DEV Community

Joe Gellatly
Joe Gellatly

Posted on • Originally published at medcurity.com

Telehealth HIPAA after the Cures Act: what changed for engineers in 2026

If you wrote your telehealth platform's HIPAA story before 2025, the rules you compiled it against don't all hold anymore.

The 21st Century Cures Act (and ONC's information-blocking rule that operationalizes it) reshaped what providers and their telehealth vendors are required to do with patient data. The 2026 HIPAA Security Rule amendments then layered new technical controls on top. Together they pushed telehealth from a "build a secure pipe and you're fine" posture toward something closer to "build a secure pipe, log every byte, prove access on demand, and never delay a legitimate data request."

This is the engineer-and-architect's version of what changed and what it means for a platform you're shipping today.

What the Cures Act actually requires of telehealth

The Cures Act's information-blocking provisions apply to providers and their health-IT actors — and most modern telehealth vendors qualify as one or the other. The shorthand most engineers carry around is "patients have a right to their data," but the operational shape is more pointed:

  • A patient (or their designated app) requests access to USCDI data — including notes, results, and demographics.
  • You must respond unless one of eight specific exceptions applies.
  • "Unable to comply" answers, throttling, opaque error messages, and queue delays can all be construed as information blocking if they look like friction-by-design.

For telehealth platforms this lands hardest on three surfaces:

  1. Patient-facing portal exports. Pre-Cures Act, "we'll mail it on a CD" was technically compliant. Post-Cures Act, friction is the violation.
  2. Third-party app integrations. A patient pointing a personal app at your FHIR endpoint has a right to that data. Your auth flow can't quietly block it.
  3. EHR / partner integrations. If you white-label to a hospital, their obligations flow through your APIs.

What the 2026 HIPAA Security Rule changed in this same surface

The 2026 amendments are still in regulatory motion at the time of writing — finalization status remains the part to watch — but the directional changes are clear and almost universally adopted in product roadmaps already:

  • MFA on remote-administrative access is now assumed, not optional.
  • Encryption at rest and in transit is no longer "addressable" for most categories.
  • Asset inventory is a first-class control, not a paperwork exercise.
  • Annual Business Associate verification is now required (previously a one-time-at-onboarding check).
  • Configuration-management evidence has to be producible on demand.

Pair these with the Cures Act's "don't quietly drop the request" posture, and the design implications stack quickly.

Five things engineering teams I talked to actually changed

Here's what I see in real codebases since the start of 2025.

1. Idempotent, audited export endpoints

Pre-Cures, export was a feature. Post-Cures, export is a system. Teams added:

  • A dedicated /export API path with strict rate limits but no quiet deny — every refusal returns a documented 1-of-8 exception code, not a 429-and-retry-later.
  • Server-side audit log entries for every export call (who, what, when, scope, exception-or-success).
  • Background-job pattern with a status URL the patient/app can poll, so "the export is taking 6 minutes" is observable rather than mysterious.

2. Real third-party app onboarding (not just OAuth-and-pray)

Patient app developers don't go through your sales team. They register, get a token, and pull data. The old approach — friction every step of the way — now reads as deliberate blocking.

Most teams I talked to moved to:

  • A self-serve developer portal with a sandbox.
  • Public docs covering all USCDI v3 elements your platform exposes.
  • Token-issuance latency budgeted under 24 hours of human review (above that and you start looking like you're stalling).

3. Asset inventory as an actual data store

The 2026 Security Rule asset-inventory requirement is the one that bit teams hardest in early audits. The "spreadsheet of laptops" approach doesn't pass anymore. Production platforms moved to:

  • A live asset registry (CMDB or equivalent) populated by your provisioning pipeline.
  • Per-asset linkage to the data classifications it touches.
  • A weekly reconciliation job that surfaces drift.

It's not a HIPAA-specific tool — most teams use whatever they already use for SOC 2 — but the coverage expectation jumped.

4. Logging that survives a subpoena

Telehealth logs always collected the basics. What changed is that "the basics" expanded:

  • Every PHI read/write/export — not just write.
  • Authentication events including failed attempts and MFA challenge outcomes.
  • Configuration changes with a diff and an actor.
  • 6-year retention is the practical floor.

The volume increase is real. Most teams either shipped to a SIEM or to a partitioned data lake with cold-tier rules tuned for 6+ year retention.

5. BAA verification as a quarterly rhythm

Annual BA verification is the under-the-radar 2026 change. Engineering ends up owning chunks of this when:

  • Your platform is the BA in the customer's contract — they are verifying you.
  • Your platform has sub-BAs (cloud, observability, transcription, etc.) — you are verifying them.

The clean implementation is a quarterly job that fans out a verification questionnaire to each BA partner and surfaces the responses to your compliance team.

Where this leaves a 2026 telehealth roadmap

If you're prioritizing what to build next, this is the rough order I'd push:

  1. Audit-grade export endpoints with documented exception responses.
  2. A self-serve third-party-app developer portal with a sandbox.
  3. Live asset inventory wired to provisioning.
  4. PHI access logs unified into a single retention-controlled stream.
  5. Quarterly BA verification job.

None of these is a Cures Act item or a 2026 Security Rule item in isolation — they're both, layered. That's the lens that makes the work tractable.


For more on the 2026 HIPAA Security Rule and the engineering-side controls telehealth platforms are scoping, see Medcurity's HIPAA Security Rule 2026 explainer, the best HIPAA SRA software comparison for 2026, the HIPAA penetration testing requirements guide, and the HIPAA vulnerability scanning requirements guide.

Top comments (0)