Understanding HIPAA's 18 PHI Identifiers: A Comprehensive Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Understanding HIPAA's 18 PHI Identifiers: A Comprehensive Guide

Kevin Henry

HIPAA

January 07, 2024

8 minutes read
Share this article
Understanding HIPAA's 18 PHI Identifiers: A Comprehensive Guide

This guide explains how the HIPAA Privacy Rule defines Protected Health Information and the 18 unique identifiers that make data identifiable. You will learn de-identification standards, compliance requirements for covered entities, risks of re-identification, and best practices that strengthen health information security.

Use this as a practical reference to safeguard PHI throughout its lifecycle—from collection and storage to sharing and disposal—while maintaining clinical usefulness and operational efficiency.

Definitions of PHI and Identifiers

Protected Health Information (PHI)

PHI is individually identifiable health information that relates to a person’s health status, care, or payment for care and is created or received by a covered entity or its business associate. If the information identifies an individual—or there is a reasonable basis to believe it can—it is PHI under the HIPAA Privacy Rule.

Identifiers under HIPAA

HIPAA lists specific data elements (“unique identifiers”) that directly or indirectly tie information to a person. When these elements are present with health data, the information is PHI; when appropriately removed or masked under de-identification standards, the data may fall outside HIPAA.

Direct vs. indirect identifiers

  • Direct identifiers point straight to a person (for example, name or Social Security number).
  • Indirect identifiers can identify when combined with other data (for example, full date of birth plus ZIP code).

Detailed Explanation of Each Identifier

  1. Names: Any part of a person’s name, including initials, when linked to health information.
  2. Geographic subdivisions smaller than a state: Street address, city, county, precinct, and ZIP code. The first three digits of a ZIP code may be used only if the combined area has more than 20,000 people; otherwise use 000.
  3. Elements of dates (except year) related to an individual: Birth, admission, discharge, and death dates; all ages over 89 are aggregated to “age 90 or older” to reduce identifiability.
  4. Telephone numbers: Any personal, work, mobile, or VoIP numbers.
  5. Fax numbers: Legacy but still sensitive when tied to care processes.
  6. Email addresses: Personal or work emails, including patient portal emails.
  7. Social Security numbers: Highly sensitive unique identifiers generally prohibited in routine workflows.
  8. Medical record numbers: Any number assigned by a provider or EHR that identifies a patient.
  9. Health plan beneficiary numbers: Member IDs issued by insurers or government programs.
  10. Account numbers: Patient portal, billing, or payment accounts linked to the individual.
  11. Certificate/license numbers: Professional or personal license numbers when linked to health information.
  12. Vehicle identifiers and serial numbers: VINs and license plates; relevant when transport or injury incidents are recorded.
  13. Device identifiers and serial numbers: Implanted device serials or home-monitoring device IDs that can identify a patient.
  14. Web URLs: Links that include user-specific tokens or paths tied to an individual.
  15. IP addresses: Network identifiers that can connect activity to a person or household.
  16. Biometric identifiers: Fingerprints and voiceprints, along with similar biometric templates that uniquely identify a person.
  17. Full-face photos and comparable images: Images sufficient to recognize or match the individual.
  18. Any other unique identifying number, characteristic, or code: Catchall for identifiers not explicitly listed; exceptions apply for properly created, non-derivable re-identification codes used internally.

Criteria for De-Identification

Safe Harbor method

  • Remove all 18 identifiers from the dataset, including granular geography and all date elements except year.
  • Aggregate ages 90 and over to a single category and apply the ZIP code “first three digits/20,000 population” rule.
  • Confirm you have no actual knowledge that remaining data could identify an individual.

Expert Determination method

  • Engage a qualified expert to apply statistical or scientific principles demonstrating a very small risk of re-identification.
  • Document methods, assumptions, data transformations (for example, generalization, suppression, noise), and residual risk.
  • Retain the expert’s rationale and scope for audits and ongoing governance.

Re-identification codes

  • You may assign a code to re-link de-identified data to a record internally, provided the code is not derived from personal information and the translation mechanism is kept separately and securely.

Notes on Limited Data Sets

A Limited Data Set permits retention of certain dates and broader geography for specific purposes under a Data Use Agreement. It is still PHI and does not meet full de-identification standards.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Compliance Requirements for Covered Entities

Core obligations

  • Apply the HIPAA Privacy Rule’s “minimum necessary” standard to uses and disclosures.
  • Implement administrative, physical, and technical safeguards under the Security Rule to protect electronic PHI.
  • Provide a Notice of Privacy Practices and honor individual rights (access, amendments, and accounting of disclosures).
  • Maintain Business Associate Agreements that bind partners handling PHI.

Risk management and documentation

  • Conduct an enterprise-wide risk analysis and maintain an ongoing risk management program.
  • Establish policies for identity and access management, encryption, audit logging, incident response, and secure disposal.
  • Train the workforce regularly, enforce sanctions, and retain documentation for required periods.

Breach response

Risks of Re-Identification

De-identified data can still be vulnerable when combined with outside datasets or when small populations, specific locations, or rare conditions make people stand out. Precision timestamps, detailed routes, and high-resolution images increase risk.

  • Linkage attacks: Matching quasi-identifiers (for example, year of birth plus partial geography) with external records.
  • Small cell sizes: Reporting categories with very few individuals inadvertently reveal identity.
  • Unstructured text: Notes may contain hidden identifiers, URLs, or device IDs.
  • Emerging analytics: Advances in pattern recognition raise risk for images and biometrics.

Mitigate by aggregating data, suppressing small counts, coarsening time and location, and validating residual risk through expert review.

Best Practices for PHI Protection

Data governance and minimization

  • Inventory PHI, map data flows, and classify sensitivity by context and purpose.
  • Collect only what you need, keep it only as long as necessary, and apply strict retention schedules.

Access control and monitoring

  • Use role-based access, multifactor authentication, just-in-time privileges, and session timeouts.
  • Enable audit logs, anomaly detection, and data loss prevention to flag unusual behavior.

Encryption and platform security

  • Encrypt PHI in transit and at rest; harden endpoints and mobile devices with updates and remote wipe.
  • Segment networks, isolate high-risk systems, and secure APIs for interoperability.

Biometric data protection

  • Store biometric templates, not raw images, and separate keys from data.
  • Apply strict consent, access logging, and revocation procedures for biometric systems.

Operational safeguards

  • Train staff to spot phishing, handle misdirected messages, and redact identifiers in free text.
  • Vet vendors, execute robust BAAs, and test incident response with tabletop exercises.
  • Validate de-identification pipelines regularly and document results for governance.

Resources for HIPAA Compliance

  • Internal policy library: Privacy Rule summary, Security Rule procedures, and breach response playbooks.
  • Risk analysis toolkit: Asset inventory, threat catalog, likelihood/impact matrix, and remediation tracker.
  • Training modules: Role-based lessons, phishing simulations, and annual refresher assessments.
  • Template pack: Business Associate Agreements, Data Use Agreements, and de-identification SOPs.
  • Technical guides: Access control standards, encryption key management, logging baselines, and backup testing checklists.
  • Audit readiness: Evidence collection checklists, log retention schedules, and control mapping to organizational policies.

Conclusion

Understanding HIPAA’s 18 PHI identifiers helps you classify data accurately, apply the right de-identification standards, and build controls that protect privacy without stalling care delivery. With disciplined governance, strong security, and clear workflows, you can reduce re-identification risk and maintain trustworthy compliance.

FAQs

What are the 18 PHI identifiers under HIPAA?

The identifiers are: names; geographic subdivisions smaller than a state; all elements of dates (except year) related to an individual and ages over 89; telephone numbers; fax numbers; email addresses; Social Security numbers; medical record numbers; health plan beneficiary numbers; account numbers; certificate/license numbers; vehicle identifiers and serial numbers; device identifiers and serial numbers; web URLs; IP addresses; biometric identifiers (such as fingerprints and voiceprints); full-face photos and comparable images; and any other unique identifying number, characteristic, or code.

How is health information de-identified according to HIPAA?

HIPAA allows two pathways: Safe Harbor, which removes all 18 identifiers and requires no actual knowledge of identifiability; and Expert Determination, where a qualified expert documents that the risk of re-identification is very small using statistical or scientific methods. Re-identification codes may be used internally if they are not derived from personal information and are stored separately.

What are the consequences of improperly handling PHI?

Consequences can include regulatory penalties, mandatory corrective actions, breach notifications to affected individuals, disruption to operations, and reputational harm. Organizations may also face contractual issues with partners and loss of patient trust.

How can organizations ensure HIPAA compliance when managing PHI?

Build a risk-based program: classify PHI, apply minimum necessary access, use encryption, monitor and log activity, train the workforce, manage vendors with strong agreements, and validate de-identification practices. Maintain current policies, test incident response, and document decisions to demonstrate due diligence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles