Glossary
Electronic Protected Health Information (ePHI)
Electronic Protected Health Information (ePHI) is Protected Health Information (PHI) that is created, stored, transmitted, or received in electronic form — the subset of PHI specifically covered by the HIPAA Security Rule, which mandates administrative, physical, and technical safeguards.
Definition
Electronic Protected Health Information (ePHI) is Protected Health Information (PHI) that is created, stored, transmitted, or received in electronic form — the subset of PHI specifically covered by the HIPAA Security Rule, which mandates administrative, physical, and technical safeguards.
ePHI includes any of the 18 HIPAA identifiers — such as names, dates, geographic data, phone numbers, addresses, medical record numbers (MRNs), and account numbers — when they appear in electronic form combined with health-related information. Practical examples include: electronic health record (EHR) records, secure patient messages, voice recordings of clinical calls, cloud-stored lab or imaging results, and billing transactions that include diagnosis codes.
Regulatory basis
ePHI is covered specifically by the HIPAA Security Rule (45 CFR 164.302–318), which applies only to PHI in electronic form (unlike the Privacy Rule, which covers PHI in all formats). The Security Rule requires three categories of safeguards:
- Administrative safeguards — policies and procedures, workforce training, access management, and risk analysis
- Physical safeguards — facility access controls, workstation use policies, and device and media controls
- Technical safeguards — access controls, audit logs, integrity controls, and transmission security
The authoritative source is the HHS HIPAA Security Rule, which publishes the full regulatory text plus guidance on implementation specifications for covered entities and business associates.
Who uses it and when it applies
- Applies to all covered entities and business associates that handle PHI in any electronic form — regardless of whether that form is a database, a file, an email, or a streaming audio recording
- Encompasses ePHI both at rest (storage on servers, hard drives, or cloud infrastructure) and in transit (transmission over networks or the internet)
- Encryption is classified as “addressable” rather than strictly required — but de-facto expected and strongly recommended for any ePHI at rest or in transit; failure to encrypt without documented justification is treated as a compliance gap in OCR audits
- Loss, theft, or unauthorized access to ePHI triggers Breach Notification Rule obligations: affected individuals, HHS, and (for large breaches) media outlets must be notified within specified timeframes
Related terms
- HIPAA Compliance — the broader regulatory framework within which the ePHI Security Rule sits
- Business Associate Agreement — the contract framework required when vendors handle ePHI on behalf of a covered entity
- HITECH Act — the 2009 law that tightened ePHI breach notification requirements and expanded enforcement
- Care coordination — a workflow that routinely generates and transmits ePHI across care teams
How Positive Check relates
Positive Check handles ePHI end-to-end: call transcripts, structured summaries, patient identifiers, and clinical flag data all qualify as ePHI under the HIPAA Security Rule. The platform implements Security Rule safeguards — encryption in transit (TLS) and at rest, role-based access controls, comprehensive audit logging, and minimum-necessary data handling. Learn more about the platform architecture on the Positive Check platform overview.
Reviewed against current HHS HIPAA Security Rule guidance. HHS HIPAA Security Rule. Last updated 2026-04-21.
