EU Cyber Resilience Act Guide for Telemedicine & Remote Patient Monitoring Vendors
Important — Class I or Class II; high overlap with MDR Class IIa/IIb medical devices
Telemedicine platforms and remote patient monitoring (RPM) devices face dual regulatory obligations under both the EU Medical Device Regulation (MDR 2017/745) and the CRA. Vendors must determine precisely which components qualify as medical devices under MDR and which are standalone software or connectivity products subject to the CRA independently. Security failures in RPM devices — which transmit real-time physiological data from patients' homes — carry both patient safety and data protection consequences, making robust security engineering a clinical as well as regulatory obligation.
CRA Scope and Interaction with the Medical Device Regulation
The CRA and MDR 2017/745 impose overlapping but distinct security obligations on telemedicine and RPM vendors. Medical devices that are also products with digital elements — which includes virtually all software-enabled telemedicine devices — are subject to both regulations simultaneously. MDR Annex I Chapter II already imposes cybersecurity requirements (GSPR 17) on medical devices, including requirements for IT security measures, authentication controls, and security updates. The CRA adds further obligations in terms of CVD policy, SBOM, and incident notification. ENISA guidance indicates that compliance with MDR cybersecurity requirements does not automatically satisfy CRA obligations — vendors must assess compliance with each regulation separately. Notably, MDR-regulated software (Software as a Medical Device, SaMD) that qualifies as Class IIa or above already requires notified body assessment, which may be coordinated with CRA assessment to reduce burden.
Technical Security Obligations for Remote Patient Monitoring
RPM devices transmitting patient physiological data from home environments present a challenging security profile: they must be simple enough for non-technical patients to operate, while securing sensitive health data in transit and at rest. Annex I requirements for RPM vendors include: encrypting all patient data transmissions using current TLS versions; implementing authentication that is accessible to elderly or technically inexperienced patients while preventing unauthorised access; ensuring device firmware updates are automatically available without requiring patient action; eliminating default credentials; implementing data minimisation — collecting only the physiological parameters required for clinical purpose; and providing documented procedures for data erasure when a device is returned or repurposed. The SBOM must cover firmware components in patient-side devices and server-side processing platforms. Vendors must also ensure cloud back-ends have appropriate access controls preventing data aggregation beyond clinical necessity.
CVD Policy Under Article 13 for Healthcare Technology
Article 13 requires a published CVD policy. For telemedicine vendors, this policy must operate alongside MDR post-market surveillance obligations and the requirement under GDPR to report personal data breaches within 72 hours of discovery. The CVD policy should specify: a dedicated security reporting contact; coordination procedures with the relevant competent authority (e.g. national medical device authority) for vulnerabilities with patient safety implications; how vulnerability information is shared with healthcare provider customers using the platform; and how security updates are communicated to patients using home-based devices. Because RPM devices process special category health data under GDPR Article 9, the CVD policy should address the privacy implications of vulnerability reports and researcher access to test environments. Separate from the CVD policy, the vendor's post-market surveillance plan under MDR must incorporate cybersecurity monitoring.
Article 14 Incident Reporting and Patient Safety Coordination
Article 14 requires notification to the relevant national CSIRT within 24 hours of confirmed active exploitation. For RPM vendors, exploitation scenarios — unauthorised access to patient vitals data, manipulation of device readings that could affect clinical decisions, or denial-of-service attacks disrupting monitoring — may simultaneously require GDPR data breach notification to the data protection authority (within 72 hours), and serious incident reporting to the competent medical device authority under MDR Article 87 (within 15 days for serious incidents, or 2 days for immediate threats). Vendors must design their incident response plan to trigger all applicable notification streams simultaneously. The CRA notification, GDPR breach notification, and MDR serious incident report must be consistent and cross-referenced. Legal counsel should be engaged in drafting incident response playbooks to ensure multi-regulatory compliance.
Conformity Assessment: Coordinating MDR and CRA Pathways
Telemedicine and RPM vendors subject to both MDR and CRA notified body requirements should seek to coordinate assessments with a single notified body that holds accreditation under both regulations, where possible. The MDR notified body assessment already covers cybersecurity aspects under GSPR 17 — this evidence base can be leveraged for the CRA technical file. The CRA technical file must additionally cover: SBOM; CVD policy documentation; Article 14 notification procedures; and post-market vulnerability monitoring plans specific to CRA requirements. Vendors with MDR Class I software products that are not subject to notified body assessment under MDR may nonetheless require notified body assessment under the CRA if the product qualifies as Important Class II. Classification under the two regulations must be assessed independently.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Telemedicine & Remote Patient Monitoring Vendors.
Start your free portalFrequently asked
Our RPM platform is a Class IIa medical device under MDR with notified body certification. Do we still need a separate CRA assessment?+
Yes. MDR and CRA are separate regulatory frameworks with distinct conformity assessment requirements. MDR notified body certification for a Class IIa device does not constitute CE marking under the CRA, and vice versa. However, the cybersecurity evidence compiled for MDR GSPR 17 compliance — security architecture, risk assessment, post-market surveillance — directly supports the CRA technical file. If your MDR notified body also holds CRA assessment accreditation, you may be able to conduct a coordinated assessment, reducing duplication of effort and cost. Contact your MDR notified body early to explore this option.
Our wearable RPM device connects to a patient's smartphone app. Who is responsible for CRA compliance — us or the smartphone manufacturer?+
You are responsible for CRA compliance for your RPM device and the companion app you distribute. The smartphone itself is the responsibility of the smartphone manufacturer. Your companion app, when distributed commercially to EU patients or healthcare providers, is in scope as a product with digital elements. The app's interactions with your device — including the Bluetooth or Wi-Fi interface — must be covered by your Annex I security assessment. You should document assumptions about smartphone security in your threat model and include guidance on minimum OS version requirements in patient-facing documentation.
How do we handle security updates for patients who are elderly or have limited technical literacy?+
Annex I requires security updates to be made available without undue delay and that devices support an automatic update mechanism where technically feasible. For consumer-facing RPM devices used by elderly or non-technical patients, automatic updates are both the technically appropriate solution and the patient safety imperative. Updates should be configured to install automatically during off-peak hours with minimal patient interaction required. Where patients can disable automatic updates, the device should prominently alert them when critical security updates are pending. Your patient-facing documentation should explain the importance of allowing automatic updates using plain, accessible language.
Compliance checklists for your products
Key CRA articles for Telemedicine & Remote Patient Monitoring Vendors
Need a CVD policy template for Telemedicine & Remote Patient Monitoring Vendors?
Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.