The PHI Inventory module helps you maintain a comprehensive register of all systems, applications, and repositories that create, receive, maintain, or transmit protected health information (PHI). This is a foundational requirement for HIPAA compliance under both the Privacy Rule and the Security Rule.

Why Maintain a PHI Inventory?

The Security Rule requires covered entities to conduct a risk analysis of ePHI across their environment (45 CFR 164.308(a)(1)). A complete and accurate PHI inventory is the starting point for:

  • Identifying where PHI resides, flows, and is accessible
  • Scoping your Security Rule risk analysis
  • Applying the minimum necessary standard
  • Determining which business associates have access to PHI
  • Validating encryption and access control requirements

Adding Systems

To add a system to the PHI inventory:

  1. Navigate to HIPAA → PHI Inventory
  2. Click Add System
  3. Provide the system name, description, and owner
  4. Select the PHI categories stored or processed
  5. Indicate the data format (electronic, paper, or both)
  6. Set the encryption status and method
  7. Specify access controls and authorised users/roles
  8. Save the entry

PHI Categories

HIPAA defines 18 types of identifiers that, when combined with health information, constitute PHI. Track which categories each system handles:

NamesFull name or last name and initial
Geographic dataAddresses, including street address, city, county, ZIP code
DatesBirth date, admission date, discharge date, date of death, and all ages over 89
Phone numbersTelephone and fax numbers
Email addressesElectronic mail addresses
SSNSocial Security numbers
Medical record numbersIdentifiers assigned by health care providers
Health plan beneficiary numbersInsurance plan member IDs
Account numbersFinancial account numbers
Certificate/licence numbersProfessional licence or certificate identifiers
Vehicle identifiersVehicle serial numbers and licence plate numbers
Device identifiersMedical device serial numbers and UDIs
Web URLsInternet URLs associated with the individual
IP addressesInternet Protocol addresses
Biometric identifiersFingerprints, retinal scans, voiceprints
Full-face photographsPhotographic images of the face
Other unique identifiersAny other unique identifying number, characteristic, or code

Encryption Status

For each system, record the encryption status of PHI at rest and in transit:

  • Encrypted at rest — PHI is encrypted when stored (e.g., AES-256, database-level encryption)
  • Encrypted in transit — PHI is encrypted during transmission (e.g., TLS 1.2+, VPN)
  • Not encrypted — PHI is not encrypted (document the compensating controls or remediation plan)

Encryption is an addressable specification under the Security Rule (45 CFR 164.312(a)(2)(iv) and 164.312(e)(2)(ii)). If encryption is not implemented, you must document why it is not reasonable and appropriate and what equivalent alternative measure is used.

Minimum Necessary Standard

The Privacy Rule's minimum necessary standard (45 CFR 164.502(b)) requires covered entities to make reasonable efforts to limit PHI to the minimum necessary to accomplish the intended purpose. Use the PHI Inventory to:

  • Document which roles have access to each system
  • Identify systems where access exceeds operational needs
  • Track remediation actions to restrict unnecessary access
  • Support your minimum necessary policies and procedures