Authentication - Conformance Criteria
3.4.1 Authentication
Nathan E Botts
/ Categories: 3.4.1 Authentication

3.4.1 Authentication

Protecting against unauthorized access


This category is about the system[1] protecting against unauthorized access (e.g., by persons other than the consumer).


The functionality of an app, its sponsorship, and linkages to external data sources all affect the security, privacy and data controls which are established to ensure safe and effective use. In this section, conformance criteria point to issues which can be addressed through a range of options, and as such implementers should consider not only the conformance criteria but the discussion regarding applicability to the exemplary use cases.

[1] “System” includes the app itself (on the device) as well as its supporting infrastructure (e.g., cloud-based or other services provided outside the device)

9939 Rate this article:
No rating
0Upvote 0Downvote

Leave a comment

This form collects your name, email, IP address and content so that we can keep track of the comments placed on the website. For more info check our Privacy Policy and Terms Of Use where you will get more info on where, how and why we store your data.
Add comment

Health App Authentication Conformance Statements

Terms Of UsePrivacy StatementCopyright 2024 by HL7 International
Back To Top