What Is a HIPAA Key Identifier? A Plain‑English Guide to the 18 Identifiers
Definition of HIPAA Key Identifiers
Under the HIPAA Privacy Rule, a “HIPAA key identifier” is any data element that can directly or indirectly reveal who a person is when linked to health information. These elements are central to Protected Health Information because they make health data “individually identifiable.”
HIPAA provides two de-identification standards: the Safe Harbor method and the Expert Determination method. Safe Harbor requires removing a specific list of 18 Health Information Identifiers tied to the individual, as well as to relatives, household members, or employers. Expert Determination allows a qualified expert to certify that the risk of Re-identification is very small. Both routes support Privacy Rule Compliance, but Safe Harbor is the most widely used because it is highly prescriptive.
When you remove all HIPAA key identifiers under Safe Harbor and avoid actual knowledge of identity, the data is no longer PHI. That enables broader use and sharing, while still honoring De-identification Standards and minimizing Re-identification Risks.
Overview of the 18 HIPAA Identifiers
These are the 18 identifiers you must remove or generalize under the Safe Harbor method to de-identify data:
- Names.
- All geographic subdivisions smaller than a state, including street address, city, county, precinct, ZIP code, and equivalent geocodes (with a narrow ZIP-code exception described below).
- All elements of dates (except year) directly related to an individual (for example, birth, admission, discharge, death), and all ages over 89, which must be reported as “age 90 or older.”
- Telephone numbers.
- Fax numbers.
- Email addresses.
- Social Security numbers.
- Medical record numbers.
- Health plan beneficiary numbers.
- Account numbers.
- Certificate/license numbers.
- Vehicle identifiers and serial numbers, including license plate numbers.
- Device identifiers and serial numbers.
- Web URLs.
- IP address numbers.
- Biometric identifiers (for example, finger and voice prints).
- Full-face photographic images and any comparable images.
- Any other unique identifying number, characteristic, or code (with limited allowances for internal, non-derivable re-identification codes).
Geographic Subdivisions and Dates
Geographic Data Privacy is one of the most common pitfalls. HIPAA treats any geographic subdivision smaller than a state as identifying. That includes street address, city, county, precinct, and ZIP code. Safe Harbor permits keeping only the first three digits of a ZIP code when the combined population for that three‑digit area exceeds 20,000; otherwise, the three digits must be changed to 000.
Dates are equally sensitive. You must remove all elements of dates tied to an individual—day, month, and precise date stamps—for events such as birth, admission, discharge, and death. You may retain the year (for example, “in 2024”). For people age 90 and older, you cannot report exact age or year of birth; you must aggregate as “90+.” These date rules apply across structured fields and narrative notes, reducing Re-identification Risks from rare-event timing.
Contact and Electronic Identifiers
Several HIPAA key identifiers involve how you reach a person or how a system can pinpoint them online. You must remove:
- Telephone and fax numbers, including those embedded in message logs or document letterheads.
- Email addresses in message bodies, headers, or metadata.
- Web URLs that can point to personal profiles, patient portals, or file locations.
- IP addresses, whether static or dynamic, because they can link activity back to a specific subscriber or location.
- Device identifiers and serial numbers (for example, IMEI, MAC addresses, or implantable device serials) that uniquely tag a user or device.
Practical steps help you maintain Privacy Rule Compliance: scan attachments and images for headers or EXIF data that include contact details; scrub audit logs before sharing; and verify that redaction covers both visible text and hidden metadata. Treat these Health Information Identifiers consistently across emails, tickets, EHR exports, and analytics data.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Protected Health Information Examples
PHI exists when health data can be linked to an identifiable person through any of the 18 identifiers or through a reasonable combination of data points. Consider these examples:
- A lab result plus a name or medical record number is PHI and must be protected.
- An emergency room note that lists a city, exact admission date, and a rare injury can allow identity inference in small communities—still PHI even without a name.
- A wearable-device export containing an IP address and step counts tied to a specific day can be PHI if the individual can be identified.
- After Safe Harbor de-identification (for example, removing contact details, exact dates, and device IDs, and converting “age 92” to “90+”), the same dataset is no longer PHI, assuming you lack actual knowledge of identity.
For analytics or research when you need some dates or limited location data, consider a HIPAA “limited data set.” It is still PHI, but it may include certain dates and broader geography (not street address) under a data use agreement—balancing utility with De-identification Standards.
Compliance and Privacy Rule Implications
Covered entities and business associates must implement policies, training, and controls to prevent disclosure of key identifiers with health data. Data mapping, access controls, and redaction workflows reduce operational risk. Always apply the minimum necessary standard when PHI is involved and document your de-identification process for accountability.
Safe Harbor is checklist-driven: remove the 18 identifiers and ensure no actual knowledge of identity remains. Expert Determination offers flexibility when you need more data specificity; a qualified expert evaluates and documents a very small risk of Re-identification given context, recipients, and safeguards. Both routes can support Privacy Rule Compliance, but you should choose the method that fits your use case, data recipients, and risk tolerance.
Remember that de-identification is not a one-time act. Context changes—new datasets, public records, or data linkages can increase Re-identification Risks. Periodic risk reviews, disclosure controls (for example, cell-size thresholds), and recipient agreements help sustain protection over time.
Managing Unique and Biometric Identifiers
Biometric Data Protection requires special care because biometric templates are inherently unique. Treat finger and voice prints—and similar modalities often used in healthcare, such as iris or palm scans—as sensitive. Avoid collecting them unless necessary, store them separately from clinical content, and apply strong encryption, access controls, and short retention periods.
HIPAA allows using an internal code to re-link de-identified data to the source, but the code must not be derived from any identifier (for example, not a hash of a name or SSN). Keep the code‑to‑identity “crosswalk” offline or in a segregated system, restrict access, and never disclose the re-identification mechanism to data recipients. These safeguards maintain utility while honoring De-identification Standards.
Summary and key takeaways
- HIPAA key identifiers are the 18 elements that make health data identifiable; removing them under Safe Harbor de-identifies the data.
- Geography smaller than a state, precise dates, contact details, electronic locators, biometric data, and unique codes all carry identification risk.
- Choose Safe Harbor for prescriptive rules or Expert Determination for flexibility, and continuously manage residual Re-identification Risks.
FAQs
What is considered a HIPAA key identifier?
It is any of the 18 data elements that can directly or indirectly identify a person when linked to health information—such as names, specific locations below the state level, exact dates, contact details, account and record numbers, device and vehicle IDs, web URLs, IP addresses, biometric identifiers, full-face photos, and any other unique identifying number, characteristic, or code.
How do HIPAA identifiers protect patient privacy?
They provide a clear checklist for removing identifying details before sharing data. By stripping these elements or generalizing them (for example, keeping only the year of an event or reporting “90+” for advanced age), you reduce the chance that someone can tie health information back to a specific person, strengthening Privacy Rule Compliance.
Are there exceptions to the 18 HIPAA identifiers?
Under Safe Harbor, you must remove all 18. However, a “limited data set” permits keeping certain dates and broader geography under a data use agreement, and the Expert Determination method allows an expert to approve data that retains some detail when the Re-identification risk is very small and appropriately controlled.
How should organizations handle biometric identifiers under HIPAA?
Collect only what you need, store biometric templates separately and encrypted, restrict access, and set short retention and deletion timelines. Treat finger and voice prints—and comparable modalities—as high sensitivity. Never derive re-identification codes from biometric or other PHI, and keep any crosswalk isolated to minimize Re-identification Risks.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.