HIPAA Compliance
HIPAA Compliance

What Are the 18 HIPAA Identifiers?

May 28, 2025

Ever wonder what makes healthcare data secure? It’s all about understanding the rules that keep patient information under lock and key. One big part of this is knowing the 18 HIPAA identifiers. These are the pieces of information that, when linked to an individual, make data protected under the Health Insurance Portability and Accountability Act, or HIPAA. Let’s unravel what these identifiers are and why they matter.

What Are HIPAA Identifiers?

HIPAA identifiers are specific types of information that, when connected to a patient, make that data protected under HIPAA regulations. The goal here is to ensure that individuals' health information remains confidential and secure. So, if you're dealing with anything related to a patient's health, these identifiers are your checklist to decide if the data needs safeguarding.

Now, you might think, "How many ways can there be to identify someone?" Turns out, there are quite a few. HIPAA outlines 18 specific identifiers that cover a wide range of information, from names and addresses to much more subtle details like IP addresses or biometric data. Each one is crucial in its own way, and understanding them helps in ensuring compliance with privacy laws.

Names: The Most Obvious Identifier

The first and perhaps the most straightforward HIPAA identifier is a person's name. It seems pretty obvious, right? But think about it—names are everywhere. They’re on medical records, prescriptions, appointment schedules, and more. The moment a name is linked to any health information, it becomes protected under HIPAA.

For healthcare providers, this means taking extra care to keep patient names confidential. Whether it’s on a file folder in a clinic or within a digital system, names need to be handled with the utmost privacy. That's where tools like Feather come in handy. Feather helps automate documentation tasks while ensuring patient names and other identifiers are kept secure. This way, healthcare professionals can focus more on patient care and less on worrying about compliance issues.

Geographic Identifiers: More Than Just an Address

When we talk about geographic identifiers, we’re not just referring to street addresses. HIPAA extends this to anything smaller than a state level, which includes city, county, precinct, zip code, and their equivalent geographical codes. It’s a big net meant to catch any detail that could link a patient to their location.

For example, if you have a list of patients who all reside in the same zip code, that in itself could be a potential privacy risk. That's why even seemingly harmless information like zip codes are de-identified in many healthcare scenarios. The idea is to anonymize data so it can't be traced back to an individual, reducing risk and enhancing privacy.

Dates: More Important Than You Might Think

Dates in healthcare aren't just about appointments or birthdays. Under HIPAA, all elements of dates (except year) directly related to an individual are considered identifiers. This includes birthdates, admission and discharge dates, and even death dates. Why such scrutiny? Because dates can be surprisingly revealing.

Consider a small community hospital. If a patient was admitted and discharged within a specific timeframe, someone could potentially identify the patient just from those dates. Therefore, when handling patient data, it’s essential to ensure that detailed date information is not inadvertently disclosed.

Phone Numbers: More Than Just a Contact

Phone numbers are another identifier that we often take for granted. They’re a direct line to a person, and when associated with medical records, they become part of the protected health information (PHI) under HIPAA. This means that phone numbers need the same level of protection as other more obvious personal details.

For healthcare providers, this involves ensuring that any system storing or transmitting patient phone numbers complies with HIPAA standards. This is where Feather can be a lifesaver. Our platform ensures that all PHI, including phone numbers, is handled in a HIPAA-compliant manner, freeing healthcare professionals from the administrative burden of managing these details manually.

Fax Numbers: Not as Outdated as You Think

Even in the age of digital communication, fax numbers remain a staple in many healthcare environments. They're considered identifiers under HIPAA for the same reason as phone numbers—they can link directly to an individual. Despite being old-school, faxing is still a secure way to send sensitive information, provided it’s done right.

Ensuring fax numbers are secure requires that they are only used in compliant systems. This means encrypted transmissions and careful management of fax records. For those of us working in healthcare, maintaining this balance between using traditional methods and ensuring modern compliance can be tricky but necessary.

Email Addresses: The Digital Identifier

Email addresses are a modern identifier that, much like phone numbers, provide a direct link to an individual. With the rise of telehealth and digital communications, protecting email addresses has become more crucial than ever. They are often used to send appointment reminders, share lab results, or communicate treatment plans.

Given their link to PHI, email addresses must be stored and transmitted securely. This is where having a robust system like Feather becomes invaluable. We help ensure that emails are not only sent securely but also stored in a way that aligns with HIPAA requirements, alleviating some of the stress healthcare professionals face in managing patient communications.

Social Security Numbers: The Sensitive One

If there’s one identifier that screams “handle with care,” it’s the Social Security Number (SSN). This nine-digit number is a key to a trove of personal information and is a prime target for identity theft. As such, it’s heavily protected under HIPAA. But sometimes, it’s necessary to use SSNs for verification or billing purposes.

When SSNs are part of the equation, it’s critical to ensure they’re stored securely and accessed only by authorized personnel. This often means implementing strict access controls and encryption to prevent unauthorized access. For many healthcare providers, this can be a challenge, but tools like Feather can streamline the process, ensuring that SSNs and other sensitive data are handled with the utmost security.

Medical Record Numbers: The Unique Identifier

Medical record numbers (MRNs) are unique identifiers assigned to patients within a healthcare system. They’re essential for tracking patient information across different departments and services. However, because they’re unique to each patient, MRNs are considered HIPAA identifiers and must be protected.

Managing MRNs involves ensuring that only authorized personnel can access them and that systems storing MRNs are secure. It’s a delicate balance between making sure healthcare providers have the information they need and protecting patient privacy. This is where solutions like Feather can be incredibly helpful, automating the secure handling of such identifiers and allowing healthcare professionals to focus on patient care.

Account Numbers: More Than Just Billing

Account numbers might seem like they’re just used for billing, but they’re another crucial HIPAA identifier. Whether it’s a billing account number or a health insurance policy number, these identifiers link financial information to patient records, making them PHI under HIPAA.

Ensuring these numbers are kept confidential means implementing robust security measures. Encryption, access controls, and regular audits are all part of maintaining compliance. For healthcare organizations, this can be a resource-intensive process. Thankfully, tools like Feather can simplify this, ensuring that account numbers are handled in a compliant manner without adding to the administrative workload.

Certificate and License Numbers: Professional Identifiers

While we often think of identifiers as being linked to patients, they can also relate to healthcare providers. Certificate and license numbers fall into this category. Whether it’s a doctor’s medical license number or a nurse’s certification, these identifiers need protection, too.

Why? Because they can be used to verify credentials and are often linked to professional profiles. Protecting these identifiers means ensuring they’re not disclosed without authorization. For healthcare providers, this involves ensuring that systems storing professional identifiers are secure and compliant with HIPAA. Feather offers a way to manage these details securely, reducing the risk of unauthorized disclosure.

Vehicle Identifiers: More Than Just a License Plate

You might not think of vehicles when talking about healthcare, but vehicle identifiers are included in HIPAA’s list. This includes license plate numbers or any other vehicle details linked to an individual. It’s about ensuring that even indirect identifiers are protected.

Imagine a scenario where a patient’s vehicle is parked in a hospital lot. The vehicle’s details could inadvertently reveal the patient’s presence in the facility. Hence, these identifiers must be handled carefully to avoid unintended disclosures. As with other identifiers, Feather can help manage this information securely, ensuring compliance with HIPAA while easing the administrative load on healthcare staff.

Device Identifiers: The Tech-Savvy Identifier

In our tech-driven world, device identifiers have become increasingly relevant. These include serial numbers of medical devices and other equipment linked to patient care. With the rise of telehealth and the use of personal devices in healthcare, protecting these identifiers is crucial.

Ensuring device identifiers are secure means implementing technical safeguards like encryption and access controls. For healthcare organizations, this is part of a broader strategy to protect PHI. Feather, with its HIPAA-compliant platform, ensures that device identifiers are managed securely, allowing healthcare professionals to focus on delivering quality care.

Web URLs and IP Addresses: The Digital Footprint

Web URLs and IP addresses are relatively new entries in the list of HIPAA identifiers, reflecting the digital nature of modern healthcare. They’re considered identifiers because they can link online activity back to an individual. For healthcare providers, this means ensuring that any digital interactions involving PHI are secure.

This involves implementing secure web protocols and monitoring network activity for any signs of unauthorized access. It’s a complex task, but one that’s essential for maintaining compliance. Tools like Feather can help automate this process, providing a secure platform for managing patient data while reducing the risk of breaches.

Biometric Identifiers: The Unique One

Biometric identifiers, such as fingerprints or voice prints, offer unique ways to identify individuals. However, their uniqueness also makes them sensitive. Under HIPAA, biometric data is considered PHI and requires strict protection.

Managing biometric data involves ensuring that it’s stored securely and accessed only by authorized personnel. This often means implementing advanced security measures like encryption and multi-factor authentication. For healthcare providers, this can be a daunting task, but Feather’s platform offers a way to manage biometric data securely and efficiently, ensuring compliance with HIPAA.

Full Face Photos and Comparable Images: The Visual Identifier

Images of patients, particularly full-face photos, are also considered HIPAA identifiers. They’re direct links to an individual and, as such, require protection. This includes not only photographs but also video recordings and any other visual media.

For healthcare providers, this means ensuring that any images taken for medical purposes are stored securely and only shared with authorized personnel. It’s a crucial aspect of maintaining patient privacy, and one that can be effectively managed with tools like Feather, which ensures that visual identifiers are handled in a HIPAA-compliant manner.

Any Other Unique Identifying Number, Characteristic, or Code: The Catch-All

This final category is a bit of a catch-all, encompassing any other unique identifiers that could link data back to an individual. It’s a reminder that while HIPAA provides a list of specific identifiers, the overarching goal is to protect patient privacy in all its forms.

For healthcare providers, this means being vigilant about how patient data is handled and ensuring that any unique identifiers are protected. Feather’s platform offers a comprehensive solution for managing PHI, ensuring that all identifiers, whether listed or not, are handled securely and in compliance with HIPAA.

Final Thoughts

Understanding and managing the 18 HIPAA identifiers is crucial for protecting patient privacy and maintaining compliance. Each identifier plays a role in ensuring that health information remains confidential and secure. At Feather, we’re committed to helping healthcare professionals manage these identifiers efficiently, reducing administrative burdens and allowing more focus on patient care. With our HIPAA-compliant AI, you can be 10x more productive at a fraction of the cost, all while ensuring your data remains secure.

Feather is a team of healthcare professionals, engineers, and AI researchers with over a decade of experience building secure, privacy-first products. With deep knowledge of HIPAA, data compliance, and clinical workflows, the team is focused on helping healthcare providers use AI safely and effectively to reduce admin burden and improve patient outcomes.

linkedintwitter

Other posts you might like

HIPAA Terms and Definitions: A Quick Reference Guide

HIPAA compliance might sound like a maze of regulations, but it's crucial for anyone handling healthcare information. Whether you're a healthcare provider, an IT professional, or someone involved in medical administration, understanding HIPAA terms can save you a lot of headaches. Let’s break down these terms and definitions so you can navigate the healthcare compliance landscape with confidence.

Read more

HIPAA Security Audit Logs: A Comprehensive Guide to Compliance

Keeping track of patient data securely is not just a best practice—it's a necessity. HIPAA security audit logs play a pivotal role in ensuring that sensitive information is handled with care and compliance. We'll walk through what audit logs are, why they're important, and how you can effectively manage them.

Read more

HIPAA Training Essentials for Dental Offices: What You Need to Know

Running a dental office involves juggling many responsibilities, from patient care to administrative tasks. One of the most important aspects that can't be ignored is ensuring compliance with HIPAA regulations. These laws are designed to protect patient information, and understanding how they apply to your practice is crucial. So, let's walk through what you need to know about HIPAA training essentials for dental offices.

Read more

HIPAA Screen Timeout Requirements: What You Need to Know

In healthcare, ensuring the privacy and security of patient information is non-negotiable. One of the seemingly small yet crucial aspects of this is screen timeout settings on devices used to handle sensitive health information. These settings prevent unauthorized access when devices are left unattended. Let's break down what you need to know about HIPAA screen timeout requirements, and why they matter for healthcare professionals.

Read more

HIPAA Laws in Maryland: What You Need to Know

HIPAA laws can seem like a maze, especially when you're trying to navigate them in the context of Maryland's specific regulations. Understanding how these laws apply to healthcare providers, patients, and technology companies in Maryland is crucial for maintaining compliance and protecting patient privacy. So, let's break down the essentials of HIPAA in Maryland and what you need to know to keep things running smoothly.

Read more

HIPAA Correction of Medical Records: A Step-by-Step Guide

Sorting through medical records can sometimes feel like unraveling a complex puzzle, especially when errors crop up in your healthcare documentation. Fortunately, the Health Insurance Portability and Accountability Act (HIPAA) provides a clear path for correcting these medical records. We'll go through each step so that you can ensure your records accurately reflect your medical history. Let's break it down together.

Read more