Is Owens & Minor HIPAA Compliant? What You Need to Know

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Is Owens & Minor HIPAA Compliant? What You Need to Know

Kevin Henry

HIPAA

April 29, 2026

7 minutes read
Share this article
Is Owens & Minor HIPAA Compliant? What You Need to Know

The short answer is that Owens & Minor’s HIPAA obligations depend on the role it plays. Its Patient Direct Segment engages directly with patients and therefore functions as a health care provider—and thus a Covered Entity for those operations. Other divisions typically support hospitals and clinics and often act as Business Associates. Because HIPAA compliance is a continuous Compliance Program rather than a one-time “certification,” you should evaluate how the company protects Protected Health Information in each context.

Overview of Owens & Minor

Owens & Minor is a healthcare products and services company that supports care delivery across settings. Its portfolio spans medical product manufacturing and distribution, supply chain and logistics services, and the Patient Direct Segment that delivers home-based medical equipment and related services to individuals.

Given this mix, the company may handle Protected Health Information (PHI) in multiple ways. When it delivers care or bills payers in Patient Direct operations, it functions as a Covered Entity. When it provides logistics, kitting, or other services for providers that involve PHI, it typically operates as a Business Associate under a Business Associate Agreement.

HIPAA Requirements for Covered Entities

If an organization is a Covered Entity, it must implement the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule. In practice, that means:

  • Privacy Rule: Use and disclose PHI only for permitted purposes (treatment, payment, health care operations) or with valid authorization; apply the minimum necessary standard; and honor individual rights such as access and amendments.
  • Security Rule: Safeguard electronic PHI with administrative, physical, and technical controls, including risk analysis, access management, encryption, audit logging, and contingency planning.
  • Breach Notification Rule: Maintain incident response processes and notify affected individuals and regulators after qualifying breaches within required timelines.
  • Business Associate Management: Execute a Business Associate Agreement before sharing PHI with vendors that create, receive, maintain, or transmit it on your behalf.
  • Policies, Training, and Documentation: Adopt written policies, train your workforce, and retain documentation to show how requirements are met.

HIPAA Compliance in Patient Direct Segment

The Patient Direct Segment interacts with patients, physicians, and payers to deliver home-based care and supplies. Those activities ordinarily make it a health care provider for HIPAA purposes, which brings direct obligations as a Covered Entity.

Common PHI flows you should expect

  • Intake and order management that capture diagnoses, prescriptions, and insurance information.
  • Eligibility checks, authorizations, and claims submissions—standard electronic transactions that involve ePHI and trigger the Security Rule.
  • Care coordination and customer support that require identity verification and role-based access to records.
  • Device setup, delivery logistics, and potential remote monitoring that necessitate secure data handling end to end.

Safeguards that demonstrate diligence

  • Verified Notice of Privacy Practices and clear use/disclosure purposes.
  • Access controls, multi-factor authentication, encryption in transit and at rest, and audit trails for systems that store ePHI.
  • Workforce training specific to home encounters (e.g., conversations in shared spaces, secure transport and disposal of documents/labels).
  • Vendor oversight for courier, repair, and technology partners that touch PHI, each bound by a Business Associate Agreement.

Data Privacy Policies

Strong privacy policies translate HIPAA principles into day-to-day behavior and account for broader Data Privacy Laws. While HIPAA governs PHI, state privacy laws may also apply to other personal data (for example, consumer information on retail sites). An effective approach documents scope, legal bases, retention, and rights handling across data types.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment
  • Data minimization and purpose limitation: Collect only what’s necessary to fulfill orders, coordinate care, and meet payer requirements.
  • Retention and disposal: Define retention periods for PHI and implement secure destruction for paper and electronic media.
  • Individual rights: Provide processes for access, amendments, and accounting of disclosures; clarify how non-PHI consumer data is addressed under state laws.
  • De-identification and aggregation: Use de-identified data for analytics when feasible to reduce privacy risk.
  • Incident response and testing: Maintain an integrated plan for security events, privacy complaints, and breach investigations.

HIPAA Compliance Programs

HIPAA compliance is sustained through a formal, enterprise-wide Compliance Program. For an organization like Owens & Minor, core components typically include:

  • Governance: Board and executive oversight, a designated privacy and security officer, and clear reporting lines.
  • Risk management: Enterprise risk analysis, remediation plans, and periodic reassessments of systems that store or process ePHI.
  • Policies and procedures: Documented administrative, physical, and technical safeguards aligned to the Security Rule and operational realities.
  • Training and awareness: Role-based onboarding and annual refreshers, plus targeted modules for high-risk roles.
  • Monitoring and auditing: Access reviews, activity log monitoring, vendor audits, and issue trending with corrective action tracking.
  • Hotline and non-retaliation: Confidential reporting channels and a disciplinary framework for violations.
  • Documentation: Evidence repositories (risk assessments, training logs, Business Associate Agreement inventory, and incident records).

When you conduct due diligence, request artifacts such as a recent risk analysis summary, security testing results, sample policies, and proof of workforce training completion.

Role of Business Associates

Outside of direct patient care, Owens & Minor often supports Covered Entities as a Business Associate. In that role, the company is directly liable for safeguarding ePHI under the Security Rule and for certain Privacy Rule provisions.

Business Associate Agreement essentials

  • Permitted uses and disclosures of PHI tied to defined services.
  • Safeguards: Implementation of administrative, physical, and technical controls, plus ongoing risk management.
  • Breach reporting timelines, cooperation duties, and documentation requirements.
  • Subcontractor flow-down: Ensuring all downstream vendors that handle PHI sign comparable agreements.
  • Termination, return, or destruction of PHI at contract end, subject to retention obligations.

As a customer, you should validate least-privilege data flows, segregated environments, and logistics controls that prevent unnecessary exposure of PHI during distribution, returns, or repairs.

Ethical Standards and Compliance Initiatives

HIPAA works best within a broader ethics culture. Hallmarks include a clear code of conduct, leadership tone that prioritizes patient trust, speak-up channels, and conflict-of-interest management for employees who interact with suppliers and providers.

  • Integrity in marketing and sales communications, avoiding misuse of PHI for non-permitted purposes.
  • Training that reinforces privacy-by-design in product, technology, and logistics decisions.
  • Continuous improvement through internal audits, metrics, and post-incident reviews.

Conclusion

Is Owens & Minor HIPAA compliant? For Patient Direct operations, it bears Covered Entity duties; for other services, it typically operates as a Business Associate under a Business Associate Agreement. Your best assurance comes from evidence of a mature Compliance Program, demonstrable Security Rule safeguards, and transparent privacy practices aligned to how each segment handles PHI.

FAQs.

What makes Owens & Minor subject to HIPAA regulations?

HIPAA applies when the company delivers or bills for health care in its Patient Direct Segment, making those operations a Covered Entity. It also applies when other divisions create, receive, maintain, or transmit PHI for providers, which makes them Business Associates with direct obligations under the Security Rule and certain Privacy Rule provisions.

How does Owens & Minor protect patient information?

Organizations like Owens & Minor safeguard PHI with layered controls: risk analysis, least-privilege access, authentication and encryption, secure logistics and labeling, vendor oversight through a Business Associate Agreement, workforce training, activity monitoring, and tested incident response and breach notification procedures.

What compliance measures has Owens & Minor implemented?

While internal details are not publicly exhaustive, a company in this role typically maintains a formal Compliance Program with documented policies, recurring training, vendor management, ongoing risk management for ePHI systems, and evidence such as risk assessment summaries and security testing results. For assurance, ask for artifacts like BAA templates, recent assessment reports, and proof of program governance and monitoring.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles