This page is part of the FHIR Specification (v1.6.0: STU 3 Ballot 4). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions
. Page versions: R5 R4B R4 R3 R2

This is a value set defined by the FHIR project.
Summary
| Defining URL: | http://hl7.org/fhir/ValueSet/audit-event-sub-type |
| Name: | Audit Event Sub-Type |
| Definition: | More detailed code concerning the type of the audit event - defined by DICOM with some FHIR specific additions. |
| Committee: | Security Work Group |
| OID: | 2.16.840.1.113883.4.642.2.270 (for OID based terminology systems) |
| Copyright: | These codes are excerpted from Digital Imaging and Communications in Medicine (DICOM) Standard, Part 16: Content Mapping Resource, Copyright © 2011 by the National Electrical Manufacturers Association. |
| Source Resource | XML / JSON |
This value set is used in the following places:

This value set includes codes from the following code systems:
| Code | Display | |
| 110120 | Application Start | Audit event: Application Entity has started |
| 110121 | Application Stop | Audit event: Application Entity has stopped |
| 110122 | Login | Audit event: User login has been attempted |
| 110123 | Logout | Audit event: User logout has been attempted |
| 110124 | Attach | Audit event: Node has been attached |
| 110125 | Detach | Audit event: Node has been detached |
| 110126 | Node Authentication | Audit event: Node Authentication has been attempted |
| 110127 | Emergency Override Started | Audit event: Emergency Override has started |
| 110128 | Network Configuration | Audit event: Network configuration has been changed |
| 110129 | Security Configuration | Audit event: Security configuration has been changed |
| 110130 | Hardware Configuration | Audit event: Hardware configuration has been changed |
| 110131 | Software Configuration | Audit event: Software configuration has been changed |
| 110132 | Use of Restricted Function | Audit event: A use of a restricted function has been attempted |
| 110133 | Audit Recording Stopped | Audit event: Audit recording has been stopped |
| 110134 | Audit Recording Started | Audit event: Audit recording has been started |
| 110135 | Object Security Attributes Changed | Audit event: Security attributes of an object have been changed |
| 110136 | Security Roles Changed | Audit event: Security roles have been changed |
| 110137 | User security Attributes Changed | Audit event: Security attributes of a user have been changed |
| 110138 | Emergency Override Stopped | Audit event: Emergency Override has Stopped |
| 110139 | Remote Service Operation Started | Audit event: Remote Service Operation has Begun |
| 110140 | Remote Service Operation Stopped | Audit event: Remote Service Operation has Stopped |
| 110141 | Local Service Operation Started | Audit event: Local Service Operation has Begun |
| 110142 | Local Service Operation Stopped | Audit event: Local Service Operation Stopped |

This expansion generated 11 Aug 2016
This value set contains 39 concepts
| Code | System | Display | Definition |
| 110120 | http://nema.org/dicom/dicm | Application Start | Audit event: Application Entity has started |
| 110121 | http://nema.org/dicom/dicm | Application Stop | Audit event: Application Entity has stopped |
| 110122 | http://nema.org/dicom/dicm | Login | Audit event: User login has been attempted |
| 110123 | http://nema.org/dicom/dicm | Logout | Audit event: User logout has been attempted |
| 110124 | http://nema.org/dicom/dicm | Attach | Audit event: Node has been attached |
| 110125 | http://nema.org/dicom/dicm | Detach | Audit event: Node has been detached |
| 110126 | http://nema.org/dicom/dicm | Node Authentication | Audit event: Node Authentication has been attempted |
| 110127 | http://nema.org/dicom/dicm | Emergency Override Started | Audit event: Emergency Override has started |
| 110128 | http://nema.org/dicom/dicm | Network Configuration | Audit event: Network configuration has been changed |
| 110129 | http://nema.org/dicom/dicm | Security Configuration | Audit event: Security configuration has been changed |
| 110130 | http://nema.org/dicom/dicm | Hardware Configuration | Audit event: Hardware configuration has been changed |
| 110131 | http://nema.org/dicom/dicm | Software Configuration | Audit event: Software configuration has been changed |
| 110132 | http://nema.org/dicom/dicm | Use of Restricted Function | Audit event: A use of a restricted function has been attempted |
| 110133 | http://nema.org/dicom/dicm | Audit Recording Stopped | Audit event: Audit recording has been stopped |
| 110134 | http://nema.org/dicom/dicm | Audit Recording Started | Audit event: Audit recording has been started |
| 110135 | http://nema.org/dicom/dicm | Object Security Attributes Changed | Audit event: Security attributes of an object have been changed |
| 110136 | http://nema.org/dicom/dicm | Security Roles Changed | Audit event: Security roles have been changed |
| 110137 | http://nema.org/dicom/dicm | User security Attributes Changed | Audit event: Security attributes of a user have been changed |
| 110138 | http://nema.org/dicom/dicm | Emergency Override Stopped | Audit event: Emergency Override has Stopped |
| 110139 | http://nema.org/dicom/dicm | Remote Service Operation Started | Audit event: Remote Service Operation has Begun |
| 110140 | http://nema.org/dicom/dicm | Remote Service Operation Stopped | Audit event: Remote Service Operation has Stopped |
| 110141 | http://nema.org/dicom/dicm | Local Service Operation Started | Audit event: Local Service Operation has Begun |
| 110142 | http://nema.org/dicom/dicm | Local Service Operation Stopped | Audit event: Local Service Operation Stopped |
| read | http://hl7.org/fhir/restful-interaction | read | Read the current state of the resource. |
| vread | http://hl7.org/fhir/restful-interaction | vread | Read the state of a specific version of the resource. |
| update | http://hl7.org/fhir/restful-interaction | update | Update an existing resource by its id (or create it if it is new). |
| delete | http://hl7.org/fhir/restful-interaction | delete | Delete a resource. |
| history | http://hl7.org/fhir/restful-interaction | history | Retrieve the change history for a particular resource, type of resource, or the entire system. |
| history-instance | http://hl7.org/fhir/restful-interaction | history-instance | Retrieve the change history for a particular resource. |
| history-type | http://hl7.org/fhir/restful-interaction | history-type | Retrieve the change history for a all resources of a particular type. |
| history-system | http://hl7.org/fhir/restful-interaction | history-system | Retrieve the change history for all resources on a system. |
| create | http://hl7.org/fhir/restful-interaction | create | Create a new resource with a server assigned id. |
| search | http://hl7.org/fhir/restful-interaction | search | Search a resource type or all resources based on some filter criteria. |
| search-type | http://hl7.org/fhir/restful-interaction | search-type | Search all resources of the specified type based on some filter criteria. |
| search-system | http://hl7.org/fhir/restful-interaction | search-system | Search all resources based on some filter criteria. |
| conformance | http://hl7.org/fhir/restful-interaction | conformance | Get a conformance statement for the system. |
| transaction | http://hl7.org/fhir/restful-interaction | transaction | Update, create or delete a set of resources as a single transaction. |
| batch | http://hl7.org/fhir/restful-interaction | batch | perform a set of a separate interactions in a single http operation |
| operation | http://hl7.org/fhir/restful-interaction | operation | Perform an operation as defined by an OperationDefinition. |
See the full registry of value sets defined as part of FHIR.
Explanation of the columns that may appear on this page:
| Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
| Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
| Code | The code (used as the code in the resource instance) |
| Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
| Definition | An explanation of the meaning of the concept |
| Comments | Additional notes about how to use the code |