DSTU2 QA Preview

This page is part of the FHIR Specification (v1.0.0: DSTU 2 Ballot 3). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R4 R3 R2

V3\SecurityPolicy\v3-SecurityPolicy.json

Raw JSON (canonical form)

Types of security policies that further specify the ActClassPolicy value set. Examples: encrypt prohibit redisclosure without consent directive

{
  "resourceType": "ValueSet",
  "id": "v3-SecurityPolicy",
  "meta": {
    "lastUpdated": "2015-09-01T14:38:48.206+10:00",
    "profile": [
      "http://hl7.org/fhir/StructureDefinition/valueset-shareable-definition"
    ]
  },
  "text": {
    "status": "generated",
    "div": "<div>!-- Snipped for Brevity --></div>"
  },
  "extension": [
    {
      "url": "http://hl7.org/fhir/StructureDefinition/valueset-oid",
      "valueUri": "urn:oid:2.16.840.1.113883.1.11.20444"
    }
  ],
  "url": "http://hl7.org/fhir/ValueSet/v3-SecurityPolicy",
  "version": "2014-03-26",
  "name": "SecurityPolicy",
  "status": "active",
  "experimental": false,
  "publisher": "HL7 v3",
  "contact": [
    {
      "telecom": [
        {
          "system": "other",
          "value": "http://www.hl7.org"
        }
      ]
    }
  ],
  "description": " Types of security policies that further specify the ActClassPolicy value set.  Examples:\r\n  encrypt prohibit redisclosure without consent directive",
  "compose": {
    "include": [
      {
        "system": "http://hl7.org/fhir/v3/ActCode",
        "filter": [
          {
            "property": "concept",
            "op": "is-a",
            "value": "SecurityPolicy"
          }
        ]
      }
    ]
  }
}

Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.