NDHM Implementation Guide

Contents

1. Introduction

The NDHM would provide technology to manage and analyse data, and create a system of personal health records and health applications. Central to the “ecosystem” would be a Personal Health Identifier (PHI) to maintain a Personal Health Record (PHR). The PHI would contain the names of patients and those of their immediate family, date of birth, gender, mobile number, email address, location, family ID and photograph. While Aadhaar assures uniqueness of identity and provides an online mechanism for authentication, it cannot be used in every health context as per the applicable regulations. The design of PHI, therefore, must allow multiple identifiers (chosen from the specified types of identifiers) for designing the structure and processes relating to PHI.

2. Purpose

The NDHM would provide technology to manage and analyse data, and create a system of personal health records and health applications. Central to the “ecosystem” would be a Personal Health Identifier (PHI) to maintain a Personal Health Record (PHR). The PHI would contain the names of patients and those of their immediate family, date of birth, gender, mobile number, email address, location, family ID and photograph. While Aadhaar assures uniqueness of identity and provides an online mechanism for authentication, it cannot be used in every health context as per the applicable regulations. The design of PHI, therefore, must allow multiple identifiers (chosen from the specified types of identifiers) for designing the structure and processes relating to PHI.

3. Scope

The NDHM would provide technology to manage and analyse data, and create a system of personal health records and health applications. Central to the “ecosystem” would be a Personal Health Identifier (PHI) to maintain a Personal Health Record (PHR). The PHI would contain the names of patients and those of their immediate family, date of birth, gender, mobile number, email address, location, family ID and photograph. While Aadhaar assures uniqueness of identity and provides an online mechanism for authentication, it cannot be used in every health context as per the applicable regulations. The design of PHI, therefore, must allow multiple identifiers (chosen from the specified types of identifiers) for designing the structure and processes relating to PHI.