HIPAA Compliance for Genetic Disorders Registry Data: What Counts as PHI and How to Handle It

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Genetic Disorders Registry Data: What Counts as PHI and How to Handle It

Kevin Henry

HIPAA

November 08, 2025

8 minutes read
Share this article
HIPAA Compliance for Genetic Disorders Registry Data: What Counts as PHI and How to Handle It

Managing a genetic disorders registry means handling some of the most sensitive information in healthcare. This guide clarifies what counts as protected health information (PHI) under HIPAA, how genetic data fits in, and the exact steps you should take to use, share, and secure it responsibly.

You will learn how to classify data, de-identify it safely, structure research workflows, put the right contracts in place, and implement security controls tailored to genomic datasets—all while accounting for federal rules and stricter State PHI Regulations where they apply.

Definition of Protected Health Information

Under HIPAA, PHI is Individually Identifiable Health Information created or received by Covered Entities or their business associates that relates to an individual’s health, care, or payment and that can identify the person directly or indirectly. Identifiers include obvious elements (name, address, contact details, medical record numbers) and any combination of data points that makes a person reasonably identifiable.

Registry entries qualify as PHI when they include identifiers or can be linked back to a subject. De-identified information falls outside HIPAA, while a Limited Data Set (which excludes direct identifiers but may keep dates and certain geography) remains regulated and requires Data Use Agreements that limit use, disclosure, and re-identification.

Genetic Information as Protected Data

Genetic information—such as results of genetic tests, variant calls, whole exome/genome sequence files, and family medical history—is health information. When it is individually identifiable and held by a Covered Entity or business associate, it is PHI under HIPAA. Because genomic patterns can be highly unique, even partial datasets may increase re-identification risk.

The Genetic Information Nondiscrimination Act reinforces protections around how genetic data may be used, particularly in health insurance and employment contexts. Treat linkage codes, specimen IDs, and key tables that enable re-identification as PHI, and manage them with the same rigor as primary datasets.

De-Identification of Genetic Data

Safe Harbor removal of identifiers

Safe Harbor requires removing the 18 direct identifiers (for example, names, full addresses, contact numbers, full-face photos) and ensuring no actual knowledge of re-identification risk. For genomics, apply extra caution: unique variant patterns and small subpopulation attributes can become indirect identifiers. Generalize dates, aggregate small cells, and suppress rare combinations that could single out a participant.

Expert Determination for genomic risk

Expert Determination uses a qualified expert to evaluate and document that re-identification risk is very small, given technical and organizational controls. For genetic registries, this often includes statistical thresholds, data perturbation or generalization, strict access controls, and governance around any re-identification keys.

Limited Data Set plus Data Use Agreements

When full de-identification is impractical, share a Limited Data Set under robust Data Use Agreements. A DUA must define permitted purposes, prohibit re-identification and contact, require safeguards, restrict onward sharing, and mandate breach reporting. Revisit DUAs when scope changes, and confirm whether State PHI Regulations impose additional terms or stricter de-identification standards.

Handling PHI in Genetic Research

First, determine your role. If you are a Covered Entity or a business associate receiving PHI on behalf of one, HIPAA applies directly. If you are not a Covered Entity but receive a Limited Data Set, you still need a DUA and must honor HIPAA’s conditions for that dataset.

For research uses, obtain patient authorization or secure an Institutional Review Board (IRB) or Privacy Board waiver when criteria are met. You may also use PHI for activities preparatory to research (without removing PHI from the Covered Entity) and for decedent research under specific documentation. Always apply the minimum necessary standard, segregate identifiers from analytic files, and use an “honest broker” or coded workflow to limit investigator exposure to direct identifiers.

Document data flows end to end: source systems, transform steps, key management, release criteria, retention, and destruction. Pair Limited Data Set sharing with Data Use Agreements and ensure your processes align with both HIPAA and any applicable State PHI Regulations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Business Associate Agreements for Genetic Data

You need a Business Associate Agreement (BAA) when a vendor or collaborator handles PHI on your behalf—such as cloud storage providers, bioinformatics platforms, sequencing laboratories performing analyses for a Covered Entity function, or registry software vendors. A BAA must define permitted uses, require safeguards consistent with the Security Rule, mandate subcontractor flow-downs, set breach notification duties, and require return or destruction of PHI at termination when feasible.

A BAA is not a substitute for a DUA. Use a BAA to govern services involving PHI; use a DUA to share a Limited Data Set for research or public health purposes. Many projects require both, depending on the role and dataset. Confirm whether State PHI Regulations require enhanced breach timelines, auditing rights, or additional terms.

Security Measures for Genetic PHI

Given the sensitivity and persistence of genomic data, implement layered defenses mapped to HIPAA’s Administrative Safeguards, Physical Safeguards, and Technical Safeguards. Treat encryption, strong identity controls, and comprehensive auditing as non-negotiable, even when categorized as “addressable.”

Administrative Safeguards

  • Conduct a formal risk analysis specific to genomic pipelines, repositories, and re-identification keys; update it regularly.
  • Adopt policies for access, minimum necessary, retention, incident response, and sanctions; train your workforce and document competency.
  • Assign security and privacy officers; govern vendors via BAAs and review their controls.
  • Plan for continuity: backups, disaster recovery, and tested restoration for large genomic files.
  • Oversee Data Use Agreements and approvals for secondary use, linking, and data release.

Physical Safeguards

  • Restrict facilities and server rooms; log access and monitor with alarms or cameras where appropriate.
  • Secure workstations and portable media; encrypt devices and enforce controlled disposal and destruction.
  • Protect biospecimens and paper records with chain-of-custody, locked storage, and inventory controls.

Technical Safeguards

  • Enforce unique IDs, least-privilege roles, and multi-factor authentication for all PHI systems.
  • Encrypt data in transit (modern TLS) and at rest (strong, managed keys with rotation and separation of duties).
  • Maintain audit logs for access and queries; centralize monitoring and alerting to detect anomalous exfiltration.
  • Segment environments (prod/test/dev), isolate re-identification keys, and use pseudonymization or tokenization for analytic workflows.
  • Harden pipelines: patching, vulnerability scans, penetration testing, and secure configurations for high-throughput storage and compute.

Exceptions to Authorization Requirements

HIPAA permits certain uses and disclosures of genetic PHI without patient authorization, including treatment, payment, and health care operations; disclosures required by law; specified public health activities; and research with an IRB/Privacy Board waiver or sharing a Limited Data Set under a DUA. You may also use PHI for activities preparatory to research and for decedent research with appropriate documentation.

De-identified data is outside HIPAA, but you must maintain the documentation that supports de-identification or Limited Data Set status. Remember, the Genetic Information Nondiscrimination Act and State PHI Regulations may impose additional prohibitions or stricter standards. When federal and state rules differ, apply the more protective requirement.

Conclusion

Classify your registry data accurately, minimize identifiers, and choose the right path—de-identification, Limited Data Set with a DUA, or full PHI with authorization or waiver. Lock in BAAs for service providers, and implement rigorous administrative, physical, and technical safeguards. With clear governance and security, you can advance genetic research while maintaining full HIPAA compliance.

FAQs

What genetic information is considered PHI under HIPAA?

Genetic test results, sequence files (e.g., WES/WGS), variant call data, and family medical history are PHI when they are Individually Identifiable Health Information created or received by Covered Entities or their business associates. Linkage keys or codes that can re-identify subjects are also PHI. De-identified genetic data is not PHI, but confirm whether State PHI Regulations still apply.

How can genetic registry data be de-identified?

Use Safe Harbor by removing all direct identifiers and reducing residual risk, or apply Expert Determination tailored to genomic uniqueness. If full de-identification is not feasible, share a Limited Data Set under strict Data Use Agreements that prohibit re-identification and onward disclosure and require safeguards and breach reporting.

When is patient authorization required for using genetic PHI?

Authorization is generally required for research uses or disclosures outside treatment, payment, and operations. You can proceed without authorization if you have an IRB/Privacy Board waiver, you are using a Limited Data Set under a DUA, you are conducting activities preparatory to research without removing PHI from the Covered Entity, or you have documentation for decedent research. Always apply minimum necessary and check State PHI Regulations.

What security measures are mandatory for protecting genetic PHI?

HIPAA’s Security Rule requires administrative, physical, and technical safeguards. In practice, you should implement multi-factor authentication, strong encryption in transit and at rest, least-privilege access, continuous auditing and monitoring, vendor governance via BAAs, workforce training, and tested backup and recovery—scaled for large, sensitive genomic files.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles