Is Segment HIPAA Compliant?
Is Segment HIPAA Compliant?
Segment, now owned by Twilio, is one of the most popular customer data platforms on the market. It solves a real problem for marketing and product teams: collecting data once and routing it to dozens of destinations without writing custom integrations for each one. Healthcare organizations are drawn to Segment because it promises a clean data layer, a single point of control for all downstream tools, and the ability to centralize data governance.
But centralizing data collection is not the same as making it compliant. When protected health information flows through a CDP, the compliance question extends well beyond the platform itself. It includes every destination that receives the data, the architecture that collects it, and the contracts governing each link in the chain. For healthcare teams evaluating Segment, the answer is not a simple yes or no. It requires a careful look at what compliance actually demands.
What Healthcare-Grade Compliance Actually Requires
Before evaluating Segment specifically, it's worth establishing what any vendor needs to demonstrate before it can safely handle healthcare data. Three pillars matter most: the legal agreement, the audit posture, and the data architecture.
A Real Business Associate Agreement
Under HIPAA, any vendor that receives, stores, or transmits protected health information on behalf of a covered entity must sign a Business Associate Agreement. A BAA is a legal contract where the vendor accepts liability for safeguarding PHI and agrees to specific obligations around breach notification, data handling, and permitted uses.
Not all BAAs are equal. Some vendors offer agreements that carve out marketing data, analytics data, or data collected on unauthenticated pages. A legitimate healthcare BAA covers the full data pipeline: collection, processing, storage, and transmission. When evaluating a BAA, read the scope carefully. A BAA that excludes the data your marketing team actually collects is not protecting you.
SOC 2 Type II with All Five Trust Criteria
SOC 2 Type II is an independent audit that verifies a vendor's controls over an extended review period. The audit covers up to five trust service criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy.
Most vendors certify only Security (1 of 5). That is table stakes. It means an auditor confirmed basic access controls and encryption. It says nothing about how data is processed, whether it remains confidential, or how the vendor handles privacy obligations.
All five criteria mean independent auditors verified the vendor handles data with the rigor healthcare requires: that the system is available when needed, processes data accurately, keeps it confidential, and respects privacy commitments. Type II (not Type I) means this was verified over a sustained period, not a single point-in-time snapshot.
Server-Side Data Architecture
Client-side tracking works by loading JavaScript in the visitor's browser. That JavaScript collects behavioral data and sends it directly from the browser to a third-party server. The browser becomes the intermediary, and the data transits through a connection your organization does not control.
Server-side tracking works differently. Data is collected on your server and sent from your infrastructure to its destination. The visitor's browser never communicates with the vendor. There is no third-party JavaScript, no third-party cookies, and no data path outside your control.
This distinction matters because every major healthcare tracking enforcement case involved client-side tracking technologies. The browser-to-third-party data path is the root cause, not a contributing factor.
Where Segment Stands
Segment occupies an interesting position in the healthcare compliance landscape. Unlike many marketing tools, it does offer some of the infrastructure healthcare teams need. But the details matter significantly.
BAA availability is tier-gated. Segment offers a Business Associate Agreement, but only for customers on its Business tier, the most expensive pricing level. Teams on the Free, Team, or Growth plans cannot sign a BAA. If your contract does not include Business-tier access, Segment is operating without a HIPAA-compliant legal framework regardless of how you configure it.
SOC 2 scope varies by tier. Segment holds SOC 2 Type II certification, but coverage of all five trust criteria (Security, Availability, Processing Integrity, Confidentiality, and Privacy) is available only at the Business tier. Lower tiers may not carry the same audit scope, which means the independent verification healthcare teams need may not apply to your deployment.
Default architecture is client-side. Segment's standard implementation uses analytics.js, a JavaScript library that loads in the visitor's browser. This library collects events and sends them from the browser to Segment's servers, which then fan out data to configured destinations. This is the same client-side architecture that has been at the center of every major healthcare enforcement action. Segment does offer server-side SDKs and an HTTP Tracking API, but the majority of healthcare implementations still rely on analytics.js for its ease of setup, broader feature support, and tighter integration with destination libraries.
Destinations are outside Segment's compliance perimeter. This is the most underappreciated risk. Segment's core value proposition is routing data to downstream tools: Google Analytics, Meta, Mixpanel, HubSpot, and hundreds of others. Each destination introduces its own compliance considerations. A destination that does not sign a BAA, operates client-side, or uses data for advertising creates a compliance gap that Segment's own BAA does not cover. The compliance posture of your Segment implementation is only as strong as the weakest destination in your pipeline.
What the Enforcement Landscape Looks Like
Since 2023, healthcare organizations have paid over $193 million in settlements and penalties related to tracking technologies on their websites. Every case involved standard marketing tools, not sophisticated attacks. The pattern is consistent: organizations installed widely used tools, those tools operated client-side, data flowed to third parties, and no one noticed until regulators or plaintiffs intervened.
Kaiser Permanente reached a $47.5 million settlement affecting 13.4 million members. From 2017 to 2024, their websites and patient portals used third-party tracking code that transmitted health information to Google, Microsoft, Meta, and X without member consent. The data included search terms, medical histories, and communications with healthcare professionals.
Advocate Aurora Health settled for $12.25 million after installing Meta Pixel and Google Analytics on its website, app, and patient portal. The intent was to "better understand patient needs." The outcome was the exposure of approximately 3 million patients' data and a class action lawsuit. Advocate Aurora's tracking ran for five years before it was identified.
GoodRx paid $1.5 million to the FTC and $25 million in a class action after tracking pixels shared prescription drug names, health conditions, and personal identifiers with Facebook, Google, and other ad platforms. This was the first enforcement action under the FTC Health Breach Notification Rule, establishing precedent that extends beyond HIPAA-covered entities.
The common thread across these cases is not that the organizations chose bad tools. They chose mainstream tools, configured them using standard practices, and had no mechanism to detect when those tools began transmitting protected data to third parties.
What a Compliant CDP Architecture Looks Like
Healthcare organizations need data infrastructure. They need to collect events, route data to analytics platforms, and measure marketing performance. The question is not whether to use a CDP, but what architecture that CDP should employ.
Server-side data collection. All event data should flow from your server to the CDP, never from the visitor's browser to a third-party endpoint. This eliminates the data path that caused every enforcement case listed above. A server-side CDP processes data within your infrastructure before dispatching it to destinations.
First-party infrastructure. Data collection should happen on your domain, through your DNS, using server-set cookies. No third-party JavaScript in the page source. No tracking endpoints visible in browser developer tools. This approach is also immune to ad blockers and Safari's Intelligent Tracking Prevention, which means more accurate data alongside better compliance.
Consent-gated data dispatch. Consent and privacy are quickly becoming the next frontier of healthcare compliance, driven by state privacy laws and rising patient expectations. Data should only flow to destinations after consent is verified server-side. A JavaScript consent check can be bypassed or fail to load. A server-side consent gate cannot. The organizations integrating consent into their data architecture now will be ahead as the regulatory landscape evolves. This means your CDP should not dispatch data to any destination until the patient's consent status has been confirmed at the server level.
Continuous compliance monitoring. Installing a compliant CDP does not mean your entire website is compliant. Marketing teams add scripts, plugins update, and third-party tags load additional tags. A web scanner that crawls your site regularly detects every cookie, script, localStorage entry, and tracking pixel across every page. It flags healthcare-specific risks: which scripts lack a BAA, which cookies are set by third parties, which tracking pixels are sending data to ad platforms. Every enforcement case in the reference data involved tracking that had been running for years before anyone noticed. Continuous scanning catches drift before it becomes a breach notification.
How to Evaluate Any CDP Vendor for Healthcare
Whether you are evaluating Segment, an alternative CDP, or any data infrastructure platform, use this checklist:
Does the vendor sign a BAA, and at what tier? If the BAA is gated to an enterprise or premium tier, confirm that your contract includes it. Then read the BAA carefully. Does it cover all data the tool collects, or does it carve out certain data types?
What does the SOC 2 report cover? Ask for the trust criteria. If it covers Security only (1 of 5), the audit did not verify confidentiality, privacy, or data processing integrity. Ask whether all five criteria are covered at your pricing tier.
Where does data flow? Does the tool load JavaScript in the visitor's browser that sends data to a third-party server? Or does data flow server-side from your infrastructure? For CDPs specifically, ask whether the server-side option provides the same feature set as the client-side implementation.
What about destinations? A CDP is only as compliant as its least compliant destination. For every tool receiving data from the CDP, ask the same questions: BAA, SOC 2 scope, data architecture, consent integration. If one destination does not have a BAA, data flowing to it from your BAA-covered CDP is still non-compliant.
How is consent enforced? Is consent a JavaScript check that can be bypassed, or is it enforced server-side before data leaves your infrastructure? Can the CDP block dispatch to specific destinations based on consent status?
Can you monitor your site continuously? Does your compliance strategy include scanning tools that detect non-compliant scripts, cookies, and pixels across your entire site on an ongoing basis? A clean CDP installation does not account for what else is running on your pages.
FAQ
Does Segment sign a BAA?
Yes, but only for customers on the Business tier, which is Segment's highest pricing level. Customers on Free, Team, or Growth plans cannot obtain a BAA. If you are evaluating Segment for healthcare use, confirm that your contract includes Business-tier access and that the BAA covers the data types your implementation will collect.
Can I use Segment's server-side SDK to avoid client-side risks?
Segment does offer server-side SDKs and an HTTP Tracking API that allow you to send data from your server rather than from the visitor's browser. This is architecturally stronger than the default analytics.js implementation. However, most Segment deployments in healthcare still use the client-side library because it is simpler to set up and supports a wider range of destination integrations. If you pursue a server-side Segment implementation, verify that all the destinations you need support server-side data ingestion as well.
What about Segment's destinations? Are they covered by Segment's BAA?
No. Segment's BAA covers Segment's own handling of your data. Once data is dispatched to a destination (Google Analytics, Meta, Mixpanel, HubSpot, or any of the hundreds of integrations Segment supports), that destination's own compliance posture applies. Each destination requires its own BAA evaluation, its own data architecture review, and its own consent integration. A compliant Segment setup routed to a non-compliant destination is still a compliance gap.
Is Segment better than Google Analytics for healthcare?
Segment and Google Analytics serve different functions. Segment is a customer data platform that collects and routes data; Google Analytics is an analytics and reporting tool. The compliance considerations differ for each. Segment does offer a BAA (at Business tier), while Google Analytics does not offer a BAA at any tier. However, if Segment is routing data to Google Analytics as a destination, the lack of a GA BAA still creates a compliance gap in your data flow.
How much have healthcare organizations paid in tracking-related settlements?
Since 2023, healthcare organizations have paid over $193 million in combined enforcement actions and class action settlements related to tracking technologies. The largest single case, Kaiser Permanente, settled for $47.5 million affecting 13.4 million members. These cases involved standard marketing tools like Meta Pixel, Google Analytics, and tracking SDKs. No case involved a sophisticated cyberattack; all were self-inflicted through routine marketing technology decisions.
Continue Learning
Explore more HIPAA compliance resources for healthcare marketers.
Tool Compliance Reviews
Find out which marketing tools are HIPAA compliant and which ones put your organization at risk.
Server-Side TrackingServer-Side Tracking Guides
Replace risky client-side pixels with secure, compliant data collection that protects patient privacy.