HIPAA Requirements for CPAP Supply Companies: Compliance Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Requirements for CPAP Supply Companies: Compliance Checklist

Kevin Henry

HIPAA

March 09, 2026

8 minutes read
Share this article
HIPAA Requirements for CPAP Supply Companies: Compliance Checklist

HIPAA Compliance Overview

As a CPAP supply company, you create, receive, maintain, or transmit Protected Health Information (PHI) every day—prescriptions, device settings, therapy compliance reports, billing details, and shipping data with patient identifiers. If you bill payers electronically or support providers in handling PHI, HIPAA applies to you as a covered entity or business associate.

HIPAA’s core obligations come from three rules: the Privacy Rule (uses/disclosures and the minimum necessary standard), the Security Rule (safeguards for electronic PHI), and the Breach Notification Rule (prompt notice to individuals, HHS, and in some cases the media—generally within 60 days of discovery). State privacy and breach laws may impose additional requirements, so plan for both federal and state compliance. This article provides practical guidance, not legal advice.

Determine your role early. Most durable medical equipment suppliers that submit claims or eligibility checks electronically are covered entities. If you service clinics or hospitals and handle PHI on their behalf, you are a business associate and must meet contractual and regulatory requirements.

At-a-glance compliance checklist

  • Designate a Privacy Officer and a Security Officer with defined authority and resources.
  • Inventory PHI: what you collect, where it resides, who accesses it, and how it flows (intake → fulfillment → payer → patient support).
  • Adopt written policies/procedures for privacy, security, and breach response; enforce the minimum necessary standard.
  • Complete a Security Risk Assessment, remediate findings, and track progress.
  • Execute and manage each required Business Associate Agreement (BAA) before sharing PHI.
  • Train your workforce on HIPAA and role-specific duties; document completion and effectiveness.

Conducting Risk Assessments

A Security Risk Assessment (SRA) is the foundation of HIPAA compliance. You identify reasonably anticipated threats and vulnerabilities to ePHI, estimate likelihood and impact, prioritize risks, and implement appropriate controls. Treat the SRA as an ongoing program, not a one-time task.

Step-by-step Security Risk Assessment

  • Scope your environment: DME/CPAP software, e-prescribing portals, billing/clearinghouses, eFax, email, call recordings, remote laptops, mobile devices, shipping systems, patient portals, and cloud storage.
  • Map PHI data flows from referral to setup, resupply outreach, claims, appeals, repairs/returns, and retention/disposal.
  • Identify threats and vulnerabilities: misdirected shipments, unauthorized portal access, lost/stolen devices, phishing, misconfigurations, insecure APIs, and vendor failures.
  • Rate likelihood and impact to derive risk, then select controls (administrative, physical, and technical) that reduce risk to a reasonable and appropriate level.
  • Create a remediation plan with owners, budgets, milestones, and target dates; verify completion and re-test.
  • Review at least annually and after material changes (new software, mergers, remote-work expansions, major incidents).

Evidence to maintain

  • Written SRA report and risk register with scoring methodology.
  • Asset inventory and PHI data-flow diagrams.
  • Policies/procedures, change-control records, and configuration baselines.
  • Vulnerability scans/penetration test summaries and remediation proof.
  • Incident and breach logs with root-cause and lessons learned.

Implementing Administrative Safeguards

Administrative Safeguards are your governance backbone. They align people and process with the Security Rule and embed privacy-by-design across intake, fulfillment, billing, and patient support operations.

Key practices

  • Assign responsibility: name a Privacy Officer and a Security Officer; define escalation paths and decision rights.
  • Policies and procedures: privacy, minimum necessary, acceptable use, remote work, change management, sanctions, and records retention.
  • Workforce security: background screening, role-based access, onboarding/offboarding checklists, and periodic access recertifications.
  • Contingency planning: documented backups, disaster recovery, and emergency-mode operations; test at least annually.
  • Incident response: detect, triage, investigate, mitigate, and notify under the Breach Notification Rule within required timeframes; maintain evidence.
  • Vendor risk management: inventory vendors, assess risk, execute BAAs, verify safeguards, and monitor performance.
  • Privacy operations: Notice of Privacy Practices, minimum necessary workflows, identity verification for callers, and authorization management for marketing beyond treatment/payment/operations.

Establishing Physical Safeguards

Physical Safeguards protect facilities, workstations, and devices that handle PHI. They matter in warehouses, retail counters, delivery/returns areas, and home-care setups.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Facilities and workstations

  • Control facility access with badges/keys, visitor logs, and area restrictions (e.g., records rooms, fulfillment lines with PHI paperwork).
  • Secure workstations with privacy screens, automatic lock, and clean-desk expectations; keep printed PHI to a minimum.
  • Store paper prescriptions, setup reports, and repair/return forms in locked locations; track chain of custody.

Devices and media

  • Encrypt laptops and mobile devices; cable-lock desktops in public areas; disable unattended USB storage.
  • Use lockable bins for shredding; apply documented media sanitization before reuse or disposal.
  • Protect in-transit PHI: seal envelopes, minimize label content, and prevent visibility of documents inside packages.

Applying Technical Safeguards

Technical Safeguards secure ePHI through access controls, encryption, integrity protections, and audit capabilities. Build controls that match your risk profile and operational realities.

Access and authentication

  • Unique user IDs, strong passwords, and multi-factor authentication for EHR/DME software, billing portals, and VPNs.
  • Role-based access aligned to the minimum necessary standard; disable accounts promptly at offboarding.
  • Automatic logoff, session timeouts, and device screen locks.

Encryption and transmission security

  • Encrypt ePHI at rest on servers, databases, and endpoints; manage keys securely.
  • Use TLS for email gateways, eFax-over-IP, APIs, and patient portals; enforce modern cipher suites.
  • Mobile device management (MDM): require PIN/biometric, remote wipe, patching, and app controls.

Integrity, logging, and monitoring

  • Enable audit logs for access, changes, exports, and failed logins; review regularly with alerts for anomalous activity.
  • Endpoint protection, vulnerability management, and timely patching of operating systems and CPAP software integrations.
  • Backups that are encrypted, immutable or versioned, and periodically restore-tested.

Technical checklist

  • Email security with encryption and data-loss prevention for PHI; block auto-forwarding to personal accounts.
  • Network segmentation for payment/billing systems and administrative tools; least-privilege service accounts.
  • Documented retention schedules; purge ePHI once no longer needed or required.

Executing Business Associate Agreements

A Business Associate Agreement defines how vendors that create, receive, maintain, or transmit PHI for you will protect it. Common business associates for CPAP suppliers include DME/CPAP software vendors, billing and clearinghouse partners, cloud hosting/providers, IT support, eFax/email services, document storage, and shredding vendors. “Conduit” services that merely transport information without persistent storage typically are not business associates.

What a strong BAA includes

  • Permitted uses/disclosures, the minimum necessary expectation, and a prohibition on unauthorized uses.
  • Administrative, Physical, and Technical Safeguards aligned with the Security Rule.
  • Incident and breach reporting obligations, cooperation in investigations, and timely notifications.
  • Subcontractor “flow-down” requirements so downstream vendors also sign BAAs and follow safeguards.
  • Right to audit/assess, termination for cause, and return or destruction of PHI at contract end.

BAA management practices

  • Maintain a vendor inventory with risk tiers; obtain signed BAAs before sharing any PHI.
  • Perform initial and periodic due diligence; track remediation of vendor findings.
  • Review BAAs annually and when services or data flows change.

Training and Awareness Programs

Effective training turns policies into daily habits. Provide onboarding and at least annual refreshers that are role-specific—for intake staff, warehouse and delivery teams, billing, clinicians, and customer support.

Program essentials

  • Cover HIPAA basics, PHI handling, minimum necessary, secure communications, identity verification, and incident reporting.
  • Include scenarios relevant to CPAP: misdirected shipments, resupply reminders, phone disclosures to caregivers, and remote troubleshooting.
  • Reinforce with ongoing awareness: phishing simulations, monthly tips, huddles, and leadership walk-throughs.
  • Measure effectiveness via completion rates, knowledge checks, mock audits, and time-to-remediate findings.
  • Update training after major system changes, new vendors, or incidents.

Conclusion

Building a reliable HIPAA program for CPAP supply operations means knowing where PHI lives, performing a rigorous Security Risk Assessment, hardening Administrative, Physical, and Technical Safeguards, managing vendors with solid BAAs, and training people to do the right thing every time. Treat compliance as a living system—review it regularly, test it, and improve it as your business evolves.

FAQs.

What HIPAA regulations apply to CPAP supply companies?

CPAP suppliers typically fall under the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule. If you submit claims or other standard transactions electronically, you are likely a covered entity; if you handle PHI on behalf of a provider, you are a business associate. In both cases, you must safeguard PHI, limit uses and disclosures, and notify affected parties if a breach occurs.

How should CPAP providers conduct a HIPAA risk assessment?

Start with a comprehensive Security Risk Assessment: inventory systems and data flows, analyze threats and vulnerabilities, rate likelihood and impact, and document a mitigation plan with owners and deadlines. Reassess at least annually and whenever you add major technology, change vendors, or experience an incident. Keep evidence—risk register, policies, scans, and remediation proof.

What are the key safeguards required under HIPAA for PHI protection?

HIPAA requires Administrative Safeguards (governance, policies, workforce management, contingency and incident response), Physical Safeguards (facility, workstation, and device/media controls), and Technical Safeguards (access control, encryption, logging/monitoring, integrity and transmission security). Apply the minimum necessary standard throughout, and verify that safeguards operate effectively.

How do Business Associate Agreements impact CPAP suppliers?

Business Associate Agreements set the rules for vendors that handle your PHI. They require appropriate safeguards, define permitted uses, mandate prompt incident and breach reporting, extend obligations to subcontractors, and allow oversight or termination for noncompliance. Without a signed BAA, you should not share PHI with the vendor.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles