Oxygen Supply Company HIPAA Requirements: Compliance Guide and Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Oxygen Supply Company HIPAA Requirements: Compliance Guide and Checklist

Kevin Henry

HIPAA

January 20, 2026

8 minutes read
Share this article
Oxygen Supply Company HIPAA Requirements: Compliance Guide and Checklist

HIPAA Compliance Overview

As an oxygen supply company, you handle Protected Health Information during patient intake, scheduling, home deliveries, maintenance, and billing. If you transmit health information in electronic standard transactions, you are a covered health care provider under HIPAA and must comply with the Privacy Rule, Security Rule, and Breach Notification Rule. Even when acting for other providers, you may operate as a business associate and must protect Electronic PHI accordingly.

Start by defining the scope of PHI and ePHI across your workflows and systems. Designate a Privacy Officer to oversee permitted uses and disclosures, and a Security Officer to manage safeguards and incident response. Adopt the minimum necessary standard, honor patient rights, and embed privacy by design in daily operations.

Quick checklist

  • Confirm whether you are a covered entity, business associate, or both.
  • Appoint a Privacy Officer and a Security Officer with documented authority.
  • Map PHI/ePHI across intake forms, delivery apps, billing, telephony, and cloud tools.
  • Adopt written policies for privacy, security, and the Breach Notification Rule.
  • Train your workforce initially and at least annually; document completion.

Conduct Risk Assessment

A risk analysis identifies where ePHI resides, threats to its confidentiality, integrity, and availability, and the safeguards you need. For oxygen suppliers, include delivery tablets, route-optimization apps, vehicle laptops, e-fax, VoIP, patient monitoring data, and billing platforms.

How to proceed

  • Inventory assets: systems, devices, data flows, vendors, and facilities handling ePHI.
  • Identify threats and vulnerabilities: lost devices, misdirected paperwork, phishing, weak access, unsecured Wi‑Fi, and supply chain risks.
  • Evaluate likelihood and impact; assign risk ratings and prioritize mitigation.
  • Document the analysis, risk management plan, owners, timelines, and residual risk.
  • Review after major changes (new software, acquisitions) and at least annually.

Evidence to maintain

  • Risk register with scoring methodology and remediation status.
  • Network/data flow diagrams and asset inventory including serials and owners.
  • Management approvals and regular progress reports.

Implement Administrative Safeguards

Administrative Safeguards are your policy backbone. They define how access is granted, how staff are trained, and how incidents are managed. For oxygen suppliers with mobile teams, clear procedures reduce errors during high-volume deliveries and service calls.

Core policies and processes

  • Governance: name a Privacy Officer and Security Officer; set escalation paths.
  • Access management: role-based access, workforce clearance, and termination checklists.
  • Training and awareness: onboarding, annual refreshers, phishing drills, and job-specific guidance for drivers and technicians.
  • Contingency planning: data backup, disaster recovery, emergency mode operations, and tabletop exercises.
  • Incident response: detect, triage, contain, investigate, and document security incidents.
  • Vendor oversight: due diligence, risk reviews, and Business Associate Agreement tracking.
  • Sanctions: graduated, documented consequences for policy violations.

Administrative checklist

  • Publish and version-control privacy and security policies.
  • Align job descriptions with least-privilege access.
  • Record all training, attestations, and sanctions actions.
  • Test backups and emergency procedures on a defined schedule.

Apply Technical Safeguards

Technical controls protect Electronic PHI wherever it lives—on servers, laptops in vehicles, delivery tablets, or in the cloud. Focus on preventing unauthorized access, maintaining integrity, monitoring activity, and securing transmission.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Access control and authentication

  • Unique user IDs, strong passwords, and multi-factor authentication for remote and privileged access.
  • Automatic logoff and session timeouts on tablets and shared workstations.
  • Role-based access in EHR, billing, e-fax, and ticketing systems.

Encryption and transmission security

  • Encrypt ePHI at rest on laptops, mobile devices, and backups.
  • Encrypt in transit for email, APIs, and e-fax gateways; use secure messaging for PHI.
  • Use VPN or zero-trust access for off-site connections and fleet devices.

Audit, integrity, and availability

  • Enable audit logs for access, changes, and exports; review regularly.
  • Integrity controls: anti-malware, allow-listing, and tamper protection.
  • Patch management, secure configurations, MDM for tablets/phones, and rapid remote wipe.
  • Resilient backups with periodic restore tests and segregation from production.

Technical checklist

  • MFA on all cloud and remote access; device encryption verified.
  • Logs centralized; alerts tuned for anomalous access and large exports.
  • Mobile devices enrolled in MDM with geolocation and wipe-on-loss.
  • Data retention rules implemented within systems.

Enforce Physical Safeguards

Physical Safeguards ensure only authorized personnel can access facilities, workstations, and media containing PHI. They are vital for teams moving between warehouses, vehicles, and patient homes.

Facility and workstation controls

  • Badge-based facility access, visitor logs, and camera coverage for receiving and refill areas.
  • Secure workstations with privacy screens; lock rooms where paperwork is processed.
  • Clean-desk rules; secure printing, scanning, and shredding for paper PHI.

Device and media controls

  • Inventory and label laptops, tablets, portable drives, and oxygen device modules that store data.
  • Procedures for media disposal and re-use, including certified wiping or destruction.
  • Vehicle security: locked storage for paperwork and devices; never leave ePHI visible.

Physical checklist

  • Visitor management and escort procedures documented and enforced.
  • Secure storage for returned equipment that may contain patient data.
  • Routine inspections to verify locks, alarms, and shred bins are functioning.

Establish Business Associate Agreements

Any vendor that creates, receives, maintains, or transmits PHI on your behalf must sign a Business Associate Agreement. Typical partners include billing services, EHR providers, e-fax and cloud storage vendors, IT support, couriers handling labeled documents, and document destruction firms.

What to include

  • Permitted uses/disclosures, minimum necessary language, and prohibition on unauthorized marketing or sale of PHI.
  • Safeguards aligned to HIPAA Security Rule, breach reporting timelines, and cooperation duties.
  • Subcontractor flow-down, right to audit, data return/secure destruction, and termination rights.

BAA checklist

  • Catalog all vendors; identify which require a Business Associate Agreement.
  • Execute BAAs before sharing PHI; store signed copies and renewal dates.
  • Review vendors annually for security posture and incident history.

Manage Breach Notification

When an incident occurs, quickly assess whether it is a reportable breach of unsecured PHI under the Breach Notification Rule. Conduct a documented risk assessment considering the nature of PHI, who received it, whether it was actually viewed, and the extent of mitigation.

Notifications and timelines

  • Notify affected individuals without unreasonable delay and no later than 60 days after discovery.
  • Notify HHS: within 60 days for breaches affecting 500 or more individuals; for fewer than 500, report within 60 days after the end of the calendar year.
  • Notify prominent media if a breach involves 500 or more residents of a state or jurisdiction.

Content, method, and documentation

  • Include what happened, the types of PHI involved, steps taken, how individuals can protect themselves, and your contact information.
  • Use first-class mail or email if the individual has consented; substitute notice if contact data is insufficient.
  • Maintain incident logs, assessment worksheets, letters, and proof of mailing.

Breach management checklist

  • Activate incident response; contain and preserve evidence immediately.
  • Complete risk assessment; decide on notification with legal/leadership sign-off.
  • Offer mitigation such as credit monitoring if appropriate; track remediation actions.

Maintain Documentation and Record-Keeping

HIPAA requires you to maintain policies, procedures, and related actions for at least six years from the date of creation or last effective date. Strong records prove your program exists in practice, not just on paper.

What to keep

  • Policies and revisions; risk analyses and risk management plans.
  • Training schedules, materials, attendance, and attestations.
  • Access reviews, audit log summaries, incident reports, and sanctions.
  • Signed Business Associate Agreements and vendor risk reviews.
  • Forms for patient rights requests and responses.

Retention and readiness

  • Centralize documents in a controlled repository with role-based access.
  • Maintain an audit-ready index and evidence trail for each safeguard.
  • Schedule quarterly program reviews and annual leadership reporting.

Conclusion

By mapping PHI, completing a rigorous risk assessment, enforcing Administrative, Technical, and Physical Safeguards, executing each Business Associate Agreement, and rehearsing breach response, your oxygen supply company can meet HIPAA requirements confidently. Treat compliance as an ongoing quality process that protects patients and your organization.

FAQs.

What are the key HIPAA requirements for oxygen supply companies?

You must protect Protected Health Information under the Privacy Rule, secure Electronic PHI under the Security Rule, and follow the Breach Notification Rule after certain incidents. Practically, that means appointing a Privacy Officer and Security Officer, limiting access to the minimum necessary, training staff, executing Business Associate Agreements with vendors, applying encryption and access controls, securing facilities and devices, and documenting everything you do.

How should an oxygen supply company conduct a HIPAA risk assessment?

Inventory where PHI and ePHI live, map data flows, and identify threats like lost tablets, phishing, or misdirected paperwork. Rate likelihood and impact, prioritize mitigation, assign owners and deadlines, and document outcomes. Reassess at least annually and whenever you add new software, workflows, or vendors.

What technical safeguards are necessary for HIPAA compliance?

Use unique IDs and multi-factor authentication, encrypt ePHI at rest and in transit, enforce automatic logoff, centralize logs and reviews, maintain anti-malware and patching, manage mobile devices with MDM and remote wipe, and test resilient backups. Apply least privilege and monitor for unusual access or large data exports.

When must a breach notification be issued under HIPAA?

If unsecured PHI is compromised and your risk assessment does not show a low probability of compromise, notify affected individuals without unreasonable delay and no later than 60 days after discovery. For 500 or more individuals, also notify HHS within 60 days and local media; for fewer than 500, report to HHS within 60 days after year-end, and keep thorough documentation of the assessment and notices.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles