The HIPAA Formula, Simplified: 18-Identifier Safe Harbor + 4-Factor Breach Test

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

The HIPAA Formula, Simplified: 18-Identifier Safe Harbor + 4-Factor Breach Test

Kevin Henry

HIPAA

June 16, 2025

7 minutes read
Share this article
The HIPAA Formula, Simplified: 18-Identifier Safe Harbor + 4-Factor Breach Test

Overview of HIPAA Safe Harbor

HIPAA’s Safe Harbor is one of the De-Identification Standards within the HIPAA Regulatory Framework. It lets you treat data as no longer Protected Health Information (PHI) once a defined set of identifiers is removed and you have no actual knowledge that the remaining information could identify a person.

Safe Harbor is a rules-based Identifier Removal Process. It complements the “expert determination” pathway but is often faster because it specifies exactly what must be stripped out. When properly applied, the resulting dataset falls outside HIPAA, supporting analytics and sharing while maintaining Data Privacy Compliance.

Re-identification codes may be used for internal linkage if they are not derived from PHI and are kept confidential. Document the steps you take so you can demonstrate adherence to the Safe Harbor method if questioned.

List of 18 Identifiers

Remove these identifiers for the individual and for relatives, employers, or household members:

  • Names.
  • Geographic subdivisions smaller than a state (street address, city, county, precinct, ZIP code, and equivalent geocodes), except the initial three ZIP digits if the resulting area has more than 20,000 people; otherwise use 000.
  • All elements of dates (except year) directly related to an individual (e.g., birth, admission, discharge, death) and all ages over 89; aggregate such ages into “90 or older.”
  • Telephone numbers.
  • Fax numbers.
  • Email addresses.
  • Social Security numbers.
  • Medical record numbers.
  • Health plan beneficiary numbers.
  • Account numbers.
  • Certificate or license numbers.
  • Vehicle identifiers and serial numbers, including license plate numbers.
  • Device identifiers and serial numbers.
  • Web URLs.
  • IP addresses.
  • Biometric identifiers, including finger and voice prints.
  • Full-face photographs and comparable images.
  • Any other unique identifying number, characteristic, or code (except a non-derivative, confidential re-identification code used internally).

Explanation of 4-Factor Breach Test

When an impermissible use or disclosure of unsecured PHI occurs, you must assess whether there is a low probability that the PHI has been compromised. The 4-Factor Breach Test provides the Risk Assessment Criteria for that decision and must be documented for each incident.

Factor 1: Nature and extent of PHI involved

Consider what identifiers were present, the sensitivity of clinical data (diagnoses, medications, financial details), and the volume or granularity. The richer the data, the higher the potential risk.

Factor 2: The unauthorized person who used or received the PHI

Evaluate whether the recipient is obligated to protect confidentiality (e.g., another covered entity) versus an individual or organization with no duty or capability to safeguard PHI.

Factor 3: Whether the PHI was actually acquired or viewed

Determine if the information was merely exposed or if someone likely accessed it (e.g., opened an email, downloaded a file). Forensics, logs, and returned mail can inform this factor.

Factor 4: The extent to which the risk has been mitigated

Assess steps taken after the incident: prompt retrieval or destruction, reliable recipient attestations, password resets, or other actions that measurably reduce risk.

If, after weighing all four factors, the probability of compromise is not low, you must proceed with Breach Notification Requirements.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Application of HIPAA Formula for De-Identification

Step 1: Define scope and intended use

Inventory data elements, map where PHI resides, and clarify use cases so you remove only what is required while preserving utility.

Step 2: Execute the Identifier Removal Process

Strip all 18 identifiers for the individual and related parties. Normalize dates to year only; convert ages over 89 to “90+”; generalize or suppress small-area geographies per ZIP aggregation rules.

Step 3: Address edge cases and context

Eliminate free-text fields that might reveal identity, and check small-cell counts or rare conditions that could enable re-identification when combined with public data. Do not proceed if you have actual knowledge that the dataset could still identify someone.

Step 4: Validate and document

Verify outputs against the 18-identifier list, record decisions, and maintain a de-identification log. If you need richer detail, consider the expert determination pathway with statistical safeguards.

