📒
HCX Protocol
v0.7
v0.7
  • Summary
  • Context
  • Introduction to HCX
  • Approach
    • Design Principles
    • Key Specifications
    • Governance
  • Technical Specifications
    • Open Protocol
      • Registries
      • Health Claims Exchange (HCX) Protocol
        • Exchange Protocol
        • Message Structure
        • API Structure
        • Error Handling
      • Data Security and Privacy
        • Transport Security
        • Message Security and Integrity
        • API Security
      • Audit and Reporting
    • Digital Network Policies
  • Domain Specifications
    • Domain Data Models
      • Handling Attachments
      • Handling Processing Errors
    • Terminologies (Code sets or Metadata standards)
    • Domain Specific Languages (DSLs)
    • Implementation Guide
  • Business Policy Specifications
    • Access Control (Roles)
    • Guidelines for Participant Onboarding
    • Guidelines for Grievance Redressal
    • Guidelines for Event audits
    • Guidelines for Beneficiary Authentication by Providers/Payors
  • Contributing to the specifications
  • Future Roadmap
Powered by GitBook
On this page
  1. Technical Specifications
  2. Open Protocol

Audit and Reporting

Overview of audit requirements

HCX instances are expected to log each API call received along with the non encrypted details (domain headers, sig/enc algorithm details, sender & recipient details) and status of signature verification.

Key Requirements:

  • HCX instances should provide reports against the audit logs for different actors - payors, providers, beneficiaries, regulators, observers. Each HCX instance shall publish the list of reports supported by that instance and also define the level/details of information in each report.

  • The audit information stored should be made available through an API, so that the participating systems can query the audit log related to them.

  • Each HCX instance shall define an archival policy for retention & deletion of audit logs. The policy shall also define the process for accessing the logs after archival, if the HCX instance has support for it.

  • It is recommended for HCX instances to have a configuration to control the amount of information that gets stored in the audit logs.

PreviousAPI SecurityNextDigital Network Policies

Last updated 3 years ago