What Does PHI Stand For? A Beginner’s Guide to Protected Health Information (HIPAA)
PHI stands for Protected Health Information. Under the HIPAA Privacy Rule, PHI is any individually identifiable health information that relates to your health, healthcare, or payment for care and can identify you. It includes demographic information and exists in paper, electronic, or oral form.
This guide explains what counts as PHI, who must protect it, where common boundaries and exclusions apply, and how PHI safeguards work in day-to-day settings.
Definition of Protected Health Information
Protected Health Information is individually identifiable health information created or received by covered entities or their business associates. It relates to your past, present, or future physical or mental health, the provision of healthcare, or payment for healthcare, and either directly identifies you or could reasonably be used to identify you.
PHI spans all media: electronic health records, paper charts, call recordings, billing systems, and verbal exchanges. Demographic information (such as age, gender, or ZIP code) becomes PHI when it is linked to health details by a covered entity or business associate.
Types of Identifiable Information
Individually identifiable health information includes a set of direct and indirect identifiers. When combined with clinical or billing details, these identifiers make data PHI.
The most common HIPAA identifiers
- Names.
- Geographic subdivisions smaller than a state (street address, city, county, ZIP code; limited exceptions for first three ZIP digits).
- All elements of dates (except year) related to an individual, including birth, admission, discharge, and death dates; ages over 89 aggregated into a single 90+ category.
- Telephone numbers and fax numbers.
- Email addresses.
- Social Security numbers.
- Medical record numbers.
- Health plan beneficiary and policy numbers.
- Account numbers.
- Certificate and license numbers.
- Vehicle identifiers and license plates.
- Device identifiers and serial numbers.
- Web URLs.
- IP addresses.
- Biometric identifiers (for example, fingerprints or voiceprints).
- Full-face photographs and comparable images.
- Any other unique identifying number, characteristic, or code.
Demographic information is not PHI on its own, but it becomes PHI when a covered entity connects it to health conditions, treatment, or payment details.
HIPAA Privacy Rule Overview
The HIPAA Privacy Rule sets national standards for how PHI may be used and disclosed. Covered entities may use or disclose PHI for treatment, payment, and healthcare operations without your written authorization. Other uses typically require authorization unless a specific permission or requirement applies (for example, certain public health activities).
Key principles include the minimum necessary standard, which directs organizations to limit PHI access to what is reasonably needed, and patient rights, such as the right to access and obtain a copy of your PHI, request amendments, receive an accounting of disclosures, request restrictions, and choose confidential communication channels.
HIPAA also outlines pathways for de-identification: the Safe Harbor method (removing specified identifiers) and expert determination. De-identified data is not PHI. Separate HIPAA rules govern breach notification duties when unsecured PHI is compromised.
Covered Entities and Business Associates
Covered entities include healthcare providers that conduct standard electronic transactions, health plans, and healthcare clearinghouses. These organizations create, receive, maintain, or transmit PHI as part of care delivery and payment.
Business associates are vendors or partners that perform services for a covered entity involving PHI—such as billing firms, cloud hosting providers, e-prescribing gateways, or analytics vendors. Business associate agreements require safeguards, limit permissible uses and disclosures, and mandate breach notification. Subcontractors handling PHI for a business associate must meet the same obligations.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
PHI Exclusions and Limitations
Not all health-related data is PHI. Important health information exclusions include:
- De-identified information that meets HIPAA’s Safe Harbor or expert determination standard.
- Education records covered by FERPA.
- Employment records held by a covered entity in its role as an employer.
- Health information of individuals deceased for more than 50 years.
- Data collected by consumer apps or devices when they are not acting on behalf of a covered entity or business associate. (If a provider ingests that data into a medical record, it becomes PHI.)
Limited data sets remove most direct identifiers but remain PHI and require a data use agreement. Psychotherapy notes are PHI but receive heightened protections and typically need specific authorization for disclosure.
Practical boundaries
If a hospital monitors your heart rate via a clinical device, those readings are PHI. The same readings in a standalone fitness app may not be PHI unless a covered entity uses or maintains them in connection with your care or payment.
Importance of PHI Safeguards
PHI safeguards protect patient trust, reduce breach risk, and ensure compliance. Effective programs balance security with clinical usability and align with the minimum necessary principle.
Administrative safeguards
- Risk analysis and risk management tailored to systems that store PHI.
- Policies, procedures, and workforce training on privacy and security practices.
- Role-based access, sanctions for violations, vendor due diligence, and business associate agreements.
Physical safeguards
- Facility access controls, workstation security, and device/media controls.
- Secure storage, transport, and disposal (for example, shredding and certified media destruction).
Technical safeguards
- Unique user IDs, strong authentication, and access controls.
- Encryption in transit and at rest where feasible.
- Audit controls, activity monitoring, and integrity checks to detect improper access or alteration.
Incident response plans, timely breach notification, and continuous improvement complete a robust PHI safeguards program.
Common Examples of PHI
- An appointment record linking your name, date of birth, and reason for visit.
- A pharmacy label showing your name, medication, prescriber, and refill details.
- Lab results tied to a medical record number or health plan ID.
- Claims data with diagnosis or procedure codes and your policy number.
- Imaging files (such as DICOM) containing embedded identifiers.
- A triage note including your address, symptoms, and phone number.
Summary and key takeaways
PHI is individually identifiable health information protected by the HIPAA Privacy Rule. It becomes PHI when health details and identifiers meet within the scope of covered entities or their business associates. Knowing the exclusions, respecting the minimum necessary standard, and implementing strong PHI safeguards help you protect privacy while enabling safe, efficient care.
FAQs.
What information is considered PHI under HIPAA?
PHI is individually identifiable health information related to your health, care, or payment that is created or received by a covered entity or business associate. It includes demographic information and identifiers such as names, contact details, medical record numbers, and full-face photos when linked to clinical or billing data.
How do covered entities protect PHI?
They implement administrative, physical, and technical PHI safeguards: role-based access, workforce training, encryption, audit logs, secure disposal, vendor controls via business associate agreements, and incident response with breach notification when required. They also follow the minimum necessary standard and honor individual rights.
What types of information are excluded from PHI?
De-identified data, education records under FERPA, employment records held by an employer, information about individuals deceased for more than 50 years, and data held by consumer apps not acting for a covered entity are excluded. Limited data sets remain PHI but include fewer identifiers and require a data use agreement.
Why is PHI important in healthcare compliance?
Protecting PHI preserves patient trust, supports ethical care, and fulfills HIPAA Privacy Rule obligations. Strong controls reduce legal, financial, and reputational risk while ensuring that necessary demographic information and clinical data can be used appropriately for treatment, payment, and healthcare operations.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.