Many web vendors are comfortable saying “HIPAA-compliant.” Fewer are careful about what that should mean at the web-system level: where PHI enters, where it is stored, what gets logged, who can access it, which vendors are involved, and what your Privacy or Security Officer would need to verify later. HIPAA is broader than code, but code can either support the program or quietly undermine it.
I am a webmaster and web developer, not a HIPAA law firm or full compliance department. I do not produce your Notice of Privacy Practices, train your clinical staff, or own your enterprise risk analysis. What I do is build and maintain the web-facing components — intake forms, portals, API integrations, dashboards, and internal tools — with the safeguards that belong in those layers, documented in ways your Privacy and Security Officers can review.
The work is grounded in practical principles learned from building and maintaining systems that may touch sensitive health-related data. Collect only the minimum necessary data. Avoid PHI in logs, emails, analytics, caches, and staging environments. Separate identifiers from payloads where feasible. Document what happened, who had access, and which vendors were in the chain, so your compliance team has something concrete to evaluate.
A note on scope
This page describes how I approach the technical web components of a HIPAA-covered or HIPAA-adjacent system. It is not legal advice, does not describe every HIPAA obligation, and does not replace your Privacy Officer, Security Officer, HIPAA consultant, or counsel. My role is to make the web layer safer, clearer, and easier for those people to review.