This page is part of the FHIR Specification (v1.1.0: STU 3 Ballot 1). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R5 R4B R4 R3 R2
This is a frozen snapshot of the FHIR specification created for the purpose of balloting the GAO implementation Guide. It includes draft changes that may be part of the future DSTU 2.1 release but further change is expected. Readers should focus solely on the GAO implementation content, and FHIR DSTU 2 for other purposes.
This is a value set defined by the FHIR project.
Summary
Defining URL: | http://hl7.org/fhir/ValueSet/audit-event-sub-type |
Name: | Audit Event Sub-Type |
Definition: | More detailed code concerning the type of the audit event - defined by DICOM with some FHIR specific additions. |
OID: | 2.16.840.1.113883.4.642.2.270 (for OID based terminology systems) |
Copyright: | These codes are excerpted from Digital Imaging and Communications in Medicine (DICOM) Standard, Part 16: Content Mapping Resource, Copyright © 2011 by the National Electrical Manufacturers Association. |
Source Resource | XML / JSON |
This value set is used in the following places:
This value set includes codes from the following code systems:
Code | Display | |
110120 | Application Start | Audit event: Application Entity has started |
110121 | Application Stop | Audit event: Application Entity has stopped |
110122 | Login | Audit event: User login has been attempted |
110123 | Logout | Audit event: User logout has been attempted |
110124 | Attach | Audit event: Node has been attached |
110125 | Detach | Audit event: Node has been detached |
110126 | Node Authentication | Audit event: Node Authentication has been attempted |
110127 | Emergency Override Started | Audit event: Emergency Override has started |
110128 | Network Configuration | Audit event: Network configuration has been changed |
110129 | Security Configuration | Audit event: Security configuration has been changed |
110130 | Hardware Configuration | Audit event: Hardware configuration has been changed |
110131 | Software Configuration | Audit event: Software configuration has been changed |
110132 | Use of Restricted Function | Audit event: A use of a restricted function has been attempted |
110133 | Audit Recording Stopped | Audit event: Audit recording has been stopped |
110134 | Audit Recording Started | Audit event: Audit recording has been started |
110135 | Object Security Attributes Changed | Audit event: Security attributes of an object have been changed |
110136 | Security Roles Changed | Audit event: Security roles have been changed |
110137 | User security Attributes Changed | Audit event: Security attributes of a user have been changed |
110138 | Emergency Override Stopped | Audit event: Emergency Override has Stopped |
110139 | Remote Service Operation Started | Audit event: Remote Service Operation has Begun |
110140 | Remote Service Operation Stopped | Audit event: Remote Service Operation has Stopped |
110141 | Local Service Operation Started | Audit event: Local Service Operation has Begun |
110142 | Local Service Operation Stopped | Audit event: Local Service Operation Stopped |
This expansion generated 03 Dec 2015
This value set contains 39 concepts
Code | System | Display |
110120 | http://nema.org/dicom/dicm | Application Start |
110121 | http://nema.org/dicom/dicm | Application Stop |
110122 | http://nema.org/dicom/dicm | Login |
110123 | http://nema.org/dicom/dicm | Logout |
110124 | http://nema.org/dicom/dicm | Attach |
110125 | http://nema.org/dicom/dicm | Detach |
110126 | http://nema.org/dicom/dicm | Node Authentication |
110127 | http://nema.org/dicom/dicm | Emergency Override Started |
110128 | http://nema.org/dicom/dicm | Network Configuration |
110129 | http://nema.org/dicom/dicm | Security Configuration |
110130 | http://nema.org/dicom/dicm | Hardware Configuration |
110131 | http://nema.org/dicom/dicm | Software Configuration |
110132 | http://nema.org/dicom/dicm | Use of Restricted Function |
110133 | http://nema.org/dicom/dicm | Audit Recording Stopped |
110134 | http://nema.org/dicom/dicm | Audit Recording Started |
110135 | http://nema.org/dicom/dicm | Object Security Attributes Changed |
110136 | http://nema.org/dicom/dicm | Security Roles Changed |
110137 | http://nema.org/dicom/dicm | User security Attributes Changed |
110138 | http://nema.org/dicom/dicm | Emergency Override Stopped |
110139 | http://nema.org/dicom/dicm | Remote Service Operation Started |
110140 | http://nema.org/dicom/dicm | Remote Service Operation Stopped |
110141 | http://nema.org/dicom/dicm | Local Service Operation Started |
110142 | http://nema.org/dicom/dicm | Local Service Operation Stopped |
read | http://hl7.org/fhir/restful-interaction | read |
vread | http://hl7.org/fhir/restful-interaction | vread |
update | http://hl7.org/fhir/restful-interaction | update |
delete | http://hl7.org/fhir/restful-interaction | delete |
history | http://hl7.org/fhir/restful-interaction | history |
history-instance | http://hl7.org/fhir/restful-interaction | history-instance |
history-type | http://hl7.org/fhir/restful-interaction | history-type |
history-system | http://hl7.org/fhir/restful-interaction | history-system |
create | http://hl7.org/fhir/restful-interaction | create |
search | http://hl7.org/fhir/restful-interaction | search |
search-type | http://hl7.org/fhir/restful-interaction | search-type |
search-system | http://hl7.org/fhir/restful-interaction | search-system |
validate | http://hl7.org/fhir/restful-interaction | validate |
conformance | http://hl7.org/fhir/restful-interaction | conformance |
transaction | http://hl7.org/fhir/restful-interaction | transaction |
operation | http://hl7.org/fhir/restful-interaction | operation |
See the full registry of value sets defined as part of FHIR.
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |