Release 5 Preview #1

This page is part of the FHIR Specification (v4.2.0: R5 Preview #1). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R4 R3 R2

V3-x_BasicConfidentialityKind.xml

Vocabulary Work GroupMaturity Level: N/AStandards Status: Informative

Raw XML (canonical form + also see XML Format Specification)

Description: Used to enumerate the typical confidentiality constraints placed upon a clinical document. Usage Note: x_BasicConfidentialityKind is a subset of Confidentiality codes that are used as metadata indicating the receiver responsibility to comply with normally applicable jurisdictional privacy law or disclosure authorization; that the receiver may not disclose this information except as directed by the information custodian, who may be the information subject; or that the receiver may not disclose this information except as directed by the information custodian, who may be the information subject.

<?xml version="1.0" encoding="UTF-8"?>

<ValueSet xmlns="http://hl7.org/fhir">
  <id value="v3-xBasicConfidentialityKind"/> 
  <meta> 
    <lastUpdated value="2019-12-31T21:03:40.621+11:00"/> 
    <profile value="http://hl7.org/fhir/StructureDefinition/shareablevalueset"/> 
  </meta> 
  <text> 
    <status value="generated"/> 
    <div xmlns="http://www.w3.org/1999/xhtml">
      <h2> V3 Value Setx_BasicConfidentialityKind</h2> 
      <div> 
        <p> Description:
Used to enumerate the typical confidentiality constraints placed upon a clinical document.
              Usage Note:
x_BasicConfidentialityKind is a subset of Confidentiality codes that are used as metadata
             indicating the receiver responsibility to comply with normally applicable jurisdictional
             privacy law or disclosure authorization; that the receiver may not disclose this information
             except as directed by the information custodian, who may be the information subject; or
             that the receiver may not disclose this information except as directed by the information
             custodian, who may be the information subject.</p> 

      </div> 
      <p> This value set includes codes from the following code systems:</p> 
      <ul> 
        <li> Include these codes as defined in 
          <a href="../../v3/Confidentiality/cs.html">
            <code> http://terminology.hl7.org/CodeSystem/v3-Confidentiality</code> 
          </a> 
          <table class="none">
            <tr> 
              <td style="white-space:nowrap">
                <b> Code</b> 
              </td> 
              <td> 
                <b> Display</b> 
              </td> 
            </tr> 
            <tr> 
              <td> 
                <a href="../../v3/Confidentiality/cs.html#v3-Confidentiality-N">N</a> 
              </td> 
              <td> normal</td> 
              <td> Privacy metadata indicating the level of protection required to safeguard personal and
                   healthcare information, which if disclosed without authorization, would present a considerable
                   risk of harm to an individual's reputation and sense of privacy.
                <br/>  
                        
                           Usage Note: The level of protection afforded normatively confidential
                   information is dictated by the prevailing normative privacy policies, which are intended
                   to engender patient trust in their healthcare providers.
                <br/>  
                        Privacy policies mandating normative levels of protection, which
                   preempt less protective privacy policies when the information is used in the delivery
                   and management of healthcare. May be pre-empted by jurisdictional law (e.g., for public
                   health reporting or emergency treatment).
                <br/>  
                        Confidentiality code total order hierarchy: Normal (N) is less
                   protective than V and R, and subsumes all other protection levels (i.e., M, L, and U).
                <br/>  
                        
                           Map:Partial Map to ISO 13606-4 Sensitivity Level (3) Clinical
                   Care when purpose of use is treatment: Default for normal clinical care access (i.e.,
                   most clinical staff directly caring for the patient should be able to access nearly all
                   of the EHR). Maps to normal confidentiality for treatment information but not to ancillary
                   care, payment and operations. 
                <br/>  
                        
                           Examples: 
                        
                <br/>  n the US, this includes what HIPAA identifies as protected health information (PHI) under
                   45 CFR Section 160.103.
              </td> 
            </tr> 
            <tr> 
              <td> 
                <a href="../../v3/Confidentiality/cs.html#v3-Confidentiality-R">R</a> 
              </td> 
              <td> restricted</td> 
              <td> Privacy metadata indicating the level of protection required to safeguard potentially
                   stigmatizing information, which if disclosed without authorization, would present a high
                   risk of harm to an individual's reputation and sense of privacy.
                <br/>  
                        
                           Usage Note: The level of protection afforded restricted confidential
                   information is dictated by specially protective organizational or jurisdictional privacy
                   policies, including at an authorized individual’s request, intended to engender patient
                   trust in providers of sensitive services.
                <br/>  
                        Privacy policies mandating additional levels of protection by
                   restricting information access preempt less protective privacy policies when the information
                   is used in the delivery and management of healthcare. May be pre-empted by jurisdictional
                   law (e.g., for public health reporting or emergency treatment).
                <br/>  
                        Confidentiality code total order hierarchy: Restricted (R) is
                   less protective than V, and subsumes all other protection levels (i.e., N, M, L, and U).
                <br/>  
                        
                           Examples: 
                        
                <br/>  Includes information that is additionally protected such as sensitive conditions mental
                   health, HIV, substance abuse, domestic violence, child abuse, genetic disease, and reproductive
                   health; or sensitive demographic information such as a patient’s standing as an employee
                   or a celebrity. May be used to indicate proprietary or classified information that is
                   not related to an individual (e.g., secret ingredients in a therapeutic substance; or
                   the name of a manufacturer).
              </td> 
            </tr> 
            <tr> 
              <td> 
                <a href="../../v3/Confidentiality/cs.html#v3-Confidentiality-V">V</a> 
              </td> 
              <td> very restricted</td> 
              <td> Privacy metadata indicating the level of protection required under atypical cicumstances
                   to safeguard potentially damaging or harmful information, which if disclosed without authorization,
                   would (1) present an extremely high risk of harm to an individual's reputation, sense
                   of privacy, and possibly safety; or (2) impact an individual's or organization's legal
                   matters.
                <br/>  
                        
                           Usage Note: The level of protection afforded very restricted
                   confidential information is dictated by specially protective privacy or legal policies
                   intended to ensure that under atypical circumstances additional protections limit access
                   to only those with a high 'need to know' and the information is kept in highest confidence..
                <br/>  
                        Privacy and legal policies mandating the highest level of protection
                   by stringently restricting information access, preempt less protective privacy policies
                   when the information is used in the delivery and management of healthcare including legal
                   proceedings related to healthcare. May be pre-empted by jurisdictional law (e.g., for
                   public health reporting or emergency treatment but only under limited circumstances).
                <br/>  
                        Confidentiality code total order hierarchy: Very Restricted (V)
                   is the highest protection level and subsumes all other protection levels s (i.e., R, N,
                   M, L, and UI).
                <br/>  
                        
                           Examples: 
                        
                <br/>  Includes information about a victim of abuse, patient requested information sensitivity,
                   and taboo subjects relating to health status that must be discussed with the patient by
                   an attending provider before sharing with the patient. May also include information held
                   under a legal hold or attorney-client privilege.
              </td> 
            </tr> 
          </table> 
        </li> 
      </ul> 
    </div> 
  </text> 
  <extension url="http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status">
    <valueCode value="external"/> 
  </extension> 
  <extension url="http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm">
    <valueInteger value="0"/> 
  </extension> 
  <url value="http://terminology.hl7.org/ValueSet/v3-xBasicConfidentialityKind"/> 
  <identifier> 
    <system value="urn:ietf:rfc:3986"/> 
    <value value="urn:oid:2.16.840.1.113883.1.11.16926"/> 
  </identifier> 
  <version value="2014-03-26"/> 
  <name value="v3.x_BasicConfidentialityKind"/> 
  <title value="V3 Value Setx_BasicConfidentialityKind"/> 
  <status value="active"/> 
  <experimental value="false"/> 
  <publisher value="HL7 v3"/> 
  <contact> 
    <telecom> 
      <system value="url"/> 
      <value value="http://www.hl7.org"/> 
    </telecom> 
  </contact> 
  <description value="  Description:
Used to enumerate the typical confidentiality constraints placed upon a clinical document.
      Usage Note:
x_BasicConfidentialityKind is a subset of Confidentiality codes that are used as metadata
     indicating the receiver responsibility to comply with normally applicable jurisdictional
     privacy law or disclosure authorization; that the receiver may not disclose this information
     except as directed by the information custodian, who may be the information subject; or
     that the receiver may not disclose this information except as directed by the information
     custodian, who may be the information subject."/> 
  <immutable value="false"/> 
  <compose> 
    <include> 
      <system value="http://terminology.hl7.org/CodeSystem/v3-Confidentiality"/> 
      <concept> 
        <code value="N"/> 
      </concept> 
      <concept> 
        <code value="R"/> 
      </concept> 
      <concept> 
        <code value="V"/> 
      </concept> 
    </include> 
  </compose> 
</ValueSet> 

Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.