Apple Registration Guide for Healthcare Organizations
- Welcome
-
- Keep your information up to date
- Update contact information
- Update how a listing is displayed
- Update location information
- Update brand information
- Update names or URLs for a FHIR API endpoint
- Add a FHIR API endpoint
- Suspend patient access
- Remove a FHIR API endpoint
- Switch EHR vendors or update Identity Providers
- Upgrade your FHIR version from DSTU2 to R4
- Claim your healthcare organization
- Report a problem
- Report a security incident
- Request logs
-
- Technical requirements and specifications for Health Records
- Technical requirements and specifications for Health app data Share with Provider
- Health Records Directory Listing FAQ
- Requirements in the Health Records Directory Listing Agreement
- Health app data Share with Provider FAQ
- OAuth guidelines
- Vendor-specific guidelines for Health Records
- Vendor-specific instructions for Health app data Share with Provider
-
- Introduction
- Key terms and definitions
- Privacy and security overview
-
- Introduction
- Data integrity and transmission security
- Security management and governance
- Information access management and authentication
- Threat management and incident response
- System hardening
- Network security
- Contingency planning
- Facilities security and environmental controls
- Workstation and device security
- Audit controls: Logging processes and pipeline
- Attachment A: Health app data Share with Provider
- Copyright
Introduction to security program
The following sections provide details about Apple’s security program for the Health app data Share with Provider HIPAA Covered Services. They address the HIPAA Security Rule’s administrative, technical, and physical safeguards for protecting PHI that’s processed in connection with the HIPAA Covered Services.
Thanks for your feedback.