Is ZocDoc HIPAA Compliant?
Is ZocDoc HIPAA Compliant?
Every appointment begins with a data trail. A patient opens their browser, types a condition or specialty into a search bar, selects a provider, fills out intake questions, and confirms a time slot. By the time they close the tab, a detailed picture of their health needs has been assembled: what kind of care they are seeking, which providers they considered, what insurance they carry, and what symptoms prompted the visit.
ZocDoc facilitates this workflow for millions of patients and tens of thousands of healthcare providers. As a healthcare marketplace, ZocDoc has made genuine investments in HIPAA compliance. The company signs Business Associate Agreements with providers who list on its platform. It holds SOC 2 certification. Its platform infrastructure is purpose-built for healthcare data.
But for healthcare organizations evaluating ZocDoc, the compliance question is more nuanced than whether ZocDoc itself is secure. The real question is what happens when ZocDoc's booking widget is embedded on your website, running alongside your existing analytics, advertising pixels, and tag management scripts.
How Patient Data Moves Through ZocDoc's Architecture
To understand the compliance picture, it helps to trace the data flow step by step.
On ZocDoc.com (the marketplace): Patients search for providers by condition, specialty, location, and insurance. Each search query carries implicit health information. Browsing a list of psychiatrists in Chicago reveals something different about a patient than browsing dermatologists in Dallas. ZocDoc's marketplace tracks which providers a patient views, which specialties they search, and which conditions they select from dropdown menus. This data lives within ZocDoc's own infrastructure, governed by their privacy policy and their HIPAA obligations.
On the provider's website (the embedded widget): Many healthcare organizations embed ZocDoc's scheduling widget directly on their own sites. This widget loads via JavaScript in the patient's browser. When a patient interacts with it, they enter personal details, select appointment types, and submit intake information. All of this happens within the context of the provider's web page.
The intake flow: ZocDoc's pre-visit forms collect insurance details, reason for visit, medical history, medications, and allergies. Patients often complete these forms before their first appointment, meaning sensitive health data is entered through a browser-based interface.
Each of these stages handles data that qualifies as protected health information under HIPAA. The critical distinction is where the compliance boundary sits. ZocDoc controls its own platform security. But the moment its widget runs on your website, it enters a shared environment that you control.
The Embed Problem: When Two JavaScript Worlds Collide
Here is where the compliance evaluation becomes important for healthcare marketers and IT teams.
ZocDoc's booking widget is embedded on provider websites via a JavaScript snippet. Once that snippet loads in a patient's browser, it shares the page with every other script running on that site. If a provider's website also runs Google Analytics, Meta Pixel, a session replay tool, a chatbot, or any other third-party tracking script, all of those tools can observe page-level activity.
This is not a flaw in ZocDoc's engineering. It is a fundamental property of how client-side JavaScript works. When multiple scripts run on the same page, they share the DOM (the page structure), can read URL parameters, observe form interactions, and access cookies. A patient clicking "Book Appointment" on a ZocDoc widget may simultaneously trigger a Google Analytics pageview event, a Meta Pixel interaction event, or a session replay recording.
The result: health-related data about the patient's booking intent, the type of provider they selected, or the department page they are on can flow to third-party platforms that have no BAA with the provider and no obligation to treat the data as PHI.
This is exactly the pattern behind over $193 million in enforcement actions and settlements since 2023. Not sophisticated attacks. Routine marketing tools running on healthcare pages, quietly collecting data that qualifies as PHI.
What $47.5 Million in Settlements Reveal About Embedded Scripts
The enforcement cases that matter most here involve healthcare organizations that used standard web tools on pages where patients interacted with health-related features.
Kaiser Permanente ($47.5M, 2025): Kaiser's websites and patient portals used third-party tracking code from Google, Microsoft, Meta, and X. The code transmitted health information, including search terms and medical histories, for 13.4 million members across nine states. The tracking had been running from 2017 to 2024. No one at Kaiser intended to share PHI with advertising platforms. The tools were installed for legitimate marketing purposes. But the architecture made leakage inevitable.
Aspen Dental ($18.4M, 2025): Aspen Dental used Meta Pixel and Google tracking tools on aspendental.com. The tools transmitted appointment booking information to Meta and Google without patient knowledge or consent. The exposure period ran from February 2022 through January 2025. Appointment booking data, the exact category of information that flows through scheduling widgets, was at the center of the case.
Advocate Aurora Health ($12.25M, 2024): Advocate Aurora installed Meta Pixel and Google Analytics on its website, app, and patient portal to "better understand patient needs." The tools exposed data of approximately 3 million patients to Meta and Google from 2017 to 2022. The stated motivation was analytics. The outcome was a multimillion-dollar settlement.
The common thread across all three cases: healthcare organizations placed third-party JavaScript on pages where patients engaged with health-related workflows. The tools did exactly what they were designed to do. The organizations simply did not account for what that meant in a healthcare context.
Embedding ZocDoc's widget on a page that also runs tracking scripts creates the same category of risk. Not because ZocDoc's widget is leaking data, but because the other scripts on the page can observe patient interactions with it.
Evaluating ZocDoc for Your Healthcare Organization
ZocDoc's own compliance posture includes several meaningful commitments:
Business Associate Agreements: ZocDoc signs BAAs with healthcare providers who list on the platform. This means ZocDoc accepts liability as a Business Associate under HIPAA for data processed through its systems.
SOC 2 certification: ZocDoc has obtained SOC 2 certification, which demonstrates that independent auditors have reviewed its security controls.
Platform security: ZocDoc's core infrastructure is built for healthcare data, with encryption, access controls, and data handling procedures designed for PHI.
These are legitimate compliance investments. Many tools evaluated on this site offer far less.
However, a complete evaluation requires looking beyond ZocDoc's own infrastructure to consider how the tool interacts with your environment. Here is a framework for that evaluation:
1. Audit what else runs on your booking pages. Before embedding ZocDoc's widget, catalog every script, pixel, and cookie on the pages where it will appear. If Google Analytics, Meta Pixel, or any advertising technology is present, those tools can observe patient interactions with the booking flow. This audit needs to be continuous, not a one-time check. Marketing teams add scripts, plugins update, and third-party tags load other tags. Your tracking surface changes constantly.
2. Verify the BAA scope. Confirm that ZocDoc's BAA covers the specific data flows relevant to your implementation. Does it cover data collected through the embedded widget on your site, or only data processed within ZocDoc's own platform? Not all BAAs are equal. A comprehensive healthcare BAA covers the full data pipeline: collection, processing, storage, and transmission.
3. Assess the client-side exposure. ZocDoc's widget loads in the patient's browser via JavaScript. Any data entered into the widget passes through the browser environment. If your site's other scripts can observe that environment, the data is potentially exposed to platforms without a BAA. Server-side architectures eliminate this risk by routing data from your server to destinations, keeping the browser out of the equation entirely.
4. Implement consent-gated data flows. The next frontier of healthcare compliance is consent management. State privacy laws are expanding. Patient expectations around data control are rising. Consent needs to be verified server-side before data flows to any destination, not through a JavaScript-based consent banner that other scripts can bypass.
5. Monitor continuously with a web scanner. A web scanner crawls your site on an ongoing basis and detects every cookie, script, localStorage entry, and tracking pixel across every page. It flags which scripts lack a BAA, which cookies are set by third parties, and which tracking pixels send data to ad platforms. Every enforcement case referenced above involved tracking that had been running for years before anyone noticed. A web scanner closes that gap.
Building a Compliant Booking and Analytics Stack
The goal is not to avoid ZocDoc. It is to ensure that your entire page environment meets the compliance bar when ZocDoc's widget is present.
A healthcare-grade architecture addresses the risks at the infrastructure level:
Server-side data collection removes the browser as a data pathway. Instead of client-side JavaScript sending data to third parties, your server processes the data and routes it to approved destinations. The patient's browser never communicates directly with analytics or advertising platforms. This is the architectural difference between hoping nothing leaks and ensuring nothing can leak.
First-party infrastructure means all data collection happens on your domain. No third-party tracking endpoints are visible in browser DevTools. Cookies are server-set, immune to Safari ITP and ad blockers. No vendor fingerprint appears in page source.
Consent-gated dispatch ensures data only flows to destinations after consent is verified server-side. This is not a JavaScript consent banner. It is a server-side gate that prevents data from reaching any destination until the patient has explicitly opted in.
Continuous compliance monitoring through a web scanner catches new scripts that marketing teams add, plugins that update with new tracking, and third-party tags that load additional tags. Without ongoing scanning, you are relying on the hope that nobody on your team introduced a non-compliant script since your last manual review.
A HIPAA-compliant CDP ties these components together: collecting data server-side, enforcing consent rules, filtering bot traffic, and dispatching to approved destinations under a comprehensive BAA with SOC 2 Type II coverage across all five trust criteria (Security, Availability, Processing Integrity, Confidentiality, and Privacy).
Frequently Asked Questions
Does ZocDoc sign a Business Associate Agreement?
Yes. ZocDoc signs BAAs with healthcare providers who list on their platform. This is a meaningful compliance commitment that establishes ZocDoc as a Business Associate under HIPAA. When evaluating the BAA, confirm its scope covers your specific use case, particularly if you are embedding the ZocDoc widget on your own website rather than directing patients to ZocDoc.com.
Is ZocDoc's booking widget safe to embed on my healthcare website?
The widget itself is built for healthcare data. The risk comes from what else runs on the same page. If your website uses Google Analytics, Meta Pixel, session replay tools, or any other client-side tracking, those scripts share the browser environment with ZocDoc's widget. Patient interactions with the booking flow can be observed by tools that have no BAA and no obligation to treat the data as PHI. Audit your page-level scripts before embedding any scheduling widget.
Does ZocDoc have SOC 2 certification?
ZocDoc has obtained SOC 2 certification. When evaluating any vendor's SOC 2, check whether it covers all five trust criteria (Security, Availability, Processing Integrity, Confidentiality, and Privacy) or only Security. Most vendors certify against Security alone, which is table stakes rather than comprehensive compliance. Also verify whether the certification is Type I (point-in-time snapshot) or Type II (sustained compliance over a review period).
Can ZocDoc's marketplace data create HIPAA risks?
When patients search for providers on ZocDoc.com by condition, specialty, or symptom, those search queries carry implicit health information. ZocDoc manages this data within its own platform under its HIPAA obligations. For providers, the consideration is whether ZocDoc's marketplace analytics (which providers patients viewed, which conditions they searched) could create data linkages that affect your compliance posture. Review ZocDoc's data sharing and analytics features with your compliance team.
What should I do if I already have ZocDoc's widget embedded alongside other tracking tools?
Start with a full audit of every script running on the pages where ZocDoc's widget appears. Use a web scanner to identify all cookies, tracking pixels, and third-party scripts across your site. For any script that lacks a BAA, evaluate whether it can observe patient interactions with the booking widget. Consider migrating your analytics and marketing stack to a server-side architecture that prevents the browser from communicating with third-party platforms. This eliminates the page-level risk without requiring you to remove the booking widget.
Evaluate your full tracking stack, not just individual tools. [See all HIPAA tool compliance guides](/learn/hipaa-compliant-tools) or [explore how a HIPAA-compliant CDP](/products/cdp) eliminates client-side risk at the architecture level.
Continue Learning
Explore more HIPAA compliance resources for healthcare marketers.
Tool Compliance Reviews
Find out which marketing tools are HIPAA compliant and which ones put your organization at risk.
Server-Side TrackingServer-Side Tracking Guides
Replace risky client-side pixels with secure, compliant data collection that protects patient privacy.