are you HIPPA compliant?

  • Profile Image
    Asked on June 16, 2014 at 01:34 PM

    If I place a form I created through you on my website for therapy clients to complete and email to my HIPPA compliant email will the process be HIPPA compliant on your end?

    Also, I would like a signed business associates agreeement to have to verify HIPPA compliance.


    Thanks, Jennifer Magbanua

  • Profile Image
    Answered on June 16, 2014 at 03:06 PM


    Jotform does not have a HIPAA Compliance Certificate, but you can use Jotform in HIPAA Compliant way. Please check the below details:

    Our servers already match all criteria since we already care a lot about the security. However, some features of our application are not HIPAA compliant so if you refrain from using those features, I think you should be fine.

    1. Always use SSL (https) version of JotForm site on your browser. Use "" to login to your account, create your forms, look at your submissions and link to your forms.

    2. Edit emails on all forms to make sure no specific information is used on them. We send emails in plain text. So, they are not secure. Only use emails to get alerts to know there is a new submission. Once you receive an email alert, log into the secure JotForm site and then look at the user 

    3. If you use the Reports feature only do it with password protection. That will both ask for a password, and it will transfer all data over SSL.

    4. Same for uploads. They are not password protected.

    5. Logout immediate after you are done with the site.

    6. Regularly download submissions and then delete them.


    Data stored on our servers are not encrypted, but access to our servers is safeguarded. Data transmission from the person who submits their health information to our servers can be done in an encrypted manner, by using the forms securely.

    JotForm certainly complies with the technical safeguard section of the HIPAA security rule:

    Information systems housing PHI must be protected from intrusion. When information flows over open networks, some form of encryption must be utilized. If closed systems/networks are utilized, existing access controls are considered sufficient and encryption is optional.

    Basically, this are described from this thread: If you have any further concerns, please let us know.

    Thank you for using Jotform!