personally identifiable information (PII) data protection impact assessment (DPIA)
X
Definition

What is PHI (protected or personal health information)?

Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, physical and mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is the primary law that oversees the use of, access to and disclosure of PHI in the United States. HIPAA defines PHI as data that relates to the past, present or future physical or mental health of an individual; the provision of healthcare to an individual; or the payment for the provision of care to an individual. HIPAA regulates how this data is collected, created, received, transmitted, maintained and stored by any HIPAA-covered organization.

Healthcare deals with sensitive details about a patient, including birthdate, medical conditions and health insurance claims. Whether in a paper-based record or an electronic health record (EHR) system, PHI explains a patient's medical history, including ailments, treatments and outcomes.

What is considered personal health information?

HIPAA lists 18 different information identifiers that, when paired with health information, become PHI. Some of these identifiers on their own allow an individual to be identified, contacted or located. Others must be combined with other information to identify a person.

The 18 identifiers are the following:

  1. Name.
  2. Geographic location or address more local than state.
  3. Dates (except years) related to an individual, such as birth, procedure and admission dates.
  4. Phone number.
  5. Fax number.
  6. Email address.
  7. Social Security number.
  8. Medical record number.
  9. Health plan beneficiary number.
  10. Account number.
  11. Certificate or license number.
  12. Vehicle identifiers, such as serial and license plate numbers.
  13. Device identifiers and serial numbers.
  14. Web URL.
  15. Internet Protocol address.
  16. Biometric identifiers, such as a fingerprint or voice print.
  17. Full-face photographs and other photos of identifying characteristics.
  18. Any other unique identifying characteristic.

How is PHI used?

From the first moments after birth, a baby will likely have PHI entered into an EHR, including weight, length, body temperature and any complications during delivery. Tracking this type of medical information during a patient's life offers clinicians the context they need to understand a person's health and make treatment decisions.

Clinical and research scientists use anonymized PHI to study health and healthcare trends. Researchers use PHI that's stripped of identifying features and added anonymously to large databases of patient information for population health management studies. Such anonymized PHI is also used to create value-based care programs that reward healthcare providers for providing quality care.

Hackers and cybercriminals take a keen interest in PHI. It's a treasure trove of personal consumer information that they can sell. Criminals also hold PHI hostage through ransomware attacks. They attempt to force a healthcare provider or other organization to provide a payoff in exchange for their PHI, which the threat actor had made inaccessible.

HIPAA and the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 limit the types of PHI healthcare providers, health insurance companies and the companies they work with can collect from individuals. Those regulations also limit what those organizations can do with the data in terms of sharing it with other organizations or using it in marketing. In addition, organizations must provide a patient's PHI to them if requested, preferably in an electronic PHI (ePHI) format.

How is ePHI collected and stored?

Electronic PHI is a subset of PHI where health information is collected, transmitted and stored electronically. The list of devices involved includes the following:

  • Databases and other forms of storage.
  • Internal hard drives, such as those in personal computers.
  • External hard drives.
  • Magnetic tapes.
  • Smartphones and other mobile devices, such as wearable monitors and medical devices.
  • Removable storage devices, such as USB drives.

Electronic PHI must be handled in accordance with HIPAA and other laws and regulations. Organizations typically have policies covering that, including how the data is collected, transmitted, altered and destroyed. They must designate clear roles and responsibilities for data handling, and train employees to follow policies and comply with all regulations.

Security measures such as encryption and access controls are crucial for securing ePHI, both at rest and in transit. For example, employees' access to ePHI data should be limited to data they need to do their job.

PHI loss or theft is still possible even with adequate security measures and policies in place. Organizations must consider creating backup copies of data and using cloud storage platforms to keep them safe. Physical, on-premises devices normally used to store ePHI are more susceptible to outages and attacks; cloud storage is a good strategy for securing ePHI copies.

What are covered entities under HIPAA?

Any organization or individual that handles PHI regularly is categorized under HIPAA as a covered entity and must follow the regulation's security and privacy rules. Providers, insurers and healthcare clearinghouses are considered covered entities.

A third party that handles PHI on behalf of a covered entity is considered a business associate under HIPAA and subject to HIPAA rules. For instance, a health information exchange (HIE) is a service that lets healthcare professionals access and share PHI. Because it is involved in transmitting the PHI on behalf of the covered entity -- the healthcare provider -- the HIE is a business associate and must comply with HIPAA's regulations.

