The DISHA methodology would include several key components, such as:
- Risk management: Organizations would be required to conduct regular risk assessments and implement measures to mitigate identified risks.
- Data governance: Organizations would be required to establish policies and procedures for managing EHI, including the creation, storage, and destruction of data.
- Technical safeguards: Organizations would be required to implement technical measures to protect EHI, such as encryption and secure access controls.
- Incident management: Organizations would be required to establish incident response plans and procedures to handle data breaches and other security incidents.
- Compliance: Organizations would be required to comply with the act and any regulations issued under it, and to document their compliance efforts.
- Penalties and enforcement: Organizations would be subject to penalties for non-compliance and the act would create a mechanism for enforcing compliance.