{"id":5909,"date":"2026-04-10T09:15:56","date_gmt":"2026-04-10T07:15:56","guid":{"rendered":"https:\/\/www.bayoomed.com\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/"},"modified":"2026-04-10T09:52:04","modified_gmt":"2026-04-10T07:52:04","slug":"help-i-have-a-diga-technical-implementation-and-requirements","status":"publish","type":"news","link":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/","title":{"rendered":"Help, I have a DiGA &#8211; Technical implementation and requirements"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2><strong>The technical guide for DiGA manufacturers: <\/strong><strong>From health insurance billing to ePA integration<\/strong><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-margin-bottom:50px;\"><p><strong>Author: Alexandra Heuel <\/strong>Project Manager at BAYOOMED<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><p>Have you developed an app that is already a medical device &#8211; or are you planning to build a DiGA from scratch? Then the most challenging part begins now: the implementation.<\/p>\n<p>Because a DiGA is not a classic software product. In addition to the actual application, you need a resilient backend architecture, secure authentication, clean data processes, interfaces to health insurance companies and &#8211; in the long term &#8211; a connection to the telematics infrastructure.<\/p>\n<p>This guide shows you which technical components are relevant, how they are connected and what you should pay attention to in practice.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Why develop a DiGA?<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>If a DiGA is prescribed by a doctor, statutory health insurance companies cover the costs and reimburse them directly to the manufacturer. In the case of private health insurance companies, reimbursement is based on individual contracts. However, the prerequisite for this is always that the DiGA must first be successfully tested and included in the official list of the BfArM.<\/p>\n<p>The DiGA process is considered one of the most advanced reimbursement processes for digital health applications in Europe. For manufacturers, it opens up the opportunity to improve care and at the same time use a clearly defined commercial access route into the healthcare system.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-top:20px;--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1366\" height=\"768\" alt=\"DiGA_Entwicklung\" title=\"MED_DiGA_Entwicklung\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Entwicklung.jpg\" class=\"img-responsive wp-image-5867\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Entwicklung-200x112.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Entwicklung-400x225.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Entwicklung-600x337.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Entwicklung-800x450.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Entwicklung-1200x675.jpg 1200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Entwicklung.jpg 1366w\" sizes=\"(max-width: 1100px) 100vw, 1366px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Legal basis for DiGA<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-4\"><p>The legal basis for DiGA can be found in \u00a7 33a SGB V. Further requirements are regulated in the DiGAV. The BfArM test criteria and the <a href=\"https:\/\/www.bfarm.de\/EN\/Medical-devices\/Tasks\/DiGA-and-DiPA\/Digital-Health-Applications\/_node.html\" target=\"_blank\" rel=\"noopener\">BfArM&#8217;s public information<\/a> are also relevant.<\/p>\n<p>The <a href=\"https:\/\/www.bfarm.de\/SharedDocs\/Downloads\/DE\/Medizinprodukte\/diga_leitfaden.pdf?__blob=publicationFile\" target=\"_blank\" rel=\"noopener\">DiGA guidelines of the BfArM<\/a> also provide important orientation.<\/p>\n<p>The BfArM examines a DiGA and includes it in the list if the specified requirements are met.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Requirements for manufacturers<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-5\"><p>In addition to the requirements for the application itself, manufacturers must also meet certain formal requirements. In particular, this includes a <strong>quality management system in accordance with ISO 13485<\/strong>. The manufacturer must also provide evidence of an <strong>information security management system with certification in accordance with ISO 27001<\/strong> or <strong>ISO 27001 based on IT baseline protection<\/strong>. Since <strong>April 1, 2022<\/strong>, the BfArM has required a corresponding ISMS certificate from the manufacturer for DiGA; since <strong>January 1, 2025<\/strong>, a certificate based on TR-03161 has also been required to prove the data security of the application.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h2><strong>Information security: Why TR-03161 is important for DiGA<\/strong><\/h2><\/h3><\/div><div class=\"fusion-text fusion-text-6\"><p>Information security is a central component of every DiGA. BSI TR-03161 defines requirements for the protection of sensitive healthcare data &#8211; for example in relation to authentication, encryption and secure data processing.<\/p>\n<p>To be included in the DiGA directory, the manufacturer must prove that the relevant security requirements have been implemented by means of a certificate from the BSI. The aim of these requirements is to effectively protect patient data and ensure the trustworthy use of digital health applications.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3><strong>How the test typically works<\/strong><\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-7\"><p>The audit is carried out by recognized inspection bodies such as PwC, T\u00dcV Informationstechnik or Secuvera.<\/p>\n<p>Important for planning:<\/p>\n<ul>\n<li>Lead time for test centers: several months in our experience<\/li>\n<li>Inspection itself: structured process with inspection report and, if necessary, improvements<\/li>\n<\/ul>\n<p>After a successful test, the result is sent to the BSI and the certificate is issued.<\/p>\n<p>\ud83d\udc49 <strong>Important for you:<\/strong> The security requirements not only affect individual functions, but the entire architecture &#8211; especially authentication, logging and data processing.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3><strong>What should you start with?<\/strong><\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-8\"><p>Before you go into individual components, one question is crucial:<\/p>\n<p>\ud83d\udc49 <strong>Welche Systeme musst Du von Anfang an mitdenken?<\/strong><\/p>\n<p>In practice, it shows:<\/p>\n<ul>\n<li>Backend &amp; Auth are <strong>always necessary<\/strong><\/li>\n<li>Billing is <strong>mandatory for operation<\/strong><\/li>\n<li>Consent management is <strong>critical from a regulatory perspective<\/strong><\/li>\n<li>TI\/ePA\/GID are <strong>dependent on the use case<\/strong>, but should be considered early on<\/li>\n<\/ul>\n<p>\ud83d\udc49 The biggest mistake: starting too late with backend, security and processes.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>The technical target architecture of a DiGA<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-9\"><p>In practice, a DiGA consists of several specialized systems:<\/p>\n<ul>\n<li>Backend (data, logic, APIs)<\/li>\n<li>Authentication service<\/li>\n<li>Consent and protocol system<\/li>\n<li>Billing system<\/li>\n<li>optional: TI\/ePA\/GID integration<\/li>\n<li>Monitoring &amp; security infrastructure<\/li>\n<\/ul>\n<p>The following building blocks form the basis.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Backend architecture and core services<\/h2><\/h2><\/div><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Health insurance billing<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-10\"><p>The statutory health insurance company provides an API definition for billing purposes.<\/p>\n<p>The typical procedure:<\/p>\n<ol>\n<li>Health insurance company creates activation code<\/li>\n<li>User enters code in the DiGA<\/li>\n<li>Validation via checkout API<\/li>\n<li>Access is enabled<\/li>\n<li>Billing data record is generated<\/li>\n<\/ol>\n<p>The important thing is:<\/p>\n<ul>\n<li>Billing data must be stored separately<\/li>\n<li>Activation codes must not be mixed with user accounts<\/li>\n<li>The manufacturer defines the usage logic of the codes<\/li>\n<\/ul>\n<p>\ud83d\udc49 <strong>Practical consequence:<\/strong>\nYou need a backend with cleanly separated data areas and a stable API connection to the health insurance companies. You can find more information on DiGA billing <a href=\"https:\/\/www.bayoomed.com\/en\/news\/services-for-diga-billing-an-overview\/\">here<\/a>.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Authentication and user administration<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-11\"><p>Eine DiGA ben\u00f6tigt Benutzerkonten mit sicherer Authentifizierung. These include:<\/p>\n<ul>\n<li>pseudonyme Nutzung<\/li>\n<li>Two-factor authentication (the BSI lists which 2FA methods are possible and sufficiently secure <a href=\"https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/Technische-Richtlinien\/TR-nach-Thema-sortiert\/tr03161\/tr03161_node.html\" target=\"_blank\" rel=\"noopener\">here<\/a>)<\/li>\n<li>Central authentication logic<\/li>\n<li>Complete logging of security-relevant events<\/li>\n<\/ul>\n<p>No personal data may be disclosed before logging in &#8211; especially when registering or resetting a password.<\/p>\n<p>\ud83d\udc49 <strong>Practical consequence:<\/strong>\nA central auth service (e.g. based on OAuth 2.0 \/ OpenID Connect) is essential.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-top:20px;--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1200\" height=\"800\" alt=\"BAYOOMED - Best Practices f\u00fcr Post-Market Cybersecurity\" title=\"BAYOOMED &#8211; Best Practices f\u00fcr Post-Market Cybersecurity\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity.jpg\" class=\"img-responsive wp-image-5313\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity-200x133.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity-400x267.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity-600x400.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity-800x533.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Consent management<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-12\"><p>The manufacturer must be able to prove at any time which user consents have been obtained. Changes to personal data must be logged. Users should be able to view this log in the DiGA and revoke consent directly in the application.<\/p>\n<ul>\n<li>Changes to the GTC or privacy policy must be announced at least <strong>14 days in advance<\/strong> and require renewed consent.<\/li>\n<li>Users must be informed <strong>14 days before the expiry of the DiGA Regulation<\/strong> so that they can prepare for the deletion and export of their data.<\/li>\n<\/ul>\n<p><strong>Practical consequence:<\/strong>\nYou need a service for storing and managing consent, audit-proof logging and a reminder or notification function.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-13 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Integration into the healthcare system<\/h2><\/h2><\/div><div class=\"fusion-title title fusion-title-14 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3><a href=\"https:\/\/www.bayoomed.com\/en\/platform-medicalone-connect\/package-diga-services\/epa-connection-for-diga-applications\/\" target=\"_blank\" rel=\"noopener\">ePA export via telematics infrastructure<\/a><\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-13\"><p>For export to the electronic patient file, data is transferred as <a href=\"https:\/\/www.bayoomed.com\/en\/platform-medicalone-connect\/package-diga-services\/interoperability-mio-mapping-for-diga\/\" target=\"_blank\" rel=\"noopener\">MIO<\/a> in XML format (FHIR-based).<\/p>\n<\/div><div class=\"fusion-text fusion-text-14\"><p>To connect to the telematics infrastructure, access to corresponding components is required, such as a connector, card terminal and a DiGA-specific SMC-B card. Communication takes place via defined interfaces, which are connected via a so-called primary system.<\/p>\n<p>Clear framework conditions apply to exports:<\/p>\n<ul>\n<li>Write access to the ePA only<\/li>\n<li>Regular exports<\/li>\n<li>Document ID required for updates<\/li>\n<li>Access only after approval by the user<\/li>\n<li>KVNr required (via GID)<\/li>\n<\/ul>\n<p>\ud83d\udc49 <strong>Practical consequence:<\/strong>\nYou need MIO conversion, TI connection and a valid test setup.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-15 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3><a href=\"https:\/\/www.bayoomed.com\/en\/platform-medicalone-connect\/package-diga-services\/healthid-integration-for-diga\/\" target=\"_blank\" rel=\"noopener\">Health ID (GID) integration<\/a><\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-15\"><p>Health insurance companies provide their policyholders with a secure digital identity as an alternative to the health card: the GesundheitsID (GID). DiGA must enable registration via this identity.<\/p>\n<p>The technical implementation is specified by Gematik. User identification and authentication are based on OAuth 2.0 and OpenID Connect. The underlying identity management takes place via OpenID Federation and is referred to as TI Federation in the context of the telematics infrastructure.<\/p>\n<p>Each health insurance company operates its own identity provider to authenticate its policyholders. Applications that wish to use this authentication must act as a so-called specialist service that acts as a relying party in the sense of OpenID Connect.<\/p>\n<p>The health insurance number (KVNR) may only be obtained via the health ID and is earmarked for a specific purpose, for example for export to the electronic patient file. The claims required for this must already be stored when registering the specialist service.<\/p>\n<p>For implementation, this means that a separate web service must be operated as a specialist service within the TI federation. The GID login will be integrated into the DiGA and interlinked with the existing authentication system.<\/p>\n<p>\ud83d\udc49 <strong>Practical consequence:<\/strong>\nYou need your own specialist service and must integrate the GID login properly into your existing authentication.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-16 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Operation and safety<\/h2><\/h2><\/div><div class=\"fusion-title title fusion-title-17 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h3>Updates and maintenance<\/h3><\/h2><\/div><div class=\"fusion-text fusion-text-16\"><p>DiGA must check at startup whether security-critical updates are available. If this is the case, the application may no longer process any sensitive data until the update is installed. This requires a mechanism that recognizes updates and restricts the use of the application if necessary.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-18 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h3>Data management and grace period<\/h3><\/h2><\/div><div class=\"fusion-text fusion-text-17\"><p>After expiry of the prescription period, user data may remain stored for a maximum of three months in a so-called grace period in order to enable a possible follow-up prescription.<\/p>\n<p>Storage beyond this period requires the express consent of the user. If this is not the case, the data must be deleted when the prescription expires. Users must also be able to decide whether to continue using the existing account or create a new account for a subsequent prescription. In the case of a new account, the existing account must be deleted.<\/p>\n<p>In addition, the DiGA must provide functions for blocking accounts, for example in the event of the loss of an end device, as well as processes for restoring or issuing new access data. It must be ensured that only legitimate users are granted access.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-19 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h3>Monitoring, logging and backup<\/h3><\/h2><\/div><div class=\"fusion-text fusion-text-18\"><p>The backend of a DiGA requires a central logging and monitoring system. All relevant system components must record events and make them centrally analyzable. Suspicious activities should be detected automatically and corresponding alarms triggered.<\/p>\n<p>Access to these systems must be secured by role and rights management.<\/p>\n<p>A robust backup and recovery concept is also required. In particular, scenarios such as a ransomware attack must be taken into account. Backups containing personal data must be stored in encrypted form.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-20 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h3>Cybersecurity requirements<\/h3><\/h2><\/div><div class=\"fusion-text fusion-text-19\"><p>The handling of cryptographic procedures is based on the specifications of BSI-TR-02102-1 and BSI-TR-02102-2. In addition, the DiGA should use certificate pinning to increase the security of communication connections.<\/p>\n<p>Cybersecurity is not an isolated aspect, but must be integrated into the architecture, operation and technical protection measures throughout.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-top:20px;--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1366\" height=\"768\" alt=\"DiGA Sicherheit\" title=\"MED_DiGA_Sicherheit\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Sicherheit.jpg\" class=\"img-responsive wp-image-5869\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Sicherheit-200x112.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Sicherheit-400x225.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Sicherheit-600x337.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Sicherheit-800x450.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Sicherheit-1200x675.jpg 1200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Sicherheit.jpg 1366w\" sizes=\"(max-width: 1100px) 100vw, 1366px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-21 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Conclusion: A DiGA is an overall project, not an individual app<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-20\"><div>\n<div>\n<p>The development of a DiGA goes far beyond the mere implementation of a mobile or web-based application. In practice, a complex system landscape is created with specialized components for billing, authentication, consent management, logging, integration into the telematics infrastructure, ePA connection as well as update and security management.<\/p>\n<p>There are also organizational and infrastructural requirements, such as the secure operation of backend systems, the handling of sensitive health data, the connection to health insurance companies and the preparation for regulatory audits such as TR-03161.<\/p>\n<p>Anyone developing a DiGA should therefore plan holistically at an early stage &#8211; not just the product and user experience, but also the architecture, security, compliance, operation and external dependencies.<\/p>\n<\/div>\n<\/div>\n<div class=\"h-8\"><\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_5 1_5 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-left-medium:calc( 0 * calc( 100% - ) );--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-shield-alt fas circle-yes\" style=\"--awb-circlebordersize:0px;--awb-font-size:70.4px;--awb-width:140.8px;--awb-height:140.8px;--awb-line-height:140.8px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_4_5 4_5 fusion-flex-column\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color7);--awb-bg-color-hover:var(--awb-color7);--awb-bg-size:cover;--awb-border-radius:60px 60px 60px 60px;--awb-width-large:80%;--awb-margin-top-large:20px;--awb-spacing-right-large:calc( 0 * calc( 100% - ) );--awb-margin-bottom-large:20px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:calc( 0 * calc( 100% - ) );--awb-spacing-left-medium:calc( 0 * calc( 100% - ) );--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-22 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Our support for your DiGA compliance<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-21\" style=\"--awb-text-color:var(--awb-color1);\"><p>The implementation of a DiGA is complex &#8211; from TI connection and backend architecture to security and certification requirements.<\/p>\n<p>BAYOOMED supports you with many years of DiGA experience, its own TI services and tried-and-tested solutions for central components such as ePA integration, GID login and billing. We also rely on tried-and-tested processes and a strong partner network when preparing for examinations and working with inspection bodies.<\/p>\n<p>\ud83d\udc49 If you want to implement your DiGA efficiently and safely, talk to us.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button-border-radius-top-left:30px;--button-border-radius-top-right:30px;--button-border-radius-bottom-right:30px;--button-border-radius-bottom-left:30px;\" target=\"_self\" href=\"https:\/\/www.bayoomed.com\/en\/#contact\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Get in touch now<\/span><\/a><\/div><\/div><\/div><\/div><\/div><!-- \/wp:post-content -->","protected":false},"author":8,"featured_media":5863,"template":"","categories":[74],"class_list":["post-5909","news","type-news","status-publish","has-post-thumbnail","hentry","category-diga-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Help, I have a DiGA - Technical implementation and requirements<\/title>\n<meta name=\"description\" content=\"Implementing DiGA technically: How to meet the requirements and successfully implement digital health applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Help, I have a DiGA - Technical implementation and requirements\" \/>\n<meta property=\"og:description\" content=\"Implementing DiGA technically: How to meet the requirements and successfully implement digital health applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"BAYOOMED\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T07:52:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Header.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/help-i-have-a-diga-technical-implementation-and-requirements\\\/\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/help-i-have-a-diga-technical-implementation-and-requirements\\\/\",\"name\":\"Help, I have a DiGA - Technical implementation and requirements\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/help-i-have-a-diga-technical-implementation-and-requirements\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/help-i-have-a-diga-technical-implementation-and-requirements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/06\\\/MED_DiGA_Header.jpg\",\"datePublished\":\"2026-04-10T07:15:56+00:00\",\"dateModified\":\"2026-04-10T07:52:04+00:00\",\"description\":\"Implementing DiGA technically: How to meet the requirements and successfully implement digital health applications.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/help-i-have-a-diga-technical-implementation-and-requirements\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/help-i-have-a-diga-technical-implementation-and-requirements\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/help-i-have-a-diga-technical-implementation-and-requirements\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/06\\\/MED_DiGA_Header.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/06\\\/MED_DiGA_Header.jpg\",\"width\":1366,\"height\":768,\"caption\":\"DiGA, Digitale Gesundheit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/help-i-have-a-diga-technical-implementation-and-requirements\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Help, I have a DiGA &#8211; Technical implementation and requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/\",\"name\":\"BAYOOMED\",\"description\":\"We engineer medical software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bayoomed.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Help, I have a DiGA - Technical implementation and requirements","description":"Implementing DiGA technically: How to meet the requirements and successfully implement digital health applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/","og_locale":"en_US","og_type":"article","og_title":"Help, I have a DiGA - Technical implementation and requirements","og_description":"Implementing DiGA technically: How to meet the requirements and successfully implement digital health applications.","og_url":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/","og_site_name":"BAYOOMED","article_modified_time":"2026-04-10T07:52:04+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Header.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/","url":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/","name":"Help, I have a DiGA - Technical implementation and requirements","isPartOf":{"@id":"https:\/\/www.bayoomed.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/#primaryimage"},"image":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Header.jpg","datePublished":"2026-04-10T07:15:56+00:00","dateModified":"2026-04-10T07:52:04+00:00","description":"Implementing DiGA technically: How to meet the requirements and successfully implement digital health applications.","breadcrumb":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/#primaryimage","url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Header.jpg","contentUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/MED_DiGA_Header.jpg","width":1366,"height":768,"caption":"DiGA, Digitale Gesundheit"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bayoomed.com\/en\/news\/help-i-have-a-diga-technical-implementation-and-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.bayoomed.com\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.bayoomed.com\/news\/"},{"@type":"ListItem","position":3,"name":"Help, I have a DiGA &#8211; Technical implementation and requirements"}]},{"@type":"WebSite","@id":"https:\/\/www.bayoomed.com\/#website","url":"https:\/\/www.bayoomed.com\/","name":"BAYOOMED","description":"We engineer medical software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bayoomed.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news\/5909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/users\/8"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media\/5863"}],"wp:attachment":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media?parent=5909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/categories?post=5909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}