Unsecured Protected Health Information
Definition
Unsecured Protected Health Information is protected health information that has not been rendered unreadable, unusable, or indecipherable to unauthorized individuals through appropriate safeguards such as strong encryption, secure destruction, or equivalent protective measures. Under HIPAA, this concept is important because a privacy or security incident involving unsecured health information may create breach notification obligations and require a structured response. The term commonly applies to paper records, emails, files, databases, backups, portable devices, logs, or application exports that contain identifiable health-related information and are exposed without adequate protection. Unsecured PHI is not limited to hospitals or insurers; it can affect digital health startups, software vendors, care coordination platforms, billing processors, analytics teams, and enterprise health benefit operations. Similar concepts appear in other privacy and security programs as sensitive personal information, regulated health data, confidential records, or special-category data. Effective governance requires knowing where PHI exists, limiting access, protecting it in transit and at rest, monitoring use, and maintaining response procedures for suspected disclosures.
Real-World Examples
Lost Unencrypted Laptop
A clinic employee loses a laptop containing patient visit notes and billing details that were stored locally without full-disk encryption.
Misaddressed Email Attachment
An enterprise health benefits team or care coordinator accidentally sends a spreadsheet of patient names, diagnoses, and appointment details to the wrong external recipient.
Exposed Cloud Storage Folder
A digital health startup stores exported patient records in a cloud folder that is accessible outside the approved workforce group.
Improper Paper Disposal
A small practice discards printed intake forms containing patient identifiers and treatment details without shredding or secure destruction.
Unsecured protected health information is PHI that has not been protected in a way that makes it unreadable, unusable, or indecipherable to unauthorized people. Under HIPAA, this often matters when evaluating whether an incident involving health information may require breach response and notification.
Protected health information is generally considered unsecured when it can be accessed, read, copied, or used by unauthorized individuals because controls such as encryption, secure deletion, access restriction, or physical protection are missing or ineffective. Examples include unencrypted files, printed records left unattended, exposed backups, or misdirected messages.
PHI is identifiable health-related information handled by organizations subject to HIPAA obligations. Unsecured PHI is a higher-risk condition where that information has not been adequately protected from unauthorized access, disclosure, or use through recognized safeguards such as encryption or secure destruction.
Encrypted PHI is usually not treated the same as unsecured PHI when the encryption is strong, properly implemented, and the keys are not exposed. If encryption is weak, misconfigured, bypassed, or the decryption key is compromised, the information may still create significant security and breach-response risk.
Examples include unencrypted patient files on a stolen laptop, printed medical records left in a public area, a spreadsheet of patient data emailed to the wrong recipient, cloud storage with overly broad access, or backup media containing identifiable health information without encryption or secure handling.
An organization should contain the incident, preserve evidence, assess what PHI was involved, determine who may have accessed it, evaluate legal and contractual notification duties, document decisions, and remediate the root cause. Response should involve privacy, security, legal, compliance, and operational stakeholders.
Healthcare organizations can reduce unsecured PHI disclosures by encrypting systems and backups, applying least-privilege access, using secure messaging and file transfer, training workforce members, monitoring access, restricting exports, securing paper records, and reviewing third-party handling of health information.
Common controls for electronic PHI include access control, multi-factor authentication, encryption at rest and in transit, audit logging, endpoint protection, vulnerability management, secure backup practices, data loss prevention, incident response procedures, and periodic review of user permissions and system configurations.
Responsibility is shared across leadership, privacy officers, security teams, IT administrators, application owners, workforce members, and service providers that handle PHI. Each group must understand its role in protecting information, reporting incidents, and following approved policies and procedures.
Information security and GRC programs should identify where PHI exists, classify it as sensitive data, define control requirements, assign ownership, monitor access, maintain evidence of safeguards, test incident response procedures, and track remediation when PHI is found to be stored, transmitted, or disposed of insecurely.
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-05-07 | WatchDog GRC Team | Initial publication |