Loading image...
Medical Record Security and Privacy in India thumbnail
Healthcare Security

Medical Record Security and Privacy in India

Complete guide to medical record security and privacy in India covering DPDP Act 2023, ABDM security framework, HIPAA compliance for Indian healthcare companies, and essential cybersecurity best practices.

Medical Record Security and Privacy in India

By Dr. Priya Sharma
20 min read
✓ Medically Reviewed

Medical Record Security and Privacy in India: Comprehensive Guide to Data Protection Laws, HIPAA Compliance, and Security Best Practices

In an era where 67 crore Indians have digital health IDs and healthcare data flows across digital platforms at unprecedented scale, the security and privacy of medical records has become one of the most critical challenges facing our healthcare system.

The stakes couldn't be higher. When Star Health, India's largest health insurer, suffered a devastating data breach in 2024 affecting 31 million Indians, it exposed not just names and phone numbers, but intimate medical diagnoses, test results, and treatment histories—information that could impact lives, careers, and families for generations.

The harsh reality: Healthcare data is 40 times more valuable on the dark web than financial information, making it a prime target for cybercriminals. Yet many Indian healthcare providers, patients, and even digital health platforms remain dangerously unprepared for the sophisticated threats targeting medical information today.

This comprehensive guide will transform you from vulnerable to vigilant, providing expert knowledge of India's evolving data protection landscape, international compliance requirements, and battle-tested security practices that protect what matters most: patient privacy and trust.

The Current State of Healthcare Data Security in India

The Scale of India's Digital Health Revolution

India's healthcare digitization represents one of the world's most ambitious health technology initiatives:

  • Ayushman Bharat Digital Mission (ABDM): 67+ crore digital health IDs created
  • Digital Health Records: 42+ crore health records linked to ABHA accounts
  • Healthcare Facilities: 1,52,544 facilities using ABDM-enabled software
  • Data Volume: Billions of medical records processed annually across platforms

The Growing Threat Landscape

2025 Healthcare Cybersecurity Statistics:

  • 70 healthcare data breaches reported in June 2025 alone
  • 7.6 million individuals affected by breaches in a single month
  • 300% increase in affected individuals compared to previous months
  • Email-based attacks remain the primary threat vector

India-Specific Vulnerabilities:

  • Rapid digitization without proportional security investment
  • Mixed public-private healthcare systems with varying security standards
  • Limited cybersecurity awareness among healthcare professionals
  • Fragmented regulatory compliance across states and systems

"The Star Health breach wasn't just a data leak—it was a wake-up call. When 31 million Indians' most intimate health information appeared on Telegram, it showed how vulnerable our entire digital health ecosystem really is." - Cybersecurity Expert, Healthcare Data Protection Council

India's Legal Framework: DPDP Act 2023 and Healthcare

Understanding the Digital Personal Data Protection Act 2023

The Digital Personal Data Protection Act (DPDP) 2023, which received presidential assent on August 11, 2023, represents India's most comprehensive data protection legislation, with specific implications for healthcare.

Key Healthcare Provisions:

Scope of Coverage:

  • Applies to all digital personal data processing within India
  • Includes offline data that is later digitized
  • Covers healthcare providers, hospitals, diagnostic centers, and health technology companies
  • Applies to international companies handling Indian patient data

Definition of Sensitive Personal Data: Health information is explicitly classified as sensitive personal data, requiring enhanced protection measures including:

  • Stronger consent requirements
  • Enhanced security safeguards
  • Stricter breach notification requirements
  • Higher penalties for violations

Patient Rights Under DPDP Act:

Right to Access:

  • Patients can request complete copies of their medical records
  • Healthcare providers must provide data in a portable format
  • Timeline requirements for responding to access requests

Right to Correction:

  • Patients can request correction of inaccurate medical information
  • Healthcare providers must verify and update incorrect data
  • Procedures for handling disputed information

Right to Erasure:

  • Limited "right to be forgotten" in healthcare contexts
  • Exceptions for medical research and public health requirements
  • Balancing patient privacy with medical necessity

Right to Data Portability:

  • Patients can transfer medical records between healthcare providers
  • Standardized formats for seamless data transfer
  • Integration with ABDM for interoperability

Compliance Requirements for Healthcare Providers

Consent Management:

Explicit Consent Requirements:

  • Clear, specific consent for each type of data processing
  • Separate consent for data sharing with third parties
  • Easy withdrawal mechanisms for patients
  • Documentation of all consent decisions

Exceptions to Consent: The DPDP Act provides consent exceptions for:

  • Medical emergencies requiring immediate treatment
  • Government health programs and public health initiatives
  • Employment-related health screenings
  • Legitimate medical research (with additional safeguards)

Data Protection Officer (DPO) Requirements:

Mandatory DPO for:

  • Large healthcare organizations processing significant volumes of patient data
  • Hospitals with more than specified revenue thresholds
  • Health technology companies serving multiple healthcare providers
  • Organizations processing sensitive health data at scale

DPO Responsibilities:

  • Monitor compliance with DPDP Act requirements
  • Conduct privacy impact assessments
  • Serve as contact point for data protection queries
  • Manage data breach response and notification procedures

Penalties and Enforcement:

Financial Penalties:

  • Up to ₹250 crores for serious violations
  • ₹50-200 crores for significant non-compliance
  • ₹10,000-10 crores for procedural violations
  • Additional penalties for repeated violations

Enforcement Authority:

  • Data Protection Board of India as primary regulatory body
  • Investigation powers and audit authority
  • Authority to impose corrective measures
  • Appeal procedures for disputed decisions

ABDM Security Framework: Privacy by Design

Core Security Principles of ABDM

The Ayushman Bharat Digital Mission implements "Privacy by Design" as a fundamental principle, incorporating security measures at every level of the digital health ecosystem.

Federated Architecture Benefits:

No Centralized Data Repository:

  • Patient data remains with healthcare providers
  • No single point of failure for data breaches
  • Reduced risk of mass data exposure
  • Enhanced control over data location and access

Consent-Based Data Sharing:

  • Every data access requires explicit patient consent
  • Granular consent for different types of health information
  • Consent withdrawal mechanisms
  • Audit trails for all consent decisions

Technical Security Measures:

Anonymization and De-identification:

  • Automatic removal of personally identifiable information
  • Advanced algorithms for data anonymization
  • Protection of individual privacy in research datasets
  • Compliance with international anonymization standards

Encryption and Secure Transmission:

  • End-to-end encryption for all data transmissions
  • Advanced encryption standards for data at rest
  • Secure APIs for healthcare provider integration
  • Regular security audits and penetration testing

ABDM Consent Manager System

How Consent Management Works:

Patient Control:

  • Patients grant specific consent for each data sharing request
  • Time-limited consent with automatic expiry
  • Ability to view all active consent agreements
  • Easy consent withdrawal with immediate effect

Healthcare Provider Integration:

  • Standardized consent request formats
  • Automated consent verification processes
  • Integration with existing healthcare systems
  • Compliance tracking and reporting

Privacy Operations Center:

  • 24/7 monitoring of privacy compliance
  • Automated detection of unauthorized access attempts
  • Regular audits of consent management processes
  • Incident response and breach notification procedures

HIPAA Compliance for Indian Healthcare Companies

When HIPAA Applies to Indian Organizations

While HIPAA is U.S. legislation, Indian healthcare companies must comply when:

Business Associate Relationships:

  • Providing services to U.S. healthcare providers
  • Processing protected health information (PHI) for U.S. clients
  • Medical billing and coding services for American hospitals
  • Telemedicine services for U.S. patients
  • Healthcare IT support for U.S. healthcare organizations

Types of Indian Companies Requiring HIPAA Compliance:

Healthcare BPO Services:

  • Medical billing and coding companies
  • Healthcare call centers
  • Medical transcription services
  • Claims processing organizations
  • Revenue cycle management companies

Technology Services:

  • Healthcare software development companies
  • Medical device manufacturers with U.S. clients
  • Health information exchange providers
  • Electronic health record vendors
  • Healthcare analytics companies

HIPAA Compliance Requirements for Indian Companies

Administrative Safeguards:

Workforce Training:

  • Annual HIPAA training for all employees handling PHI
  • Role-based access training based on job functions
  • Incident response training and procedures
  • Regular updates on regulatory changes

Policy and Procedure Documentation:

  • Written privacy and security policies
  • Breach notification procedures
  • Incident response plans
  • Employee sanctions for HIPAA violations

Access Management:

  • Assigned security responsibilities for designated personnel
  • Information access management procedures
  • Workforce clearance procedures
  • Information system activity review processes

Physical Safeguards:

Facility Security:

  • Controlled access to facilities processing PHI
  • Security cameras and monitoring systems
  • Visitor access controls and logging
  • Secure disposal of PHI-containing materials

Workstation Security:

  • Restricted access to workstations containing PHI
  • Automatic screen locks and timeout procedures
  • Physical positioning of workstations to prevent unauthorized viewing
  • Secure workstation configuration standards

Device and Media Controls:

  • Encryption of portable devices containing PHI
  • Secure disposal procedures for electronic media
  • Controls for receipt and removal of hardware/software
  • Data backup and recovery procedures

Technical Safeguards:

Access Control:

  • Unique user identification for each person accessing PHI
  • Automatic logoff procedures for inactive sessions
  • Role-based access controls limiting PHI access
  • Multi-factor authentication for sensitive systems

Audit Controls:

  • Audit logs tracking all PHI access and modifications
  • Regular review of audit logs for unauthorized access
  • Automated alerts for suspicious activities
  • Long-term retention of audit records

Transmission Security:

  • End-to-end encryption for PHI transmissions
  • Secure communication protocols (HTTPS, SFTP)
  • Message authentication and integrity controls
  • Secure email systems for PHI communications

Business Associate Agreement (BAA) Requirements

Essential BAA Components:

Permitted Uses and Disclosures:

  • Specific authorized uses of PHI
  • Limitations on disclosure to subcontractors
  • Requirements for minimum necessary access
  • Restrictions on re-disclosure of PHI

Safeguard Requirements:

  • Implementation of administrative, physical, and technical safeguards
  • Regular security assessments and updates
  • Incident reporting and breach notification procedures
  • Return or destruction of PHI upon contract termination

Compliance Monitoring:

  • Right of covered entity to monitor compliance
  • Audit procedures and inspection rights
  • Corrective action requirements for violations
  • Termination procedures for material breaches

Healthcare Data Security Best Practices

Comprehensive Security Framework

Multi-Layered Defense Strategy:

Network Security:

  • Firewalls with healthcare-specific configurations
  • Intrusion detection and prevention systems
  • Network segmentation isolating critical systems
  • Regular vulnerability assessments and penetration testing

Endpoint Protection:

  • Advanced antivirus and anti-malware solutions
  • Endpoint detection and response (EDR) systems
  • Mobile device management for healthcare applications
  • Regular software updates and patch management

Email Security:

  • Advanced threat protection for email systems
  • Email encryption for PHI communications
  • Phishing simulation and user training programs
  • Secure email gateways with content filtering

Identity and Access Management:

Strong Authentication:

  • Multi-factor authentication for all healthcare systems
  • Biometric authentication for high-security environments
  • Smart card or token-based authentication
  • Risk-based authentication adjusting to user behavior

Access Control:

  • Role-based access control (RBAC) systems
  • Principle of least privilege access
  • Regular access reviews and deprovisioning
  • Privileged account management and monitoring

User Activity Monitoring:

  • Comprehensive audit logging of all PHI access
  • User behavior analytics detecting anomalous activities
  • Real-time alerts for suspicious access patterns
  • Forensic capabilities for incident investigation

Data Protection and Encryption

Encryption Standards:

Data at Rest:

  • AES-256 encryption for stored PHI
  • Database-level encryption for medical records
  • Full-disk encryption for all healthcare workstations
  • Encrypted backups with secure key management

Data in Transit:

  • TLS 1.3 for all web-based healthcare applications
  • VPN connections for remote healthcare access
  • Encrypted file transfer protocols (SFTP, HTTPS)
  • API security with token-based authentication

Key Management:

  • Hardware security modules (HSMs) for key protection
  • Regular key rotation and lifecycle management
  • Split knowledge and dual control for critical keys
  • Secure key escrow and recovery procedures

Data Loss Prevention:

Content Monitoring:

  • Automated detection of PHI in emails and file transfers
  • Data classification based on sensitivity levels
  • Real-time blocking of unauthorized PHI transmissions
  • Policy enforcement for data handling procedures

Backup and Recovery:

  • Regular automated backups with encryption
  • Geographically distributed backup locations
  • Regular recovery testing and validation
  • Business continuity planning for healthcare operations

Incident Response and Breach Management

Incident Response Framework:

Detection and Analysis:

  • 24/7 security operations center (SOC) monitoring
  • Automated threat detection and correlation
  • Incident classification and severity assessment
  • Initial containment and evidence preservation

Containment and Recovery:

  • Immediate isolation of affected systems
  • Forensic analysis and impact assessment
  • System restoration and security enhancement
  • Validation of system integrity before production use

Post-Incident Activities:

  • Comprehensive incident documentation
  • Lessons learned and process improvement
  • Regulatory notification and compliance reporting
  • Patient notification as required by law

Breach Notification Requirements:

DPDP Act Notifications:

  • Immediate notification to Data Protection Board of India
  • Patient notification within prescribed timeframes
  • Public disclosure for significant breaches
  • Remedial action reporting and implementation

HIPAA Breach Notifications:

  • HHS notification within 60 days
  • Individual patient notification within 60 days
  • Media notification for breaches affecting 500+ individuals
  • Annual reporting for smaller breaches

Technology Solutions for Healthcare Security

Advanced Security Technologies

Artificial Intelligence and Machine Learning:

Threat Detection:

  • AI-powered anomaly detection for unusual access patterns
  • Machine learning algorithms identifying potential breaches
  • Behavioral analytics detecting insider threats
  • Automated response to known threat signatures

Privacy Protection:

  • AI-driven data anonymization and de-identification
  • Smart consent management with natural language processing
  • Automated privacy impact assessments
  • Intelligent data classification and protection

Blockchain for Healthcare Security:

Benefits for Medical Records:

  • Immutable audit trails for all data access and modifications
  • Decentralized storage reducing single points of failure
  • Smart contracts for automated consent management
  • Enhanced interoperability with secure data sharing

Implementation Considerations:

  • Scalability challenges for large healthcare systems
  • Regulatory compliance with emerging blockchain regulations
  • Integration with existing healthcare information systems
  • Energy consumption and environmental impact considerations

Cloud Security for Healthcare

Cloud Deployment Models:

Private Cloud:

  • Dedicated infrastructure for healthcare organizations
  • Enhanced control over security configurations
  • Compliance with healthcare-specific regulations
  • Higher costs but maximum security customization

Public Cloud with Healthcare Compliance:

  • Shared infrastructure with strong security controls
  • Cost-effective scaling for growing healthcare needs
  • Built-in compliance features for healthcare regulations
  • Vendor responsibility for infrastructure security

Hybrid Cloud:

  • Combination of private and public cloud resources
  • Sensitive data in private cloud, less sensitive in public
  • Flexibility in balancing security and cost considerations
  • Complex management but optimized resource utilization

Cloud Security Best Practices:

Vendor Due Diligence:

  • Comprehensive security assessments of cloud providers
  • Verification of compliance certifications and audits
  • Review of data residency and sovereignty requirements
  • Evaluation of incident response and breach notification procedures

Configuration Management:

  • Secure baseline configurations for all cloud services
  • Regular security configuration reviews and updates
  • Automated compliance monitoring and remediation
  • Change management procedures for security configurations

Patient Rights and Education

Understanding Patient Privacy Rights

Fundamental Privacy Rights:

Right to Privacy:

  • Expectation of confidentiality in healthcare relationships
  • Protection against unauthorized disclosure of health information
  • Cultural and religious privacy considerations
  • Family privacy in healthcare decision-making

Right to Control Health Information:

  • Authorization required for most health information disclosures
  • Ability to restrict access to specific healthcare providers
  • Choice in how health information is communicated
  • Right to request confidential communications

Patient Education and Empowerment:

Digital Health Literacy:

  • Understanding of digital health record systems
  • Knowledge of privacy settings and consent mechanisms
  • Awareness of security risks and protective measures
  • Skills for managing personal health information

Privacy Awareness:

  • Recognition of potential privacy threats
  • Understanding of data sharing practices
  • Knowledge of rights and remedies for privacy violations
  • Active participation in privacy protection measures

Building Patient Trust Through Transparency

Transparency Initiatives:

Privacy Notices:

  • Clear, understandable explanations of data practices
  • Regular updates reflecting changes in data handling
  • Multiple language options for diverse populations
  • Easy access through multiple communication channels

Consent Processes:

  • Granular consent options for different data uses
  • Regular consent renewal and confirmation processes
  • Easy consent withdrawal mechanisms
  • Clear explanations of consent implications

Breach Communication:

  • Timely notification of any privacy incidents
  • Clear explanation of incident impact and remediation
  • Resources for affected individuals
  • Commitment to preventing future incidents

Regulatory Compliance and Audit

Compliance Management Framework

Ongoing Compliance Activities:

Regular Risk Assessments:

  • Comprehensive security risk assessments
  • Privacy impact assessments for new systems
  • Vendor risk assessments and monitoring
  • Regular updates based on threat landscape changes

Policy and Procedure Management:

  • Regular review and update of security policies
  • Training on policy changes and updates
  • Compliance monitoring and enforcement
  • Documentation of policy compliance activities

Audit and Monitoring:

  • Internal audits of security and privacy practices
  • External audits by qualified cybersecurity firms
  • Regulatory compliance audits and inspections
  • Continuous monitoring of security controls effectiveness

Documentation Requirements:

Compliance Documentation:

  • Security policies and procedures
  • Risk assessment reports and remediation plans
  • Training records and acknowledgments
  • Incident reports and response documentation

Audit Trail Maintenance:

  • Comprehensive logging of all system activities
  • Long-term retention of audit logs
  • Regular review and analysis of audit data
  • Forensic capabilities for detailed investigation

Regulatory Reporting and Notifications

Notification Requirements:

Data Protection Board of India:

  • Breach notifications within 72 hours of discovery
  • Annual compliance reports and attestations
  • Response to regulatory inquiries and investigations
  • Remedial action reporting and implementation

Healthcare Regulatory Bodies:

  • Medical Council compliance reporting
  • State health department notifications
  • Insurance regulatory body reporting
  • International regulatory notifications (for global operations)

Future of Healthcare Data Security in India

Emerging Trends and Technologies

Next-Generation Security Technologies:

Zero Trust Architecture:

  • Never trust, always verify approach to security
  • Continuous verification of users and devices
  • Microsegmentation of healthcare networks
  • Principle of least privilege access enforcement

Quantum-Resistant Cryptography:

  • Preparation for quantum computing threats
  • Implementation of post-quantum cryptographic standards
  • Migration planning for quantum-safe algorithms
  • Research collaboration on quantum security solutions

Privacy-Preserving Technologies:

  • Homomorphic encryption for secure data processing
  • Differential privacy for research data sharing
  • Federated learning for collaborative healthcare research
  • Secure multi-party computation for joint analysis

Regulatory Evolution:

Enhanced Data Protection Laws:

  • Strengthened healthcare-specific privacy regulations
  • International harmonization of healthcare data protection
  • Cross-border data transfer frameworks
  • Emerging digital health governance structures

AI and Healthcare Regulation:

  • Regulation of AI systems in healthcare
  • Algorithmic transparency and accountability
  • Bias detection and mitigation requirements
  • Ethics frameworks for AI-driven healthcare decisions

Building a Secure Digital Health Ecosystem

Collaborative Security Approach:

Public-Private Partnerships:

  • Government and industry collaboration on cybersecurity
  • Shared threat intelligence and best practices
  • Joint incident response capabilities
  • Coordinated approach to healthcare security standards

International Cooperation:

  • Participation in global healthcare security initiatives
  • Adoption of international healthcare cybersecurity standards
  • Cross-border information sharing on threats and vulnerabilities
  • Harmonized approach to healthcare data protection

Continuous Innovation:

Security Research and Development:

  • Investment in healthcare cybersecurity research
  • Development of India-specific security solutions
  • Collaboration between academia and industry
  • Open-source security tools for healthcare organizations

Workforce Development:

  • Healthcare cybersecurity training programs
  • Professional certification in healthcare information security
  • Continuing education for healthcare IT professionals
  • Public awareness campaigns on healthcare data protection

Practical Implementation Guide

Getting Started with Healthcare Data Security

Assessment and Planning Phase:

Current State Assessment:

  1. Data Inventory: Catalog all types of health information processed
  2. System Mapping: Identify all systems storing or processing PHI
  3. Risk Assessment: Evaluate current security risks and vulnerabilities
  4. Compliance Gap Analysis: Compare current practices with regulatory requirements

Security Strategy Development:

  1. Security Framework Selection: Choose appropriate frameworks (NIST, ISO 27001)
  2. Risk Tolerance Definition: Establish acceptable levels of security risk
  3. Budget Planning: Allocate resources for security initiatives
  4. Timeline Development: Create realistic implementation schedules

Implementation Roadmap:

Phase 1: Foundation (Months 1-3)

  • Implement basic security controls (access management, encryption)
  • Establish security policies and procedures
  • Begin workforce security training programs
  • Set up basic monitoring and logging capabilities

Phase 2: Enhancement (Months 4-8)

  • Deploy advanced threat detection systems
  • Implement comprehensive backup and recovery solutions
  • Establish incident response capabilities
  • Conduct security awareness training for all staff

Phase 3: Optimization (Months 9-12)

  • Deploy AI-powered security tools
  • Implement advanced threat hunting capabilities
  • Establish continuous compliance monitoring
  • Conduct comprehensive security audits and assessments

Ongoing Management:

Continuous Improvement:

  • Regular security assessments and updates
  • Threat intelligence monitoring and analysis
  • Security metrics tracking and reporting
  • Stakeholder feedback and security program refinement

Performance Monitoring:

  • Key performance indicators (KPIs) for security effectiveness
  • Regular reporting to executive leadership and boards
  • Benchmarking against industry best practices
  • Return on investment (ROI) analysis for security initiatives

Conclusion: Securing India's Digital Health Future

The digitization of India's healthcare system represents both unprecedented opportunity and significant risk. With 67 crore Indians already holding digital health IDs and billions of medical records flowing through digital systems, the foundation of our digital health infrastructure must be built on uncompromising security and privacy principles.

The Path Forward Requires:

Individual Responsibility:

  • Healthcare providers must invest in comprehensive security measures
  • Patients must become active participants in protecting their health information
  • Technology vendors must prioritize security in product development
  • Regulators must enforce compliance while supporting innovation

Collective Action:

  • Industry-wide adoption of security best practices
  • Sharing of threat intelligence and security insights
  • Collaborative development of security standards and frameworks
  • Public-private partnerships addressing healthcare cybersecurity challenges

Continuous Vigilance:

  • Regular assessment and improvement of security measures
  • Adaptation to emerging threats and technologies
  • Investment in cybersecurity workforce development
  • Commitment to transparency and accountability in data protection

The Stakes Are Clear: When healthcare data is compromised, it's not just information that's lost—it's trust, privacy, dignity, and sometimes lives. The breach affecting 31 million Star Health customers wasn't just a business incident; it was a betrayal of the fundamental promise that healthcare providers make to protect their patients' most sensitive information.

Your Action Plan:

  1. Healthcare Providers: Conduct immediate security assessments and implement comprehensive protection measures
  2. Patients: Understand your privacy rights and actively participate in protecting your health information
  3. Technology Companies: Build security and privacy into every healthcare solution from the ground up
  4. Policymakers: Strengthen and enforce data protection regulations while supporting healthcare innovation

The Future Depends on Decisions Made Today:

Every security control implemented, every employee trained, every privacy policy updated, and every patient educated contributes to a more secure and trustworthy digital health ecosystem. The technologies exist, the regulations are in place, and the awareness is growing.

What's needed now is the collective will to make healthcare data security and privacy not just a compliance requirement, but a fundamental value that drives every decision in India's digital health transformation.

The choice is ours: We can build a digital health system that patients trust, providers rely on, and the world admires for its security and privacy protections. Or we can continue accepting preventable breaches as the cost of digital progress.

The patients of India—present and future—deserve nothing less than the highest standards of data protection. The time to act is now.


Ready to secure your healthcare organization's future? Start with a comprehensive security assessment and build the foundation for trustworthy digital health services that protect what matters most: patient privacy and trust.

Continue Reading

More insights on medical records and healthcare technology

A1C Test: Purpose, Procedure, Results & Cost in India
12 min read
Medical Tests

A1C Test: Purpose, Procedure, Results & Cost in India

Learn everything about the A1C test in India. Understand its purpose, procedure, preparation, normal ranges, and costs. Get a comprehensive guide to manage your diabetes effectively. Find A1C test cost details here.

A1C testA1C test IndiaMedical Review
Read More
Medical Record Security and Privacy in India | Ayu | Ayu - Smart Medical Records for India