This page is part of the FHIR Specification (v1.1.0: STU 3 Ballot 1). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R4 R3 R2
This is a frozen snapshot of the FHIR specification created for the purpose of balloting the GAO implementation Guide. It includes draft changes that may be part of the future DSTU 2.1 release but further change is expected. Readers should focus solely on the GAO implementation content, and FHIR DSTU 2 for other purposes.
Types of security policies that further specify the ActClassPolicy value set. Examples: encrypt prohibit redisclosure without consent directive
{ "resourceType": "ValueSet", "id": "v3-SecurityPolicy", "meta": { "lastUpdated": "2015-12-03T09:57:31.744+11:00", "profile": [ "http://hl7.org/fhir/StructureDefinition/valueset-shareable-definition" ] }, "text": { "status": "generated", "div": "<div>!-- Snipped for Brevity --></div>" }, "extension": [ { "url": "http://hl7.org/fhir/StructureDefinition/valueset-oid", "valueUri": "urn:oid:2.16.840.1.113883.1.11.20444" } ], "url": "http://hl7.org/fhir/ValueSet/v3-SecurityPolicy", "version": "2014-03-26", "name": "SecurityPolicy", "status": "active", "experimental": false, "publisher": "HL7 v3", "contact": [ { "telecom": [ { "system": "other", "value": "http://www.hl7.org" } ] } ], "description": " Types of security policies that further specify the ActClassPolicy value set. Examples:\r\n encrypt prohibit redisclosure without consent directive", "compose": { "include": [ { "system": "http://hl7.org/fhir/v3/ActCode", "filter": [ { "property": "concept", "op": "is-a", "value": "SecurityPolicy" } ] } ] } }
Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.