What Is ePHI Under HIPAA? A Practical Guide for Organizations
Definition of ePHI
Electronic protected health information (ePHI) is any protected health information that is created, received, maintained, or transmitted in electronic media. Under the HIPAA Privacy Rule, PHI is individually identifiable health information that relates to a person’s past, present, or future health status, care, or payment—and when that PHI exists in electronic form, it becomes ePHI.
What counts as electronic media
- Storage media: servers, EHR databases, laptops, mobile devices, removable drives, backup tapes, and cloud storage.
- Transmission media: email, secure messaging, patient portals, APIs (e.g., FHIR/HL7), networks, VPNs, and fax-over-IP.
Common examples of ePHI
- EHR entries, progress notes, lab results, imaging and radiology files.
- Claims data, eligibility files, remittance advice, and payment records.
- Patient communications, telehealth recordings, and portal messages.
- Scheduling systems and device-generated data that can identify an individual.
What is not ePHI
- De-identified data that meets HIPAA’s de-identification standards.
- Employment records held by a covered entity in its role as employer.
- Educational records protected by FERPA.
Key point: the HIPAA Security Rule applies specifically to ePHI, while the HIPAA Privacy Rule covers PHI in any format.
HIPAA Security Requirements
The HIPAA Security Rule requires organizations to ensure the confidentiality, integrity, and availability of ePHI. You must protect against reasonably anticipated threats and impermissible uses or disclosures, ensure workforce compliance, and document your safeguards and decisions.
Required vs. addressable specifications
Security standards contain implementation specifications labeled “required” or “addressable.” Addressable does not mean optional; you must implement the control as written, implement an effective alternative, or document why it is not reasonable and appropriate in your environment.
Documentation and governance
- Maintain written policies and procedures, workforce sanctions, and evidence of implementation.
- Keep documentation for at least six years from the date of creation or last effective date.
- Evaluate your program periodically and whenever material changes impact ePHI.
The Security Rule works alongside the HIPAA Privacy Rule, the Breach Notification Rule, and contractual obligations such as a Business Associate Agreement.
Covered Entities and Business Associates
Covered entities include health plans, health care clearinghouses, and health care providers that conduct standard electronic transactions. Business associates are persons or organizations that perform functions or services for a covered entity involving the use or disclosure of PHI, including ePHI.
Business Associate Agreement essentials
- Permitted and required uses/disclosures of ePHI and the “minimum necessary” standard.
- Implementation of Administrative Safeguards, Technical Safeguards, and Physical Safeguards consistent with the HIPAA Security Rule.
- Timely breach reporting, incident cooperation, and downstream obligations for subcontractors.
- Return or secure destruction of ePHI at contract termination where feasible.
Both covered entities and business associates must conduct a Risk Assessment, manage identified risks, train their workforce, and ensure vendors with ePHI access are bound by a Business Associate Agreement.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentRisk Analysis and Management
HIPAA requires an accurate and thorough assessment of potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI, followed by risk management to reduce risks to reasonable and appropriate levels.
Practical steps
- Scope and inventory: map systems, users, vendors, and data flows touching ePHI.
- Identify threats and vulnerabilities: technical, physical, and administrative gaps.
- Analyze likelihood and impact; assign risk ratings and prioritize remediation.
- Select safeguards; document rationale, owners, timelines, and success metrics.
- Implement controls; validate through testing, monitoring, and audits.
- Reassess after material changes, security incidents, or technology deployments.
Evidence to maintain
- Risk Assessment reports, risk register, and remediation plans.
- Policies/procedures, training records, and Business Associate Agreement files.
- Testing, monitoring, and evaluation results that show the program is effective.
Technical Safeguards for ePHI
Access controls
- Unique user IDs, role-based access, and least-privilege permissions.
- Multi-factor authentication, emergency access procedures, and automatic logoff.
- Device security: full-disk encryption, mobile device management, and session timeouts.
Audit controls
- Comprehensive logging for systems handling ePHI, including read, create, update, delete, and export events.
- Centralize logs in a SIEM; alert on anomalous behavior and privileged activity.
- Retain logs per policy to investigate incidents and support compliance reviews.
Integrity
- Hashing, digital signatures, and write-once or versioned storage to prevent improper alteration.
- Change tracking within EHRs, code-signing for clinical apps, and configuration baselines.
- Anti-malware, vulnerability management, and prompt patching of critical systems.
Person or entity authentication
- Strong authentication methods (MFA, certificate- or device-based trust, SSO with identity governance).
- Identity proofing for high-risk access such as remote administration and API keys.
Transmission security
- Encrypt ePHI in transit (e.g., modern TLS), use secure email or portal messaging, and enforce HSTS.
- Apply VPNs or zero-trust network access for remote users and third parties.
- Protect APIs with OAuth 2.0/OpenID Connect, rate limiting, and token management.
Administrative and Physical Safeguards
Administrative Safeguards
- Security management process: Risk Assessment, risk management, sanctions, and activity reviews.
- Assigned security responsibility and clear information access management.
- Security awareness and training with phishing and social engineering coverage.
- Security incident procedures and a documented breach response plan.
- Contingency planning: data backup, disaster recovery, and emergency mode operations.
- Periodic evaluation of the Security Rule program; policy documentation retained for six years.
- Vendor and Business Associate Agreement management, including subcontractor oversight.
Physical Safeguards
- Facility access controls, visitor management, and secure areas for servers and networking gear.
- Workstation use and security standards, privacy screens, and clean-desk expectations.
- Device and media controls: inventory, secure disposal, media reuse procedures, and data backups.
- Environmental protections such as power, HVAC, and water detection where appropriate.
Compliance Training and Best Practices
Build a high-impact training program
- Train at onboarding and refresh regularly; tailor modules by role and system access.
- Cover HIPAA Privacy Rule vs. HIPAA Security Rule, data handling, minimum necessary, and reporting procedures.
- Reinforce with simulations, microlearning, and leadership messaging.
Operational best practices
- Maintain an asset inventory, configuration baselines, and patch/vulnerability management.
- Adopt least privilege, network segmentation, and data loss prevention for ePHI flows.
- Encrypt ePHI at rest and in transit; use secure key management and separation of duties.
- Backups follow the 3-2-1 rule; test restoration and disaster recovery regularly.
- Third-party risk management with due diligence, ongoing monitoring, and strong Business Associate Agreements.
Incident response and breach handling
- Detect, contain, and investigate; preserve logs and evidence.
- Perform a risk-of-harm analysis to determine if an incident is a reportable breach of unsecured PHI.
- Notify affected individuals and regulators without unreasonable delay and no later than 60 days where required.
- Document the incident, decisions, and corrective actions to strengthen future defenses.
Conclusion
ePHI sits at the center of HIPAA compliance. By performing a thorough Risk Assessment, implementing Administrative Safeguards, Technical Safeguards, and Physical Safeguards, and reinforcing practices through training and vendor governance, you can protect ePHI effectively while enabling care, operations, and innovation.
FAQs.
What information qualifies as ePHI?
ePHI is any individually identifiable health information that is created, received, maintained, or transmitted electronically and relates to a person’s health condition, care, or payment. It includes data in EHRs, billing systems, patient portals, email, images, and device data that can identify an individual. De-identified information that meets HIPAA standards is not ePHI.
How must organizations safeguard ePHI?
Organizations must follow the HIPAA Security Rule by conducting a Risk Assessment and implementing Administrative Safeguards, Technical Safeguards, and Physical Safeguards. Typical controls include role-based access, multi-factor authentication, encryption in transit and at rest, audit logging, incident response, contingency planning, and governance through policies, training, and Business Associate Agreements.
What are the consequences of ePHI breaches?
Consequences can include regulatory investigations, corrective action plans, and tiered civil monetary penalties. Serious violations may trigger criminal liability. Breaches also create reputational harm, operational disruption, and notification costs under the Breach Notification Rule, which requires timely notice to affected individuals and, in some cases, regulators and the media.
How often should risk analyses be conducted?
HIPAA sets no fixed interval, but requires ongoing, accurate, and thorough assessments. In practice, conduct a Risk Analysis regularly—commonly at least annually—and whenever you experience security incidents, adopt new systems, change vendors, or make other material changes that could alter risk to ePHI.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment