Monthly Archives: December 2020

PDPSI Ecosystem

The National Digital Health Mission (NDHM) has issued the Health Data management policy which has been introduced over the previous series of articles. As per the document on the NDHM website, the Health Data Management Policy (HDMP) is the first … Continue reading

Posted in Cyber Law | 1 Comment

Data Fiduciaries under NDHM

(This is a continuation of the previous Article) The Health Data Protection policy announced by NHD scheme has adopted the Obligations of data fiduciaries and rights of data principles from the Personal Data Protection Bill 2019. Accordingly the obligations include … Continue reading

Posted in Cyber Law | Leave a comment

Managing IDs in NHD ecosystem

(This is a continuation of the earlier article) Presently most of the Government’s schemes use the Aadhaar ID as the identity determinant of the citizens. It is the attempt to link Aadhaar ID to property registrations to prevent benami properties … Continue reading

Posted in Cyber Law | Leave a comment

NDHM-Health Data Management policy objective need not be linked to ISO standard

(This is a continuation of the earlier article) Before we dive deeper into the NDHM’s Health Data Management policy, there is a need to discuss one philosophical issue about what should be the objective of such policy and even the … Continue reading

Posted in Cyber Law | Leave a comment

Consent Management under NDHM

(This is in continuation of the earlier article on NDHM) “Informed Consent” is the backbone of most Data Protection laws including the Indian Personal Data Protection Act (proposed). The NDHM’s Health Management Policy adopts all the provisions of the PDPB … Continue reading

Posted in Cyber Law | Leave a comment

NDHM is a trend setter… Get Started early on the Privacy Protection Journey

(This is in continuation of the earlier article on NDHM) The National Digital Health Mission (NDHM) is an ambitious project of the Government of India for providing a nation wide health care system and makes comprehensive use of technology. Since … Continue reading

Posted in Cyber Law | Leave a comment