Veeam Completes Acquisition of Securiti AI to Create the Industry’s First Trusted Data Platform for Accelerating Safe AI at Scale

View

HIPAA PHI Explained: Identifiers, De-identification & Compliance Checklist

Author

Anas Baig

Product Marketing Manager at Securiti

Published February 9, 2026

Listen to the content

Understanding the Health Insurance Portability and Accountability Act (HIPAA) isn’t just a core requirement for ensuring compliance, but a crucial business imperative. This is particularly important when businesses handle Protected Health Information (PHI).

Securing PHI, as outlined under HIPAA, requires more than just surface-level scanning, especially when organizations lack visibility of where their data resides or whom it is shared with. The fundamental understanding organization needs is to understand what counts as PHI, which shows up in more places than many organizations realize.

This guide breaks down what counts as PHI under HIPAA, the 18 identifiers that make health data “identifiable,” what changes after de-identification, and a compliance checklist for best practices organizations should follow to store, share, and manage PHI responsibly.

Understanding PHI Under HIPAA

HIPAA defines Health Information as any information, oral or recorded, created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse and relating to an individual's past, present, or future physical or mental health or condition, health care provision, or payment for health care.

On the other hand, HIPAA’s Privacy Rule explicitly details Individually Identifiable Health Information, also known as Protected Health Information (PHI). PHI refers to any information about a person’s health, care, or healthcare payments created or handled by covered entities that identifies the individual or could reasonably be used to identify them.

An individual who knowingly discloses individually identifiable health information/PHI can incur hefty monetary penalties as well as imprisonment. This can occur when the individual leverages a unique health identifier, acquires PHI about an individual, or shares PHI with another individual. In such a scenario, the individual can face fines up to $250,000 and 10 years imprisonment, or both.

In short, any healthcare records, services, or billing details pertaining to the patient constitute sensitive patient information and must be protected to ensure HIPAA PHI compliance.

HIPAA PHI: The 18 Identifiers You Must Protect

HIPAA is geared toward protecting sensitive personal health data and empowering patients with rights over their health data. Under HIPAA, any information pertaining to an individual becomes PHI when it includes specific data elements that can identify an individual.

These data elements, commonly referred to as identifiers, are outlined in the HIPAA Privacy Rule. If an organization finds itself collecting, processing, storing, or sharing any of these 18 identifiers, it will be subject to the HIPAA regulations. These 18 identifiers include:

  • Names
  • Address (geographic subdivisions smaller than a state, including street address, city, county, precinct, and ZIP code)
  • Dates relating to an individual, including birth, admission, discharge, and death dates
  • Telephone numbers
  • Fax numbers
  • Email addresses
  • Social Security numbers
  • Medical record numbers
  • Health plan beneficiary numbers
  • Account numbers
  • Certificate or license numbers
  • Vehicle identifiers and serial numbers, including license plate numbers
  • Device identifiers and serial numbers
  • Web URLs
  • Internet Protocol (IP) addresses
  • Biometric identifiers, including fingerprints and voice prints
  • Full-face photographic images and any comparable images
  • Any other unique identifying number, characteristic, or code

These identifiers alone can trigger HIPAA protection, especially when they are coupled with healthcare data, treatment plans and services, and billing information.

What Happens to PHI After De-identification?

Data can be accumulated from multiple sources, and some of it may not be directly related or fall under the protected standard. In an event where PHI is de-identified, meaning the likelihood of personal identifiers such as names, addresses, phone numbers, and other identifiers has been ruled out, as per HIPAA standards, that particular information is no longer subject to HIPAA regulations.

De-identified health information is unrestricted and can be freely used, processed, stored, shared, or sold for multiple purposes that the organization deems fit without the patient’s consent. This is because the de-identified health information cannot help identify an individual.

The HIPAA Privacy Rule specifies two ways to de-identify health information. These include:

a. Expert Determination Method

A qualified expert applies statistical or scientific principles to determine that the risk of re-identification is very small.

b. Safe Harbor Method

All 18 HIPAA identifiers are removed, and the organization has no knowledge of how the remaining data could identify an individual.

How PHI Is Handled and Managed Under HIPAA

No matter what stage of the data lifecycle PHI is in, it must be handled with care, securely guarded, and protected from unauthorized access or inadvertent exposure. HIPAA establishes detailed guidelines on how covered entities and business associates must manage PHI to protect patient privacy from the moment data is obtained, processed, stored, shared, or eventually destroyed.

Core principles of handling and managing PHI under HIPAA include:

a. Minimum Necessary Rule

Covered entities should only collect the minimum amount of information necessary to provide the services. The data must only be utilized for the intended purpose.

b. Permitted Uses and Disclosures

Without obtaining consent from the patient, Treatment, Payment, and Healthcare Operations can use or disclose PHI.

c. Access Controls

Access controls should be implemented for PHI, which should only be accessed by authorized individuals who absolutely need the PHI to conduct their job obligations. This includes role-based access, multi-factor authentication, etc.

d. Security Safeguards

Organizations must establish administrative, physical, and technical protections to secure PHI. This comprises policies and training, secure data storage, and technical measures, including data encryption at rest and in transit, risk assessments, and maintaining audit logs.

e. Retention and Disposal

When PHI is being utilized, it must be retained according to HIPAA-approved guidelines and industry best practices. Once PHI serves its purpose and is no longer required, it should be securely disposed of, such as by permanently deleting electronic data or shredding paper records.

HIPAA Compliance Checklist for Protecting PHI

A HIPAA Compliance Checklist ensures organizations are properly protecting PHI and complying with HIPAA standards and notable regulatory requirements.

a. Governance and Policies

  • Designate a privacy and security officer in charge of overseeing compliance with HIPAA requirements
  • Update organization-wide policies to accommodate the HIPAA Security and Privacy Rule standards and regularly update policies to reflect evolving regulatory changes

b. Risk Assessment and Management

  • Conduct regular assessments such as vulnerability assessments, risk assessments, penetration testing, and compliance audits to identify and remediate potential threats to PHI
  • Continuously monitor systems and processes for new or emerging vulnerabilities

c. Access Controls

  • Establish role-based access controls to limit access to PHI and introduce multi-factor authentication as an additional layer of security before access is granted
  • Maintain a comprehensive list of access privileges and regularly review access entitlements to ensure that the right people have been given access to PHI; revoke access where necessary

d. Use and Disclosure of PHI

  • Ensure the absolute minimum data is obtained necessary for operational requirements, and PHI is consciously processed, stored, or shared only for permitted purposes
  • As a best practice, industry standard, and in compliance with regulatory requirements, obtain the patient’s consent when making decisions about their health data

Here’s more on the checklist as identified by the HHS Office for Civil Rights as essential elements of an effective HIPAA compliance program.

Automate Compliance with Securiti DSPM

As regulatory pressure increases and data environments grow more complex, organizations can no longer rely on manual methods to ensure compliance. DSPM offers a proactive, automated, and scalable solution to maintaining a continuous data security and privacy posture, not just for HIPAA, but for any current or future regulation.

Securiti's Data Command Center (rated #1 DSPM by GigaOM) provides a built-in DSPM solution, enabling organizations to secure sensitive data across multiple public clouds, private clouds, data lakes and warehouses, and SaaS applications, protecting both data at rest and in motion.

With Securiti, organizations can leverage contextual data intelligence and controls to discover and classify data, minimize ROT (Redundant, Obsolete, and Trivial) data risk, reduce misconfiguration vulnerabilities, prevent unauthorized data access, understand data flow, and enforce consistent security controls across the data journey, including real-time streaming data, while also managing compliance and breach risk.

Schedule a demo to learn more.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security: Why Healthcare Organizations Choose Securiti
Discover why healthcare organizations trust Securiti for Data & AI Security. Learn key blockers, five proven advantages, and what safe data innovation makes possible.
View More
The Anthropic Exploit: Welcome to the Era of AI Agent Attacks
Explore the first AI agent attack, why it changes everything, and how DataAI Security pillars like Intelligence, CommandGraph, and Firewalls protect sensitive data.
HIPAA PHI Explained: Identifiers, De-identification & Compliance Checklist View More
HIPAA PHI Explained: Identifiers, De-identification & Compliance Checklist
Discover what PHI is under HIPAA. Understand what is considered PHI as per HIPAA Rules, the list of 18 identifiers, and what happens to...
Red Teaming View More
What is AI Red Teaming? Complete Guide
AI red teaming tests AI systems for security, safety, and misuse risks. Learn how it works, common techniques, real-world use cases, and why it...
View More
Australia’s Privacy Overhaul: Landmark Reforms in Privacy, Cyber Security & Online Safety
Access the whitepaper and gain insights into Australia’s Privacy Law landscape, CSLP, Social Media Minimum Age Act, and how Securiti helps ensure swift compliance.
View More
CNIL’s €475 Million Cookie Consent Enforcement: Key Lessons for Organizations
Download the whitepaper to learn about CNIL’s €475 million cookie consent enforcement fine. Discover key lessons for organizations and how to automate compliance.
View More
Solution Brief: Microsoft Purview + Securiti
Extend Microsoft Purview with Securiti to discover, classify, and reduce data & AI risk across hybrid environments with continuous monitoring and automated remediation. Learn...
Top 7 Data & AI Security Trends 2026 View More
Top 7 Data & AI Security Trends 2026
Discover the top 7 Data & AI security trends for 2026. Learn how to secure AI agents, govern data, manage risk, and scale AI...
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
What's
New