What is the difference between PHI and ePHI

PHI relates to physical records, while ePHI is any PHI that is created, stored, transmitted, or received electronically. PHI only relates to information on patients or health plan members.

How is PHI different from ePHI?

Under HIPAA, any information that can be used to identify a patient is considered Protected Health Information (PHI). PHI in electronic form — such as a digital copy of a medical report — is electronic PHI, or ePHI. … Anything related to health, treatment or billing that could identify a patient is PHI.

Is ePHI a subset of PHI?

Electronic Protected Health Information (“EPHI”) is defined as Individually Identifiable Health Information transmitted by electronic media or maintained in electronic media. … They include information in written, verbal and electronic form. EPHI is a subset of PHI and PHI is a subset of Health information.

What is PII and ePHI?

As of September 23rd, 2013, it’s not just healthcare providers and health plans that are legally responsiblefor Protected Health Information (PHI), electronic Protected Health Information (ePHI) and Personally Identifying Information (PII) associated with health data.

Is ePHI a phone number?

It is critical to note that the CFR definition that exempts standard phone calls and faxes from being ePHI applies only to their transmission and does not comment on their storage. Because of this, if you are storing voicemails or faxes electronically, these will certainly qualify as ePHI.

What is HIPAA PHI?

PHI stands for Protected Health Information. The HIPAA Privacy Rule provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information.

What qualifies as ePHI?

Electronic protected health information or ePHI is defined in HIPAA regulation as any protected health information (PHI) that is created, stored, transmitted, or received in any electronic format or media. HIPAA regulation states that ePHI includes any of 18 distinct demographics that can be used to identify a patient.

Are PHI and PII the same?

The major difference between PHI and PII is that PII is a legal definition – i.e. PII is anything that could be used to uniquely identify an individual. PHI is a subset of PII in that a medical record could be used to identify a person – especially if the disease or condition is rare enough.

What is PPI and PHI?

The Federal government requires organizations to identify PII (Personally identifiable information) and PHI (Protected Health information) and handle them securely. … The first step to keeping this information safe, is understanding as much as possible about what it is, and how important it can be.

What is PHI data examples?

Examples of PHI include: Name. Address (including subdivisions smaller than state such as street address, city, county, or zip code) Any dates (except years) that are directly related to an individual, including birthday, date of admission or discharge, date of death, or the exact age of individuals older than 89.

Article first time published on

What is PHI or ePHI?

Electronic protected health information (ePHI) is protected health information (PHI) that is produced, saved, transferred or received in an electronic form. … This includes identifying and protecting against reasonably anticipated threats to the security or integrity of the information.

What's the difference between PHI and ePHI?

Protected Health Information Definition PHI relates to physical records, while ePHI is any PHI that is created, stored, transmitted, or received electronically. PHI only relates to information on patients or health plan members. … PHI is only considered PHI when an individual could be identified from the information.

What is not an example of ePHI?

ePHI is only considered “protected information” when, 1) it is maintained by a HIPAA-covered entity or business associate, and 2) it can identify a specific individual. That means that health information stored in school or employment records is not ePHI, nor is the professional information of medical staff.

How do I safeguard ePHI?

  1. Password-Protect Microsoft Word Files.
  2. Encryption Using a “Public-Private Key” Option.
  3. Encryption Using “Symmetric Key” Option.
  4. Secure Web Sites.
  5. Virtual Private Networks (VPNs)

Is PHI an email address?

And as we’ve learned, even names or email addresses become PHI when coupled with a health condition. Covered entities must take reasonable steps to protect PHI sent via email all the way to the recipient’s inbox.

How long is PHI protected?

Safeguarding PHI is extremely important to keeping patient’s sensitive information private, however, did you know that PHI protection extends beyond death? In fact, HIPAA requires PHI protection for 50 years after a patient’s death.

What are examples of IIHI?

Common individual identifiers include name, address, and social security number, but may also include date of birth, Zip Code, or county location.

How can PHI be transmitted?

Emails including PHI can’t be transmitted unless the email is encrypted using either a third party program or encryption with 3DES, AES or similar algorithms. If the PHI is in the body text, the message must be encrypted, and if it’s part of an attach- ment, the attachment can be encrypted instead.

Who is not covered by the Privacy Rule?

The Privacy Rule excludes from protected health information employment records that a covered entity maintains in its capacity as an employer and education and certain other records subject to, or defined in, the Family Educational Rights and Privacy Act, 20 U.S.C. §1232g. De-Identified Health Information.

Is a doctor's name considered PHI?

Examples of PHI include: Billing information from a doctor or clinic. Email to a doctor’s office about a medication or prescription. … Any record containing both a person’s name and name of that person’s medical provider.

What is the best example of PHI?

  • Patient names.
  • Addresses — In particular, anything more specific than state, including street address, city, county, precinct, and in most cases zip code, and their equivalent geocodes.
  • Dates — Including birth, discharge, admittance, and death dates.
  • Telephone and fax numbers.
  • Email addresses.

What happens if PHI is not safeguarded?

If PHI security is compromised in a healthcare data breach, the notification process is essential. However, the HIPAA breach notification rule states that when unsecured PHI is compromised, then covered entities and their business associates need to notify potentially affected parties.

Is PHI a diagnosis?

PHI includes health records such as EHR/EMRs, lab test results, health histories, diagnoses, treatment information, insurance information and lists of allergies are all considered PHI, as are unique identifiers and demographic information.

Can you have PHI without PII?

Protected health information is a subset of PII, but it specifically refers to health information shared with HIPAA covered entities. Medical records, lab reports, and hospital bills are PHI, along with any information relating to an individual’s past, present, or future physical or mental health.

Why is PHI so important?

PHI is important to individuals and valuable to hackers which makes it vital for organizations to protect. HIPAA lays out all the requirements and safeguards that should be put in place so that each person’s identifiable health information is kept secure from cyber criminals.

Is patient name PHI?

Patient names (first and last name or last name and initial) are one of the 18 identifiers classed as protected health information (PHI) in the HIPAA Privacy Rule.

Is mother's maiden name PHI?

Personally Identifiable Information (PII) includes: … Examples of PII include, but are not limited to: Name: full name, maiden name, mother’s maiden name, or alias.

What is the difference between PPI and PII?

Personally Identifiable Information (PII) deals with any sort of sensitive information associated with a specific person, which can be used to identify or locate that individual. … Another common name for this type of data is Private Personal information (PPI).

Who is responsible for ePHI?

The HIPAA Security Rule stipulates the person designated the role of HIPAA Security Officer must implement policies and procedures to prevent, detect, contain, and correct breaches of ePHI.

How do you safeguard PII PHI and ePHI?

  1. Encrypt everything. Encryption is critical. …
  2. Assess your risk. Conduct a complete risk assessment of all the elements of your ecosystem that store, process, or transfer electronic PHI (ePHI). …
  3. Training is fundamental. …
  4. Be vigilant and ready to act. …
  5. Read business associate agreements and find partnerships you trust.

Which of the following is not PHI?

Examples of health data that is not considered PHI: Number of steps in a pedometer. Number of calories burned. Blood sugar readings w/out personally identifiable user information (PII) (such as an account or user name)

You Might Also Like