Does HIPAA Apply to Phone Numbers? When a Phone Number Is (and Isn’t) PHI

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Does HIPAA Apply to Phone Numbers? When a Phone Number Is (and Isn’t) PHI

Kevin Henry

HIPAA

March 08, 2024

6 minutes read
Share this article
Does HIPAA Apply to Phone Numbers? When a Phone Number Is (and Isn’t) PHI

Short answer: it depends on context. Under the HIPAA Privacy Rule, a phone number can be Protected Health Information (PHI) when it relates to an individual’s health care or payment and is held by a Covered Entity or its Business Associate. The same number, in a different context, may not be PHI at all.

Phone Numbers as Protected Health Information

When a phone number becomes PHI

A phone number qualifies as PHI when it is part of Individually Identifiable Health Information in a Designated Record Set—such as medical or billing records used to make decisions about a person. If you collect or store a patient’s number to schedule visits, deliver test results, send care instructions, or process claims, you are handling PHI.

Everyday examples

  • Appointment scheduling and reminders tied to a patient chart.
  • Billing contacts maintained alongside diagnosis or procedure codes.
  • Telehealth accounts or patient portal profiles linked to treatment.

When it is not PHI

  • A personal contact list kept for non-work use.
  • Numbers collected by a retailer with no health-care function.
  • Consumer apps operating independently of a Covered Entity (not on its behalf).

HIPAA Identifiers and Phone Numbers

Phone numbers are an explicit HIPAA identifier

Under HIPAA’s De-Identification Standards, telephone numbers are among the enumerated identifiers that can link data to a person. Their presence typically makes data identifiable if the information also relates to health care or payment.

Implications for data use

  • To meet Safe Harbor de-identification, you must remove phone numbers along with other specified identifiers.
  • A Limited Data Set cannot include phone numbers; if you need to share near-raw data, use a data use agreement and exclude contact elements.

Contextual Application of HIPAA to Phone Numbers

Role matters: Covered Entity vs. Business Associate

If you are a Covered Entity (provider, health plan, clearinghouse), numbers in patient or member records are PHI. If you are a Business Associate handling those numbers to perform services (e.g., a reminder or messaging vendor), you are also subject to HIPAA via a Business Associate Agreement.

Direct-to-consumer scenarios

When individuals give their number to a consumer health app not acting for a Covered Entity, HIPAA generally does not apply. Other laws (state privacy, TCPA) may, but the number is not PHI solely because it concerns health topics outside the HIPAA-covered relationship.

Research and data sharing

For research disclosures, phone numbers cannot appear in a Limited Data Set. If recontact is required, consider a coded linkage managed by an honest broker, or obtain authorization or a waiver from an IRB/Privacy Board.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Exclusion Criteria for Phone Numbers

  • Employment records held by a Covered Entity in its role as employer are not PHI, even if they contain phone numbers.
  • Education records covered by FERPA are excluded from HIPAA; student health center records may be FERPA or HIPAA depending on the institution’s structure.
  • Numbers stored or used without any relation to health care, payment, or operations—and not within a Designated Record Set—are not PHI.
  • Properly de-identified data sets are not PHI; any residual linkage that enables re-identification can negate this status.

De-Identification and Phone Number Removal

Safe Harbor method

Remove phone numbers and all other specified identifiers, and ensure you have no actual knowledge that remaining data could identify the individual. This is the most straightforward path to release data without HIPAA restrictions.

Expert Determination method

A qualified expert may certify that the risk of re-identification is very small. You might tokenize or transform phone numbers, but only if the expert’s analysis supports the residual risk controls and the re-identification key is stored separately with strict safeguards.

Practical techniques

  • Suppress entire numbers rather than partially masking them when sharing externally.
  • Use one-way hashing or format-preserving tokens only for internal linkage, with segregated keys and access controls.
  • Document your De-Identification Standards, testing, and approvals for audit readiness.

Safeguarding Phone Numbers as PHI

Administrative and technical controls

  • Apply the minimum necessary standard; limit who can view or export contact fields.
  • Use role-based access, MFA, encryption in transit and at rest, and audit logging.
  • Maintain data maps showing where phone numbers live across systems and vendors.

Messaging and voicemail practices

  • Confirm the destination number before disclosure; authenticate the recipient when sharing more than basic reminders.
  • Keep voicemails and texts content-minimal (e.g., callback requests) unless you have the individual’s preference and appropriate authorization.
  • Use secure messaging for sensitive content; avoid including diagnoses or detailed results in standard SMS.

Lifecycle management

  • Set retention aligned to policy and law; securely dispose of exports and device caches.
  • Train staff on handling contact data, and test responses to misdirected messages.

Compliance Responsibilities for Covered Entities

Governance and contracts

  • Define whether each system containing phone numbers is part of the Designated Record Set.
  • Execute and manage Business Associate Agreements with any vendor that receives phone numbers as PHI.
  • Include contact-data handling in your risk analysis and ongoing risk management.

Operations and rights

  • Implement policies for appointment reminders, marketing versus treatment communications, and patient preferences for contact.
  • Honor the right of access; verify identity before releasing any information by phone or text.
  • Maintain disclosure logs where applicable and monitor for inappropriate exports.

Incident response

  • Have procedures to investigate misdirected calls or texts, assess compromise probability, and provide breach notification when required.
  • Revoke access, rotate tokens/keys, and retrain staff after incidents.

Conclusion

Does HIPAA apply to phone numbers? Yes—when a number lives in a Designated Record Set and relates to health care or payment by a Covered Entity or Business Associate, it is PHI and must be protected. Outside that context, it may not be PHI. Treat phone numbers with the same rigor as other identifiers, apply De-Identification Standards when sharing data, and operationalize safeguards across people, process, and technology.

FAQs.

When does a phone number qualify as PHI under HIPAA?

A phone number is PHI when it is part of Individually Identifiable Health Information maintained by a Covered Entity or Business Associate in a Designated Record Set—such as medical, billing, or enrollment records used to make decisions about the individual.

Can phone numbers without health information be subject to HIPAA?

Yes, if the number resides in a Designated Record Set related to care, payment, or operations, it is PHI even if the field itself holds no clinical details. A number held outside the HIPAA-covered relationship—like a retailer’s marketing list—generally is not PHI.

How should covered entities protect phone numbers linked to health data?

Apply the minimum necessary rule, restrict access via roles, encrypt in transit and at rest, log access, verify recipients before disclosures, keep messages content-minimal, train staff, manage vendor contracts with BAAs, and maintain retention and disposal controls.

What methods can de-identify phone numbers in health records?

Use Safe Harbor by removing phone numbers (and other identifiers) entirely, or employ Expert Determination with documented risk analysis. For internal linkage, replace numbers with one-way tokens, store re-identification keys separately, and enforce strict technical and administrative safeguards.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles