ByAUJay
Blockchain Development Services Healthcare Providers Actually Use: EHR, Claims, and Consent
Why now: the regulatory clock is forcing real automation
So, here's the deal: from now until January 1, 2027, most insurance companies in the U.S. are going to be making some changes. We need to get those FHIR-based APIs up and running for prior authorizations. It's super important that we speed up the decision-making process, aiming for 72 hours for urgent requests and 7 days for the standard ones. Let’s make this happen! The CMS has made a pretty significant move by easing up on enforcement. This means you can now use those FHIR-only prior authorization APIs without the hassle of converting them into X12 278 format. This definitely makes life easier for today's setups!
Just a heads up - even though a lot of plans are set to wrap up by January 1, 2027, don’t forget that some of those operational things will actually start happening as soon as 2026. So, it’s good to keep that in mind! If you're working on something right now, make sure your tech stack is all about that “FHIR-first” approach. Keep TEFCA in mind, and don't forget to set things up so they're ready for an audit when the time comes! For more info, just head over to this link: cms.gov. You'll find everything you need there!
So, at the network layer, TEFCA is all set and operational, with a few key QHINs already in the mix, like Epic Nexus and Surescripts.
Hey there! Just a heads up--the TEFCA FHIR “Facilitated FHIR” security model is encouraging folks to hop on the HL7 FAST UDAP Security IG bandwagon by January 1, 2026. So, if you haven't started looking into it yet, now's the time to dive in!
So, what that really means is that trust, registration, and token flows are all starting to mesh together. It’s a smart move to begin developing your services with this in mind right now.
Take a look at the full scoop here. You'll find all the juicy details!
So, here’s the scoop: ONC has officially finished up with USCDI v3 and has also got FHIR US Core 6 all set and ready to go!
1. So, starting January 1, 2026, they're rolling out 0 as the benchmark for certified health IT. Recently, there's been some more flexibility for developers, which is great because it gives them a little extra breathing room when it comes to deadlines. If you’re gearing up for R4, here’s what you need to know. 0. 1/US Core 6.
1. You'll be all set to meet those certification and payer API requirements! If you want to dive deeper into the details, feel free to check it out here. You won't want to miss it!
The 2024 Change Healthcare cyberattack really opened our eyes to how having key chokepoints can create some serious risks.
Just a quick reminder: make sure that whatever you put into action doesn't end up storing any PHI on the blockchain. It's super important!
Why not take advantage of blockchain to ensure integrity, track provenance, and simplify authorization? At the same time, you can keep the actual data stored off-chain and make it revocable whenever needed.
If you want to dive deeper into this topic, check it out here.
What healthcare actually buys from blockchain in 2025
- EHR Data Exchange and Integrity: So, when it comes to event-level audit trails and making sure the source is tamper-proof, we’re really aligning with TEFCA and FHIR. It's all about keeping things secure and transparent! Estonia's national health system is really leading the way with a great example of using KSI blockchains on a big scale to keep records secure and trustworthy. It's impressive to see how they're making it work! The best part? You can tweak this model without having to keep any PHI on-chain. Take a look at this: (e-estonia.com). It's pretty interesting!
- Claims and Prior Authorization: Imagine a world where FHIR-first workflows (like CRD, DTR, and PAS) come together with on-chain attestations. This combo could finally put an end to those annoying “he said/she said” debates that we deal with all too often. Smart triggers for attachments and time-sensitive, trackable SLAs? Seriously, that’s a total game changer! If you're looking for more info, check it out here: (cms.gov). There's a lot to dig into!
- Consent and Handling Sensitive Data: We’re using computable FHIR Consent and DS4P security labels, along with patient-held verifiable credentials. This way, we can provide flexible and controlled permissions for sharing sensitive information. That’s a pretty clever approach to dealing with sensitive information! Learn more at: (build.fhir.org).
Let’s dive into each one and I’ll share some great build patterns to really help illustrate the points.
1) EHR exchange you can deploy: FHIR + TEFCA with blockchain-backed integrity
The job-to-be-done
Hey there! You can easily grab and share your electronic health information (EHI) for treatment and personal access thanks to TEFCA. Also, make sure to keep tabs on who made any changes, when they happened, and the reasons behind them-- all while avoiding putting any personal health info on the blockchain.
- Get those updates out there right away! Whether it’s about orders, results, or any status changes, you’ll be on top of it. Plus, you’ll have a rock-solid audit trail that you can easily search through, making things a breeze for both internal compliance and external audits.
Reference architecture (what we build for clients)
- Data plane
- We’re all set with FHIR R4!
0. We’ve got one server that checks all the boxes for US Core 6.
1. You’ve got zero profiles, but there’s also an R5 Subscriptions Backport that lets you send out handy event notifications based on specific topics to other systems. Take a look at this: (hl7.org). You might find it really interesting!
- You can get started with TEFCA by connecting through your favorite QHIN. We're backing TEFCA's “Facilitated FHIR” security (that’s UDAP/FAST) and also incorporating SMART v2 whenever it makes sense to do so. Check out all the details right here: (blog.hl7.org). You'll find some interesting stuff!
- Integrity plane
- So, let's dive into the topic of integrity, shall we? You can hash certain EHR artifacts, such as Composition, DiagnosticReport, and Provenance resources. Once you've got those hashes, you can throw in some metadata--like the timestamp, the signer’s DID, and the policy IDs--and then just write all that onto a permissioned chain, like Fabric or Besu. It's a pretty streamlined way to keep everything secure! Make sure to keep your PHI snug and secure in your EHR or data lake by using WORM/retention controls. It's a smart move to protect sensitive data! Hey, just a quick reminder to make sure you log your FHIR SubscriptionStatus notifications (you know, the event IDs) on the chain! With this approach, you’ll have a solid event log that matches up nicely with your EHR audit logs. It’s a great way to keep everything in sync!
- Identity and trust So, if you're thinking about credentials, you can actually create both organization-level and app-level ones using W3C Verifiable Credentials 2. It's pretty straightforward!
0. Make sure to link your key material to HSM-backed wallets, and let your DID/VC registries really stand out as read-only chain states. Also, those SMART Health Card formats have really proven themselves when it comes to signing health data. Find more here: (w3.org).
- Consent hooks When it comes to managing consent, make sure to use on-chain identifiers to link to your FHIR Consent resources. You can totally connect to DS4P labels (that's meta.security) for managing purpose-of-use controls and segmentation, like distinguishing between SDOH and behavioral health. It's a handy way to keep things organized! Learn more at: (build.fhir.org).
Practical details that matter
- Eventing: Jump in and check out the Subscriptions Backport v1!
1. Absolutely, you're all set! This will really help you meet ONC’s Subscriptions client criteria and get ready for those high-frequency event flows--like webhooks, websockets, and REST-hook channels. Exciting times ahead! Check it out here.
- TEFCA scope: Alright, let’s dive in and start with the Treatment and Individual Access Services use cases. If you're already collaborating with QHIN participants such as Epic Nexus and Surescripts, you'll have an easier time broadening your network within their ecosystems. More details here.
- Hash Strategy: I recommend using SHA-256 since it works well with a lot of different tools. It’s a solid choice for ensuring compatibility! To ensure your hashes stay consistent across different vendors, make sure you’re using canonicalized FHIR JSON. This means sorting the keys and removing any fields that might change often. That way, you’ll avoid any unnecessary discrepancies!
- Retention and deletion: Just a friendly reminder--make sure you don’t store any PHI or “consent text” on the blockchain. It's crucial to keep that stuff off-chain! If you ever need to revoke or delete those off-chain records, don’t forget to go ahead and publish a revocation transaction that links back to a specific artifact ID. It's a simple step, but really important! Oh, and don’t forget to keep a quick “tombstone” note handy! This should be free of any personal details but will help auditors keep track of the lifecycle without having to dig through and restore any content.
What “good” looks like (benchmarks)
We're seeing a median write latency of under 250ms to the ledger for each event when we batch things together. On top of that, our end-to-end event-to-hash service level agreement is coming in at under 2 seconds.
- Hash verification is totally reliable and consistent across all environments, and we've never encountered any false positives during our quarterly integrity checks. We’ve set up some solid TEFCA-compliant security measures. This includes UDAP registration, managing token lifetimes, and audience scoping. And don’t worry--we made sure everything was tested and validated in our pre-production environment before we launched. Take a look at this: blog.hl7.org. You might find it interesting!
Case signal
Estonia's national e-health program is using Guardtime's KSI technology to keep health records secure. What's cool about this setup is that it protects the integrity of those records without actually storing any personal health information (PHI) on the blockchain. This approach really helps maintain solid audit trails, giving everyone peace of mind. This method works perfectly for the U.S. Providers are on the lookout for ways to show that their records are secure and reliable, all while keeping the risk of breaches as low as possible. (e-estonia.com).
2) Claims and prior authorization that reduce denials, not just “pilot nicely”
The job-to-be-done
Take a look at CMS-0057-F! It dives deep into improving Patient Access, Provider Access, Payer-to-Payer, and Prior Authorization APIs, all through the power of FHIR. It's a pretty interesting read if you're into making healthcare more accessible! So here's the plan: we want to get back to people within 72 hours for urgent cases and within a week for the standard ones. And of course, we’ll make sure to include the reasons for any denials, too. They're looking to have everything fully up and running by 2027, but a few payers will need to get things going by 2026. If you're interested, feel free to check out the CMS website for more in-depth information. It’s a great resource if you want to get into the nitty-gritty!
Alright, let’s dive into the whole rework situation. So, here’s the thing: as it stands, only around 35% of prior authorizations are wrapped up electronically. There’s definitely room for improvement, don’t you think? So, what are the main roadblocks? Well, it’s all about those tricky attachment workflows and those annoying portal silos. If you want to dive deeper, take a peek at CAQH’s insights. You’ll find some really interesting information there!
Reference architecture (CRD/DTR/PAS + chain)
- CRD (Coverage Requirements Discovery): This tool makes it super easy to find out the plan rules while you’re in the middle of a clinician workflow, thanks to a handy SMART on FHIR app. Next up, we have DTR (Documentation Templates & Rules). This handy tool helps you figure out exactly what documentation you need by tapping into FHIR Questionnaire and CQL. It's like having a personal guide to keep things organized! And finally, there's PAS (Prior Authorization Support). This is the spot where you can easily submit and keep track of your authorizations. Don't forget to take a look at the latest STU 2!
1. Check out the awesome guides over at hl7.org. They've got some really helpful info!
- You can stick to FHIR only: Good news! With some leeway from CMS, covered entities now have the option to launch a full FHIR prior authorization API. This means you can skip the old-school X12 278 and still keep everything compliant. This is a total game-changer for those new builds! If you want to dig deeper into the details, check out cms.gov. You won’t want to miss this!
- On-chain attestations (not PHI): So, these basically keep track of request IDs, timestamps, decision deadlines, and the codes for why something got denied. Whenever payers update their statuses or request attachments, it triggers what's called an attested event. This approach lets providers clearly prove, “Hey, we submitted a complete request at T0” whenever disputes come up. It really helps minimize those frustrating gray-area write-offs that can be a hassle to deal with.
Practical details that matter
- Instagram Versions: Make sure to check out the “APIs & Relevant Standards” page on the CMS site for updates! By July 2025, you can expect to see CRD/DTR/PAS 2 making its debut!
1. You've got it right there with FHIR R4. 0. So, we're talking about a few key concepts here: SMART v2 and US Core 6.
1. 0. Definitely keep those saved as your go-to dependencies! (cms.gov).
- Attachments: Just a heads-up! You don’t have to stress about X12 attachments for now since they’re not required yet. It’s totally your call!
When you're designing your API, make sure it can handle FHIR documents and links smoothly. It should also support observations that are coded with LOINC and SNOMED. This way, you're covering all the necessary bases for managing health data effectively!
Whenever you get or check out any content, it’s a smart move to keep a record of the chain attestation. (crowell.com). - Timers and SLAs: Don’t forget to include those SLA timers in the chain state, okay? Hey there! Just a quick tip: smart contracts can really help you out by giving you a nudge when you’re getting close to that 7-day deadline. Also, make sure to add those payer "specific reason" codes--this little detail can really speed things up when you’re resubmitting corrections. You've got this! (cms.gov).
- Dispute Analytics: Use the unchangeable timeline to analyze denials based on the payer, the specific type of service, and what kind of data is missing. And hey, don’t forget to tweak your DTR rules every week!
What “good” looks like (benchmarks)
- First-pass approval uplift: Let’s shoot for a solid 10-15% increase in those high-volume service lines after we’ve polished up those DTR questionnaires.
- Cycle-time: You can look forward to decisions coming in about 30-50% faster in the areas that used to depend on uploading stuff through the portal.
- Audit friction: We’ve noticed that the time it takes to prep for appeals is getting shorter, all thanks to the on-chain attestation exports. It’s a real game changer!
Industry signals to watch
The latest index from CAQH shows that prior authorization still isn't fully automated, which is a bummer because it means there's a ton of potential savings out there and a chance to give clinicians back some of their precious time. If you're building with FHIR APIs, you’ll be right on track with federal guidelines and any updates to the operating rules. It’s a great way to stay current and compliant! (caqh.org).
3) Consent and sensitive data: computable rules, selective disclosure, and legal nuance
The job-to-be-done
Just a friendly reminder to always be super clear about consent! It’s important to let everyone know who gets to see their data, what exactly you're sharing, why you need it, and how long it’ll be kept around. This goes for electronic health records, insurance companies, and any apps you might be using. Keeping it transparent helps build trust and keeps everyone on the same page! Hey, just a quick reminder to make sure you include those layers for any sensitive information! It’s super important!
- Keep an eye on those legal updates! So, the OCR's reproductive health privacy rule, which was supposed to kick in by April 2024, ended up getting largely overturned by a court ruling on June 18, 2025. It's a good idea to stay informed about these changes! Just a heads-up: there are still some changes to the Notice of Privacy Practices (NPP) that you'll need to keep in mind. Make sure you're ready to meet the compliance deadline by February 16, 2026! You don’t need to completely overhaul your consent framework every time there’s a policy change. Instead, think of it as a chance to adapt and tweak things here and there. It's all about building on what you already have! If you want to dive deeper into the details, check it out here. It's got all the info you need!
Reference architecture (FHIR Consent/DS4P + verifiable credentials + chain)
- Understanding computable consent in FHIR:
- Leverage FHIR Consent to clearly outline permissions, identify key players, define purposes, and note any exceptions. It's a great way to keep everything organized! Hey, just make sure to keep the human-readable section off the blockchain. Instead, let's anchor the Consent.id along with its hash directly on-chain. If you're looking for more info, check this out: (hl7.org). You’ll find all the details you need there! Hey, just a quick reminder to make sure you slap those DS4P security labels (you know, the meta.security ones) on any resources that have sensitive info in them. It's super important! When it comes to access control, it's important to take a look at these labels and consider what the access request is all about. Take a look at this link: (build.fhir.org). It's definitely worth checking out!
- Patient-held permissions:
- Let's start rolling out those Verifiable Credentials!
You can use 0 to indicate things like consent grants or maybe even to show that a clinician is credentialed. This approach lets patients share just the info they want. For example, they can say, “I’m okay with sharing my SDOH data for care management until the end of 2026,” all while keeping their identity under wraps. SMART Health Cards use a pattern that's pretty similar to JWS+FHIR. If you're curious to dive deeper, you can check it out here: (w3.org). - Attestations, not content: When you're dealing with blockchain, all you really need to do is jot down the hash of the consent, along with the version, the effective and expiry dates, and the policy URN. It’s pretty straightforward! If you ever need to cancel it, just go ahead and publish a revocation transaction and update those DS4P flags. The relying parties will be able to check it out the next time they look.
Practical details that matter
- Policy Flexibility: With that Texas court ruling in 2025, it’s probably best to avoid getting too set in stone with clinical categories, like labeling things as “reproductive care.” "Instead, it’s a good idea to connect with policy libraries that you can keep fresh as OCR guidance evolves." It's a good idea to keep your labels and scopes neatly organized in tables. It'll make it super easy for you to refer back to them whenever you need! (hhs.gov).
Hey there! So, when it comes to DS4P enforcement, it might be a good idea to think about creating a Security Labeling Service (SLS). This service could automatically classify resources right when they’re created. Plus, you could throw in a Label Orchestrator that regularly checks the purpose of use across APIs and analytics. That way, you stay on top of things and keep everything in check! If you’re looking for some reliable advice, definitely take a look at HL7’s DS4P IG. They’ve got some really practical patterns that can help you out! (build.fhir.org).
- App scopes: Make sure to set clear SMART/UDAP scopes--like Observation.rs?category=social-history--so you can control exactly what data gets shared with apps. This way, we’re sticking to the US Core guidelines for granular scopes and keeping everything nice and tidy. (build.fhir.org).
What “good” looks like (benchmarks)
- Consent checks are super quick, taking less than 100ms. This speedy response is mainly because we cache decisions that have a short lifespan (TTL).
- Don’t worry, there’s no personal health info or policy details stored directly on the blockchain. Instead, we verify all consents through hashes, which keeps everything nice and secure. Selective disclosure is working smoothly with at least two wallet providers. This makes it super easy to flip between various wallets, whether you're using an enterprise wallet or a patient mobile wallet. (learn.microsoft.com).
Implementation patterns that avoid dead ends
7Block Labs’ opinionated stack choices
- Ledger: So, when it comes to your consortium's needs, you've got a couple of solid options. You can go with Hyperledger Fabric, which provides cool features like channel isolation and private data collections. Or, if you're leaning more towards something Ethereum-based, Hyperledger Besu is a great choice as a permissioned version of Ethereum. Just think about what fits your requirements best! Keeping your block intervals on the shorter side--like around 2 seconds or even less--is a smart move for better event anchoring. Plus, think about batching those hashes to help spread out the fees. It can really make a difference!
- Cryptography and Keys: This is for VC 2. For both 0 and SMART HC, we're using HSM-backed signing with the P‑256 algorithm. It's a good idea to refresh your organization's DIDs every year, or anytime there's a security breach. Keeping things updated helps protect your info! And don’t forget to set up dual control for key exports. It’s a great way to add an extra layer of security! (w3.org).
- Off-chain storage: Try using an encrypted object storage solution that features SSE-KMS and has an immutability option. Don’t forget to use FIPS 140‑2 validated modules whenever you need them! It’s essential for keeping things secure. It's a great idea to use content-addressed paths that rely on hashes, and to only keep the essential join keys in the ledger. This way, you simplify things and keep everything efficient!
- FHIR Eventing: Let’s get the Subscriptions Backport up and running with webhook delivery, plus a solid retry and backoff system to make sure everything flows smoothly! Just a quick reminder: make sure to add SubscriptionStatus to every notification bundle. This way, it’ll be super easy for consumers to check the sequence and topic! (build.fhir.org).
- TEFCA readiness: It’s the perfect moment to dive into getting your UDAP/FAST SSRAA registration set up and those token flows going strong. Don’t wait too long on this!
So, you've got the hang of working with SMART v2, and now you're getting ready to switch over to UDAP since that's what your QHIN needs.
(blog.hl7.org).
Interop guardrails
- Version pinning: We're focusing on FHIR R4 right now.
0. 1, US Core 6.
1. 0, CRD/DTR/PAS 2.
1. So, you've got SMART v2 and the Subscriptions Backport v1 in the mix.
1. 0. Just a heads-up to keep an eye on ONC’s enforcement discretion windows! There have been some recent updates that have actually pushed the certification deadlines for developers into the first quarter of 2026. Feel free to take a look at it here.
- Deterministic hashing: Before you start hashing your FHIR data, make sure you’ve got it all sorted and canonicalized. And hey, remember to share your canonicalization method with others too!
- Auditability: Whenever there's an API call that alters clinical or claim information, it's important to generate a provenance event with a consistent ID. We need to make sure this gets anchored on-chain in just 1 to 2 seconds.
Proving value quickly: 90‑day deployment blueprint
- Weeks 0-2: Developing Policy and Setting KPIs. How about we pick two service lines to start with, like imaging or DME? That way, we can get the prior authorization pilots rolling! Let's really get into those SLAs and zero in on the specific denial categories. Alright, let’s nail down those baseline metrics! We need to figure out the first-pass approval rate, how many days it usually takes to make a decision, the resubmission rate, and of course, the main reasons why applications get denied.
- Weeks 2-6: Building the “Narrow Waist”.
- Get the CRD, DTR, and PAS 2 all set up.
1. Connect your endpoints to your EHR with SMART on FHIR. It’s a great way to streamline everything! Hey, just a quick reminder to make sure you turn on R4 Subscriptions Backport for those events! Don't want to miss out on any updates! Let's kick things off by implementing a permissioned ledger that uses organization DIDs. We’ll also set up an on-chain PAS attestation model and add some automated SLA timers to help us stay on top of everything. Let's go ahead and add DS4P labeling into the EHR write path, and don't forget to connect those consent hashes while we're at it!
- Weeks 6-10: Kicking Off with Two Payers.
- Leverage CMS’s flexibility to roll out FHIR-only prior authorization with those payers who are eager to get started. If that doesn't work out, we can always rely on a translation bridge when we need to. (cms.gov).
- Create dashboards to keep an eye on SLA breaches and the time it takes to handle attachments. Also, let’s automate those reminders for anything that’s still hanging around.
- Weeks 10-12: Time to Review and Ramp Things Up! Hey team, let's set our sights on reducing denials for our selected service lines by at least 10%. In addition, keep an eye on how much time we're saving with each authorization. And don’t forget to prepare those integrity and audit reports to keep us in line with compliance. We've got this! Hey, don’t forget to pass the “attested timeline” along to your revenue integrity and legal teams. It’ll definitely help streamline the appeals process and make everything run a lot smoother!
Pitfalls to avoid (learned the hard way)
- **Putting PHI on-chain. Honestly, just don't go there. You should really use the chain for things like proofs and permissions, but it’s not the best option for keeping sensitive data safe. HIMSS really emphasizes that you should avoid storing any identifiable information on-chain whenever possible. Check it out here.
- **Hard-coding consent categories. Hey, heads up! Court rulings can really turn things upside down, so it’s a smart move to link your labels to external policy libraries that you can update easily, like those DS4P value sets. If you're looking for the details, you can check them out here.
- **Overlooking who’s connected to the network. "If you've got some solid players in your network, you're definitely going to see a quicker return on your investment." The Synaptic Health Alliance has actually seen some solid returns on investment thanks to shared provider data. It’s pretty cool how having multiple payers and providers on board really makes a difference! Hey, did you know that network effects are super important? If you're curious to dive deeper into it, check it out here. It's definitely worth a look!
- Putting too much focus on X12-first PA stacks. ** Now that CMS has approved FHIR-only approaches, creating a streamlined FHIR solution can help you hit those requirements quicker and with way less stress. Hey, if you want to read the official announcement, you can find it right here. It's worth a look!
Emerging best practices (2025-2027 horizon)
- TEFCA and FHIR Everywhere: Buckle up because we're about to see a lot more Qualified Health Information Networks (QHINs) popping up, which means there’s going to be a whole lot more FHIR traffic flowing around! Getting security in sync with FAST UDAP right now is a clever idea to avoid any headaches in 2026. Trust me, it's worth it to be proactive! Check it out here.
- Verified permissions: Thanks to VC 2. Great news! Now you can take advantage of selective disclosure and offline verification. This is just great for keeping track of consent between various organizations and for managing things like workforce credentials, including privileges and DEA. It's time to kick off the pilot program for wallets using those rotation and revocation playbooks! Let’s get things rolling! More details here.
- Integrity as a Service: Estonia is really setting the bar high with its approach to keeping electronic health records and claim events secure, all while avoiding the headache of shuffling data around. It's pretty impressive! This method is really starting to play a crucial role in audits and enhancing our cyber resilience. If you want to dive deeper into this, check it out here. It's got all the details you need!
- Streamlined PA Automation: With CRD, DTR, and PAS making steady progress and CMS rolling out their timelines, we’re likely to see some impressive improvements. Organizations that take the time to tweak their DTR rules according to specific service lines should notice shorter cycle times and a drop in denials. It’s all about fine-tuning things to get the best results! If you’re curious and want to dig a little deeper, check out the details here. There’s a ton of useful info waiting for you!
What 7Block Labs delivers
- Interop-first builds: We're focusing on FHIR R4 and US Core 6.
1. You've got zero servers right now, but don't worry! You’ll still have some cool features at your disposal, like Subscriptions Backport, SMART v2, and UDAP/FAST security to keep everything secure and running smoothly. Hey, just a quick reminder about those TEFCA onboarding playbooks! You can find them here. Definitely worth checking out!
- Prior Auth Automation: Here’s the scoop on CRD, DTR, and PAS 2!
1. Check it out! 0 services are now available, featuring timelines that are verified by our service level agreements on a permissioned chain. Plus, we've got some handy integration kits ready for both payers and providers to make things easier! If you’re curious and want to dig deeper, check out the details here. There’s a ton of info waiting for you!
- Consent you can really understand: We’ve got FHIR Consent in the mix, plus DS4P labeling, and verifiable credentials to back up authorizations. And let’s not forget those trustworthy zero-PHI ledgers that help keep everything secure and allow for easy revocation when needed. Check it out here.
- Compliance posture: So, let’s dive into how we can create systems that are flexible enough to handle any changes from HIPAA and OCR without needing to completely overhaul everything. It's really about changing out the policies rather than diving into the code. More info here.
Hey there! If you're looking to tackle some things in 2026 like minimizing those annoying prior authorization headaches, making sure your EHR data is rock solid, or finally breaking free from the chaos of portal purgatory, we're here to help you out! We can help you kick off something really solid in just 90 days! Plus, we’ll make sure it’s all set to grow right before those looming 2027 deadlines sneak up on you.
Like what you're reading? Let's build together.
Get a free 30-minute consultation with our engineering team.
Related Posts
ByAUJay
Building Supply Chain Trackers for Luxury Goods: A Step-by-Step Guide
How to Create Supply Chain Trackers for Luxury Goods
ByAUJay
Building 'Private Social Networks' with Onchain Keys
Creating Private Social Networks with Onchain Keys
ByAUJay
Tokenizing Intellectual Property for AI Models: A Simple Guide
## How to Tokenize “Intellectual Property” for AI Models ### Summary: A lot of AI teams struggle to show what their models have been trained on or what licenses they comply with. With the EU AI Act set to kick in by 2026 and new publisher standards like RSL 1.0 making things more transparent, it's becoming more crucial than ever to get this right.

