HIPAA ePHI Requirements: What Counts, Common Risks, and How to Protect

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA ePHI Requirements: What Counts, Common Risks, and How to Protect

Kevin Henry

HIPAA

April 25, 2024

7 minutes read
Share this article
HIPAA ePHI Requirements: What Counts, Common Risks, and How to Protect

ePHI Definition

Electronic protected health information (ePHI) is any individually identifiable health information you create, receive, maintain, or transmit in electronic form. If health details can be tied to a person and exist in a digital system—EHRs, emails, cloud storage, backups, or mobile apps—they are ePHI.

What counts as ePHI

ePHI includes a person’s past, present, or future physical or mental health, the care provided, or payment for care, when combined with identifiers. It spans clinical notes, lab results, imaging, claims data, appointment messages, and metadata that can identify a patient.

Common identifiers that trigger ePHI status

  • Names; geographic details below state level; dates (except year) tied to an individual.
  • Phone and fax numbers; email addresses; Social Security, medical record, and health plan beneficiary numbers.
  • Account, certificate, and license numbers; vehicle and device identifiers; URLs and IP addresses.
  • Biometrics (finger/voice); full-face photos; any other unique identifier or code.

Where ePHI typically resides

  • EHR databases, patient portals, billing systems, imaging archives, and clinical devices.
  • Spreadsheets, tickets, chat transcripts, call recordings, voicemail, and PDFs.
  • Cloud apps, data warehouses, analytics sandboxes, backups, and developer test systems.

What is not ePHI

Data de-identified to HIPAA standards is not ePHI. Educational records governed by FERPA and employment records held by a covered entity in its role as employer also fall outside ePHI.

HIPAA Security Rule Overview

The HIPAA Security Rule sets risk-based, flexible requirements for safeguarding ePHI through administrative safeguards, physical safeguards, and technical safeguards. It applies to covered entities and their business associates that handle ePHI.

Risk-based and scalable

Controls must be reasonable for your size, complexity, and risk profile. You must perform a documented risk assessment, implement appropriate measures, and keep evidence that safeguards operate effectively.

Required vs. addressable specifications

“Required” standards must be implemented. “Addressable” items—like certain encryption requirements—must be implemented if reasonable and appropriate; if not, you must document why and adopt equivalent alternatives.

Documentation and accountability

You must maintain policies and procedures, workforce training, incident response, evaluations, and business associate agreements (BAAs). Documentation is your proof of compliance and due diligence.

Administrative Safeguards

Security management process

  • Conduct a formal risk assessment to identify threats, vulnerabilities, and likelihood/impact.
  • Prioritize risks, implement risk management plans, and track remediation to closure.
  • Establish ongoing vulnerability management and change control.

Assigned security responsibility

Designate a security official to develop, implement, and enforce your HIPAA Security Rule program.

Workforce security and training

  • Use role-based access and the minimum necessary standard.
  • Provide security awareness training, with phishing simulations and periodic refreshers.
  • Apply a sanctions policy and clean offboarding with prompt account disablement.

Information access management

  • Approve access based on job duties; review entitlements regularly.
  • Separate duties for high-risk functions and prohibit shared accounts.

Security incident procedures

  • Define detection, reporting, triage, containment, and eradication steps.
  • Preserve logs and evidence; determine breach status and notification obligations.

Contingency planning

  • Create data backup, disaster recovery, and emergency-mode operation plans.
  • Set RPO/RTO targets; test restores and full exercises at least annually.

Business associate management

  • Execute BAAs, perform vendor due diligence, and monitor performance.
  • Ensure downstream subcontractors meet the same HIPAA ePHI requirements.

Evaluation and continuous improvement

Perform periodic technical and non-technical evaluations to verify controls remain effective as systems, threats, and workflows change.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Physical Safeguards

Facility access controls

  • Badge-based access, visitor logs, escort procedures, and 24/7 monitoring where appropriate.
  • Environmental protections for server rooms (fire suppression, UPS, climate control).

Workstation use and security

  • Define permissible use and secure locations for workstations handling ePHI.
  • Use privacy screens, auto-lock, clean desk practices, and cable locks in shared areas.

Device and media controls

  • Maintain hardware inventories; track custody during moves, repairs, and disposal.
  • Sanitize or destroy media before reuse; verify wipes and document chain of custody.

Mobile device security in practice

  • Enforce full-disk encryption, strong screen locks, and remote wipe via MDM/UEM.
  • Use secure containers for email and apps; disable local backups and risky sharing.

Technical Safeguards

Access control

  • Unique user IDs, multi-factor authentication, and automatic logoff.
  • Emergency access procedures and just-in-time elevated access with approvals.

Audit controls

  • Centralize logs (SIEM), monitor anomalous access, and retain records per policy.
  • Review EHR access patterns to detect snooping or inappropriate lookups.

Integrity safeguards

  • Protect against unauthorized alteration using checksums, FIM, and EDR.
  • Harden configurations; use code signing and secure update mechanisms.

Person or entity authentication

  • Strong authentication methods (MFA, certificates, hardware keys) for all ePHI systems.
  • Prohibit shared credentials; rotate and vault service accounts and secrets.

Transmission security

  • Encrypt data in transit (TLS 1.2+), use VPN or zero trust for remote access.
  • Enable email encryption and secure messaging for PHI-containing communications.

Encryption requirements

While some encryption requirements are “addressable,” regulators expect encryption unless you document a justified alternative. Use full-disk encryption for laptops and mobile devices, strong encryption for data at rest (such as AES-256), and modern TLS for data in motion. Manage keys securely and separate duties for key custodians.

Common Risks to ePHI

  • Phishing, ransomware, and business email compromise exploiting human error.
  • Lost or stolen laptops and phones lacking mobile device security and encryption.
  • Cloud or server misconfigurations exposing databases, buckets, or backups.
  • Weak passwords, credential reuse, and shared or orphaned accounts.
  • Insider threats, unauthorized snooping, or privilege creep.
  • Unpatched systems, unsupported software, and insecure medical devices.
  • Improper media disposal, insecure home networks, and shadow IT tools.
  • Vendors without adequate safeguards or incomplete BAAs.

Protecting ePHI

A practical, prioritized approach

  • Start with a comprehensive risk assessment to map systems, data flows, threats, and controls; build a risk register and remediation plan.
  • Update policies and procedures to reflect the HIPAA Security Rule and the minimum necessary standard; train and test your workforce.
  • Harden identity: implement MFA everywhere, least-privilege access, role-based controls, and quarterly access reviews.
  • Meet encryption requirements: full-disk encryption on endpoints, server-side encryption in clouds and databases, and TLS for all transmissions.
  • Secure endpoints and mobiles: MDM/UEM with remote wipe, EDR, patch SLAs, USB control, and mobile device security baselines.
  • Protect email and messaging: enforced encryption, phishing defenses, DLP rules, and approved secure messaging for care teams.
  • Lock down cloud and networks: configuration baselines, segmentation, firewalls, private access, and secret management.
  • Implement audit and monitoring: centralize logs, alert on unusual access, and review EHR access for inappropriate lookups.
  • Build resilience: 3-2-1 backups with immutability, periodic restore tests, disaster recovery plans, and tabletop exercises.
  • Manage vendors: perform due diligence, maintain BAAs, verify controls, and set breach notification expectations.
  • Prepare to respond: incident response playbooks, legal/PR coordination, and clear decision criteria for breach notifications.
  • Document everything and re-evaluate annually or after major changes.

Conclusion

HIPAA ePHI requirements center on knowing what counts as ePHI, understanding your risks, and implementing layered administrative, physical, and technical safeguards. By prioritizing risk assessment, strong encryption, disciplined access control, continuous monitoring, and mobile device security, you create a defensible, resilient program that protects patients and your organization.

FAQs

What types of information are considered ePHI under HIPAA?

Any electronic information about an individual’s health status, care, or payment that can identify the person is ePHI. Examples include clinical notes, test results, claims, images, and appointment messages when linked to identifiers such as names, contact details, dates, account or medical record numbers, device IDs, IPs, biometrics, or photos.

How does the HIPAA Security Rule protect ePHI?

It requires a risk-based program built on administrative safeguards, physical safeguards, and technical safeguards. You must assess risk, implement appropriate controls (including encryption where reasonable and appropriate), train staff, monitor access, plan for incidents and recovery, manage vendors via BAAs, and keep thorough documentation.

What are the common risks to ePHI?

Top risks include phishing and ransomware, lost or unencrypted mobile devices, cloud misconfigurations, weak or shared passwords, insider misuse, unpatched systems, improper disposal of media, insecure remote work, and third-party failures. Many incidents start with human error or gaps in basic hygiene.

How can organizations effectively protect ePHI?

Begin with a documented risk assessment, then enforce least privilege and MFA, meet encryption requirements for data at rest and in transit, deploy MDM and EDR, secure email and messaging, harden cloud and networks, centralize logging and reviews, practice backups and disaster recovery, manage vendors with BAAs, train staff, and test incident response regularly.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles