Solutions by Regulation

Protect Health Data Online – Comply with HIPAA, MHMD, VCDPA, CTCPA, and more.

Health-related websites and apps face a growing body of state health care privacy laws in Virginia, Washington, Connecticut, Nevada, and other states, as well as HIPAA. Vault protects your institution with independent, third-party, continuous monitoring of health data flows.

Solutions for HIPAA, MHMD

Health Data Compliance Is Critical

From 2023 to 2025, healthcare groups paid over $100M in fines and settlements for violations of tracking tech rules. Vault’s platform continuously monitors your websites and mobile apps for compliance with HIPAA, the MHMD Act, and other health data laws, detecting trackers and flows that collect protected health information (PHI) or sensitive health data.

Icon

Pixel Penalties Top $100M

Mass General Brigham, $18.4M for tracking pixels; Novant Health, $6.6M for a Meta Pixel; Cerebral, $7.8M over user data; Flo Health/Google, $8M$48M under CIPA.

Icon

Widespread Non-Compliance

An April 2024 analysis found 33% of healthcare websites still had the Meta Pixel installed, and 98.6% of hospital sites were sending data to third parties via trackers.

Icon

New State Law – My Health My Data

Washington’s recent MHMD Act defines “consumer health data” quite broadly and imposes a $7,500-per-violation penalty. Class actions can lead to even larger settlements.

How Vault JS Supports Health Data Compliance

Icon

PHI/Health Data Discovery

Automatically scans where you collect health data flagged as CHD (consumer health data).

Icon

HIPAA Compliance Assurance

Vault monitors your sites/apps for unauthorized vendors with no business relationship or contracts.

Icon

My Health My Data and Similar New Laws

Vault’s rule engine incorporates MHMD and other new state laws.

Icon

Preventive Care for Privacy

Vault provides continuous real-time detection of compliance violations.

Icon

Documentation for Regulators

Vault creates audit trails that detail your proactive measures.

Key Health Data Compliance Capabilities

How we manage risk in a changing environment

PHI Pattern Detection

Automatically detects protected health information in network traffic, form submissions, and third-party transmissions. Vault checks for names, email addresses, medical details, and identifiers to flag potential violations prior to unauthorized sharing.

Tracker Behavior Analysis

Tracker Behavior Analysis evaluates how third-party scripts, pixels, and SDKs collect, transmit, and potentially repurpose health-related data, revealing hidden data flows, cross-site sharing, and unauthorized disclosures.

Mobile SDK Scanning

Mobile SDK Scanning analyzes embedded iOS and Android SDKs to detect health data collection, device identifiers, and third-party transmissions. It help identifies hidden data sharing within mobile apps that create compliance risks.

HIPAA vs Consumer Data Mode

HIPAA vs. Consumer Data Mode allows your teams to apply differentiated monitoring based on how you classify health-related data, helping you stay compliant even with broad consumer health privacy laws such as MHMD.

Remediation Playbooks

Vault provides detailed information on your organization’s data collection, including where it is and the path it took to whatever page it’s on.

Frequently Asked Questions

Any health information that can reasonably be tied to an identifiable individual may qualify as PHI. Under HIPAA, PHI is any individually identifiable health information on a website created, received, maintained, or transmitted by a covered entity or business associate. This can include names, email addresses, phone numbers, IP addresses, device identifiers, appointment details, medical conditions, prescription information, insurance data, or any form-provided data regarding past, present, or future physical or mental health. Even seemingly basic identifiers can become PHI when linked to health-related content — such as a patient portal login, symptom checker, or condition-specific page visit.

The key issue is not the tool itself, but whether identifiable health information is transmitted and whether appropriate safeguards and agreements are in place. Under the Health Insurance Portability and Accountability Act (HIPAA), a violation occurs if protected health information (PHI) is disclosed to a third party without proper authorization or a compliant Business Associate Agreement (BAA). If tracking tools like Meta Pixel or Google Analytics collect identifiers, such as an IP address, email, or device ID, in connection with health-related page visits, appointment scheduling, or portal logins, that data may qualify as PHI.

The My Health, My Data Act (MHMDA) is a privacy law enacted by Washington state that protects consumer health data that falls outside the scope of federal HIPAA protections, including information linked to a person’s physical or mental health, treatments, conditions, or inferences about health status. It requires companies to obtain clear opt-in consent before collecting, using, sharing, or selling consumer health data, and to post a dedicated health data privacy policy and uphold consumer rights, such as access, deletion, and withdrawal of consent. The law broadly applies to any organization that conducts business in Washington or targets Washington consumers and determines how their health data is processed.

It depends on your role. HIPAA applies to “covered entities”, such as healthcare providers, health plans, and clearinghouses, and their business associates. If your wellness e-commerce site is not providing medical care, billing insurance, or handling protected health information (PHI) on behalf of a covered entity, HIPAA likely does not apply. However, you may still be subject to other health privacy laws, such as Washington’s My Health My Data Act or state consumer privacy laws, if you collect health-related information. So even if HIPAA doesn’t apply, health data compliance may still matter.

Yes, a tracking pixel can capture health-related information. Pixels typically collect IP addresses, device IDs, browser details, page URLs, and other identifiers. On a healthcare or wellness site, those same identifiers can become sensitive when tied to specific pages, such as a condition-specific article, appointment scheduling page, prescription refill form, or symptom checker. If the pixel transmits URLs, form inputs, search terms, or event parameters that reveal an identifiable user’s health interest or condition, it may qualify as protected health information under HIPAA or as regulated consumer health data under state laws.

The key question is whether identifiable health information is being disclosed, not simply whether analytics software is being used. Under HIPAA, if an analytics provider receives PHI on your behalf, it is generally considered a business associate, which means you must have a compliant Business Associate Agreement (BAA) in place. If no BAA exists, transmitting PHI to that vendor could violate HIPAA. If the analytics tool does not receive PHI — e.g., the health-related identifiers are removed or tracking is limited to non-patient areas — patient authorization may not be required.

Vault detects and analyzes potential PHI exposure without becoming a repository of patient records. It inspects network traffic, form submissions, and tracker behavior to identify patterns that may indicate protected health information. Findings are logged as compliance evidence rather than stored as full patient datasets, helping teams evaluate risk while minimizing data retention. Vault supports HIPAA compliance efforts by surfacing unauthorized disclosures, validating safeguards, and documenting remediation — without positioning itself as a clinical data system.

Yes. Vault continually adapts to evolving regulatory landscapes, including updates to HIPAA and emerging state health privacy laws. As new requirements, such as expanded consent obligations, data minimization standards, or consumer rights provisions, are finalized, Vault’s rule engine and scanning logic can be updated to reflect those changes.

Healthcare privacy is non-negotiable — make sure you get it right.