Step 5: Govern re-identification codes

When you must link records over time, use a code not derived from PHI, store the key separately, limit access, and prohibit external disclosure of the code.

Steps for Breach Notification Compliance

  • Contain and investigate: secure systems, preserve evidence, and stop further disclosure.
  • Confirm PHI scope: determine if unsecured PHI was involved and identify affected individuals.
  • Perform and document the 4-Factor Breach Test for the specific incident.
  • Decide: if the probability of compromise is not low, treat the event as a breach and proceed with notifications.
  • Notify affected individuals without unreasonable delay and no later than 60 calendar days from discovery. Include what happened, what PHI was involved, steps individuals should take, what you are doing to mitigate harm, and contact information.
  • Notify the Secretary of HHS: for breaches affecting 500 or more individuals in a state or jurisdiction, report without unreasonable delay and no later than 60 days from discovery; for fewer than 500, log incidents and report within 60 days after the end of the calendar year.
  • Notify prominent media outlets if 500 or more residents of a state or jurisdiction are affected, within 60 days from discovery.
  • Provide substitute notice when contact details are insufficient or out of date, and maintain toll-free contact options as required.
  • Business associates must notify the covered entity without unreasonable delay and no later than 60 days, supplying the information needed for downstream notices.
  • Mitigate and prevent recurrence: offer remedies (e.g., credit monitoring if appropriate), patch vulnerabilities, retrain workforce, and update policies.

Importance of Risk Mitigation

Strong controls reduce incident likelihood and can influence Factor 4 of the breach test. Encryption, for example, can render PHI unintelligible to unauthorized parties, materially lowering risk even if data is exposed.

Build layered defenses: minimize data, tighten access, and monitor continuously. Effective mitigation both protects individuals and supports Data Privacy Compliance during audits.

  • Encrypt PHI at rest and in transit; manage keys securely.
  • Apply multi-factor authentication, least-privilege access, and rapid account revocation.
  • Use data loss prevention, mobile device management, and routine patching.
  • Govern vendors with rigorous BAAs, security reviews, and ongoing oversight.
  • Limit retention, de-identify when feasible, and test incident response plans.

Regulatory Purpose of HIPAA Formula

The “formula” aligns two pillars of the HIPAA Regulatory Framework: Safe Harbor de-identification and the 4-Factor Breach Test. Together they set clear, actionable rules for using data responsibly and for responding when PHI is exposed.

By following the Identifier Removal Process and the Breach Notification Requirements, you protect individuals, enable ethical data use, and reduce enforcement risk—all while strengthening trust in your organization’s stewardship of health information.

FAQs.

What are the 18 identifiers under HIPAA Safe Harbor?

They are: names; geographic subdivisions smaller than a state (with ZIP aggregation rules); all elements of dates except year and all ages over 89; telephone numbers; fax numbers; email addresses; Social Security numbers; medical record numbers; health plan beneficiary numbers; account numbers; certificate/license numbers; vehicle identifiers and serial numbers (including license plates); device identifiers and serial numbers; web URLs; IP addresses; biometric identifiers (e.g., finger and voice prints); full-face photos and comparable images; and any other unique identifying number, characteristic, or code (except a confidential, non-derivative re-identification code).

How does the 4-factor breach test determine a breach?

You evaluate: (1) the nature and extent of PHI involved, (2) who used or received it, (3) whether it was actually acquired or viewed, and (4) how much you mitigated the risk. If, after weighing all four, the probability of compromise is not low, the incident is a breach requiring notification.

When is breach notification required under HIPAA?

Notification is required after an impermissible use or disclosure of unsecured PHI when your documented assessment does not demonstrate a low probability of compromise. You must notify affected individuals without unreasonable delay and within 60 days of discovery, notify HHS (timelines vary by breach size), and notify media for breaches affecting 500 or more residents of a state or jurisdiction.

How does removing identifiers protect patient privacy?

Removing the 18 identifiers severs direct and indirect links to a person, shrinking the attack surface for re-identification. This Safe Harbor method produces data that is no longer PHI under HIPAA, enabling analysis and sharing while upholding privacy expectations.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles