HIPAA Limited Data Set Explained: Requirements, Permitted Uses, and Safeguards

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Limited Data Set Explained: Requirements, Permitted Uses, and Safeguards

Kevin Henry

HIPAA

February 02, 2025

8 minutes read
Share this article
HIPAA Limited Data Set Explained: Requirements, Permitted Uses, and Safeguards

Definition of Limited Data Set

A HIPAA Limited Data Set (LDS) is Protected Health Information that excludes specific direct identifiers but can retain certain details like city, state, ZIP code, and dates (for example, admission, discharge, service, and birth/death dates). Because an LDS can still indirectly identify someone, it remains PHI and is subject to HIPAA rules, including the minimum necessary standard.

To qualify as a Limited Data Set, you must remove these direct identifiers of the individual and of relatives, employers, or household members:

  • Names
  • Postal address information other than town or city, state, and ZIP code
  • Telephone numbers
  • Fax numbers
  • Email addresses
  • Social Security numbers
  • Medical record numbers
  • Health plan beneficiary numbers
  • Account numbers
  • Certificate/license numbers
  • Vehicle identifiers and serial numbers, including license plates
  • Device identifiers and serial numbers
  • Web URLs
  • IP addresses
  • Biometric identifiers (for example, fingerprints, voiceprints)
  • Full-face photographs and comparable images

Unlike fully de-identified data, an LDS may include more granular time and location elements. You should still strip any fields not needed for your specific purpose to strengthen privacy and align with minimum necessary.

Permitted Uses and Disclosures

You may use or disclose a Limited Data Set without patient authorization only for these purposes: research, health care operations, and public health activities. A Data Use Agreement is required for disclosures to external recipients. Internal use within your organization for these purposes may proceed under policies that enforce the minimum necessary standard.

Research

An LDS supports study design, feasibility analysis, outcomes research, comparative effectiveness work, and analytics that require dates or generalized geography. Because the LDS excludes direct identifiers, you may disclose it for research with a Data Use Agreement instead of patient authorization or a waiver.

Health Care Operations

Use an LDS for quality assessment and improvement, patient safety activities, utilization review, cost management, actuarial analysis, or accreditation support. Keep the data limited to what you need for the specific health care operations task.

Public Health Reporting

Public health authorities may receive an LDS to support surveillance, program evaluation, or outbreak analytics when authorized by law. If the public health purpose requires direct identifiers, use the applicable HIPAA public health provisions instead of an LDS.

What is not permitted

  • Marketing or sales of PHI
  • Contacting individuals based on the LDS
  • Any use beyond research, health care operations, or public health activities

If an external party performs services on your behalf (a business associate), you must have a Business Associate Agreement. You can incorporate LDS-specific restrictions into the BAA or execute a separate Data Use Agreement to cover the LDS terms.

Data Use Agreement Requirements

A Data Use Agreement (DUA) provides the “satisfactory assurances” HIPAA requires before you disclose a Limited Data Set. The DUA must do the following:

  • Specify the permitted uses and disclosures of the Limited Data Set, tied to research, health care operations, and/or public health activities.
  • Identify who is allowed to use or receive the data (by role or named entities).
  • Require the recipient not to use or disclose the data except as permitted by the DUA or required by law.
  • Require appropriate Administrative Safeguards, Technical Safeguards, and physical protections to prevent unauthorized disclosure.
  • Require the recipient to report any non-permitted use or disclosure to the disclosing party.
  • Bind the recipient to ensure its agents and subcontractors follow the same restrictions and safeguards.
  • Prohibit re-identification of the data or contacting the individuals.

Strong DUAs also describe the dataset (fields, time span, cohort), establish retention limits and disposal methods, require audit cooperation, and clarify breach handling and notification timelines. If you learn of a material breach by the recipient, you must take reasonable steps to cure it, terminate disclosures if cure fails, and, when appropriate, report to regulators.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Safeguards for Limited Data Sets

Even without direct identifiers, an LDS is still PHI. Build layered safeguards that enable Unauthorized Disclosure Prevention and align with HIPAA’s Security Rule for electronic PHI.

Administrative Safeguards

  • Governance: assign a data steward, approve use cases, and document minimum necessary justifications.
  • Risk management: conduct risk analyses for each LDS flow; track mitigations and residual risk.
  • Policies and training: standard operating procedures for LDS creation, review, disclosure, and breach response; train all users annually.
  • Third-party oversight: due diligence before disclosure; verify DUA execution and vendor security posture.
  • Access management: role-based access, need-to-know reviews, and timely deprovisioning.

Technical Safeguards

  • Encrypt in transit and at rest; enforce TLS and strong cryptographic standards.
  • Least-privilege access with multifactor authentication and just-in-time elevation for admin tasks.
  • Comprehensive logging, immutable audit trails, and alerts for anomalous access patterns.
  • Data loss prevention, secure enclaves/VDIs, and blocked egress channels for bulk exports.
  • Pseudonymization/tokenization for record linkage without exposing direct identifiers.

Physical Safeguards

  • Controlled facilities and media handling; lockable storage for removable media.
  • Device protections: screen privacy, automatic locking, and secure disposal/shredding.

Compliance Best Practices

  • Design for minimum necessary: include only fields essential to the stated research, health care operations, or public health objective.
  • Standardize LDS creation: use vetted templates and data dictionaries; automate removal of direct identifiers.
  • Centralize agreements: maintain a searchable repository for every Data Use Agreement, with owners, expirations, and renewal workflows.
  • Validate before release: perform peer review of dataset schemas and run disclosure risk checks (for example, small-cell suppression in outputs).
  • Monitor continuously: audit access logs, reconcile extracts with approvals, and review vendors at least annually.
  • Plan the lifecycle: set retention periods, archival criteria, and irreversible destruction procedures.
  • Integrate incident response: define triage, risk assessment, notifications, and corrective actions for suspected unauthorized disclosure.

Enforcement and Penalties

The HIPAA Privacy, Security, and Breach Notification Rules are enforced by the U.S. Department of Health and Human Services’ Office for Civil Rights, with support from the Department of Justice for criminal cases. Impermissible use or disclosure of a Limited Data Set can trigger civil monetary penalties, corrective action plans, and multi-year monitoring. Willful or wrongful disclosures can lead to criminal liability.

Breaches involving an LDS are assessed under the Breach Notification Rule. If there is more than a low probability that the PHI has been compromised, you must provide notifications to affected individuals, HHS, and in some cases the media, and you must mitigate harm.

If you discover a recipient’s material violation of the Data Use Agreement, you must attempt to cure it. If unsuccessful, stop disclosures and consider reporting the issue to regulators as required.

Data Set Management Strategies

  • Architect for reuse: maintain a canonical LDS schema and controlled code sets to reduce ad-hoc extractions.
  • Use data catalogs: register each LDS with ownership, purpose, fields, lineage, and DUA linkage for full traceability.
  • Apply privacy engineering: tokenization for linkage, date shifting where feasible, and output checks to avoid re-identification risks.
  • Segment environments: keep curated LDS in secured analytics sandboxes; restrict copy-out pathways and enable review of derived outputs.
  • Automate workflows: approval gates, extraction jobs, and watermarking of files with dataset IDs and expiration dates.
  • Quality assurance: validate completeness, ranges, and time consistency so recipients can rely on the data for research or health care operations.

Conclusion

A HIPAA Limited Data Set enables valuable research, health care operations, and public health reporting by removing direct identifiers while preserving essential dates and locations. By pairing a precise Data Use Agreement with strong Administrative Safeguards and Technical Safeguards—and by managing the dataset lifecycle carefully—you reduce risk, prevent unauthorized disclosure, and stay aligned with HIPAA’s minimum necessary standard.

FAQs

What is a limited data set under HIPAA?

A Limited Data Set is Protected Health Information that excludes specific direct identifiers (for example, names, full addresses, contact details, account and ID numbers, device/vehicle identifiers, URLs/IPs, biometrics, and full-face images) but can retain city, state, ZIP code, and dates. It is still PHI and subject to HIPAA.

What are the required elements of a data use agreement?

A DUA must define permitted uses/disclosures; identify who may use or receive the data; require no uses beyond the DUA or as required by law; mandate appropriate safeguards; require reporting of any non-permitted use/disclosure; bind agents and subcontractors to the same terms; and prohibit re-identification or contacting individuals.

How must recipients safeguard limited data sets?

Recipients must implement Administrative Safeguards (governance, risk management, training, access control), Technical Safeguards (encryption, least privilege, MFA, logging, DLP), and physical protections, maintain auditability, and promptly report any suspected unauthorized disclosure.

When can a limited data set be used without patient authorization?

You may use or disclose an LDS without patient authorization for research, health care operations, and public health activities, provided a Data Use Agreement is in place for disclosures to external recipients and the minimum necessary standard is met.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles