What is HIPAA Certification For Healthcare Vendors?
HIPAA Certification For Healthcare Vendors is a process whereby a supplier to the U.S. healthcare sector receives a formal third-party certification to signify the organization is compliant with HIPAA rules.
HIPAA is a U.S. law, the Health Insurance Portability and Accountability Act, that sets the minimum standards required to protect the privacy and security of an individuals’ health records. Under HIPAA, health records are known as Protected Health Information (PHI).
How Does HIPAA Apply To Vendors?
HIPAA broadly defines healthcare organizations as “covered entities” and their suppliers as “business associates”. Under HIPAA, a covered entity can only use a third party vendor’s software, products, or services if it receives satisfactory assurances in advance that the vendor will safeguard any PHI that it handles or comes into contact with.
If your company is a vendor that sells software, products, or services to the U.S. healthcare sector, it is likely to qualify as a business associate covered under HIPAA. You will therefore need to unambiguously demonstrate that the organization and offering complies with all applicable standards of HIPAA.
Providing satisfactory assurances that your organization is “HIPAA compliant” is unfortunately not straightforward. In many cases a vendor may have achieved any number of highly credible security certifications, but none will map exactly to the requirements of HIPAA. Any gaps that remain could undermine your organization’s chances of securing a contract with a HIPAA covered entity.
What Rules & Standards Apply To Vendors?
In very broad terms, a vendor working with a covered entity must:
- Follow the HIPAA Privacy Rule which limits uses/disclosures of Protected Health Information.
- Comply with the HIPAA Security Rule which safeguards the use of electronic Protected Health Information.
- Report any breaches that occur under the HIPAA Breach Notification Rule.
- Sign a Business Associate Agreement between the vendor and the covered entity they are supplying their services to.
Examples Of HIPAA For Vendors
Within the rules, different HIPAA standards will apply to healthcare vendors depending on the software, product, or service being provided to, or on behalf of, HIPAA covered entities. Here are some simple examples to illustrate the potential variations:
Vendor Example One:
An EDI (Electronic Data Interchange) software provider that has a customer support team where support personnel have full visibility of transactions. Implications: The vendor will have to comply with all the HIPAA Security Rule safeguards. The vendor will also need to create internal privacy policies to instruct their personnel on using and disclosing only the minimum necessary permissible Protected Health Information under the HIPAA Privacy Rule.
Vendor Example Two:
A cloud storage service provider that has “no view” access to Protected Health Information, because the information is encrypted and the HIPAA covered entity maintains the decryption key. Implications: The vendor will have to comply with fewer HIPAA Security Rule safeguards, and will not have to develop any privacy policies on permissible uses and disclosures of Protected Health Information.
Vendor Example Three:
A patient communications & forms platform that sends intake forms and appointment reminders. Support staff can view message content and completed forms in a dashboard to troubleshoot issues. Implications: The vendor must implement the full set of HIPAA Security Rule safeguards and maintain Privacy Rule policies (e.g., minimum necessary, role-based access, procedures for uses/disclosures). Requires a BAA; breach notification duties apply.
How Can Healthcare Vendors Get Certified As HIPAA Compliant?
There are two ways in which healthcare vendors can get certified as HIPAA compliant.
(1) Engage A HIPAA Compliance Consultant
A HIPAA compliance consultant, usually an independent auditors and compliance firm, will conduct a HIPAA risk assessment and advise you on the measures that have to be implemented to support compliance with applicable HIPAA standards. Once the measures are implemented, the consultant will then certify the organization as HIPAA compliant.
This can be expensive and time-consuming for smaller vendors. Plus a major issue with this type of HIPAA certification is that it is a point-in-time certification. It only certifies that measures existed to support HIPAA compliance. It does not certify the measures still exist or are being used. For some HIPAA covered entities, even annual point-in-time certifications do not provide the assurances necessary to meet due diligence requirements.
(2) Subscribe To HIPAA Compliance Software
HIPAA compliance software varies depending on the provider, but in general it makes it easy to manage ongoing HIPAA compliance for all types of business associates through automation of all the processes required. As compliance experts, in most cases the provider also gives HIPAA coaching as part of the offering, in order to ensure the compliance software is set up and operating correctly.
The big advantage is that the software provides ongoing certification for the vendor and notifies them of any potential issues.
The Benefits Of Vendor HIPAA Certification
(1) Faster Sales Cycle & Accelerated Trust
The primary benefit of HIPAA certification is that it creates immediate credibility with healthcare prospects, demonstrating upfront the vendor’s commitment to HIPAA compliance and reducing friction in the vendor selection process.
Being able to demonstrate real-time HIPAA compliance to prospective customers reduces the due diligence burden, and gives you a competitive edge over uncertified vendors
(2) Stronger Security & Lower Risk:
HIPAA certification reduces your exposure to cyberattacks and privacy violations by ensuring ongoing compliance with all applicable standards. This matters because the most common fallout from a cyberattack at a healthcare vendor is the loss of service contracts with covered entities and a damaged reputation that makes it harder to win new business.
Even if a breach does occur, certification provides protection. By demonstrating adherence to an accepted security framework, your organization benefits from the HIPAA Safe Harbor Law, which empowers the HHS Office for Civil Rights to lessen potential financial penalties, corrective action plans, and other sanctions.
Get The FREE
HIPAA Checklist
For Business Associates
Confidently Demonstrate Your Organization's HIPAA Compliance
A link to your download will be sent to your email address
Your Privacy Respected
HIPAA Journal Privacy Policy
A Five Step Guide To HIPAA Certification For Healthcare Vendors
Prior to any HIPAA certification process you can use these five steps to underprepare for HIPAA compliance.
Step One: Determine Your HIPAA Status
If your organization provides software, products, or services to a customer that qualifies as a HIPAA covered entity, and the software, product, or service will be used to create, receive, maintain, or transmit Protected Health Information for an activity or function regulated by the HIPAA Administrative Simplification Regulations, the organization qualifies as a Business Associate.
If your organization provides software, products, or services TO a customer that qualifies as a Business Associate, the organization qualifies as a subcontractor to the Business Associate (also known as a downstream Business Associate). Subcontractors have the same compliance requirements as Business Associates, but they are likely to have less access to Protected Health Information.
Step Two: Organize Agreements With Downstream Business Associates
If your organization qualifies as a Business Associate, and it uses services provided by a third party for creating, receiving, maintaining, or transmitting Protected Health Information, it will be necessary for you to enter into a Business Associate Agreement with the third party to whom you will be subcontracting covered services. Effectively, the third party will be a downstream Business Associate to your organization.
Examples of when downstream Business Associate Agreements are necessary include when your organization collects Protected Health Information on its website using a Google Forms plugin, when it stores Protected Health Information in the Microsoft Cloud, and when it transmits Protected Health Information in an encrypted email and the encryption service is provided by a third party who maintains the decryption key.
In the same way as your prospective customers will conduct due diligence on your organization, your organization must also conduct due diligence on downstream Business Associates. The due diligence must be completed and documented prior to entering into a Business Associate Agreement, and prior to disclosing any Protected Health Information to the downstream Business Associate.
Step Three: Implement All Applicable Safeguards and Policy Requirements
In order to be certified as HIPAA compliant, it is necessary to have measures in place that satisfy the requirements of all applicable security safeguards. In order to determine what measures are necessary, you have to conduct a risk analysis of the potential threats to Protected Health Information, and implement measures that are sufficient to reduce threats to a “reasonable and appropriate level”.
What constitutes a “reasonable and appropriate level” is dependent on how you interpret the General Security Rules and the Flexibility of Approach clause in 45 CFR §164.306. However, it is important that any security measures implemented to reduce threats also account for careless or negligent uses and disclosures of Protected Health Information by workforce members that are not permitted by the HIPAA Privacy Rule.
It is not only necessary to implement measures to qualify for HIPAA certification. It is also necessary that policies and procedures are developed on the compliant use of the measures by workforce members. For example, if you have assigned a unique password for each workforce member, there has to be a policy instructing workforce members not to disclose their passwords to anybody else, preferably explaining why.
Step Four: Prepare Procedures For Security Incident Reporting And Breach Response
Under HIPAA, a security incident is any attempt to access, use, modify, or destroy information or the systems on which information is stored – regardless of whether the attempt is successful or not. The HIPAA Security Rule requires Business Associates to identify, respond to, document, and report all security incidents to HIPAA covered entities (or upstream Business Associates), even if the incidents do not result in a data breach.
Most modern security solutions have capabilities that can be configured to monitor network activity and flag anomalous behaviors. As well as activating these capabilities, it is also necessary to implement measures that enable workforce members to flag unsuccessful incidents when they evade detection by security solutions. Thereafter, procedures must be prepared for escalating reports to HIPAA covered entities.
If a security incident results in a data breach, procedures must be in place to contain and control the breach, and mitigate the consequences of the breach. In most cases, breaches of unsecured Protected Health Information must be notified to the HIPAA covered entity or upstream Business Associate, but your organization will be responsible for reviewing the cause of the breach and implementing measures to prevent a recurrence.
Step Five: Develop A Workforce Training Program And HIPAA Sanctions Policy
All HIPAA covered entities and Business Associates are required to develop and provide a workforce training program that covers the security awareness training requirements of the HIPAA Security Rule, and any policies that have been implemented to support compliance with the HIPAA Privacy and Breach Notification Rules. For this reason, off-the-shelf generic security training does not meet the requirements of HIPAA.
HIPAA covered entities and Business Associates must also develop a HIPAA sanctions policy that applies sanctions on workforce members who violate any policy implemented to comply with the HIPAA Security Rule, or any standard of the HIPAA Privacy and Breach Notification Rules. This requirement applies even if the violation did not result in a data breach, and organizations that fail to apply sanctions are themselves in violation of HIPAA.
Organizations are required to apply sanctions for violations even if the standard relating to the violation has not been covered in training. For example, if a workforce member finds out a family member is unwell through their authorized access to Protected Health Information and impermissibly, but without knowing it was wrong, shares that information with other family members, they still have to be sanctioned.
Some HIPAA certification organizations are unaware of this requirement, and this information can be used to determine which certification organizations “know their stuff”.
Get The FREE
HIPAA Checklist
For Business Associates
Confidently Demonstrate Your Organization's HIPAA Compliance
A link to your download will be sent to your email address
Your Privacy Respected
HIPAA Journal Privacy Policy
Other Compliance Requirements To Consider
Depending on the capabilities of the software, product, or service you wish to market to the U.S. healthcare sector, there may be further compliance requirements in addition to HIPAA or HIPAA-esque regulations.
These include (but are not limited to) the Health Information Technology Standards for certified health IT, FDA regulations for medical devices, and The FTC’s Healthcare Breach Notification Rule for consumer health apps.
If you are unsure about which compliance requirements you have to consider, including those mandated by state laws, you are advised to speak with a HIPAA compliance consultant or a HIPAA compliance software provider.
HIPAA Badges & Other Visual Signals Of Trust
While HIPAA itself does not issue an official certification or badge, many independent auditors and compliance firms provide third-party HIPAA certification programs. These often include a badge or seal that organizations can display on their websites, sales collateral, and marketing materials.
Even though these badges are not government-issued, they still serve as visible proof of commitment to HIPAA compliance. For healthcare prospects, seeing a recognizable certification mark reduces uncertainty, speeds up trust-building, and lowers the due diligence burden. In competitive markets, a certification badge can function as a quick differentiator—signaling that your organization prioritizes compliance and security, even if the badge itself is not an “official” HIPAA designation.
Please see our Business Associates Hub for more expert articles on Business Associate compliance.
Get The FREE
HIPAA Checklist For Vendors
Learn What Is Required For HIPAA Compliance
A link for the checklist will be sent to your email address
Your Privacy Respected
HIPAA Journal Privacy Policy
HIPAA Journal featured on

