Electronically Protected Health Information (ePHI) | Overview | Why Information Security Policies are Essential

78. What is Electronically Protected Health Information (ePHI) and why are policies and procedures so important for compliance?

Electronically Protected Health Information (ePHI) is essentially Protected Health Information (PHI) that is stored, maintained, and/or transmitted in electronic format. More specifically, it can include any of the following, so long as it’s electronic – and if it isn’t – then it’s simply referred to as Protected Health Information (PHI), for which ePHI is a subset thereof.

1. Names
2. All geographical identifiers smaller than a state
3. Dates (other than year) directly related to an individual
4. Phone numbers
5. Fax numbers
6. Email addresses
7. Social Security numbers
8. Medical record numbers
9. Health insurance beneficiary numbers
10. Account numbers
11. Certificate/license numbers
12. Vehicle identifiers and serial numbers, including license plate numbers;
13. Device identifiers and serial numbers;
14. Web Uniform Resource Locators (URLs)
15. Internet Protocol (IP) address numbers
16. Biometric identifiers, including finger, retinal and voice prints
17. Full face photographic images and any comparable images
18. Any other unique identifying number, characteristic, or codes.

From ePHI to credit card information – and more – any type of information deemed sensitive needs to be protected at all times, with begins developing and implementing comprehensive information security policies and procedures. Available for instant download, the industry leading I.T. security policy templates are easy-to-use and customize, so visit flatirontech.org to learn more. In today’s world of growing cybersecurity attacks and threats, now’s the time to put in place high-quality, industry leading information security policies and procedures – largely due to growing regulatory compliance laws – but also for I.T. best practices. Visit flatirontech.org to learn more about the very best information security policies and procedures found anywhere today.

Also, please visit our HIPAA specific website at hipaapoliciesandprocedures.com to learn more about HIPAA compliance, along with the industry leading documentation we offer for both the HIPAA Security Rule and the HIPAA Privacy Rule. When it comes to the very best documentation for regulatory compliance, Flat Iron Technologies, LLC, is the only name you need to know.

GISCP - PREMIER Edition ($1,479.00)

Click below to view table of contents

GISCP cover

White Papers