Deciphering PHI Identifiers Within HIPAA Regulations

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Deciphering PHI Identifiers Within HIPAA Regulations

Kevin Henry

HIPAA

January 09, 2024

8 minutes read
Share this article
Deciphering PHI Identifiers Within HIPAA Regulations

Overview of PHI Identifiers

Protected Health Information (PHI) is individually identifiable health data that relates to a person’s health, care, or payment for care and is created or maintained by Covered Entities or their Business Associates. The HIPAA Privacy Rule specifies 18 identifiers that, when present with health information, render it PHI.

Deciphering PHI identifiers within HIPAA regulations helps you separate what must be protected from what can be shared. HIPAA permits identifier de-identification by two paths: the Safe Harbor method, which removes all 18 identifiers, and the Expert Determination method, which uses statistical risk analysis to ensure very small re-identification risk.

Once PHI is de-identified, it falls outside the Privacy Rule, but you should still apply reasonable Data Safeguards to uphold Health Information Security and ethical use.

Detailed Explanation of Each PHI Identifier

Demographic and contact identifiers

  • Names: Any full or partial name that can identify a person, including initials when combined with other data.
  • Geographic subdivisions smaller than a state: Street address, city, county, precinct, ZIP code (only the first three digits may remain when the corresponding region has more than 20,000 residents; otherwise use 000), and equivalent geocodes.
  • All elements of dates (except year) related to an individual: Birth, admission, discharge, and death dates; ages over 89 must be aggregated as 90 or older to avoid singling out individuals.
  • Telephone numbers: Any personal, work, mobile, or VoIP number linked to the individual.
  • Fax numbers: Outbound or inbound numbers associated with the person or their household.
  • Email addresses: Personal or work emails that connect to the individual.

Numbers and codes assigned to individuals

  • Social Security numbers: Full or partial values are identifying and cannot be shared.
  • Medical record numbers: Any internal chart, encounter, or patient ID used by a provider.
  • Health plan beneficiary numbers: Subscriber IDs, including those issued by public or private plans.
  • Account numbers: Billing, bank, or portal account IDs that can connect a record to a person.
  • Certificate/license numbers: Professional, driver’s license, or other government-issued IDs.

Vehicles, devices, and digital traces

  • Vehicle identifiers and serial numbers: VINs, license plates, and similar tags that could tie to a person.
  • Device identifiers and serial numbers: IMEIs, implant serials, and other device-linked codes.
  • Web URLs: Page or portal addresses that point to a personal profile, record, or account.
  • IP address numbers: Static or dynamic IPs that can reasonably be linked to the individual.

Images and biometrics

  • Biometric identifiers: Fingerprints, voiceprints, retinal/iris scans, and comparable metrics.
  • Full-face photographs and comparable images: Any image that allows ready identification of the person.

The catch-all

  • Any other unique identifying number, characteristic, or code: This includes free-text notes with rare conditions, small-location references, or an internal re-identification code that could enable matching back to the individual.

Importance of PHI in HIPAA Compliance

Recognizing PHI triggers your obligations under the HIPAA Privacy Rule and the Security Rule. You must limit uses and disclosures to permitted purposes and apply the Minimum Necessary Standard so workforce members access only what they need to do their jobs.

Properly identifying PHI also streamlines sharing for treatment, payment, and health care operations while maintaining trust. It enables compliance-ready workflows, accurate logging, and defensible responses to audits and investigations.

Clear labeling of PHI versus de-identified data reduces breach risk, prevents mission creep in analytics, and supports sustainable Health Information Security practices.

Exclusions from PHI

De-identified information is not PHI if you remove the 18 identifiers under Safe Harbor or an expert certifies that re-identification risk is very small. Aggregated statistics that no longer identify individuals also fall outside PHI.

Education records covered by FERPA and employment records held by a Covered Entity in its role as employer are excluded. Health information about an individual that is not created or received by a Covered Entity or Business Associate (for example, some consumer apps) generally is not PHI under HIPAA, though other laws may apply.

Information about individuals deceased for more than 50 years is not PHI. Note that a Limited Data Set is still PHI, but you may use or disclose it for specific purposes under a Data Use Agreement.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Handling and Protecting PHI

Administrative safeguards

  • Perform an enterprise risk analysis, assign a privacy and security officer, and enforce policies that reflect the Minimum Necessary Standard.
  • Train your workforce, manage user provisioning and sanctions, and maintain Business Associate Agreements with vendors handling PHI.
  • Define retention and disposal schedules, incident response steps, and breach decision trees with clear roles and timelines.

Technical safeguards

  • Use role-based access, unique user IDs, and multi-factor authentication for systems with ePHI.
  • Encrypt PHI in transit and at rest, implement integrity controls, and maintain audit logs with regular reviews.
  • Apply Data Safeguards such as DLP, endpoint protection, backups, and secure key management.

Physical safeguards

  • Control facility access, secure workstations and mobile devices, and protect media with tracking, sanitization, and verified destruction.
  • Use privacy screens and clean desk practices to reduce incidental exposure in hybrid and clinical environments.

De-identification and data minimization

  • Apply identifier de-identification using Safe Harbor or Expert Determination for secondary use and sharing.
  • Prefer pseudonymization and Limited Data Sets with Data Use Agreements when full de-identification is not practical.
  • Continuously minimize collection, storage, and disclosure to what is necessary for the stated purpose.

HIPAA violations are enforced by HHS Office for Civil Rights through complaint investigations, audits, corrective action plans, and tiered civil penalties aligned to the level of culpability. Willful neglect can trigger the highest penalty tiers and ongoing monitoring.

Knowingly obtaining or disclosing PHI without authorization can lead to criminal liability, with enhanced penalties for false pretenses or intent to profit. State privacy, breach notification, and consumer protection laws may add parallel obligations and liabilities.

When a breach of unsecured PHI occurs, you must notify affected individuals, HHS, and sometimes the media without unreasonable delay and no later than 60 days after discovery. A documented risk assessment—considering the data involved, the unauthorized recipient, whether the data was actually viewed, and mitigation—supports defensible breach decisions.

Best Practices for PHI Management

  • Inventory systems and data flows so you always know where PHI lives and who can access it.
  • Embed privacy-by-design: default to the Minimum Necessary Standard, segregate environments, and enforce least privilege.
  • Harden endpoints and cloud services, patch routinely, and validate backups and recovery objectives.
  • Operationalize BAAs, vendor risk reviews, and ongoing monitoring of Business Associates that handle PHI.
  • Test incident response with tabletop exercises and close gaps with corrective action plans.
  • Use de-identification and Limited Data Sets for analytics whenever possible to reduce exposure.

Conclusion

By accurately classifying PHI, removing identifiers when appropriate, and applying layered safeguards, you uphold the HIPAA Privacy Rule, strengthen Health Information Security, and reduce organizational risk while enabling responsible data use.

FAQs

What are the 18 PHI identifiers under HIPAA?

  1. Names
  2. Geographic subdivisions smaller than a state (street address, city, county, precinct, ZIP code—with only the first three digits allowed when the region has more than 20,000 residents; otherwise 000)
  3. All elements of dates (except year) directly related to an individual, and ages over 89 (aggregate as 90+)
  4. Telephone numbers
  5. Fax numbers
  6. Email addresses
  7. Social Security numbers
  8. Medical record numbers
  9. Health plan beneficiary numbers
  10. Account numbers
  11. Certificate/license numbers
  12. Vehicle identifiers and serial numbers, including license plates
  13. Device identifiers and serial numbers
  14. Web URLs
  15. IP addresses
  16. Biometric identifiers (for example, finger and voice prints)
  17. Full-face photographs and comparable images
  18. Any other unique identifying number, characteristic, or code

How does HIPAA define and protect PHI?

HIPAA defines PHI as individually identifiable health information held or transmitted by a Covered Entity or Business Associate. The HIPAA Privacy Rule governs permitted uses and disclosures; the Security Rule requires administrative, technical, and physical protections for electronic PHI; and the Breach Notification Rule mandates timely notice after certain incidents.

What information is excluded from PHI?

De-identified data (via Safe Harbor or Expert Determination), education records under FERPA, employment records held by a Covered Entity in its employer role, information about individuals deceased for more than 50 years, and health data not created or received by a Covered Entity or Business Associate are not PHI. A Limited Data Set remains PHI but may be shared for specific purposes under a Data Use Agreement.

How should covered entities handle PHI securely?

Apply the Minimum Necessary Standard; implement role-based access, MFA, encryption in transit and at rest, audit logging, and regular risk analyses; train staff; manage vendors with BAAs; maintain incident response and breach notification procedures; and prefer de-identification or Limited Data Sets for analytics to reduce risk.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles