HIPAA Compliance for Dental Imaging: What You Need to Know

HIPAA and Dental Imaging
If you store, transmit, or share dental images electronically in the United States, you must comply with HIPAA (Health Insurance Portability and Accountability Act). DICOM files contain Protected Health Information (PHI) — patient name, date of birth, medical record numbers — embedded directly in the file metadata. This means every CBCT scan you handle is subject to HIPAA regulations.
Key HIPAA Requirements for Dental Images
Storage Security
HIPAA's Security Rule requires that electronic PHI (ePHI) be protected with appropriate safeguards:
- Encryption at rest: Stored DICOM files must be encrypted. AES-256 is the industry standard.
- Access controls: Only authorized personnel should be able to access patient images. Implement role-based access with unique user credentials.
- Audit trails: Maintain logs of who accessed which patient images and when.
- Backup and disaster recovery: Have a documented backup plan for your image archive.
Transmission Security
When sending DICOM files electronically — whether to a specialist, patient, or cloud platform — the transmission must be encrypted:
- TLS 1.2 or higher for web-based transfers
- Encrypted email or secure file-sharing platforms for email-based delivery
- Avoid unencrypted channels: Regular email attachments, consumer cloud storage (Google Drive, Dropbox personal), and unencrypted FTP are not HIPAA-compliant for PHI
Sharing with Patients
Patients have the right to access their own health records, including imaging. When sharing scans with patients:
- Use secure, encrypted sharing methods
- Links should have expiration dates
- Consider whether the patient portal or sharing method requires authentication
- Document the sharing in the patient's record
Business Associate Agreements (BAAs)
If you use a third-party service to store or process dental images (cloud PACS, online DICOM viewers, image sharing platforms), that service provider is a "Business Associate" under HIPAA. You must have a signed Business Associate Agreement (BAA) in place before sharing any patient data with them.
When evaluating cloud imaging platforms, always ask: Do they sign BAAs? Where is data stored? What encryption is used? What access controls are in place?
Common HIPAA Violations in Dental Imaging
The most frequent violations we see in dental practices:
- Emailing DICOM files as unencrypted attachments
- Storing images on personal devices without encryption
- Using consumer cloud storage without a BAA
- Sharing patient images on social media (even with good intentions for education)
- Not having audit trails for who accessed patient scans
Choosing HIPAA-Compliant Imaging Tools
Look for dental imaging platforms that offer encrypted storage, encrypted transmission (TLS), role-based access, audit logging, and are willing to sign a BAA. These features should be standard, not premium add-ons.
Try CBCTHub for free
Upload, view, and share DICOM scans in the cloud. Nothing to install.
Create free accountRelated articles
HIPAA-compliant CBCT viewers: what to look for and what the acronyms mean
A plain-English breakdown of what HIPAA requires from a CBCT viewer vendor in 2026, and the non-negotiable features to verify before picking one.

What Is CBCT and Why Every Dental Practice Needs It
Learn how cone beam computed tomography revolutionizes dental imaging and diagnosis. Discover why CBCT is essential for modern dental practices.

How to Read a CBCT Scan: A Beginner's Guide for Dentists
New to CBCT interpretation? Learn how to navigate axial, sagittal, and coronal views, identify key anatomical landmarks, and avoid common reading mistakes.