HIPAA and PII Explained: What’s the Difference, Where They Overlap, and What’s Protected

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA and PII Explained: What’s the Difference, Where They Overlap, and What’s Protected

Kevin Henry

HIPAA

August 14, 2025

7 minutes read
Share this article
HIPAA and PII Explained: What’s the Difference, Where They Overlap, and What’s Protected

Definition of PII and PHI

PII: Personally Identifiable Information

PII is any data that can identify you directly or indirectly—such as your name, address, phone number, Social Security number, device identifiers, or precise location. Because it is Individually Identifiable Information, PII can stand alone or combine with other data to single you out.

PII is a broad category used across industries. It is not governed by one single U.S. federal law; instead, its handling depends on sector-specific rules and state privacy statutes. The common goal is to reduce identifiability, limit access, and prevent misuse.

PHI: Protected Health Information

PHI is a specific subset of Individually Identifiable Health Information created, received, maintained, or transmitted by a HIPAA Covered Entity or its Business Associate. PHI links an individual identifier to health status, healthcare provision, or payment for care.

Under HIPAA’s Privacy Rule and Security Rule, PHI includes common identifiers (e.g., names, addresses, account numbers) when tied to health data. De-identified information that meets HIPAA standards is not PHI because reasonable reidentification risk has been removed.

Who is covered under HIPAA

HIPAA applies to health plans, healthcare clearinghouses, and most healthcare providers—collectively known as Covered Entities. It also applies to Business Associates that perform services involving PHI for them, such as billing, cloud hosting, claims processing, or analytics.

Quick comparison

  • PII is a broad identity concept used in many domains; PHI is PII plus health context handled by HIPAA-regulated entities.
  • All PHI contains PII, but not all PII is PHI.
  • PHI triggers HIPAA-specific obligations, including Breach Notification, while PII obligations vary by law and jurisdiction.

Scope of PII vs PHI

PII appears in nearly every business context—customer accounts, HR records, marketing databases, and online services. The scope focuses on identifiability and the risk of harm if exposure occurs, not on a single national standard.

PHI exists only when health-related information is linked to an individual and handled by a Covered Entity or Business Associate. The same identifier (e.g., email) becomes PHI when tied to diagnoses, prescriptions, or claims data in a HIPAA environment.

Context determines classification. Your name in a retail loyalty program is PII. Your name attached to a lab result at a clinic is PHI. Data from a consumer wellness app may be PII unless the app acts for a provider or health plan, which could bring it under HIPAA.

HIPAA allows two de-identification approaches—expert determination and safe harbor—so data can be used with reduced privacy risk. De-identified data falls outside PHI, but reidentification attempts can restore obligations and risks.

Regulation and Compliance Requirements

HIPAA obligations

The Privacy Rule governs how PHI may be used and disclosed, individual rights (access, amendments, accounting), and minimum necessary standards. The Security Rule requires risk-based administrative, physical, and technical safeguards for electronic PHI.

Breach Notification requires Covered Entities and Business Associates to assess incidents, mitigate harm, and notify affected individuals and regulators when PHI is compromised. Documentation, risk analysis, and Data Handling Protocols are central to demonstrating compliance.

PII obligations

PII compliance in the U.S. is a patchwork. Sectoral laws (for finance, education, children, credit) and state privacy statutes impose notice, choice, access, deletion, and security requirements. Organizations typically adopt policy frameworks, data mapping, and vendor controls to meet these obligations.

For both PII and PHI, contracts and governance matter. Business Associate Agreements, data processing terms, and clear Data Handling Protocols align responsibilities, retention limits, and security expectations across your vendor ecosystem.

Compliance Enforcement

HIPAA enforcement is led by the HHS Office for Civil Rights, which investigates complaints, audits, and reportable breaches. Remedies may include corrective action plans, monitoring, and monetary settlements.

For PII, Compliance Enforcement often comes from state attorneys general and the Federal Trade Commission. Penalties depend on the violated statute, the severity of the incident, and whether the organization maintained reasonable security practices.

Data Sensitivity and Protection Measures

Classify and minimize

Start with a data inventory to classify PII and PHI by sensitivity and business purpose. Apply data minimization—collect only what you need, shorten retention periods, and strip unnecessary identifiers wherever possible.

Safeguards mapped to risk

  • Administrative: policies, training, vendor due diligence, incident response, and change management.
  • Physical: facility security, media controls, hardware disposal, and secure storage.
  • Technical: encryption in transit and at rest, access control, MFA, segmentation, auditing, and DLP.

Under the Security Rule, safeguards are risk-based; some are “addressable,” but that does not mean optional. You should document decisions, implement compensating controls, and periodically reassess risks.

Operational hygiene

Use role-based access, least privilege, and continuous monitoring to deter misuse. Test backups, apply patches promptly, and log administrative actions. Strong Data Handling Protocols—covering collection, use, sharing, and disposal—reduce both breach likelihood and impact.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Overlap Between PII and PHI

PII and PHI overlap on identifiers. Email, phone, IP address, or account numbers become PHI when linked to health data within a HIPAA setting. Outside that setting, they remain PII but still require responsible protection.

Edge cases are common. An employer’s HR file is typically PII, not PHI, even if it contains medical notes, because HIPAA excludes employment records. A third-party claims processor handling benefit data for a health plan is a Business Associate; the same identifiers are PHI in that context.

Consumer health technologies may handle step counts, glucose readings, or medication reminders. If they operate on behalf of a provider or plan, HIPAA likely applies; if they serve consumers directly, PII rules and general Breach Notification laws may govern instead.

Consequences of Data Breaches

For PHI, confirmed breaches trigger Breach Notification obligations to affected individuals and regulators, and in some cases public notice. Expect investigations, remediation commitments, and potential settlements if safeguards were inadequate.

PII breaches face a mix of state and sector rules. Typical requirements include timely notices, offering support such as credit monitoring when appropriate, regulator engagement, and documented remediation to prevent recurrence.

Beyond regulatory risk, breaches erode trust, disrupt operations, and can lead to litigation. A disciplined incident response plan—containing, investigating, communicating, and learning—minimizes harm and strengthens long-term resilience.

PII and PHI in Healthcare and Non-Healthcare Contexts

Healthcare settings

In clinics, hospitals, telehealth, labs, and health plans, most identifiable patient information is PHI. Access controls, audit trails, and secure messaging are essential to meet Privacy Rule and Security Rule expectations.

Non-healthcare settings

Retailers, employers, fintechs, and online platforms mainly process PII. However, when they handle data for a Covered Entity—such as benefits administration or medical billing—they can become Business Associates with HIPAA duties.

Research and analytics

Research teams may use de-identified data or limited data sets with data use agreements to reduce privacy risk while enabling analysis. Clear scoping, governance, and Compliance Enforcement mechanisms keep projects aligned with lawful and ethical use.

Conclusion

In short, HIPAA and PII differ by context and content: PII identifies you; PHI identifies you in connection with health information handled by HIPAA-regulated entities. Knowing where they overlap helps you apply the right safeguards, meet Breach Notification duties, and build trust.

FAQs.

What is the primary difference between HIPAA and PII?

PII is any Individually Identifiable Information about you, used across industries. HIPAA governs PHI, which is PII linked to health information when handled by a Covered Entity or Business Associate. All PHI contains PII, but not all PII is PHI.

How does HIPAA protect PHI differently than PII?

HIPAA imposes the Privacy Rule, Security Rule, and Breach Notification requirements on PHI. These set strict standards for use, disclosure, safeguards, and incident response. PII protections vary by law, so obligations depend on the applicable state or sectoral statutes.

Where do HIPAA regulations apply outside healthcare?

HIPAA applies to non-clinical vendors that handle PHI for Covered Entities—billing services, cloud providers, consultants, claims processors, and other Business Associates. When operating on behalf of a provider or health plan, they must meet HIPAA’s administrative, physical, and technical safeguards.

What are the consequences of a PHI data breach?

Organizations must conduct a risk assessment, mitigate harm, and provide Breach Notification to affected individuals and regulators. They may face investigations, corrective action plans, monitoring, and monetary settlements, alongside significant reputational and operational impacts.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles