Decoding the HIPAA Privacy Rule: Understanding Identifiers

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Decoding the HIPAA Privacy Rule: Understanding Identifiers

Kevin Henry

HIPAA

January 08, 2024

6 minutes read
Share this article
Decoding the HIPAA Privacy Rule: Understanding Identifiers

Overview of HIPAA Privacy Rule

The HIPAA Privacy Rule establishes national standards for how covered entities and their business associates use, disclose, and safeguard Protected Health Information (PHI). It applies to PHI in any form—paper, electronic, or oral—and is central to Health Data Privacy Compliance across the care continuum.

Identifiers sit at the heart of the rule. When identifiers are linked to health data, the information becomes PHI and triggers strict requirements. When identifiers are removed in line with HIPAA’s De-identification Standard, data may be shared more freely for operations, research, and public health.

Who must comply

  • Covered entities: healthcare providers, health plans, and healthcare clearinghouses.
  • Business associates: vendors handling PHI on behalf of covered entities (e.g., billing, IT, analytics).

List of HIPAA Identifiers

HIPAA identifies 18 data elements that can make health information individually identifiable. These include specific Geographic Subdivision Identifiers, Biometric Identifiers, and Unique Identifying Codes.

  • Names.
  • All geographic subdivisions smaller than a state (street address, city, county, precinct, ZIP code, and similar geocodes).
  • All elements of dates (except year) related to an individual (e.g., birth, admission, discharge, death) and all ages over 89, which must be grouped as “90 or older.”
  • Telephone numbers.
  • Fax numbers.
  • Email addresses.
  • Social Security numbers.
  • Medical record numbers.
  • Health plan beneficiary numbers.
  • Account numbers.
  • Certificate or license numbers.
  • Vehicle identifiers and serial numbers, including license plates.
  • Device identifiers and serial numbers.
  • Web URLs.
  • IP address numbers.
  • Biometric identifiers (e.g., fingerprints, voiceprints).
  • Full-face photographs and comparable images.
  • Any other unique identifying number, characteristic, or code (with limited exceptions for non-derivable re-identification codes).

Clarifying rules

  • ZIP codes: only the first three digits may be used when the area shares a population of more than 20,000; otherwise, replace with “000.”
  • Ages: any age over 89 and related date elements must be aggregated into a single “90 or older” category.

Requirements for Protected Health Information

PHI may be used or disclosed without authorization for treatment, payment, and healthcare operations. For most other purposes, you need an individual’s valid authorization that clearly states the scope and purpose.

Apply the Minimum Necessary standard to limit PHI access, use, and disclosure to what is reasonably needed. Implement PHI Safeguarding measures such as role-based access, audit logs, encryption, and workforce training.

When sharing PHI with vendors, execute Business Associate Agreements that define permitted uses, safeguards, breach reporting, and termination rights. Maintain policies for retention, disposal, and secure transmission of PHI.

Individuals have rights to access, obtain copies (including electronic copies), request amendments, receive an accounting of disclosures, request restrictions, and ask for confidential communications.

If a breach occurs, follow HIPAA Breach Notification Rule requirements: assess risk, document your analysis, and notify affected individuals (and regulators, when required) within prescribed timeframes.

Methods for De-identifying Data

HIPAA’s De-identification Standard allows two pathways to transform PHI into non-identifiable data with a very small risk of re-identification: Safe Harbor and Expert Determination.

Safe Harbor method

  • Remove all 18 HIPAA identifiers about the individual and their relatives, employers, or household members.
  • Ensure no actual knowledge remains that the residual information could identify the individual.

Expert Determination method

  • A qualified expert applies statistical or scientific principles to determine that the risk of re-identification is very small.
  • Approaches can include generalization, suppression, perturbation, k-anonymity–style techniques, and documented risk assessments.

Limited Data Sets and Data Use Agreements

A Limited Data Set removes direct identifiers but may retain dates and certain Geographic Subdivision Identifiers (city, state, ZIP). It is not fully de-identified and requires a Data Use Agreement limiting uses to research, public health, or healthcare operations.

Re-identification codes

HIPAA permits Unique Identifying Codes for re-identification if the code cannot be derived from removed identifiers, is kept separately, and is disclosed only as allowed by policy.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Compliance and Enforcement

The HHS Office for Civil Rights (OCR) enforces the Privacy Rule through complaints, breach investigations, and periodic audits. Outcomes range from technical assistance to resolution agreements and multi-year corrective action plans.

Civil penalties are tiered by culpability, and criminal penalties may apply for knowing misuse of PHI. Thorough documentation—risk analyses, training records, BAAs, and incident reports—demonstrates ongoing compliance.

Impact on Healthcare Providers

Compliance shapes everyday workflows: EHR configuration, role-based permissions, patient intake forms, and secure information exchanges. Telehealth, remote monitoring, and mobile apps must align with Privacy and Security Rule safeguards.

De-identification enables analytics, quality improvement, and research while reducing privacy risk. Clear policies and staff training build patient trust and support sustainable Health Data Privacy Compliance.

Best Practices for Data Protection

  • Conduct an enterprise risk analysis and implement risk-based controls for PHI Safeguarding.
  • Enforce least privilege with role-based access, multi-factor authentication, and timely access reviews.
  • Encrypt PHI in transit and at rest; use secure messaging and vetted APIs.
  • Deploy data loss prevention, endpoint protection, mobile device management, and rigorous audit logging.
  • Minimize data collection; retain only what you need and dispose of PHI securely.
  • Manage vendors with due diligence, BAAs, and third‑party risk monitoring.
  • Maintain an incident response plan with tabletop exercises and breach playbooks.
  • Embed privacy by design in projects; apply de-identification or Limited Data Sets when full identifiers are unnecessary.
  • Control re-identification processes using non-derivable Unique Identifying Codes stored separately from datasets.
  • Train your workforce regularly and document all policies, procedures, and sanctions.

Conclusion

Understanding how identifiers create PHI—and how to remove them under the De-identification Standard—lets you share data responsibly while protecting individuals. Clear policies, strong safeguards, and disciplined governance keep privacy risks low and compliance high.

FAQs

What are the 18 HIPAA identifiers?

Names; geographic subdivisions smaller than a state; all elements of dates (except year) and ages over 89; telephone numbers; fax numbers; email addresses; Social Security numbers; medical record numbers; health plan beneficiary numbers; account numbers; certificate/license numbers; vehicle identifiers and serial numbers; device identifiers and serial numbers; web URLs; IP addresses; biometric identifiers; full-face photos and comparable images; and any other unique identifying number, characteristic, or code (with limited exception for non-derivable re-identification codes).

How does HIPAA define de-identification?

De-identification is achieved when health information cannot reasonably identify an individual. HIPAA allows two methods: remove all 18 identifiers under Safe Harbor with no actual knowledge of identifiability, or obtain Expert Determination that the risk of re-identification is very small using accepted statistical or scientific methods.

Which data elements require special protection under HIPAA?

Any data that links health information to an individual—including the 18 identifiers—requires protection as PHI. This spans contact details, financial and account numbers, device and network data, Biometric Identifiers, full-face images, and granular dates or locations tied to a person.

What methods are used to remove identifiers from PHI?

You can remove identifiers via Safe Harbor (strip all 18 and verify low risk) or use Expert Determination with techniques such as suppression, generalization, perturbation, and structured statistical models. When full de-identification is not feasible, a Limited Data Set with a Data Use Agreement can reduce risk for specific purposes.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles