2nd DSTU Draft For Comment

This page is part of the FHIR Specification (v0.4.0: DSTU 2 Draft). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions

Profile EHRS FM Record Lifecycle Event - Security Event - Definitions

Todo

Definitions for the securityevent-ehrs-rle-ehrsecurityevent Profile.

SecurityEvent(EHRSecurityEvent)
Definition

A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.

Control1..1
Requirements
Comments

Based on ATNA (RFC 3881).

SecurityEvent.id
Definition

The logical id of the resource, as used in the url for the resoure. Once assigned, this value never changes.

Control0..1
Typeid
Requirements
Comments

The only time that a resource does not have an id is when it is being submitted to the server using a create operation. Bundles always have an id, though it is usually a generated UUID.

SecurityEvent.meta
Definition

The metadata about the resource. This is content that is maintained by the infrastructure. Changes to the content may not always be associated with version changes to the resource.

Control0..1
TypeMeta
Requirements
Comments
SecurityEvent.implicitRules
Definition

A reference to a set of rules that were followed when the resource was constructed, and which must be understood when processing the content.

Control0..1
Typeuri
Is Modifiertrue
Requirements
Comments

Asserting this rule set restricts the content to be only understood by a limited set of trading partners. This inherently limits the usefulness of the data in the long term. However the existing health eco-system is highly fractured, and not yet ready to define, collect, and exchange data in a generally computable sense. Wherever possible, implementers and/or specification writers should avoid using this element as much as possible.

SecurityEvent.language
Definition

The base language in which the resource is written.

Control0..1
BindingA human language
The codes SHALL be taken from http://tools.ietf.org/html/bcp47
Typecode
Requirements
Comments

Language is provided to support indexing and accessibility (typically, services such as text to speech use the language tag). The html language tag in the narrative applies to the narrative. The language tag on the resource may be used to specify the language of other presentations generated from the data in the resource

Not all the content has to be in the base language. The Resource.language should not be assumed to apply to the narrative automatically. If a language is specified, it should it also be specified on the div element in the html (see rules in HTML5 for information about the relationship between xml:lang and the html lang attribute).

SecurityEvent.text
Definition

A human-readable narrative that contains a summary of the resource, and may be used to represent the content of the resource to a human. The narrative need not encode all the structured data, but is required to contain sufficient detail to make it "clinically safe" for a human to just read the narrative. Resource definitions may define what content should be represented in the narrative to ensure clinical safety.

Control0..1 This element is affected by the following invariants: dom-1
TypeNarrative
Requirements
Alternate Namesnarrative, html, xhtml, display
Comments

Contained resources do not have narrative. Resources that are not contained SHOULD have a narrative.

SecurityEvent.contained
Definition

These resources do not have an independent existence apart from the resource that contains them - they cannot be identified independently, and nor can they have their own independent transaction scope.

Control0..*
TypeResource
Requirements
Alternate Namesinline resources, anonymous resources, contained resources
Comments

This should never be done when the content can be identified properly, as once identification is lost, it is extremely difficult (and context dependent) to restore it again.

SecurityEvent.extension
Definition

May be used to represent additional information that is not part of the basic definition of the resource. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.modifierExtension
Definition

May be used to represent additional information that is not part of the basic definition of the resource, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.event
Definition

Identifies the name, action type, time, and disposition of the audited event.

Control1..1
Must Supporttrue
Requirements

The event must be identified.

Comments
SecurityEvent.event.id
Definition

unique id for the element within a resource (for internal references).

Control0..1
Typeid
Requirements
Comments
SecurityEvent.event.extension
Definition

May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SlicingThis element introduces a set of slices. The slicing rules are:
  • unordered
  • open
  • discriminators: url
SecurityEvent.event.extension (http://hl7.org/fhir/ExtensionDefinition/securityevent-ehrs-rle-location)
Definition

The phyiscal location of the event (e.g. Building, room, etc.).

Control0..1
TypeResource(Profile = (Profile = http://hl7.org/fhir/Profile/Location))
Requirements
Comments
SecurityEvent.event.extension (http://hl7.org/fhir/ExtensionDefinition/securityevent-ehrs-rle-reason)
Definition

The reason that the activity was taking place.

Control0..1
BindingIndicates the why the event occurred
The codes SHALL be taken from PurposeOfUse; other codes may be used where these codes are not suitable
TypeCodeableConcept
Requirements
Comments
SecurityEvent.event.extension (http://hl7.org/fhir/ExtensionDefinition/securityevent-ehrs-rle-policy)
Definition

Policy or plan the event was defined by. Typically, a single event may have multiple applicable policy documents, such as patient consent, guarantor funding, etc.

Control0..1
Typeuri
Requirements
Comments
SecurityEvent.event.modifierExtension
Definition

May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content, modifiers
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.event.type
Definition

Identifier for a family of the event.

Control1..1
BindingType of event
The codes SHOULD be taken from Audit Event ID; other codes may be used where these codes are not suitable
TypeCodeableConcept
Must Supporttrue
Requirements

This identifies the performed function. For "Execute" Event Action Code audit records, this identifies the application function performed.

Comments

e.g., a menu item, program, rule, policy, function code, application name or URL. It identifies the performed function.

SecurityEvent.event.subtype
Definition

Identifier for the category of event.

Control0..*
BindingSub-type of event
The codes SHOULD be taken from Security Event Sub-Type; other codes may be used where these codes are not suitable
TypeCodeableConcept
Must Supporttrue
Requirements

This field enables queries of messages by implementation-defined event categories.

Comments
SecurityEvent.event.action
Definition

Indicator for type of action performed during the event that generated the audit.

Control0..1
BindingIndicator for type of action performed during the event that generated the audit.
The codes SHALL be taken from SecurityEventAction
Typecode
Must Supporttrue
Requirements

This broadly indicates what kind of action was done on the Participant Object.

Comments
SecurityEvent.event.dateTime
Definition

The time when the event occurred on the source.

Control1..1
Typeinstant
Must Supporttrue
Requirements

This ties an event to a specific date and time. Security audits typically require a consistent time base, e.g., UTC, to eliminate time-zone issues arising from geographical distribution.

Comments

In a distributed system, some sort of common time base, e.g., an NTP [RFC1305] server, is a good implementation tactic.

SecurityEvent.event.outcome
Definition

Indicates whether the event succeeded or failed.

Control0..1
BindingIndicates whether the event succeeded or failed
The codes SHALL be taken from SecurityEventOutcome
Typecode
Requirements
Comments

In some cases a "success" may be partial, for example, an incomplete or interrupted transfer of a radiological study. For the purpose of establishing accountability, these distinctions are not relevant.

SecurityEvent.event.outcomeDesc
Definition

A free text description of the outcome of the event.

Control0..1
Typestring
Requirements
Comments
SecurityEvent.participant
Definition

A person, a hardware device or software process.

Control1..*
Must Supporttrue
Requirements

The event has one or more active participants.

Comments

There may be more than one user per event, for example, in cases of actions initiated by one user for other users, or in events that involve more than one user, hardware device, or system process. However, only one user may be the initiator/requestor for the event.

InvariantsDefined on this element
sev-3: Either a userId or a reference, but not both (xpath: exists(f:userId) != exists(f:reference))
SecurityEvent.participant.id
Definition

unique id for the element within a resource (for internal references).

Control0..1
Typeid
Requirements
Comments
SecurityEvent.participant.extension
Definition

May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.participant.modifierExtension
Definition

May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content, modifiers
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.participant.role
Definition

Specification of the role(s) the user plays when performing the event. Usually the codes used in this element are local codes defined by the role-based access control security system used in the local context.

Control0..*
BindingRole(s) the user plays (from RBAC)
The codes SHOULD be taken from Audit Active Participant Role ID Code; other codes may be used where these codes are not suitable
TypeCodeableConcept
Must Supporttrue
Requirements

This value ties an audited event to a user's role(s). It is an optional value that might be used to group events for analysis by user functional role categories.

Comments
SecurityEvent.participant.reference
Definition

Direct reference to a resource that identifies the participant.

Control0..1 This element is affected by the following invariants: sev-3
TypeChoice of: Reference(Profile = (Profile = http://hl7.org/fhir/Profile/Practitioner)), Reference(Profile = (Profile = http://hl7.org/fhir/Profile/Patient)), Reference(Profile = (Profile = http://hl7.org/fhir/Profile/Device))
Must Supporttrue
Requirements

This field ties an audit event to a specific resource.

Comments
SecurityEvent.participant.userId
Definition

Unique identifier for the user actively participating in the event.

Control0..1 This element is affected by the following invariants: sev-3
Typestring
Must Supporttrue
Requirements

This field ties an audit event to a specific user.

Comments

a unique value within the Audit Source ID. For node-based authentication -- where only the system hardware or process, but not a human user, is identified -- User ID would be the node name.

SecurityEvent.participant.altId
Definition

Alternative Participant Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g., single sign-on), if available.

Control0..1
Typestring
Requirements

In some situations a human user may authenticate with one identity but, to access a specific application system, may use a synonymous identify. For example, some "single sign on" implementations will do this. The alternative identifier would then be the original identify used for authentication, and the User ID is the one known to and used by the application.

Comments
SecurityEvent.participant.name
Definition

Human-meaningful name for the user.

Control0..1
Typestring
Requirements

The User ID and Authorization User ID may be internal or otherwise obscure values. This field assists the auditor in identifying the actual user.

Comments
SecurityEvent.participant.requestor
Definition

Indicator that the user is or is not the requestor, or initiator, for the event being audited.

Control1..1
Typeboolean
Must Supporttrue
Requirements

This value is used to distinguish between requestor-users and recipient-users. For example, one person may initiate a report-output to be sent to another user.

Comments

There can only be one initiator. If the initiator is not clear, then do not choose any one participant as the initiator.

SecurityEvent.participant.media
Definition

Type of media involved. Used when the event is about exporting/importing onto media.

Control0..1
TypeCoding
Requirements

Usually, this is used instead of specifying a network address. This field is not used for Media Id (i.e. the serial number of a CD).

Comments
SecurityEvent.participant.network
Definition

Logical network location for application activity, if the activity has a network location.

Control0..1
Must Supporttrue
Requirements
Comments
SecurityEvent.participant.network.id
Definition

unique id for the element within a resource (for internal references).

Control0..1
Typeid
Requirements
Comments
SecurityEvent.participant.network.extension
Definition

May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.participant.network.modifierExtension
Definition

May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content, modifiers
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.participant.network.identifier
Definition

An identifier for the network access point of the user device for the audit event.

Control0..1
Typestring
Must Supporttrue
Requirements

This datum identifies the user's network access point, which may be distinct from the server that performed the action. It is an optional value that may be used to group events recorded on separate servers for analysis of a specific network access point's data access across all servers.

Comments

This could be a device id, IP address or some other identifier associated with a device.

SecurityEvent.participant.network.type
Definition

An identifier for the type of network access point that originated the audit event.

Control0..1
BindingThe type of network access point that originated the audit event
The codes SHALL be taken from SecurityEventParticipantNetworkType
Typecode
Must Supporttrue
Requirements

This datum identifies the type of network access point identifier of the user device for the audit event. It is an optional value that may be used to group events recorded on separate servers for analysis of access according to a network access point's type.

Comments
SecurityEvent.source
Definition

Application systems and processes.

Control1..1
Must Supporttrue
Requirements

The event is reported by one source.

Comments

Since multi-tier, distributed, or composite applications make source identification ambiguous, this collection of fields may repeat for each application or process actively involved in the event. For example, multiple value-sets can identify participating web servers, application processes, and database server threads in an n-tier distributed application. Passive event participants, e.g., low-level network transports, need not be identified.

SecurityEvent.source.id
Definition

unique id for the element within a resource (for internal references).

Control0..1
Typeid
Requirements
Comments
SecurityEvent.source.extension
Definition

May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.source.modifierExtension
Definition

May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content, modifiers
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.source.site
Definition

Logical source location within the healthcare enterprise network.

Control0..1
Typestring
Must Supporttrue
Requirements

This value differentiates among the sites in a multi-site enterprise health information system.

Comments

a hospital or other provider location within a multi-entity provider group.

SecurityEvent.source.identifier
Definition

Identifier of the source where the event originated.

Control1..1
Typestring
Must Supporttrue
Requirements

This field ties the event to a specific source system. It may be used to group events for analysis according to where the event occurred.

Comments
SecurityEvent.source.type
Definition

Code specifying the type of source where event originated.

Control1..1
BindingCode specifying the type of source where event originated
The codes SHOULD be taken from Security Event Source Type; other codes may be used where these codes are not suitable
TypeCoding
Must Supporttrue
Requirements

This field indicates which type of source is identified by the Audit Source ID. It is an optional value that may be used to group events for analysis according to the type of source where the event occurred.

Comments
SecurityEvent.object
Definition

Specific instances of data or objects that have been accessed.

Control0..*
Must Supporttrue
Requirements

The event may have other objects involved.

Comments

required unless the values for Event Identification, Active Participant Identification, and Audit Source Identification are sufficient to document the entire auditable event. Because events may have more than one participant object, this group can be a repeating set of values.

InvariantsDefined on this element
sev-1: Either a name or a query (or both) (xpath: not(exists(f:name)) or not(exists(f:query)))
sev-2: Either an identifier or a reference, but not both (xpath: exists(f:identifier) != exists(f:reference))
SecurityEvent.object.id
Definition

unique id for the element within a resource (for internal references).

Control0..1
Typeid
Requirements
Comments
SecurityEvent.object.extension
Definition

May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.object.modifierExtension
Definition

May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content, modifiers
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.object.identifier
Definition

Identifies a specific instance of the participant object. The reference should always be version specific.

Control0..1 This element is affected by the following invariants: sev-2
TypeIdentifier
Must Supporttrue
Requirements
Comments

Identifier details depends on object type.

SecurityEvent.object.reference
Definition

Identifies a specific instance of the participant object. The reference should always be version specific.

Control0..1 This element is affected by the following invariants: sev-2
TypeReference(Profile = http://hl7.org/fhir/Profile/Any)
Must Supporttrue
Requirements
Comments
SecurityEvent.object.type
Definition

Object type being audited.

Control0..1
BindingCode for the participant object type being audited
The codes SHALL be taken from SecurityEventObjectType
Typecode
Must Supporttrue
Requirements

To describe the object being acted upon. In addition to queries on the subject of the action in an auditable event, it is also important to be able to query on the object type for the action.

Comments

This value is distinct from the user's role or any user relationship to the participant object.

SecurityEvent.object.role
Definition

Code representing the functional application role of Participant Object being audited.

Control0..1
BindingCode representing the functional application role of Participant Object being audited
The codes SHALL be taken from SecurityEventObjectRole
Typecode
Must Supporttrue
Requirements

For some detailed audit analysis it may be necessary to indicate a more granular type of participant, based on the application role it serves.

Comments

See RFC 3881 for rules concerning matches between role and type.

SecurityEvent.object.lifecycle
Definition

Identifier for the data life-cycle stage for the participant object.

Control0..1
BindingIdentifier for the data life-cycle stage for the participant object
The codes SHALL be taken from SecurityEventObjectLifecycle
Typecode
Must Supporttrue
Requirements

Institutional policies for privacy and security may optionally fall under different accountability rules based on data life cycle. This provides a differentiating value for those cases.

Comments

This can be used to provide an audit trail for data, over time, as it passes through the system.

SecurityEvent.object.sensitivity
Definition

Denotes policy-defined sensitivity for the Participant Object ID such as VIP, HIV status, mental health status or similar topics.

Control0..1
BindingThe sensitivity of an object in a security event resource. May also encompass confidentiality and rudimentary access control
For example codes, see Security Event Object Sensitivity
TypeCodeableConcept
Must Supporttrue
Requirements

This field identifies a specific instance of an object, such as a patient, to detect/track privacy and security issues.

Comments

Values from ATNA are institution- and implementation-defined text strings (in sensitivity.text). HL7 defines confidentiality codes for records, documents etc. that can also be used here.

SecurityEvent.object.name
Definition

An instance-specific descriptor of the Participant Object ID audited, such as a person's name.

Control0..1 This element is affected by the following invariants: sev-1
Typestring
Requirements
Comments

This field may be used in a query/report to identify audit events for a specific person, e.g., where multiple synonymous Participant Object IDs (patient number, medical record number, encounter number, etc.) have been used.

SecurityEvent.object.description
Definition

Text that describes the object in more detail.

Control0..1
Typestring
Requirements
Comments
SecurityEvent.object.query
Definition

The actual query for a query-type participant object.

Control0..1 This element is affected by the following invariants: sev-1
Typebase64Binary
Requirements

For query events it may be necessary to capture the actual query input to the query process in order to identify the specific event. Because of differences among query implementations and data encoding for them, this is a base 64 encoded data blob. It may be subsequently decoded or interpreted by downstream audit analysis processing.

Comments
SecurityEvent.object.detail
Definition

Additional Information about the Object.

Control0..*
Requirements
Comments
SecurityEvent.object.detail.id
Definition

unique id for the element within a resource (for internal references).

Control0..1
Typeid
Requirements
Comments
SecurityEvent.object.detail.extension
Definition

May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.object.detail.modifierExtension
Definition

May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.

Control0..*
TypeExtension
Requirements
Alternate Namesextensions, user content, modifiers
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SecurityEvent.object.detail.type
Definition

Name of the property.

Control1..1
Typestring
Requirements
Comments
SecurityEvent.object.detail.value
Definition

Property value.

Control1..1
Typebase64Binary
Requirements
Comments