Skip to content

With TÜVIT to health insurance

Digital Health Applications (DiGA)

Your digital health application as an "app on prescription"

In order for your digital health application to be eligible for reimbursement, you must prove to the Federal Institute for Drugs and Medical Devices (BfArM) that your application fulfils certain IT security, data protection and data security requirements. We accompany you on your way to reimbursable DiGA.

Successful provision of evidence

Your app on prescription: With us, you provide the evidence required by the Federal Institute for Drugs and Medical Devices (BfArM).

Health data protected in the best possib

Penetration tests provide the best possible protection for your DiGA against cyberattacks and data theft & prevent reputational damage.

Increased trust among users

The implementation of the DiGA security requirements also leads to greater trust among users with regard to the security of sensitive data.

What is the Digital Health Applications Regulation (DiGAV)?

The Digital Healthcare Act (DVG) created the basis for the entitlement of insured persons to the provision of digital health applications. Following on from this, the Digital Health Applications Ordinance (DiGAV) contains the requirements for the reimbursement of digital health applications (DiGA) by health insurance companies.

The requirements relate in particular to the aspects of safety, quality, data protection and data security.

Your advantages at a glance

DiGA: IT security, data protection, and data security

The security of DiGA applications is crucial for their authorisation, the protection of sensitive health data and the trust of users. The following benefits show how targeted security measures not only fulfil regulatory requirements, but also protect your app in the long term.

  • Providing evidence to the BfArM
    We will provide you with the necessary evidence so that your app can become a health insurance benefit.
  • Objective analysis of security measures
    Whether through penetration tests, audits or analyses, we take a close look at your DiGA and your ISMS.
  • Identification & elimination of vulnerabilities
    Our experts uncover potential weaknesses in your DiGA so that you can proactively close them.
  • Continuous improvement
    By uncovering potential for optimisation, you continuously improve the IT security of your DiGA.

 

  • Trust towards customers & business partners
    By implementing the DiGA security requirements, you strengthen the trust of your customers & business partners.
  • Protection against potential cyber attacks, espionage & co.
    Protect your DiGA's sensitive health data against hacker attacks & data theft in the best possible way.
  • Reduction of IT risks
    Increase the security of your DiGA & reduce potential IT risks through penetration tests and an ISMS.
  • Avoidance of economic damage
    By fulfilling the DiGA security requirements, you prevent financial and reputational damage.

 

Good to know

Requirements for the security of digital health applications (DiGA)

What DiGA operators and manufacturers need to know

What data protection and IT security requirements must digital health applications (DiGA) fulfil in order to become an "app on prescription"?

Penetration tests

If a product version is applied for inclusion in the DiGA directory, a penetration test must have been carried out for all components - regardless of the protection requirements of the DiGA.

The pentest must be carried out by a BSI-certified test centre, include mandatory code reviews and whitebox tests and be based on the BSI's implementation concept for penetration tests and the OWASP Top 10 risks for web applications and mobile apps.

We carry out the corresponding tests to provide evidence and help you to identify and close potential security gaps.

To pentesting

Proof of an ISMS

The 1st DiGAV-ÄndV requires all DiGAs to have an ISMS in accordance with ISO 27001 or "ISO 27001 on the basis of IT-Grundschutz (BSI standard 200-2: IT-Grundschutz methodology)".

We offer audits and GAP analyses as part of which we check whether you fulfil the necessary certification requirements.

About the ISMS

Interoperability with the ePA

DiGAs must enable the regular, automated export of data collected by the DiGA to the ePA from 1 January 2024.

The corresponding requirements for semantic and syntactic interoperability are defined by the KBV.

Secure authentication

The 1st DiGAV Amendment Ordinance introduces the need for a secure authentication option for insured persons via digital identity.

This must be implemented by 1 January 2024 at the latest.

Data protection & data security

From 1 August 2024, proof of compliance with data protection requirements must be provided. This takes the form of an issued certificate in accordance with Article 42 GDPR.

From 1 January 2025, DiGAs must also fulfil data security requirements in accordance with Section 139e (10) SGB V. This includes the Technical Guideline TR-03161 (Requirements for applications in the healthcare sector) of the BSI or a corresponding (TR) certificate. Our IT security experts will check your DiGA according to the requirements of BSI TR-03161 and accompany you on the way to successful certification.

Data protection

We will support you – no matter what

Get started at last!

We advise you


TÜV NORD IT Secure Communication I Berlin
Goal achieved?

We check that


TÜV Informationstechnik I Essen

Frequently Asked Questions (FAQ)

What you need to know about DiGA

Digital health applications (DiGA) are medical devices of low risk classes, i.e. risk classes I or IIa according to the Medical Device Regulation (MDR).

These are apps or web-based applications that are used to recognise, monitor, treat or alleviate illnesses. They can also be used in relation to injuries or disabilities.

This means that DiGAs are "digital assistants" in the hands of patients that have a health-related purpose and can be prescribed by doctors and reimbursed by health insurance companies.

The following evidence must be provided for inclusion in the DiGA directory or should be able to be presented on request:

  • Proof of fulfilment of requirements under medical device law
  • Declaration in accordance with Annex 1 of the DiGAV: Data protection and data security requirements
  • Declaration in accordance with Annex 2 of the DiGAV: Requirements for interoperability, robustness, consumer protection, user-friendliness, support for service providers, quality of medical content and patient safety
  • Proof of positive supply effects*
  • Proof that penetration tests have been carried out
  • ISMS certificate in accordance with ISO 27001 or "ISO 27001 on the basis of IT baseline protection (BSI Standard 200-2: IT baseline protection methodology)"
  • For very high protection requirements: Answering the checklist of additional requirements for DiGA with very high protection requirements
  • From 1 August 2024: Certificate in accordance with Article 42 of the GDPR

* If a comparative study to prove a positive supply effect is not yet available, a provisional inclusion in the directory can be applied for.

You can find the guidelines for the fast-track procedure here.

If your company already has an ISMS certified according to the ISO 27000 series or BSI Standard 200-2, which includes the entire life cycle of your DiGA, adequate solutions for implementing most of the requirements in the data security checklist in Annex 1 to the DiGAV should already have been implemented for the DiGA and its operation. Nevertheless, verification by the manufacturer must be carried out here and documented in a binding manner by completing the checklist accordingly.

Security as a process: For every change to the DiGA and/or the framework conditions, it must be checked how this changes the analysed risks and threats and whether the protective measures are still sufficient. This must be done continuously, even without updates, e.g. if a security vulnerability is recognised in a library in use.

If the assessment of the risks to the security of the DiGA comes to the conclusion that there are new threats that can be better analysed or detected by a penetration test, then a new test should be carried out. If not, there is no need to carry out a new penetration test.

In general, however, it should be borne in mind that at a certain point, a new penetration test is typically required, as significant changes have occurred since the last penetration test. Proof that a penetration test has been carried out must be provided to the BfArM on request.

Why we are a strong partner for you

Good reasons that speak in our favour