HIPAA – Health Insurance Portability and Accountability Act
Protect your clients’ health information with PII Tools.
How PII Tools helps with HIPAA
Thorough PHI Discovery
Find all the electronic (ePHI) sensitive data in your environment. Scan local and cloud storages, emails, databases, archived and password-protected files, images, signatures, and more (see the complete list). Rely on built-in OCR to analyze scanned or rotated documents, such as MRI scans and prescriptions.


Right To Access
Instantly find all the data related to a specific subject across your entire inventory, including the exact file locations. By using PII Tools’ unique PII Analytics, you can filter and search for affected documents on demand, allowing you to easily react to any ePHI access request.

Risk Classification
Analyze and sort ePHI data based on its severity, content, or context. PII Tools performs an automatic risk classification of each scanned file. This helps you to evaluate ePHI data in context and improves your review experience, because not all personal health information is created equal.


Automated Face Recognition
Full-face photos and other photos where a person can be identified are classified as sensitive data. PII Tools’ proprietary AI automatically detects faces in images, eliminating the need for a manual assessment.

Clear Breach Notification Reports
If the security of the ePHI has been compromised, you have to notify the authorities and affected individuals. Use PII Tools to scan the affected environments, and rely on clear reports to identify what and whose data was leaked to start remedial action immediately.


Continuous Email Scanning
The more employees and clients you have, the more mailboxes and digital communication is required. PII Tools can be set up to regularly scan each email in every mailbox for ePHI to ensure your employees don’t disclose any sensitive data.

Our customers say…
John Duminy
Vulnerability Manager, CRC Cyber Team
"Very few solutions actually incorporate ML and AI. And that makes a huge difference because it dramatically increases PII Tools’ efficiency."
