WHO SMART Guidelines
Permanent URI for this community
Browse
Browsing WHO SMART Guidelines by Subject "DDCC"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
- ItemDDCC guidance and communication materials for policy makers and program managers(Vital Wave, )DDCC Overview summarizes the key concepts and value of digital certificates and supports policy makers and program managers to make the case for sustainable investment in national digital certificate programs. Operational Guidance elaborates on technical and operational concepts contained in the DDCC Overview with detail on how to estimate costs and operationalize a national digital certificate program. The DDCC FAQ is a companion document to the DDCC communication materials, providing detailed answers to frequently asked questions.
- ItemDigital Documentation of COVID-19 Certificates legal framework assessment and decision-making frameworkThis deck covers insights on relevant frameworks for implementing a digital documentation of COVID certificates and a decision making framework. It establishes guidance for countries to be able to develop policies required to support the implementation of digital COVID-19 certificates in the absence of clearer and more specified policies under the IHR.
- ItemDigital implementation investment guide (DIIG): integrating digital interventions into health programmesThis Digital Implementation Investment Guide (DIIG) aims to help governments and technical partners plan a digital health implementation that focuses on one or more health programmes to support national health system goals. The Guide is designed to walk users of the document step-by-step through planning, costing and implementing digital health interventions within a digital health enterprise. This consists of selecting digital health interventions that are aligned with identified health needs, appropriate to a specific country context and integrated with existing technologies and the broader digital architecture. Users of the Guide will learn from diverse experiences deploying digital health technologies over the past decade and will be guided through a systematic approach to designing, costing and implementing meaningful digital health interventions that are part of a digital health enterprise.
- ItemGenerating Digital Certificates with District Health Information Software (DHIS2) Software(DHIS2 Team, )Several countries use DHIS2 data to produce secure digital certificates for COVID-19 vaccination or negative test results, through integration with external software applications and alignment with national, regional and global standards, including WHO guidelines. These documents provide a overview of the different facets of DHIS2 implementation.
- ItemSMART Health Cards Implementation GuideThis implementation guide provides a framework for "Health Cards", with a short term goal to enable a consumer to receive COVID-19 Vaccination or Lab results and present these results to another party in a verifiable manner. Key use cases include conveying point-in-time infection status for return-to-workplace and travel. This approach should also support documentation of immunization status and other health details.
- ItemUnderstanding Total Cost of Ownership for Digital HealthInvestors, government officials, and implementers can use this document to understand the totality of costs for a DHI over its first five years of implementation and operation and help estimate, validate, and socialize anticipated costs for their specific contexts. This Total Cost of Ownership (TCO) Analysis aims to inform the behavior of governments and donors and guide investment strategies for digital health by highlighting how to make markets more efficient and equitable. The analyses included in this provide new tools and guidance for investors, government officials, and implementers looking to maximize the impact of their digital investments.
- ItemWHO DDCCG Security Review Report(T-Systems International GmbH, )The goal of this test is to identify vulnerabilities that an attacker can exploit to compromise systems or the data stored on them, to gain access to sensitive information, or to compromise their availability. The during the penetration, no significant vulnerabilities in the application were discovered. The behavior of the test object meets expectations and did not suggest any deviant behavior. From an overall perspective the application appears highly resilient and leverages proven technologies.