR or clinical systems
- Stores wearable data in a platform that the clinic accesses as part of clinical care
- Processes wearable data and generates clinical reports that the clinic uses in treatment decisions
In these configurations, the wearable platform vendor is performing a function that involves PHI on the clinic’s behalf. A BAA is required before that data flow may legally operate.
Major clinical RPM vendors understand this and offer standard BAAs. The problem arises with consumer wearable integrations that were not designed for clinical use — informal connections between consumer health apps and clinical portals that no one formally evaluated for BA status.
The practice test: does the vendor have access to data that would identify a patient AND relate to their health or health care, AND is that access happening in service of the clinic’s operations? If yes, the vendor is a BA and a BAA is required.
If a consumer wearable vendor does not offer a BAA, the clinic cannot use that vendor as part of a clinical care workflow without creating a HIPAA violation. That is a practical limit on which RPM integrations are permissible.
The FTC Health Breach Notification Rule: Where HIPAA Does Not Reach
HIPAA’s jurisdiction ends at covered entities and their business associates. Consumer wearable vendors, operating purely as consumer businesses, are outside HIPAA’s reach.
The FTC fills part of that gap through its Health Breach Notification Rule, which applies to vendors of personal health records (PHR vendors) — businesses that maintain health records for individuals outside of HIPAA’s covered entity framework — and to their service providers.
If a wearable platform qualifies as a PHR vendor under the FTC rule, it must:
- Notify affected consumers within 60 days of discovering a breach of unsecured identifiable health information
- Notify the FTC no later than when consumer notification is sent
- For breaches affecting 500 or more consumers in a state, notify prominent media outlets in that state
The FTC has updated and enforced this rule with increased rigor in recent years. Companies that collect health data and experience breaches — including some fitness app operators — have faced FTC action even where HIPAA did not apply.
For your clinic, the practical implication: if you recommend a wearable platform to patients for RPM purposes, the vendor’s own compliance with the FTC rule is a factor in your vendor vetting process. A vendor that cannot articulate its breach notification obligations under either HIPAA or FTC rules is a risk.
Remote Patient Monitoring: A Compliance Checklist
RPM programs that use wearable data need a documented compliance structure. The minimum:
Data flow documentation. Identify each data element collected by the wearable device, the path it travels (device → vendor platform → clinic EHR, for example), every system and vendor it passes through, and who at the clinic can access it.
BA identification. For each vendor in the data flow, determine whether they meet the BA definition. Any vendor that stores, processes, or transmits PHI on your behalf is a BA.
BAA execution. Obtain signed BAAs from all qualifying vendors before activating the integration. Document the BAA in your vendor management records.
Minimum necessary access. RPM data should be accessible only to clinical staff with a treatment relationship to the patient. Apply the same role-based access controls you apply to EHR data.
Audit logging. Confirm that your EHR logs access to RPM data the same way it logs access to other PHI. Access to wearable data without a treatment justification is a potential privacy violation.
Patient authorization. Determine whether your RPM enrollment process adequately informs patients about how their wearable data will be used, who will have access, and how it will be stored. While HIPAA does not require patient authorization for uses within treatment, patient transparency reduces complaint risk.
Incident response integration. A breach of RPM data — unauthorized access to the wearable integration, a vendor-side exposure — triggers your breach response procedures the same as any other PHI breach. Confirm your incident response plan addresses data received from external platforms.
The growth of remote patient monitoring is genuine and clinically useful. The compliance infrastructure for it at small clinics has often not grown at the same pace. Addressing the data flow documentation, the BAA inventory, and the access controls before an incident occurs is the right sequence.
PHI Fundamentals
Core PHI and ePHI definitions, identifiers, edge cases, and data-classification concepts healthcare teams need before tool selection.
Building a HIPAA-Compliant AI Use Policy for Your Clinic
How to build a HIPAA-compliant AI use policy for your clinic: approved tools, BAA requirements, prohibited inputs, staff training, and OCR's guidance on AI.
PHI Retention and Destruction Requirements Under HIPAA
HIPAA data retention and PHI destruction requirements: what 45 CFR §164.530(j) requires, state law overlays, approved destruction methods, and BA...
Sources