HIPAA privacy rule

The main regulation that governs the secure handling of PHI is the HIPAA Privacy Rule. It governs how hospitals, ambulatory care centers, long-term care facilities and other healthcare providers use and share PHI. It provides federal protections for PHI that covered entities hold and gives patients certain rights with respect to that information. The HIPAA Privacy Rule specifies when the disclosure of PHI is permitted, such as to ensure the health and safety of the patient and to communicate with individuals the patient says can receive the information.

Organizations can't sell PHI unless in one of the following circumstances:

  • For a public health purpose that HIPAA allows.
  • For research, but only for reimbursement of costs.
  • For treatment and present or future payment as allowed by HIPAA.
  • As part of the merger or acquisition of a HIPAA-covered entity.

HIPAA also gives individuals the right to make written requests to amend PHI that a covered entity maintains.

Partners of healthcare providers and insurers that sign HIPAA business associate agreements are legally bound to handle patient data according to the HIPAA Privacy and Security Rules. Business associates, as well as covered entities, are subject to HIPAA audits, conducted by the U.S. Department of Health and Human Services' (HHS) Office for Civil Rights. HIPAA violations are costly and can damage a business's reputation.

Protected health information was originally intended to apply to paper records. Since the passage of the HITECH Act and the replacement of paper health records with EHRs, HIPAA has governed electronically stored patient data. HIPAA rules regulate paper and electronic data sets equally, but there are differences between the two formats.

First, covered entities must respond to patients' requests for access to their data within 30 days, a timeframe created to accommodate the transmission of paper records. However, the HIPAA rules state that if the provider is using health IT, the patient should be able to get the records faster.

The PHI disposal methods also vary between electronic and paper records. Paper files are shredded or otherwise made unreadable and unable to be reconstructed. Electronic PHI must be cleared or purged from the system in which it was held.

List of HIPAA compliance requirements
HIPAA noncompliance can be costly, so it's important to follow the above steps to make sure PHI is handled appropriately under the law.

HIPAA compliance and security

The HIPAA Security Rule encompasses measures that restrict unauthorized access to PHI. Covered entities must defend against threats to PHI that can be reasonably anticipated. It also requires technical, administrative and physical safeguards to protect PHI.

What follows are examples of these three safeguards:

  1. Technical safeguards cover the use of firewalls, encryption, access controls and other technology.
  2. Physical safeguards include locking up physical records, keycards and other access controls on electronic devices containing PHI, making screens unreadable to anyone except the user, and other measures.
  3. Administrative safeguards include policies that limit PHI access to certain people, safety awareness training and other people-based approaches to security.

Covered entities must evaluate IT capabilities and the likelihood of a PHI security risk. HIPAA rules don't specify the types of technology needed, but covered organizations must take action to keep hackers and malware from gaining access to patient data.

Other regulations affecting PHI, include the European Union's General Data Protection Regulation (GDPR). It applies to a broader set of health data, including genetics. Healthcare organizations that treat EU patients must adhere to the GDPR regulations about patient consent to process PHI.

Also, in 2018, the U.S. federal government announced the MyHealthEData program, in which the government promotes the idea that patients should control their PHI and that patients can transfer data from one doctor to another. The underlying point of MyHealthEData is to encourage healthcare organizations to pursue interoperability of health data as a way of allowing patients more access to their records.

In recent years, the HHS proposed changes to HIPAA, but the Security Rule has largely remained intact. However, more recent HHS proposals include the department publishing voluntary cybersecurity performance goals in January 2024 to encourage healthcare providers to strengthen their data security and disaster recovery measures. Additionally, the department published an update to HIPAA's Privacy Rule to encompass reproductive health data as well in June 2024, having done so through its Office of Civil Rights.

What is the difference between PII, PHI and IIHI?

It's important to distinguish between personally identifiable information (PII), PHI and a third type: individually identifiable health information (IIHI):

Personally identifiable information

PII is any data used to identify someone. It could be nonsensitive data that can be transmitted and stored publicly without resulting in harm to the individual. Or it could be sensitive data that, if disclosed, might harm the individual. PII also encompasses more than just health information. It includes information such as tax information, credit card numbers and Social Security numbers used in a context unrelated to healthcare operations and services. Protecting PII is only mandated in certain instances, such as when it's being used in a healthcare context or combined with healthcare information.

Protected health information

PHI is information used in a medical context. Organizations handling PHI must always comply with HIPAA rules.

Individually identifiable health information

IIHI is health information that can identify a person. It's essentially PII in a health context. Not all IIHI is protected under HIPAA. IIHI that a HIPAA-covered entity hasn't handled, transmitted, maintained or stored is IIHI that doesn't qualify as PHI. For example, if a patient takes daily blood pressure readings on a paper form that includes their name, address and phone number but they don't send it to their doctor, that would be IIHI that's not PHI. Although it might be sensitive, because it hasn't been transmitted, it isn't protected.

In other words, IIHI becomes PHI in the following circumstances:

  • IIHI transmitted by electronic media, such as email.
  • IIHI maintained in electronic media, such as on a server.
  • IIHI transmitted or maintained in a physical location used by a HIPAA- or GDPR-covered provider.

PHI and healthcare apps

EHRs are a common area where PHI and IT intersect, as are health information exchanges. Vendors create HIEs to enable healthcare providers to access and transmit PHI properly. These third-party vendors are responsible for developing applications that are HIPAA-compliant.

Developing a healthcare app, particularly mobile health applications, such as heart rate or blood sugar monitors, that use PHI and are HIPAA compliant is expensive and time-consuming. Apps for tracking personal health metrics that don't transmit PHI data anywhere aren't subject to HIPAA rules. However, texting, image sharing, video conferencing and any other app where patients discuss or share PHI with healthcare providers must be HIPAA-compliant and have the required security measures to protect data.

Ensuring that all privacy and security safeguards are in place is challenging. Some developers work with cloud providers that are certified to host or maintain the parts of the service's stack that need to be HIPAA compliant.

Wearable technology that collects biometric data poses unique challenges when it comes to regulatory compliance and securing PHI. These devices collect a diverse set of information, including medical, exercise and biological data such as heart rates and sleep patterns, and it's not always clear what data must be protected.

Often, patients use wearables to monitor their health metrics without sharing the information with their healthcare provider. In those cases, HIPAA compliance doesn't apply. If an organization developing the wearable plans to retain user data for research or other purposes, it might need to comply with HIPAA and get informed consent from users.

Many healthcare-related apps don't have to comply with HIPAA. Scenarios where an application must comply with HIPAA include the following:

  • If a covered entity develops a healthcare app that collects or interacts with PHI, the information must be protected in compliance with HIPAA.
  • If a physician recommends that a patient use a healthcare app, the information collected isn't covered, because the app wasn't developed for the physician to use. However, if the data from the app is added to the patient's EHR, it is covered.
  • If a third-party developer makes an app for physicians to use that collects PHI or interacts with it, the third party is a business associate handling PHI on behalf of the physician, and HIPAA applies to the business associate.
List of digital health technologies
PHI can be collected and transmitted from various digital health technologies.

Common misconceptions about PHI

Another area of misinterpretation is that PHI privacy and security don't always move in tandem. It's possible to have security restrictions in place that don't fully protect privacy under HIPAA mandates. For example, if a cloud vendor hosts encrypted PHI for an ambulatory clinic, privacy could still be an issue if the cloud vendor isn't part of a business associate agreement. Under HIPAA, the cloud vendor is responsible for the integrity of the hosted PHI, as well as its security.

Also, PHI shouldn't be confused with a personal health record (PHR), which a patient maintains and updates using services such as the Apple Health application.

With a PHR, patients oversee the security of the data themselves, akin to consumers guarding their credit card numbers and other personal information. However, the lines between PHR and PHI will blur in the future as more digital medical records are accessed and shared by patients.

Managing and analyzing patient data on a large scale is challenging. Learn how data analytics tools are used for patient data.

This was last updated in October 2024

Continue Reading About What is PHI (protected or personal health information)?

Dig Deeper on Heathcare policy and regulation

xtelligent Rev Cycle Management
xtelligent Patient Engagement
xtelligent Healthtech Analytics
xtelligent Healthtech Security
xtelligent Virtual Healthcare
Close