Are IP Addresses Considered PHI Under HIPAA? Yes—Here’s When and Why

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Are IP Addresses Considered PHI Under HIPAA? Yes—Here’s When and Why

Kevin Henry

HIPAA

July 10, 2025

8 minutes read
Share this article
Are IP Addresses Considered PHI Under HIPAA? Yes—Here’s When and Why

Overview of PHI Under HIPAA

Under the HIPAA Privacy Rule, Protected Health Information (PHI) is health information that identifies an individual—or could reasonably be used to identify one—when created or received by a covered entity or its business associate. In this framework, an IP address can be PHI if it connects a person to health care, payment, or a condition.

Covered entities include health care providers, health plans, and clearinghouses; business associates support them with services that involve PHI. If you collect or process IP addresses in these roles, treat them as potential Health Information Identifiers whenever they link to care, diagnosis, treatment, or billing.

While the Privacy Rule defines what counts as PHI, the Security Rule governs how you safeguard electronic PHI (ePHI). If an IP address is part of ePHI—for example, inside audit logs for a patient portal—you must apply appropriate Security Rule safeguards.

HIPAA’s 18 Identifiers List

For Data De-identification under the Privacy Rule’s Safe Harbor method, you must remove 18 specific identifiers so the remaining data cannot reasonably identify a person. IP addresses are explicitly on this list of Health Information Identifiers.

The 18 identifiers

  • Names
  • All geographic subdivisions smaller than a state (e.g., street address, city, county, precinct, ZIP code—with limited exceptions for the first three digits in certain cases)
  • All elements of dates (except year) directly related to an individual (e.g., birth, admission, discharge, death) and all ages over 89
  • Telephone numbers
  • Fax numbers
  • Email addresses
  • Social Security numbers
  • Medical record numbers
  • Health plan beneficiary numbers
  • Account numbers
  • Certificate/license numbers
  • Vehicle identifiers and serial numbers (including license plates)
  • Device identifiers and serial numbers
  • Web Universal Resource Locators (URLs)
  • Internet Protocol (IP) address numbers
  • Biometric identifiers (e.g., finger and voice prints)
  • Full-face photographic images and comparable images
  • Any other unique identifying number, characteristic, or code

Safe Harbor requires removing all 18 items and having no actual knowledge that the remaining data could identify the person. Alternatively, you may use the Expert Determination method to show a very small risk of re-identification under documented controls.

Conditions When IP Addresses Qualify as PHI

When IP addresses are PHI

  • They appear in patient portal, telehealth, EHR, billing, or claims systems that also contain diagnosis, treatment, or payment details.
  • They are logged alongside user IDs, names, email addresses, appointment times, or insurance information gathered by a covered entity or business associate.
  • They are combined with page paths, form fields, or messages that reveal a condition (e.g., symptom checkers, intake forms, prescription refills).
  • They originate from connected health devices or remote monitoring tools that transmit measurements associated with a specific individual.

When IP addresses are not PHI

  • They are collected by an organization that is not a HIPAA covered entity or business associate and are not linked to health information.
  • They appear in logs unrelated to care, diagnosis, treatment, or payment—without any reasonable basis to identify a patient.
  • They have been removed or adequately transformed under a valid de-identification methodology and cannot reasonably re-identify an individual.

A practical test for patient identifiability

Ask three questions: Who collected the IP address (covered entity or BA)? What health context is present (care, condition, or payment)? Could the IP reasonably identify a person alone or combined with other held data? If all three lean toward identifiability, treat the IP address as PHI.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Risk Factors in IP Address Data Handling

Patient identifiability increases when IP addresses interact with other persistent signals or sensitive workflows. Understanding these risk factors strengthens Compliance Risk Management and reduces exposure.

  • Authentication context: IP addresses tied to logged-in patient accounts, portals, or telehealth sessions.
  • Persistent identifiers: cookies, device IDs, or account IDs that follow a user across sessions and systems.
  • Small populations and static or IPv6 addresses that are more unique to a household or individual.
  • Rich telemetry: full URLs, query strings, referrers, error traces, or form field values captured in logs.
  • Third-party scripts or trackers that receive IP addresses without a Business Associate Agreement.
  • Long retention periods that enable linkage with other datasets over time.
  • Cross-system correlation where network, application, and marketing logs are analyzed together.

De-identification caveats for IP addresses

Under Safe Harbor, you must remove IP addresses entirely. Truncation or hashing may still permit re-identification if other signals exist. If you retain partial IPs for analytics, use the Expert Determination method, document controls, and routinely re-validate risk.

HIPAA Security Rule Requirements

When IP addresses form part of ePHI, the Security Rule Safeguards apply. You must implement administrative, physical, and technical measures proportional to risk, and continuously evaluate their effectiveness.

Administrative safeguards

  • Enterprise-wide risk analysis and ongoing risk management focused on systems that store or transmit IP-linked ePHI.
  • Policies and procedures for access, logging, retention, disposal, and incident response.
  • Workforce training, role-based access, and sanction policies to enforce proper handling.
  • Vendor diligence and Business Associate Agreements that govern IP address sharing and protection.
  • Regular evaluations and tabletop exercises to validate readiness.

Physical safeguards

  • Facility access controls and visitor management for data centers and on-premises environments.
  • Workstation security, screen privacy, and device/media controls for storage, transport, reuse, and disposal.

Technical safeguards

  • Access controls (unique user IDs, least privilege, session timeouts, strong authentication).
  • Audit controls with immutable logging, time synchronization, and active monitoring.
  • Integrity protections and change management to prevent unauthorized alteration of ePHI.
  • Transmission security and encryption in transit and at rest for systems that handle IP-linked ePHI.

Best Practices for IP Address Data Protection

  • Minimize collection: capture only the IP details you need for security or operations, not for broad tracking.
  • Segment analytics: isolate marketing tools from clinical systems; disable unnecessary third-party tags.
  • Implement encryption everywhere and enforce TLS with modern cipher suites.
  • Shorten retention and rotate logs; purge or archive to hardened, access-controlled storage.
  • Adopt pseudonymization or tokenization; avoid storing raw IPs where feasible.
  • Use privacy-preserving analytics; consider aggregation and noise injection validated by Expert Determination.
  • Tighten access governance with least privilege, just-in-time elevation, and periodic entitlement reviews.
  • Continuously monitor: anomaly detection, DLP, and alerting for unusual export or query patterns.
  • Conduct vendor risk assessments and ensure Business Associate Agreements address IP handling.
  • Document decisions and rationales as part of ongoing Compliance Risk Management.

Misclassifying or mishandling IP addresses tied to health information can trigger HIPAA enforcement, breach notifications, class actions, and scrutiny under consumer protection or state privacy laws. Reputational harm and contractual liability with partners and vendors often exceed direct fines.

HIPAA enforcement and penalties

  • Tiered civil monetary penalties based on culpability and corrective action.
  • Corrective action plans, outside monitoring, and public settlement announcements.

Breach notification obligations

  • Timely notice to affected individuals, federal regulators, and in some cases the media.
  • Forensic investigation, risk-of-harm assessment, and required documentation.
  • Federal and state consumer protection laws for unfair or deceptive practices.
  • Business Associate Agreement violations and indemnification demands.
  • Employment, professional, and accreditation consequences for systemic failures.

Summary

Are IP addresses considered PHI under HIPAA? Yes—when they are held by covered entities or business associates in a health care context and can reasonably identify an individual. Treat IP addresses as PHI in patient-facing systems, apply Security Rule safeguards, use robust de-identification, and document defensible compliance decisions.

FAQs.

When Are IP Addresses Classified as PHI?

An IP address is PHI when a covered entity or business associate collects or maintains it in connection with health care, payment, or a condition, and it identifies—or could reasonably identify—the individual, especially when combined with other data such as user IDs, portal sessions, or clinical details.

How Does HIPAA Define Identifiable Health Information?

HIPAA defines identifiable health information as data related to an individual’s past, present, or future physical or mental health, the provision of care, or payment for care, where the information identifies the person or there is a reasonable basis to believe it could. PHI exists when such information is created or received by a covered entity or business associate.

What Security Measures Are Required for IP Address PHI?

Apply Security Rule safeguards: perform a risk analysis, implement access control and audit logging, use encryption in transit and at rest, enforce least privilege and session timeouts, monitor for anomalies, manage vendors with Business Associate Agreements, and maintain policies, training, and incident response plans.

Can IP Addresses Alone Constitute PHI Under HIPAA?

By themselves, IP addresses are not automatically PHI. They become PHI when a covered entity or business associate can reasonably link the address to a specific person in a health care context. For de-identification under Safe Harbor, however, IP addresses count as identifiers and must be removed from shared datasets.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles