Release 5 Preview #2

This page is part of the FHIR Specification (v4.4.0: R5 Preview #2). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R4 R3

4.4.2.4 HL7 v3 Value Set ActCode

Vocabulary Work Group Maturity Level: 1Draft Use Context: Any

This value set (http://terminology.hl7.org/ValueSet/v3-ActCode) is defined as part of HL7 v3.

Summary

Defining URL:http://terminology.hl7.org/ValueSet/v3-ActCode
Version:2019-07-31
Name:v3.ActCode
Title:v3 Code System ActCode
Definition:

A code specifying the particular kind of Act that the Act-instance represents within its class. Constraints: The kind of Act (e.g. physical examination, serum potassium, inpatient encounter, charge financial transaction, etc.) is specified with a code from one of several, typically external, coding systems. The coding system will depend on the class of Act, such as LOINC for observations, etc. Conceptually, the Act.code must be a specialization of the Act.classCode. This is why the structure of ActClass domain should be reflected in the superstructure of the ActCode domain and then individual codes or externally referenced vocabularies subordinated under these domains that reflect the ActClass structure. Act.classCode and Act.code are not modifiers of each other but the Act.code concept should really imply the Act.classCode concept. For a negative example, it is not appropriate to use an Act.code "potassium" together with and Act.classCode for "laboratory observation" to somehow mean "potassium laboratory observation" and then use the same Act.code for "potassium" together with Act.classCode for "medication" to mean "substitution of potassium". This mutually modifying use of Act.code and Act.classCode is not permitted.

OID: (for OID based terminology systems)
Source ResourceXML / JSON

This value set is used in the following places:


 

This expansion generated 03 May 2020


This value set contains 1066 concepts

Expansion based on v3 Code System ActCode v2019-07-31 (CodeSystem)

All codes from system http://terminology.hl7.org/CodeSystem/v3-ActCode

LvlCodeDisplayLogical Definition (CLD)
0_ActAccountCodeActAccountCodeAn account represents a grouping of financial transactions that are tracked and reported together with a single balance. Examples of account codes (types) are Patient billing accounts (collection of charges), Cost centers; Cash.
1  ACCTRECEIVABLEaccount receivableAn account for collecting charges, reversals, adjustments and payments, including deductibles, copayments, coinsurance (financial transactions) credited or debited to the account receivable account for a patient's encounter.
1  CASHCashCash
1  CCcredit cardDescription: Types of advance payment to be made on a plastic card usually issued by a financial institution used of purchasing services and/or products.
2    AEAmerican ExpressAmerican Express
2    DNDiner's ClubDiner's Club
2    DVDiscover CardDiscover Card
2    MCMaster CardMaster Card
2    VVisaVisa
1  PBILLACCTpatient billing accountAn account representing charges and credits (financial transactions) for a patient's encounter.
0_ActAdjudicationCodeActAdjudicationCodeIncludes coded responses that will occur as a result of the adjudication of an electronic invoice at a summary level and provides guidance on interpretation of the referenced adjudication results.
1  _ActAdjudicationGroupCodeActAdjudicationGroupCodeCatagorization of grouping criteria for the associated transactions and/or summary (totals, subtotals).
2    CONTcontractTransaction counts and value totals by Contract Identifier.
2    DAYdayTransaction counts and value totals for each calendar day within the date range specified.
2    LOClocationTransaction counts and value totals by service location (e.g clinic).
2    MONTHmonthTransaction counts and value totals for each calendar month within the date range specified.
2    PERIODperiodTransaction counts and value totals for the date range specified.
2    PROVproviderTransaction counts and value totals by Provider Identifier.
2    WEEKweekTransaction counts and value totals for each calendar week within the date range specified.
2    YEARyearTransaction counts and value totals for each calendar year within the date range specified.
1  AAadjudicated with adjustmentsThe invoice element has been accepted for payment but one or more adjustment(s) have been made to one or more invoice element line items (component charges). Also includes the concept 'Adjudicate as zero' and items not covered under a particular Policy. Invoice element can be reversed (nullified). Recommend that the invoice element is saved for DUR (Drug Utilization Reporting).
2    ANFadjudicated with adjustments and no financial impactThe invoice element has been accepted for payment but one or more adjustment(s) have been made to one or more invoice element line items (component charges) without changing the amount. Invoice element can be reversed (nullified). Recommend that the invoice element is saved for DUR (Drug Utilization Reporting).
1  ARadjudicated as refusedThe invoice element has passed through the adjudication process but payment is refused due to one or more reasons. Includes items such as patient not covered, or invoice element is not constructed according to payer rules (e.g. 'invoice submitted too late'). If one invoice element line item in the invoice element structure is rejected, the remaining line items may not be adjudicated and the complete group is treated as rejected. A refused invoice element can be forwarded to the next payer (for Coordination of Benefits) or modified and resubmitted to refusing payer. Invoice element cannot be reversed (nullified) as there is nothing to reverse. Recommend that the invoice element is not saved for DUR (Drug Utilization Reporting).
1  ASadjudicated as submittedThe invoice element was/will be paid exactly as submitted, without financial adjustment(s). If the dollar amount stays the same, but the billing codes have been amended or financial adjustments have been applied through the adjudication process, the invoice element is treated as "Adjudicated with Adjustment". If information items are included in the adjudication results that do not affect the monetary amounts paid, then this is still Adjudicated as Submitted (e.g. 'reached Plan Maximum on this Claim'). Invoice element can be reversed (nullified). Recommend that the invoice element is saved for DUR (Drug Utilization Reporting).
0_ActAdjudicationResultActionCodeActAdjudicationResultActionCodeActions to be carried out by the recipient of the Adjudication Result information.
1  DISPLAYDisplayThe adjudication result associated is to be displayed to the receiver of the adjudication result.
1  FORMPrint on FormThe adjudication result associated is to be printed on the specified form, which is then provided to the covered party.
0_ActBillableModifierCodeActBillableModifierCodeDefinition:An identifying modifier code for healthcare interventions or procedures.
1  CPTMCPT modifier codesDescription:CPT modifier codes are found in Appendix A of CPT 2000 Standard Edition.
1  HCPCSAHCPCS Level II and Carrier-assignedDescription:HCPCS Level II (HCFA-assigned) and Carrier-assigned (Level III) modifiers are reported in Appendix A of CPT 2000 Standard Edition and in the Medicare Bulletin.
0_ActBillingArrangementCodeActBillingArrangementCodeThe type of provision(s) made for reimbursing for the deliver of healthcare services and/or goods provided by a Provider, over a specified period.
1  BLKblock fundingA billing arrangement where a Provider charges a lump sum to provide a prescribed group (volume) of services to a single patient which occur over a period of time. Services included in the block may vary. This billing arrangement is also known as Program of Care for some specific Payors and Program Fees for other Payors.
1  CAPcapitation fundingA billing arrangement where the payment made to a Provider is determined by analyzing one or more demographic attributes about the persons/patients who are enrolled with the Provider (in their practice).
1  CONTFcontract fundingA billing arrangement where a Provider charges a lump sum to provide a particular volume of one or more interventions/procedures or groups of interventions/procedures.
1  FINBILLfinancialA billing arrangement where a Provider charges for non-clinical items. This includes interest in arrears, mileage, etc. Clinical content is not included in Invoices submitted with this type of billing arrangement.
1  ROSTroster fundingA billing arrangement where funding is based on a list of individuals registered as patients of the Provider.
1  SESSsessional fundingA billing arrangement where a Provider charges a sum to provide a group (volume) of interventions/procedures to one or more patients within a defined period of time, typically on the same date. Interventions/procedures included in the session may vary.
1  FFSfee for serviceA billing arrangement where a Provider charges a separate fee for each intervention/procedure/event or product. Fee for Service is used when an individual intervention/procedure/event is used for billing purposes. In other words, fees are associated with the intervention/procedure/event. For example, a specific CCI (Canadian Classification of Interventions) code has an associated fee and is used for billing purposes.
2    FFPSfirst fill, part fill, partial strengthA first fill where the quantity supplied is less than one full repetition of the ordered amount. (e.g. If the order was 90 tablets, 3 refills, a partial fill might be for only 30 tablets.) and also where the strength supplied is less than the ordered strength (e.g. 10mg for an order of 50mg where a subsequent fill will dispense 40mg tablets)
2    FFCSfirst fill complete, partial strengthA first fill where the quantity supplied is equal to one full repetition of the ordered amount. (e.g. If the order was 90 tablets, 3 refills, a complete fill would be for the full 90 tablets) and also where the strength supplied is less than the ordered strength (e.g. 10mg for an order of 50mg where a subsequent fill will dispense 40mg tablets).
2    TFStrial fill partial strengthA fill where a small portion is provided to allow for determination of the therapy effectiveness and patient tolerance and also where the strength supplied is less than the ordered strength (e.g. 10mg for an order of 50mg where a subsequent fill will dispense 40mg tablets).
0_ActBoundedROICodeActBoundedROICodeType of bounded ROI.
1  ROIFSfully specified ROIA fully specified bounded Region of Interest (ROI) delineates a ROI in which only those dimensions participate that are specified by boundary criteria, whereas all other dimensions are excluded. For example a ROI to mark an episode of "ST elevation" in a subset of the EKG leads V2, V3, and V4 would include 4 boundaries, one each for time, V2, V3, and V4.
1  ROIPSpartially specified ROIA partially specified bounded Region of Interest (ROI) specifies a ROI in which at least all values in the dimensions specified by the boundary criteria participate. For example, if an episode of ventricular fibrillations (VFib) is observed, it usually doesn't make sense to exclude any EKG leads from the observation and the partially specified ROI would contain only one boundary for time indicating the time interval where VFib was observed.
0_ActCareProvisionCodeact care provisionDescription:The type and scope of responsibility taken-on by the performer of the Act for a specific subject of care.
1  _ActCredentialedCareCodeact credentialed careDescription:The type and scope of legal and/or professional responsibility taken-on by the performer of the Act for a specific subject of care as described by a credentialing agency, i.e. government or non-government agency. Failure in executing this Act may result in loss of credential to the person or organization who participates as performer of the Act. Excludes employment agreements. Example:Hospital license; physician license; clinic accreditation.
2    _ActCredentialedCareProvisionPersonCodeact credentialed care provision peronDescription:The type and scope of legal and/or professional responsibility taken-on by the performer of the Act for a specific subject of care as described by an agency for credentialing individuals.
3      CACCcertified anatomic pathology and clinical pathology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CAICcertified allergy and immunology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CAMCcertified aerospace medicine careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CANCcertified anesthesiology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CAPCcertified anatomic pathology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CBGCcertified clinical biochemical genetics careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CCCCcertified clinical cytogenetics careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CCGCcertified clinical genetics (M.D.) careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CCPCcertified clinical pathology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CCSCcertified colon and rectal surgery careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CDECcertified dermatology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CDRCcertified diagnostic radiology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CEMCcertified emergency medicine careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CFPCcertified family practice careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CIMCcertified internal medicine careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CMGCcertified clinical molecular genetics careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CNECcertified neurology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board
3      CNMCcertified nuclear medicine careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CNQCcertified neurology with special qualifications in child neurology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CNSCcertified neurological surgery careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      COGCcertified obstetrics and gynecology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      COMCcertified occupational medicine careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      COPCcertified ophthalmology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      COSCcertified orthopaedic surgery careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      COTCcertified otolaryngology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CPECcertified pediatrics careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CPGCcertified Ph.D. medical genetics careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CPHCcertified public health and general preventive medicine careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CPRCcertified physical medicine and rehabilitation careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CPSCcertified plastic surgery careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CPYCcertified psychiatry careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CROCcertified radiation oncology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CRPCcertified radiological physics careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CSUCcertified surgery careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CTSCcertified thoracic surgery careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CURCcertified urology careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      CVSCcertified vascular surgery careDescription:Scope of responsibility taken on for specialty care as defined by the respective Specialty Board.
3      LGPClicensed general physician careDescription:Scope of responsibility taken-on for physician care of a patient as defined by a governmental licensing agency.
2    _ActCredentialedCareProvisionProgramCodeact credentialed care provision programDescription:The type and scope of legal and/or professional responsibility taken-on by the performer of the Act for a specific subject of care as described by an agency for credentialing programs within organizations.
3      AALCaccredited assisted living careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the respective accreditation agency.
3      AAMCaccredited ambulatory careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the respective accreditation agency.
3      ABHCaccredited behavioral health careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the respective accreditation agency.
3      ACACaccredited critical access hospital careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the respective accreditation agency.
3      ACHCaccredited hospital careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the respective accreditation agency.
3      AHOCaccredited home careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the respective accreditation agency.
3      ALTCaccredited long term careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the respective accreditation agency.
3      AOSCaccredited office-based surgery careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the respective accreditation agency.
3      CACScertified acute coronary syndrome careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CAMIcertified acute myocardial infarction careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CASTcertified asthma careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CBARcertified bariatric surgery careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CCADcertified coronary artery disease careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CCARcertified cardiac careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CDEPcertified depression careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CDGDcertified digestive/gastrointestinal disorders careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CDIAcertified diabetes careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CEPIcertified epilepsy careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CFELcertified frail elderly careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CHFCcertified heart failure careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CHROcertified high risk obstetrics careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CHYPcertified hyperlipidemia careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CMIHcertified migraine headache careDescription:.
3      CMSCcertified multiple sclerosis careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      COJRcertified orthopedic joint replacement careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CONCcertified oncology careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      COPDcertified chronic obstructive pulmonary disease careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CORTcertified organ transplant careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CPADcertified parkinsons disease careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CPNDcertified pneumonia disease careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CPSTcertified primary stroke center careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CSDMcertified stroke disease management careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CSICcertified sickle cell careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CSLDcertified sleep disorders careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CSPTcertified spine treatment careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CTBUcertified trauma/burn center careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CVDCcertified vascular diseases careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CWMAcertified wound management careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
3      CWOHcertified women's health careDescription:Scope of responsibility taken on by an organization for care of a patient as defined by the disease management certification agency.
1  _ActEncounterCodeActEncounterCodeDomain provides codes that qualify the ActEncounterClass (ENC)
2    AMBambulatoryA comprehensive term for health care provided in a healthcare facility (e.g. a practitioneraTMs office, clinic setting, or hospital) on a nonresident basis. The term ambulatory usually implies that the patient has come to the location and is not assigned to a bed. Sometimes referred to as an outpatient encounter.
2    EMERemergencyA patient encounter that takes place at a dedicated healthcare service delivery location where the patient receives immediate evaluation and treatment, provided until the patient can be discharged or responsibility for the patient's care is transferred elsewhere (for example, the patient could be admitted as an inpatient or transferred to another facility.)
2    FLDfieldA patient encounter that takes place both outside a dedicated service delivery location and outside a patient's residence. Example locations might include an accident site and at a supermarket.
2    HHhome healthHealthcare encounter that takes place in the residence of the patient or a designee
2    IMPinpatient encounterA patient encounter where a patient is admitted by a hospital or equivalent facility, assigned to a location where patients generally stay at least overnight and provided with room, board, and continuous nursing service.
3      ACUTEinpatient acuteAn acute inpatient encounter.
3      NONACinpatient non-acuteAny category of inpatient encounter except 'acute'
2    OBSENCobservation encounterAn encounter where the patient usually will start in different encounter, such as one in the emergency department (EMER) but then transition to this type of encounter because they require a significant period of treatment and monitoring to determine whether or not their condition warrants an inpatient admission or discharge. In the majority of cases the decision about admission or discharge will occur within a time period determined by local, regional or national regulation, often between 24 and 48 hours.
2    PRENCpre-admissionA patient encounter where patient is scheduled or planned to receive service delivery in the future, and the patient is given a pre-admission account number. When the patient comes back for subsequent service, the pre-admission encounter is selected and is encapsulated into the service registration, and a new account number is generated. Usage Note: This is intended to be used in advance of encounter types such as ambulatory, inpatient encounter, virtual, etc.
2    SSshort stayAn encounter where the patient is admitted to a health care facility for a predetermined length of time, usually less than 24 hours.
2    VRvirtualA patient encounter where the patient and the practitioner(s) are not in the same physical location. Examples include telephone conference, email exchange, robotic surgery, and televideo conference.
1  _ActMedicalServiceCodeActMedicalServiceCodeGeneral category of medical service provided to the patient during their encounter.
2    ALCAlternative Level of CareProvision of Alternate Level of Care to a patient in an acute bed. Patient is waiting for placement in a long-term care facility and is unable to return home.
2    CARDCardiologyProvision of diagnosis and treatment of diseases and disorders affecting the heart
2    CHRChronicProvision of recurring care for chronic illness.
2    DNTLDentalProvision of treatment for oral health and/or dental surgery.
2    DRGRHBDrug RehabProvision of treatment for drug abuse.
2    GENRLGeneralGeneral care performed by a general practitioner or family doctor as a responsible provider for a patient.
2    MEDMedicalProvision of diagnostic and/or therapeutic treatment.
2    OBSObstetricsProvision of care of women during pregnancy, childbirth and immediate postpartum period. Also known as Maternity.
2    ONCOncologyProvision of treatment and/or diagnosis related to tumors and/or cancer.
2    PALLPalliativeProvision of care for patients who are living or dying from an advanced illness.
2    PEDPediatricsProvision of diagnosis and treatment of diseases and disorders affecting children.
2    PHARPharmaceuticalPharmaceutical care performed by a pharmacist.
2    PHYRHBPhysical RehabProvision of treatment for physical injury.
2    PSYCHPsychiatricProvision of treatment of psychiatric disorder relating to mental illness.
2    SURGSurgicalProvision of surgical treatment.
0_ActClaimAttachmentCategoryCodeActClaimAttachmentCategoryCodeDescription: Coded types of attachments included to support a healthcare claim.
1  AUTOATTCHauto attachmentDescription: Automobile Information Attachment
1  DOCUMENTdocumentDescription: Document Attachment
1  HEALTHREChealth recordDescription: Health Record Attachment
1  IMGimage attachmentDescription: Image Attachment
1  LABRESULTSlab resultsDescription: Lab Results Attachment
1  MODELmodelDescription: Digital Model Attachment
1  WIATTCHwork injury report attachmentDescription: Work Injury related additional Information Attachment
1  XRAYx-rayDescription: Digital X-Ray Attachment
0_ActConsentTypeActConsentTypeDefinition: The type of consent directive, e.g., to consent or dissent to collect, access, or use in specific ways within an EHRS or for health information exchange; or to disclose health information for purposes such as research.
1  ICOLinformation collectionDefinition: Consent to have healthcare information collected in an electronic health record. This entails that the information may be used in analysis, modified, updated.
1  IDSCLinformation disclosureDefinition: Consent to have collected healthcare information disclosed.
1  INFAinformation accessDefinition: Consent to access healthcare information.
2    INFAOaccess onlyDefinition: Consent to access or "read" only, which entails that the information is not to be copied, screen printed, saved, emailed, stored, re-disclosed or altered in any way. This level ensures that data which is masked or to which access is restricted will not be. Example: Opened and then emailed or screen printed for use outside of the consent directive purpose.
2    INFASOaccess and save onlyDefinition: Consent to access and save only, which entails that access to the saved copy will remain locked.
1  IRDSCLinformation redisclosureDefinition: Information re-disclosed without the patient's consent.
1  RESEARCHresearch information accessDefinition: Consent to have healthcare information in an electronic health record accessed for research purposes.
2    RSDIDde-identified information accessDefinition: Consent to have de-identified healthcare information in an electronic health record that is accessed for research purposes, but without consent to re-identify the information under any circumstance.
2    RSREIDre-identifiable information accessDefinition: Consent to have de-identified healthcare information in an electronic health record that is accessed for research purposes re-identified under specific circumstances outlined in the consent. Example:: Where there is a need to inform the subject of potential health issues.
0_ActContainerRegistrationCodeActContainerRegistrationCodeConstrains the ActCode to the domain of Container Registration
1  IDIdentifiedUsed by one system to inform another that it has received a container.
1  IPIn PositionUsed by one system to inform another that the container is in position for specimen transfer (e.g., container removal from track, pipetting, etc.).
1  LLeft EquipmentUsed by one system to inform another that the container has been released from that system.
1  MMissingUsed by one system to inform another that the container did not arrive at its next expected location.
1  OIn ProcessUsed by one system to inform another that the specific container is being processed by the equipment. It is useful as a response to a query about Container Status, when the specific step of the process is not relevant.
1  RProcess CompletedStatus is used by one system to inform another that the processing has been completed, but the container has not been released from that system.
1  XContainer UnavailableUsed by one system to inform another that the container is no longer available within the scope of the system (e.g., tube broken or discarded).
0_ActControlVariableActControlVariableAn observation form that determines parameters or attributes of an Act. Examples are the settings of a ventilator machine as parameters of a ventilator treatment act; the controls on dillution factors of a chemical analyzer as a parameter of a laboratory observation act; the settings of a physiologic measurement assembly (e.g., time skew) or the position of the body while measuring blood pressure. Control variables are forms of observations because just as with clinical observations, the Observation.code determines the parameter and the Observation.value assigns the value. While control variables sometimes can be observed (by noting the control settings or an actually measured feedback loop) they are not primary observations, in the sense that a control variable without a primary act is of no use (e.g., it makes no sense to record a blood pressure position without recording a blood pressure, whereas it does make sense to record a systolic blood pressure without a diastolic blood pressure).
1  AUTOauto-repeat permissionSpecifies whether or not automatic repeat testing is to be initiated on specimens.
1  ENDCendogenous contentA baseline value for the measured test that is inherently contained in the diluent. In the calculation of the actual result for the measured test, this baseline value is normally considered.
1  REFLEXreflex permissionSpecifies whether or not further testing may be automatically or manually initiated on specimens.
0_ActCoverageConfirmationCodeActCoverageConfirmationCodeResponse to an insurance coverage eligibility query or authorization request.
1  _ActCoverageAuthorizationConfirmationCodeActCoverageAuthorizationConfirmationCodeIndication of authorization for healthcare service(s) and/or product(s). If authorization is approved, funds are set aside.
2    AUTHAuthorizedAuthorization approved and funds have been set aside to pay for specified healthcare service(s) and/or product(s) within defined criteria for the authorization.
2    NAUTHNot AuthorizedAuthorization for specified healthcare service(s) and/or product(s) denied.
1  _ActCoverageEligibilityConfirmationCodeActCoverageEligibilityConfirmationCodeIndication of eligibility coverage for healthcare service(s) and/or product(s).
2    ELGEligibleInsurance coverage is in effect for healthcare service(s) and/or product(s).
2    NELGNot EligibleInsurance coverage is not in effect for healthcare service(s) and/or product(s). May optionally include reasons for the ineligibility.
0_ActCoverageLimitCodeActCoverageLimitCodeCriteria that are applicable to the authorized coverage.
1  _ActCoverageQuantityLimitCodeActCoverageQuantityLimitCodeMaximum amount paid or maximum number of services/products covered; or maximum amount or number covered during a specified time period under the policy or program.
2    COVPRDcoverage periodCodes representing the time period during which coverage is available; or financial participation requirements are in effect.
2    LFEMXlife time maximumDefinition: Maximum amount paid by payer or covered party; or maximum number of services or products covered under the policy or program during a covered party's lifetime.
2    NETAMTNet AmountMaximum net amount that will be covered for the product or service specified.
2    PRDMXperiod maximumDefinition: Maximum amount paid by payer or covered party; or maximum number of services/products covered under the policy or program by time period specified by the effective time on the act.
2    UNITPRICEUnit PriceMaximum unit price that will be covered for the authorized product or service.
2    UNITQTYUnit QuantityMaximum number of items that will be covered of the product or service specified.
1  COVMXcoverage maximumDefinition: Codes representing the maximum coverate or financial participation requirements.
1  _ActCoveredPartyLimitCodeActCoveredPartyLimitCodeCodes representing the types of covered parties that may receive covered benefits under a policy or program.
0_ActCoverageTypeCodeActCoverageTypeCodeDefinition: Set of codes indicating the type of insurance policy or program that pays for the cost of benefits provided to covered parties.
1  _ActInsurancePolicyCodeActInsurancePolicyCodeSet of codes indicating the type of insurance policy or other source of funds to cover healthcare costs.
2    EHCPOLextended healthcarePrivate insurance policy that provides coverage in addition to other policies (e.g. in addition to a Public Healthcare insurance policy).
2    HSAPOLhealth spending accountInsurance policy that provides for an allotment of funds replenished on a periodic (e.g. annual) basis. The use of the funds under this policy is at the discretion of the covered party.
2    AUTOPOLautomobileInsurance policy for injuries sustained in an automobile accident. Will also typically covered non-named parties to the policy, such as pedestrians and passengers.
3      COLcollision coverage policyDefinition: An automobile insurance policy under which the insurance company will cover the cost of damages to an automobile owned by the named insured that are caused by accident or intentionally by another party.
3      UNINSMOTuninsured motorist policyDefinition: An automobile insurance policy under which the insurance company will indemnify a loss for which another motorist is liable if that motorist is unable to pay because he or she is uninsured. Coverage under the policy applies to bodily injury damages only. Injuries to the covered party caused by a hit-and-run driver are also covered.
2    PUBLICPOLpublic healthcareInsurance policy funded by a public health system such as a provincial or national health plan. Examples include BC MSP (British Columbia Medical Services Plan) OHIP (Ontario Health Insurance Plan), NHS (National Health Service).
3      DENTPRGdental programDefinition: A public or government health program that administers and funds coverage for dental care to assist program eligible who meet financial and health status criteria.
3      DISEASEPRGpublic health programDefinition: A public or government health program that administers and funds coverage for health and social services to assist program eligible who meet financial and health status criteria related to a particular disease. Example: Reproductive health, sexually transmitted disease, and end renal disease programs.
4        CANPRGwomen's cancer detection programDefinition: A program that provides low-income, uninsured, and underserved women access to timely, high-quality screening and diagnostic services, to detect breast and cervical cancer at the earliest stages. Example: To improve women's access to screening for breast and cervical cancers, Congress passed the Breast and Cervical Cancer Mortality Prevention Act of 1990, which guided CDC in creating the National Breast and Cervical Cancer Early Detection Program (NBCCEDP), which provides access to critical breast and cervical cancer screening services for underserved women in the United States. An estimated 7 to 10% of U.S. women of screening age are eligible to receive NBCCEDP services. Federal guidelines establish an eligibility baseline to direct services to uninsured and underinsured women at or below 250% of federal poverty level; ages 18 to 64 for cervical screening; ages 40 to 64 for breast screening.
4        ENDRENALend renal programDefinition: A public or government program that administers publicly funded coverage of kidney dialysis and kidney transplant services. Example: In the U.S., the Medicare End-stage Renal Disease program (ESRD), the National Kidney Foundation (NKF) American Kidney Fund (AKF) The Organ Transplant Fund.
4        HIVAIDSHIV-AIDS programDefinition: Government administered and funded HIV-AIDS program for beneficiaries meeting financial and health status criteria. Administration, funding levels, eligibility criteria, covered benefits, provider types, and financial participation are typically set by a regulatory process. Payer responsibilities for administering the program may be delegated to contractors. Example: In the U.S., the Ryan White program, which is administered by the Health Resources and Services Administration.
3      MANDPOLmandatory health programmandatory health program
3      MENTPRGmental health programDefinition: Government administered and funded mental health program for beneficiaries meeting financial and mental health status criteria. Administration, funding levels, eligibility criteria, covered benefits, provider types, and financial participation are typically set by a regulatory process. Payer responsibilities for administering the program may be delegated to contractors. Example: In the U.S., states receive funding for substance use programs from the Substance Abuse Mental Health Administration (SAMHSA).
3      SAFNETsafety net clinic programDefinition: Government administered and funded program to support provision of care to underserved populations through safety net clinics. Example: In the U.S., safety net providers such as federally qualified health centers (FQHC) receive funding under PHSA Section 330 grants administered by the Health Resources and Services Administration.
3      SUBPRGsubstance use programDefinition: Government administered and funded substance use program for beneficiaries meeting financial, substance use behavior, and health status criteria. Beneficiaries may be required to enroll as a result of legal proceedings. Administration, funding levels, eligibility criteria, covered benefits, provider types, and financial participation are typically set by a regulatory process. Payer responsibilities for administering the program may be delegated to contractors. Example: In the U.S., states receive funding for substance use programs from the Substance Abuse Mental Health Administration (SAMHSA).
3      SUBSIDIZsubsidized health programDefinition: A government health program that provides coverage for health services to persons meeting eligibility criteria such as income, location of residence, access to other coverages, health condition, and age, the cost of which is to some extent subsidized by public funds.
4        SUBSIDMCsubsidized managed care programDefinition: A government health program that provides coverage through managed care contracts for health services to persons meeting eligibility criteria such as income, location of residence, access to other coverages, health condition, and age, the cost of which is to some extent subsidized by public funds. Discussion: The structure and business processes for underwriting and administering a subsidized managed care program is further specified by the Underwriter and Payer Role.class and Role.code.
4        SUBSUPPsubsidized supplemental health programDefinition: A government health program that provides coverage for health services to persons meeting eligibility criteria for a supplemental health policy or program such as income, location of residence, access to other coverages, health condition, and age, the cost of which is to some extent subsidized by public funds. Example: Supplemental health coverage program may cover the cost of a health program or policy financial participations, such as the copays and the premiums, and may provide coverage for services in addition to those covered under the supplemented health program or policy. In the U.S., Medicaid programs may pay the premium for a covered party who is also covered under the Medicare program or a private health policy. Discussion: The structure and business processes for underwriting and administering a subsidized supplemental retiree health program is further specified by the Underwriter and Payer Role.class and Role.code.
2    WCBPOLworker's compensationInsurance policy for injuries sustained in the work place or in the course of employment.
1  _ActInsuranceTypeCodeActInsuranceTypeCodeDefinition: Set of codes indicating the type of insurance policy. Insurance, in law and economics, is a form of risk management primarily used to hedge against the risk of potential financial loss. Insurance is defined as the equitable transfer of the risk of a potential loss, from one entity to another, in exchange for a premium and duty of care. A policy holder is an individual or an organization enters into a contract with an underwriter which stipulates that, in exchange for payment of a sum of money (a premium), one or more covered parties (insureds) is guaranteed compensation for losses resulting from certain perils under specified conditions. The underwriter analyzes the risk of loss, makes a decision as to whether the risk is insurable, and prices the premium accordingly. A policy provides benefits that indemnify or cover the cost of a loss incurred by a covered party, and may include coverage for services required to remediate a loss. An insurance policy contains pertinent facts about the policy holder, the insurance coverage, the covered parties, and the insurer. A policy may include exemptions and provisions specifying the extent to which the indemnification clause cannot be enforced for intentional tortious conduct of a covered party, e.g., whether the covered parties are jointly or severably insured. Discussion: In contrast to programs, an insurance policy has one or more policy holders, who own the policy. The policy holder may be the covered party, a relative of the covered party, a partnership, or a corporation, e.g., an employer. A subscriber of a self-insured health insurance policy is a policy holder. A subscriber of an employer sponsored health insurance policy is holds a certificate of coverage, but is not a policy holder; the policy holder is the employer. See CoveredRoleType.
2    _ActHealthInsuranceTypeCodeActHealthInsuranceTypeCodeDefinition: Set of codes indicating the type of health insurance policy that covers health services provided to covered parties. A health insurance policy is a written contract for insurance between the insurance company and the policyholder, and contains pertinent facts about the policy owner (the policy holder), the health insurance coverage, the insured subscribers and dependents, and the insurer. Health insurance is typically administered in accordance with a plan, which specifies (1) the type of health services and health conditions that will be covered under what circumstances (e.g., exclusion of a pre-existing condition, service must be deemed medically necessary; service must not be experimental; service must provided in accordance with a protocol; drug must be on a formulary; service must be prior authorized; or be a referral from a primary care provider); (2) the type and affiliation of providers (e.g., only allopathic physicians, only in network, only providers employed by an HMO); (3) financial participations required of covered parties (e.g., co-pays, coinsurance, deductibles, out-of-pocket); and (4) the manner in which services will be paid (e.g., under indemnity or fee-for-service health plans, the covered party typically pays out-of-pocket and then file a claim for reimbursement, while health plans that have contractual relationships with providers, i.e., network providers, typically do not allow the providers to bill the covered party for the cost of the service until after filing a claim with the payer and receiving reimbursement).
3      DENTALdental care policyDefinition: A health insurance policy that that covers benefits for dental services.
3      DISEASEdisease specific policyDefinition: A health insurance policy that covers benefits for healthcare services provided for named conditions under the policy, e.g., cancer, diabetes, or HIV-AIDS.
3      DRUGPOLdrug policyDefinition: A health insurance policy that covers benefits for prescription drugs, pharmaceuticals, and supplies.
3      HIPhealth insurance plan policyDefinition: A health insurance policy that covers healthcare benefits by protecting covered parties from medical expenses arising from health conditions, sickness, or accidental injury as well as preventive care. Health insurance policies explicitly exclude coverage for losses insured under a disability policy, workers' compensation program, liability insurance (including automobile insurance); or for medical expenses, coverage for on-site medical clinics or for limited dental or vision benefits when these are provided under a separate policy. Discussion: Health insurance policies are offered by health insurance plans that typically reimburse providers for covered services on a fee-for-service basis, that is, a fee that is the allowable amount that a provider may charge. This is in contrast to managed care plans, which typically prepay providers a per-member/per-month amount or capitation as reimbursement for all covered services rendered. Health insurance plans include indemnity and healthcare services plans.
3      LTClong term care policyDefinition: An insurance policy that covers benefits for long-term care services people need when they no longer can care for themselves. This may be due to an accident, disability, prolonged illness or the simple process of aging. Long-term care services assist with activities of daily living including: Help at home with day-to-day activities, such as cooking, cleaning, bathing and dressing Care in the community, such as in an adult day care facility Supervised care provided in an assisted living facility Skilled care provided in a nursing home
3      MCPOLmanaged care policyDefinition: Government mandated program providing coverage, disability income, and vocational rehabilitation for injuries sustained in the work place or in the course of employment. Employers may either self-fund the program, purchase commercial coverage, or pay a premium to a government entity that administers the program. Employees may be required to pay premiums toward the cost of coverage as well. Managed care policies specifically exclude coverage for losses insured under a disability policy, workers' compensation program, liability insurance (including automobile insurance); or for medical expenses, coverage for on-site medical clinics or for limited dental or vision benefits when these are provided under a separate policy. Discussion: Managed care policies are offered by managed care plans that contract with selected providers or health care organizations to provide comprehensive health care at a discount to covered parties and coordinate the financing and delivery of health care. Managed care uses medical protocols and procedures agreed on by the medical profession to be cost effective, also known as medical practice guidelines. Providers are typically reimbursed for covered services by a capitated amount on a per member per month basis that may reflect difference in the health status and level of services anticipated to be needed by the member.
4        POSpoint of service policyDefinition: A policy for a health plan that has features of both an HMO and a FFS plan. Like an HMO, a POS plan encourages the use its HMO network to maintain discounted fees with participating providers, but recognizes that sometimes covered parties want to choose their own provider. The POS plan allows a covered party to use providers who are not part of the HMO network (non-participating providers). However, there is a greater cost associated with choosing these non-network providers. A covered party will usually pay deductibles and coinsurances that are substantially higher than the payments when he or she uses a plan provider. Use of non-participating providers often requires the covered party to pay the provider directly and then to file a claim for reimbursement, like in an FFS plan.
4        HMOhealth maintenance organization policyDefinition: A policy for a health plan that provides coverage for health care only through contracted or employed physicians and hospitals located in particular geographic or service areas. HMOs emphasize prevention and early detection of illness. Eligibility to enroll in an HMO is determined by where a covered party lives or works.
4        PPOpreferred provider organization policyDefinition: A network-based, managed care plan that allows a covered party to choose any health care provider. However, if care is received from a "preferred" (participating in-network) provider, there are generally higher benefit coverage and lower deductibles.
3      MENTPOLmental health policyDefinition: A health insurance policy that covers benefits for mental health services and prescriptions.
3      SUBPOLsubstance use policyDefinition: A health insurance policy that covers benefits for substance use services.
3      VISPOLvision care policyDefinition: Set of codes for a policy that provides coverage for health care expenses arising from vision services. A health insurance policy that covers benefits for vision care services, prescriptions, and products.
2    DISdisability insurance policyDefinition: An insurance policy that provides a regular payment to compensate for income lost due to the covered party's inability to work because of illness or injury.
2    EWBemployee welfare benefit plan policyDefinition: An insurance policy under a benefit plan run by an employer or employee organization for the purpose of providing benefits other than pension-related to employees and their families. Typically provides health-related benefits, benefits for disability, disease or unemployment, or day care and scholarship benefits, among others. An employer sponsored health policy includes coverage of health care expenses arising from sickness or accidental injury, coverage for on-site medical clinics or for dental or vision benefits, which are typically provided under a separate policy. Coverage excludes health care expenses covered by accident or disability, workers' compensation, liability or automobile insurance.
2    FLEXPflexible benefit plan policyDefinition: An insurance policy that covers qualified benefits under a Flexible Benefit plan such as group medical insurance, long and short term disability income insurance, group term life insurance for employees only up to $50,000 face amount, specified disease coverage such as a cancer policy, dental and/or vision insurance, hospital indemnity insurance, accidental death and dismemberment insurance, a medical expense reimbursement plan and a dependent care reimbursement plan. Discussion: See UnderwriterRoleTypeCode flexible benefit plan which is defined as a benefit plan that allows employees to choose from several life, health, disability, dental, and other insurance plans according to their individual needs. Also known as cafeteria plans. Authorized under Section 125 of the Revenue Act of 1978.
2    LIFElife insurance policyDefinition: A policy under which the insurer agrees to pay a sum of money upon the occurrence of the covered partys death. In return, the policyholder agrees to pay a stipulated amount called a premium at regular intervals. Life insurance indemnifies the beneficiary for the loss of the insurable interest that a beneficiary has in the life of a covered party. For persons related by blood, a substantial interest established through love and affection, and for all other persons, a lawful and substantial economic interest in having the life of the insured continue. An insurable interest is required when purchasing life insurance on another person. Specific exclusions are often written into the contract to limit the liability of the insurer; for example claims resulting from suicide or relating to war, riot and civil commotion. Discussion:A life insurance policy may be used by the covered party as a source of health care coverage in the case of a viatical settlement, which is the sale of a life insurance policy by the policy owner, before the policy matures. Such a sale, at a price discounted from the face amount of the policy but usually in excess of the premiums paid or current cash surrender value, provides the seller an immediate cash settlement. Generally, viatical settlements involve insured individuals with a life expectancy of less than two years. In countries without state-subsidized healthcare and high healthcare costs (e.g. United States), this is a practical way to pay extremely high health insurance premiums that severely ill people face. Some people are also familiar with life settlements, which are similar transactions but involve insureds with longer life expectancies (two to fifteen years).
3      ANNUannuity policyDefinition: A policy that, after an initial premium or premiums, pays out a sum at pre-determined intervals. For example, a policy holder may pay $10,000, and in return receive $150 each month until he dies; or $1,000 for each of 14 years or death benefits if he dies before the full term of the annuity has elapsed.
3      TLIFEterm life insurance policyDefinition: Life insurance under which the benefit is payable only if the insured dies during a specified period. If an insured dies during that period, the beneficiary receives the death payments. If the insured survives, the policy ends and the beneficiary receives nothing.
3      ULIFEuniversal life insurance policyDefinition: Life insurance under which the benefit is payable upon the insuredaTMs death or diagnosis of a terminal illness. If an insured dies during that period, the beneficiary receives the death payments. If the insured survives, the policy ends and the beneficiary receives nothing
2    PNCproperty and casualty insurance policyDefinition: A type of insurance that covers damage to or loss of the policyholderaTMs property by providing payments for damages to property damage or the injury or death of living subjects. The terms "casualty" and "liability" insurance are often used interchangeably. Both cover the policyholder's legal liability for damages caused to other persons and/or their property.
2    REIreinsurance policyDefinition: An agreement between two or more insurance companies by which the risk of loss is proportioned. Thus the risk of loss is spread and a disproportionately large loss under a single policy does not fall on one insurance company. Acceptance by an insurer, called a reinsurer, of all or part of the risk of loss of another insurance company. Discussion: Reinsurance is a means by which an insurance company can protect itself against the risk of losses with other insurance companies. Individuals and corporations obtain insurance policies to provide protection for various risks (hurricanes, earthquakes, lawsuits, collisions, sickness and death, etc.). Reinsurers, in turn, provide insurance to insurance companies. For example, an HMO may purchase a reinsurance policy to protect itself from losing too much money from one insured's particularly expensive health care costs. An insurance company issuing an automobile liability policy, with a limit of $100,000 per accident may reinsure its liability in excess of $10,000. A fire insurance company which issues a large policy generally reinsures a portion of the risk with one or several other companies. Also called risk control insurance or stop-loss insurance.
2    SURPLsurplus line insurance policyDefinition: A risk or part of a risk for which there is no normal insurance market available. Insurance written by unauthorized insurance companies. Surplus lines insurance is insurance placed with unauthorized insurance companies through licensed surplus lines agents or brokers.
2    UMBRLumbrella liability insurance policyDefinition: A form of insurance protection that provides additional liability coverage after the limits of your underlying policy are reached. An umbrella liability policy also protects you (the insured) in many situations not covered by the usual liability policies.
1  _ActProgramTypeCodeActProgramTypeCodeDefinition: A set of codes used to indicate coverage under a program. A program is an organized structure for administering and funding coverage of a benefit package for covered parties meeting eligibility criteria, typically related to employment, health, financial, and demographic status. Programs are typically established or permitted by legislation with provisions for ongoing government oversight. Regulations may mandate the structure of the program, the manner in which it is funded and administered, covered benefits, provider types, eligibility criteria and financial participation. A government agency may be charged with implementing the program in accordance to the regulation. Risk of loss under a program in most cases would not meet what an underwriter would consider an insurable risk, i.e., the risk is not random in nature, not financially measurable, and likely requires subsidization with government funds. Discussion: Programs do not have policy holders or subscribers. Program eligibles are enrolled based on health status, statutory eligibility, financial status, or age. Program eligibles who are covered parties under the program may be referred to as members, beneficiaries, eligibles, or recipients. Programs risk are underwritten by not for profit organizations such as governmental entities, and the beneficiaries typically do not pay for any or some portion of the cost of coverage. See CoveredPartyRoleType.
2    CHARcharity programDefinition: A program that covers the cost of services provided directly to a beneficiary who typically has no other source of coverage without charge.
2    CRIMEcrime victim programDefinition: A program that covers the cost of services provided to crime victims for injuries or losses related to the occurrence of a crime.
2    EAPemployee assistance programDefinition: An employee assistance program is run by an employer or employee organization for the purpose of providing benefits and covering all or part of the cost for employees to receive counseling, referrals, and advice in dealing with stressful issues in their lives. These may include substance abuse, bereavement, marital problems, weight issues, or general wellness issues. The services are usually provided by a third-party, rather than the company itself, and the company receives only summary statistical data from the service provider. Employee's names and services received are kept confidential.
2    GOVEMPgovernment employee health programDefinition: A set of codes used to indicate a government program that is an organized structure for administering and funding coverage of a benefit package for covered parties meeting eligibility criteria, typically related to employment, health and financial status. Government programs are established or permitted by legislation with provisions for ongoing government oversight. Regulation mandates the structure of the program, the manner in which it is funded and administered, covered benefits, provider types, eligibility criteria and financial participation. A government agency is charged with implementing the program in accordance to the regulation Example: Federal employee health benefit program in the U.S.
2    HIRISKhigh risk pool programDefinition: A government program that provides health coverage to individuals who are considered medically uninsurable or high risk, and who have been denied health insurance due to a serious health condition. In certain cases, it also applies to those who have been quoted very high premiums a" again, due to a serious health condition. The pool charges premiums for coverage. Because the pool covers high-risk people, it incurs a higher level of claims than premiums can cover. The insurance industry pays into the pool to make up the difference and help it remain viable.
2    INDindigenous peoples health programDefinition: Services provided directly and through contracted and operated indigenous peoples health programs. Example: Indian Health Service in the U.S.
2    MILITARYmilitary health programDefinition: A government program that provides coverage for health services to military personnel, retirees, and dependents. A covered party who is a subscriber can choose from among Fee-for-Service (FFS) plans, and their Preferred Provider Organizations (PPO), or Plans offering a Point of Service (POS) Product, or Health Maintenance Organizations. Example: In the U.S., TRICARE, CHAMPUS.
2    RETIREretiree health programDefinition: A government mandated program with specific eligibility requirements based on premium contributions made during employment, length of employment, age, and employment status, e.g., being retired, disabled, or a dependent of a covered party under this program. Benefits typically include ambulatory, inpatient, and long-term care, such as hospice care, home health care and respite care.
2    SOCIALsocial service programDefinition: A social service program funded by a public or governmental entity. Example: Programs providing habilitation, food, lodging, medicine, transportation, equipment, devices, products, education, training, counseling, alteration of living or work space, and other resources to persons meeting eligibility criteria.
2    VETveteran health programDefinition: Services provided directly and through contracted and operated veteran health programs.
0_ActDetectedIssueManagementCodeActDetectedIssueManagementCodeCodes dealing with the management of Detected Issue observations
1  _ActAdministrativeDetectedIssueManagementCodeActAdministrativeDetectedIssueManagementCodeCodes dealing with the management of Detected Issue observations for the administrative and patient administrative acts domains.
2    _AuthorizationIssueManagementCodeAuthorization Issue Management CodeAuthorization Issue Management Code
3      EMAUTHemergency authorization overrideUsed to temporarily override normal authorization rules to gain access to data in a case of emergency. Use of this override code will typically be monitored, and a procedure to verify its proper use may be triggered when used.
4        21authorization confirmedDescription: Indicates that the permissions have been externally verified and the request should be processed.
1  1Therapy AppropriateConfirmed drug therapy appropriate
2    19Consulted SupplierConsulted other supplier/pharmacy, therapy confirmed
2    2Assessed PatientAssessed patient, therapy is appropriate
2    22appropriate indication or diagnosisDescription: The patient has the appropriate indication or diagnosis for the action to be taken.
2    23prior therapy documentedDescription: It has been confirmed that the appropriate pre-requisite therapy has been tried.
2    3Patient ExplanationPatient gave adequate explanation
2    4Consulted Other SourceConsulted other supply source, therapy still appropriate
2    5Consulted PrescriberConsulted prescriber, therapy confirmed
3      6Prescriber Declined ChangeConsulted prescriber and recommended change, prescriber declined
2    7Interacting Therapy No Longer Active/PlannedConcurrent therapy triggering alert is no longer on-going or planned
1  14Supply AppropriateConfirmed supply action appropriate
2    15ReplacementPatient's existing supply was lost/wasted
2    16Vacation SupplySupply date is due to patient vacation
2    17Weekend SupplySupply date is intended to carry patient over weekend
2    18Leave of AbsenceSupply is intended for use during a leave of absence from an institution.
2    20additional quantity on separate dispenseDescription: Supply is different than expected as an additional quantity has been supplied in a separate dispense.
1  8Other Action TakenOrder is performed as issued, but other action taken to mitigate potential adverse effects
2    10Provided Patient EducationProvided education or training to the patient on appropriate therapy use
2    11Added Concurrent TherapyInstituted an additional therapy to mitigate potential negative effects
2    12Temporarily Suspended Concurrent TherapySuspended existing therapy that triggered interaction for the duration of this therapy
2    13Stopped Concurrent TherapyAborted existing therapy that triggered interaction.
2    9Instituted Ongoing Monitoring ProgramArranged to monitor patient for adverse effects
0_ActExposureCodeActExposureCodeConcepts that identify the type or nature of exposure interaction. Examples include "household", "care giver", "intimate partner", "common space", "common substance", etc. to further describe the nature of interaction.
1  CHLDCAREDay care - Child care InteractionDescription: Exposure participants' interaction occurred in a child care setting
1  CONVEYNCCommon Conveyance InteractionDescription: An interaction where the exposure participants traveled in/on the same vehicle (not necessarily concurrently, e.g. both are passengers of the same plane, but on different flights of that plane).
1  HLTHCAREHealth Care Interaction - Not Patient CareDescription: Exposure participants' interaction occurred during the course of health care delivery or in a health care delivery setting, but did not involve the direct provision of care (e.g. a janitor cleaning a patient's hospital room).
1  HOMECARECare Giver InteractionDescription: Exposure interaction occurred in context of one providing care for the other, i.e. a babysitter providing care for a child, a home-care aide providing assistance to a paraplegic.
1  HOSPPTNTHospital Patient InteractionDescription: Exposure participants' interaction occurred when both were patients being treated in the same (acute) health care delivery facility.
1  HOSPVSTRHospital Visitor InteractionDescription: Exposure participants' interaction occurred when one visited the other who was a patient being treated in a health care delivery facility.
1  HOUSEHLDHousehold InteractionDescription: Exposure interaction occurred in context of domestic interaction, i.e. both participants reside in the same household.
1  INMATEInmate InteractionDescription: Exposure participants' interaction occurred in the course of one or both participants being incarcerated at a correctional facility
1  INTIMATEIntimate InteractionDescription: Exposure interaction was intimate, i.e. participants are intimate companions (e.g. spouses, domestic partners).
1  LTRMCARELong Term Care Facility InteractionDescription: Exposure participants' interaction occurred in the course of one or both participants being resident at a long term care facility (second participant may be a visitor, worker, resident or a physical place or object within the facility).
1  PLACECommon Space InteractionDescription: An interaction where the exposure participants were both present in the same location/place/space.
1  PTNTCAREHealth Care Interaction - Patient CareDescription: Exposure participants' interaction occurred during the course of health care delivery by a provider (e.g. a physician treating a patient in her office).
1  SCHOOL2School InteractionDescription: Exposure participants' interaction occurred in an academic setting (e.g., participants are fellow students, or student and teacher).
1  SOCIAL2Social/Extended Family InteractionDescription: An interaction where the exposure participants are social associates or members of the same extended family
1  SUBSTNCECommon Substance InteractionDescription: An interaction where the exposure participants shared or co-used a common substance (e.g. drugs, needles, or common food item).
1  TRAVINTCommon Travel InteractionDescription: An interaction where the exposure participants traveled together in/on the same vehicle/trip (e.g. concurrent co-passengers).
1  WORK2Work InteractionDescription: Exposure interaction occurred in a work setting, i.e. participants are co-workers.
0_ActFinancialTransactionCodeActFinancialTransactionCodeActFinancialTransactionCode
1  CHRGStandard ChargeA type of transaction that represents a charge for a service or product. Expressed in monetary terms.
1  REVStandard Charge ReversalA type of transaction that represents a reversal of a previous charge for a service or product. Expressed in monetary terms. It has the opposite effect of a standard charge.
0_ActIncidentCodeActIncidentCodeSet of codes indicating the type of incident or accident.
1  MVAMotor vehicle accidentIncident or accident as the result of a motor vehicle accident
1  SCHOOLSchool AccidentIncident or accident is the result of a school place accident.
1  SPTSporting AccidentIncident or accident is the result of a sporting accident.
1  WPAWorkplace accidentIncident or accident is the result of a work place accident
0_ActInformationAccessCodeActInformationAccessCodeDescription: The type of health information to which the subject of the information or the subject's delegate consents or dissents.
1  ACADRadverse drug reaction accessDescription: Provide consent to collect, use, disclose, or access adverse drug reaction information for a patient.
1  ACALLall accessDescription: Provide consent to collect, use, disclose, or access all information for a patient.
1  ACALLGallergy accessDescription: Provide consent to collect, use, disclose, or access allergy information for a patient.
1  ACCONSinformational consent accessDescription: Provide consent to collect, use, disclose, or access informational consent information for a patient.
1  ACDEMOdemographics accessDescription: Provide consent to collect, use, disclose, or access demographics information for a patient.
1  ACDIdiagnostic imaging accessDescription: Provide consent to collect, use, disclose, or access diagnostic imaging information for a patient.
1  ACIMMUNimmunization accessDescription: Provide consent to collect, use, disclose, or access immunization information for a patient.
1  ACLABlab test result accessDescription: Provide consent to collect, use, disclose, or access lab test result information for a patient.
1  ACMEDmedication accessDescription: Provide consent to collect, use, disclose, or access medical condition information for a patient.
1  ACMEDCmedical condition accessDefinition: Provide consent to view or access medical condition information for a patient.
1  ACMENmental health accessDescription:Provide consent to collect, use, disclose, or access mental health information for a patient.
1  ACOBScommon observations accessDescription: Provide consent to collect, use, disclose, or access common observation information for a patient.
1  ACPOLPRGpolicy or program information accessDescription: Provide consent to collect, use, disclose, or access coverage policy or program for a patient.
1  ACPROVprovider information accessDescription: Provide consent to collect, use, disclose, or access provider information for a patient.
1  ACPSERVprofessional service accessDescription: Provide consent to collect, use, disclose, or access professional service information for a patient.
1  ACSUBSTABsubstance abuse accessDescription:Provide consent to collect, use, disclose, or access substance abuse information for a patient.
0_ActInformationAccessContextCodeActInformationAccessContextCodeConcepts conveying the context in which authorization given under jurisdictional law, by organizational policy, or by a patient consent directive permits the collection, access, use or disclosure of specified patient health information.
1  INFAUTauthorized information transferAuthorization to collect, access, use, or disclose specified patient health information in accordance with jurisdictional law, organizational policy, or a patient's consent directive, which may be implied, deemed, opt-in, opt-out, or explicit.
2    INFCONafter explicit consentAuthorization to collect, access, use, or disclose specified patient health information as explicitly consented to by the subject of the information or the subject's representative.
1  INFCRTonly on court orderAuthorization to collect, access, use, or disclose specified patient health information in accordance with judicial system protocol, such as in the case of a subpoena or court order.
1  INFDNGonly if danger to othersAuthorization to collect, access, use, or disclose specified patient health information where deemed necessary to avert potential danger to other persons in accordance with jurisdictional law, organizational policy, or standards of practice. For example, disclosure about a person threatening violence.
1  INFEMERonly in an emergencyAuthorization to collect, access, use, or disclose specified patient health information in accordance with emergency information transfer protocol dictated by jurisdictional law, organization policy, or standards of practice. For example, sharing of health information during disaster response.
1  INFPWRonly if public welfare riskAuthorization to collect, access, use, or disclose specified patient health information necessary to avert potential public welfare risk in accordance with jurisdictional law, organizational policy, or standards of practice. For example, reporting that a person is a victim of abuse or demonstrating suicidal tendencies.
1  INFREGregulatory information transferAuthorization to collect, access, use, or disclose specified patient health information for public health, welfare, and safety purposes in accordance with jurisdictional law, organizational policy, or standards of practice. For example, public health reporting of notifiable conditions.
0_ActInformationCategoryCodeActInformationCategoryCodeDefinition:Indicates the set of information types which may be manipulated or referenced, such as for recommending access restrictions.
1  ALLCATall categoriesDescription: All patient information.
1  ALLGCATallergy categoryDefinition:All information pertaining to a patient's allergy and intolerance records.
1  ARCATadverse drug reaction categoryDescription: All information pertaining to a patient's adverse drug reactions.
1  COBSCATcommon observation categoryDefinition:All information pertaining to a patient's common observation records (height, weight, blood pressure, temperature, etc.).
1  DEMOCATdemographics categoryDefinition:All information pertaining to a patient's demographics (such as name, date of birth, gender, address, etc).
1  DICATdiagnostic image categoryDefinition:All information pertaining to a patient's diagnostic image records (orders & results).
1  IMMUCATimmunization categoryDefinition:All information pertaining to a patient's vaccination records.
1  LABCATlab test categoryDescription: All information pertaining to a patient's lab test records (orders & results)
1  MEDCCATmedical condition categoryDefinition:All information pertaining to a patient's medical condition records.
1  MENCATmental health categoryDescription: All information pertaining to a patient's mental health records.
1  PSVCCATprofessional service categoryDefinition:All information pertaining to a patient's professional service records (such as smoking cessation, counseling, medication review, mental health).
1  RXCATmedication categoryDefinition:All information pertaining to a patient's medication records (orders, dispenses and other active medications).
0_ActInvoiceElementCodeActInvoiceElementCodeType of invoice element that is used to assist in describing an Invoice that is either submitted for adjudication or for which is returned on adjudication results.
1  _ActInvoiceAdjudicationPaymentCodeActInvoiceAdjudicationPaymentCodeCodes representing a grouping of invoice elements (totals, sub-totals), reported through a Payment Advice or a Statement of Financial Activity (SOFA). The code can represent summaries by day, location, payee and other cost elements such as bonus, retroactive adjustment and transaction fees.
2    _ActInvoiceAdjudicationPaymentGroupCodeActInvoiceAdjudicationPaymentGroupCodeCodes representing adjustments to a Payment Advice such as retroactive, clawback, garnishee, etc.
3      ALECalternate electronicPayment initiated by the payor as the result of adjudicating a submitted invoice that arrived to the payor from an electronic source that did not provide a conformant set of HL7 messages (e.g. web claim submission).
3      BONUSbonusBonus payments based on performance, volume, etc. as agreed to by the payor.
3      CFWDcarry forward adjusmentAn amount still owing to the payor but the payment is 0$ and this cannot be settled until a future payment is made.
3      EDUeducation feesFees deducted on behalf of a payee for tuition and continuing education.
3      EPYMTearly payment feeFees deducted on behalf of a payee for charges based on a shorter payment frequency (i.e. next day versus biweekly payments.
3      GARNgarnisheeFees deducted on behalf of a payee for charges based on a per-transaction or time-period (e.g. monthly) fee.
3      INVOICEsubmitted invoicePayment is based on a payment intent for a previously submitted Invoice, based on formal adjudication results..
3      PINVpaper invoicePayment initiated by the payor as the result of adjudicating a paper (original, may have been faxed) invoice.
3      PPRDprior period adjustmentAn amount that was owed to the payor as indicated, by a carry forward adjusment, in a previous payment advice
3      PROAprofessional association deductionProfessional association fee that is collected by the payor from the practitioner/provider on behalf of the association
3      RECOVrecoveryRetroactive adjustment such as fee rate adjustment due to contract negotiations.
3      RETROretro adjustmentBonus payments based on performance, volume, etc. as agreed to by the payor.
3      TRANtransaction feeFees deducted on behalf of a payee for charges based on a per-transaction or time-period (e.g. monthly) fee.
2    _ActInvoiceAdjudicationPaymentSummaryCodeActInvoiceAdjudicationPaymentSummaryCodeCodes representing a grouping of invoice elements (totals, sub-totals), reported through a Payment Advice or a Statement of Financial Activity (SOFA). The code can represent summaries by day, location, payee, etc.
3      INVTYPEinvoice typeTransaction counts and value totals by invoice type (e.g. RXDINV - Pharmacy Dispense)
3      PAYEEpayeeTransaction counts and value totals by each instance of an invoice payee.
3      PAYORpayorTransaction counts and value totals by each instance of an invoice payor.
3      SENDAPPsending applicationTransaction counts and value totals by each instance of a messaging application on a single processor. It is a registered identifier known to the receivers.
1  _ActInvoiceDetailCodeActInvoiceDetailCodeCodes representing a service or product that is being invoiced (billed). The code can represent such concepts as "office visit", "drug X", "wheelchair" and other billable items such as taxes, service charges and discounts.
2    _ActInvoiceDetailClinicalProductCodeActInvoiceDetailClinicalProductCodeAn identifying data string for healthcare products.
3      UNSPSCUnited Nations Standard Products and Services ClassificationDescription:United Nations Standard Products and Services Classification, managed by Uniform Code Council (UCC): www.unspsc.org
2    _ActInvoiceDetailDrugProductCodeActInvoiceDetailDrugProductCodeAn identifying data string for A substance used as a medication or in the preparation of medication.
3      GTINGlobal Trade Item NumberDescription:Global Trade Item Number is an identifier for trade items developed by GS1 (comprising the former EAN International and Uniform Code Council).
3      UPCUniversal Product CodeDescription:Universal Product Code is one of a wide variety of bar code languages widely used in the United States and Canada for items in stores.
2    _ActInvoiceDetailGenericCodeActInvoiceDetailGenericCodeThe detail item codes to identify charges or changes to the total billing of a claim due to insurance rules and payments.
3      _ActInvoiceDetailGenericAdjudicatorCodeActInvoiceDetailGenericAdjudicatorCodeThe billable item codes to identify adjudicator specified components to the total billing of a claim.
4        COINcoinsuranceThat portion of the eligible charges which a covered party must pay for each service and/or product. It is a percentage of the eligible amount for the service/product that is typically charged after the covered party has met the policy deductible. This amount represents the covered party's coinsurance that is applied to a particular adjudication result. It is expressed as a negative dollar amount in adjudication results.
4        COPAYMENTpatient co-payThat portion of the eligible charges which a covered party must pay for each service and/or product. It is a defined amount per service/product of the eligible amount for the service/product. This amount represents the covered party's copayment that is applied to a particular adjudication result. It is expressed as a negative dollar amount in adjudication results.
4        DEDUCTIBLEdeductibleThat portion of the eligible charges which a covered party must pay in a particular period (e.g. annual) before the benefits are payable by the adjudicator. This amount represents the covered party's deductible that is applied to a particular adjudication result. It is expressed as a negative dollar amount in adjudication results.
4        PAYpaymentThe guarantor, who may be the patient, pays the entire charge for a service. Reasons for such action may include: there is no insurance coverage for the service (e.g. cosmetic surgery); the patient wishes to self-pay for the service; or the insurer denies payment for the service due to contractual provisions such as the need for prior authorization.
4        SPENDspend downThat total amount of the eligible charges which a covered party must periodically pay for services and/or products prior to the Medicaid program providing any coverage. This amount represents the covered party's spend down that is applied to a particular adjudication result. It is expressed as a negative dollar amount in adjudication results
4        COINSco-insuranceThe covered party pays a percentage of the cost of covered services.
3      _ActInvoiceDetailGenericModifierCodeActInvoiceDetailGenericModifierCodeThe billable item codes to identify modifications to a billable item charge. As for example after hours increase in the office visit fee.
4        AFTHRSnon-normal hoursPremium paid on service fees in compensation for practicing outside of normal working hours.
4        ISOLisolation allowancePremium paid on service fees in compensation for practicing in a remote location.
4        OOOout of officePremium paid on service fees in compensation for practicing at a location other than normal working location.
3      _ActInvoiceDetailGenericProviderCodeActInvoiceDetailGenericProviderCodeThe billable item codes to identify provider supplied charges or changes to the total billing of a claim.
4        CANCAPTcancelled appointmentA charge to compensate the provider when a patient cancels an appointment with insufficient time for the provider to make another appointment with another patient.
4        DSCdiscountA reduction in the amount charged as a percentage of the amount. For example a 5% discount for volume purchase.
4        ESAextraordinary service assessmentA premium on a service fee is requested because, due to extenuating circumstances, the service took an extraordinary amount of time or supplies.
4        FFSTOPfee for service top offUnder agreement between the parties (payor and provider), a guaranteed level of income is established for the provider over a specific, pre-determined period of time. The normal course of business for the provider is submission of fee-for-service claims. Should the fee-for-service income during the specified period of time be less than the agreed to amount, a top-up amount is paid to the provider equal to the difference between the fee-for-service total and the guaranteed income amount for that period of time. The details of the agreement may specify (or not) a requirement for repayment to the payor in the event that the fee-for-service income exceeds the guaranteed amount.
4        FNLFEEfinal feeAnticipated or actual final fee associated with treating a patient.
4        FRSTFEEfirst feeAnticipated or actual initial fee associated with treating a patient.
4        MARKUPmarkup or up-chargeAn increase in the amount charged as a percentage of the amount. For example, 12% markup on product cost.
4        MISSAPTmissed appointmentA charge to compensate the provider when a patient does not show for an appointment.
4        PERFEEperiodic feeAnticipated or actual periodic fee associated with treating a patient. For example, expected billing cycle such as monthly, quarterly. The actual period (e.g. monthly, quarterly) is specified in the unit quantity of the Invoice Element.
4        PERMBNSperformance bonusThe amount for a performance bonus that is being requested from a payor for the performance of certain services (childhood immunizations, influenza immunizations, mammograms, pap smears) on a sliding scale. That is, for 90% of childhood immunizations to a maximum of $2200/yr. An invoice is created at the end of the service period (one year) and a code is submitted indicating the percentage achieved and the dollar amount claimed.
4        RESTOCKrestocking feeA charge is requested because the patient failed to pick up the item and it took an amount of time to return it to stock for future use.
4        TRAVELtravelA charge to cover the cost of travel time and/or cost in conjuction with providing a service or product. It may be charged per kilometer or per hour based on the effective agreement.
4        URGENTurgentPremium paid on service fees in compensation for providing an expedited response to an urgent situation.
3      _ActInvoiceDetailTaxCodeActInvoiceDetailTaxCodeThe billable item codes to identify modifications to a billable item charge by a tax factor applied to the amount. As for example 7% provincial sales tax.
4        FSTfederal sales taxFederal tax on transactions such as the Goods and Services Tax (GST)
4        HSTharmonized sales TaxJoint Federal/Provincial Sales Tax
4        PSTprovincial/state sales taxTax levied by the provincial or state jurisdiction such as Provincial Sales Tax
2    _ActInvoiceDetailPreferredAccommodationCodeActInvoiceDetailPreferredAccommodationCodeAn identifying data string for medical facility accommodations.
3      _ActEncounterAccommodationCodeActEncounterAccommodationCodeAccommodation type. In Intent mood, represents the accommodation type requested. In Event mood, represents accommodation assigned/used. In Definition mood, represents the available accommodation type.
4        _HL7AccommodationCodeHL7AccommodationCodeDescription:Accommodation type. In Intent mood, represents the accommodation type requested. In Event mood, represents accommodation assigned/used. In Definition mood, represents the available accommodation type.
5          IIsolationAccommodations used in the care of diseases that are transmitted through casual contact or respiratory transmission.
5          PPrivateAccommodations in which there is only 1 bed.
5          SSuiteUniquely designed and elegantly decorated accommodations with many amenities available for an additional charge.
5          SPSemi-privateAccommodations in which there are 2 beds.
5          WWardAccommodations in which there are 3 or more beds.
2    _ActInvoiceDetailClinicalServiceCodeActInvoiceDetailClinicalServiceCodeAn identifying data string for healthcare procedures.
1  _ActInvoiceGroupCodeActInvoiceGroupCodeType of invoice element that is used to assist in describing an Invoice that is either submitted for adjudication or for which is returned on adjudication results. Invoice elements of this type signify a grouping of one or more children (detail) invoice elements. They do not have intrinsic costing associated with them, but merely reflect the sum of all costing for it's immediate children invoice elements.
2    _ActInvoiceInterGroupCodeActInvoiceInterGroupCodeType of invoice element that is used to assist in describing an Invoice that is either submitted for adjudication or for which is returned on adjudication results. Invoice elements of this type signify a grouping of one or more children (detail) invoice elements. They do not have intrinsic costing associated with them, but merely reflect the sum of all costing for it's immediate children invoice elements. The domain is only specified for an intermediate invoice element group (non-root or non-top level) for an Invoice.
3      CPNDDRGINGcompound drug invoice groupA grouping of invoice element groups and details including the ones specifying the compound ingredients being invoiced. It may also contain generic detail items such as markup.
3      CPNDINDINGcompound ingredient invoice groupA grouping of invoice element details including the one specifying an ingredient drug being invoiced. It may also contain generic detail items such as tax or markup.
3      CPNDSUPINGcompound supply invoice groupA grouping of invoice element groups and details including the ones specifying the compound supplies being invoiced. It may also contain generic detail items such as markup.
3      DRUGINGdrug invoice groupA grouping of invoice element details including the one specifying the drug being invoiced. It may also contain generic detail items such as markup.
3      FRAMEINGframe invoice groupA grouping of invoice element details including the ones specifying the frame fee and the frame dispensing cost that are being invoiced.
3      LENSINGlens invoice groupA grouping of invoice element details including the ones specifying the lens fee and the lens dispensing cost that are being invoiced.
3      PRDINGproduct invoice groupA grouping of invoice element details including the one specifying the product (good or supply) being invoiced. It may also contain generic detail items such as tax or discount.
2    _ActInvoiceRootGroupCodeActInvoiceRootGroupCodeType of invoice element that is used to assist in describing an Invoice that is either submitted for adjudication or for which is returned on adjudication results. Invoice elements of this type signify a grouping of one or more children (detail) invoice elements. They do not have intrinsic costing associated with them, but merely reflect the sum of all costing for it's immediate children invoice elements. Codes from this domain reflect the type of Invoice such as Pharmacy Dispense, Clinical Service and Clinical Product. The domain is only specified for the root (top level) invoice element group for an Invoice.
3      CPINVclinical product invoiceClinical product invoice where the Invoice Grouping contains one or more billable item and is supported by clinical product(s). For example, a crutch or a wheelchair.
3      CSINVclinical service invoiceClinical Services Invoice which can be used to describe a single service, multiple services or repeated services. [1] Single Clinical services invoice where the Invoice Grouping contains one billable item and is supported by one clinical service. For example, a single service for an office visit or simple clinical procedure (e.g. knee mobilization). [2] Multiple Clinical services invoice where the Invoice Grouping contains more than one billable item, supported by one or more clinical services. The services can be distinct and over multiple dates, but for the same patient. This type of invoice includes a series of treatments which must be adjudicated together. For example, an adjustment and ultrasound for a chiropractic session where fees are associated for each of the services and adjudicated (invoiced) together. [3] Repeated Clinical services invoice where the Invoice Grouping contains one or more billable item, supported by the same clinical service repeated over a period of time. For example, the same Chiropractic adjustment (service or treatment) delivered on 3 separate occasions over a period of time at the discretion of the provider (e.g. month).
3      CSPINVclinical service and productA clinical Invoice Grouping consisting of one or more services and one or more product. Billing for these service(s) and product(s) are supported by multiple clinical billable events (acts). All items in the Invoice Grouping must be adjudicated together to be acceptable to the Adjudicator. For example , a brace (product) invoiced together with the fitting (service).
3      FININVfinancial invoiceInvoice Grouping without clinical justification. These will not require identification of participants and associations from a clinical context such as patient and provider. Examples are interest charges and mileage.
3      OHSINVoral health serviceA clinical Invoice Grouping consisting of one or more oral health services. Billing for these service(s) are supported by multiple clinical billable events (acts). All items in the Invoice Grouping must be adjudicated together to be acceptable to the Adjudicator.
3      PAINVpreferred accommodation invoiceHealthCare facility preferred accommodation invoice.
3      RXCINVRx compound invoicePharmacy dispense invoice for a compound.
3      RXDINVRx dispense invoicePharmacy dispense invoice not involving a compound
3      SBFINVsessional or block fee invoiceClinical services invoice where the Invoice Group contains one billable item for multiple clinical services in one or more sessions.
3      VRXINVvision dispense invoiceVision dispense invoice for up to 2 lens (left and right), frame and optional discount. Eye exams are invoiced as a clinical service invoice.
0_ActInvoiceElementSummaryCodeActInvoiceElementSummaryCodeIdentifies the different types of summary information that can be reported by queries dealing with Statement of Financial Activity (SOFA). The summary information is generally used to help resolve balance discrepancies between providers and payors.
1  _InvoiceElementAdjudicatedInvoiceElementAdjudicatedTotal counts and total net amounts adjudicated for all Invoice Groupings that were adjudicated within a time period based on the adjudication date of the Invoice Grouping.
2    ADNFPPELATadjud. nullified prior-period electronic amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date), subsequently cancelled in the specified period and submitted electronically.
2    ADNFPPELCTadjud. nullified prior-period electronic countIdentifies the total number of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date), subsequently cancelled in the specified period and submitted electronically.
2    ADNFPPMNATadjud. nullified prior-period manual amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date), subsequently cancelled in the specified period and submitted manually.
2    ADNFPPMNCTadjud. nullified prior-period manual countIdentifies the total number of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date), subsequently cancelled in the specified period and submitted manually.
2    ADNFSPELATadjud. nullified same-period electronic amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date), subsequently nullified in the specified period and submitted electronically.
2    ADNFSPELCTadjud. nullified same-period electronic countIdentifies the total number of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date), subsequently nullified in the specified period and submitted electronically.
2    ADNFSPMNATadjud. nullified same-period manual amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date), subsequently cancelled in the specified period and submitted manually.
2    ADNFSPMNCTadjud. nullified same-period manual countIdentifies the total number of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date), subsequently cancelled in the specified period and submitted manually.
2    ADNPPPELATadjud. non-payee payable prior-period electronic amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date) that do not match a specified payee (e.g. pay patient) and submitted electronically.
2    ADNPPPELCTadjud. non-payee payable prior-period electronic countIdentifies the total number of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date) that do not match a specified payee (e.g. pay patient) and submitted electronically.
2    ADNPPPMNATadjud. non-payee payable prior-period manual amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date) that do not match a specified payee (e.g. pay patient) and submitted manually.
2    ADNPPPMNCTadjud. non-payee payable prior-period manual countIdentifies the total number of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date) that do not match a specified payee (e.g. pay patient) and submitted manually.
2    ADNPSPELATadjud. non-payee payable same-period electronic amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date) that do not match a specified payee (e.g. pay patient) and submitted electronically.
2    ADNPSPELCTadjud. non-payee payable same-period electronic countIdentifies the total number of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date) that do not match a specified payee (e.g. pay patient) and submitted electronically.
2    ADNPSPMNATadjud. non-payee payable same-period manual amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date) that do not match a specified payee (e.g. pay patient) and submitted manually.
2    ADNPSPMNCTadjud. non-payee payable same-period manual countIdentifies the total number of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date) that do not match a specified payee (e.g. pay patient) and submitted manually.
2    ADPPPPELATadjud. payee payable prior-period electronic amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date) that match a specified payee (e.g. pay provider) and submitted electronically.
2    ADPPPPELCTadjud. payee payable prior-period electronic countIdentifies the total number of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date) that match a specified payee (e.g. pay provider) and submitted electronically.
2    ADPPPPMNATadjud. payee payable prior-period manual amoutIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date) that match a specified payee (e.g. pay provider) and submitted manually.
2    ADPPPPMNCTadjud. payee payable prior-period manual countIdentifies the total number of all Invoice Groupings that were adjudicated as payable prior to the specified time period (based on adjudication date) that match a specified payee (e.g. pay provider) and submitted manually.
2    ADPPSPELATadjud. payee payable same-period electronic amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date) that match a specified payee (e.g. pay provider) and submitted electronically.
2    ADPPSPELCTadjud. payee payable same-period electronic countIdentifies the total number of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date) that match a specified payee (e.g. pay provider) and submitted electronically.
2    ADPPSPMNATadjud. payee payable same-period manual amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date) that match a specified payee (e.g. pay provider) and submitted manually.
2    ADPPSPMNCTadjud. payee payable same-period manual countIdentifies the total number of all Invoice Groupings that were adjudicated as payable during the specified time period (based on adjudication date) that match a specified payee (e.g. pay provider) and submitted manually.
2    ADRFPPELATadjud. refused prior-period electronic amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as refused prior to the specified time period (based on adjudication date) and submitted electronically.
2    ADRFPPELCTadjud. refused prior-period electronic countIdentifies the total number of all Invoice Groupings that were adjudicated as refused prior to the specified time period (based on adjudication date) and submitted electronically.
2    ADRFPPMNATadjud. refused prior-period manual amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as refused prior to the specified time period (based on adjudication date) and submitted manually.
2    ADRFPPMNCTadjud. refused prior-period manual countIdentifies the total number of all Invoice Groupings that were adjudicated as refused prior to the specified time period (based on adjudication date) and submitted manually.
2    ADRFSPELATadjud. refused same-period electronic amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as refused during the specified time period (based on adjudication date) and submitted electronically.
2    ADRFSPELCTadjud. refused same-period electronic countIdentifies the total number of all Invoice Groupings that were adjudicated as refused during the specified time period (based on adjudication date) and submitted electronically.
2    ADRFSPMNATadjud. refused same-period manual amountIdentifies the total net amount of all Invoice Groupings that were adjudicated as refused during the specified time period (based on adjudication date) and submitted manually.
2    ADRFSPMNCTadjud. refused same-period manual countIdentifies the total number of all Invoice Groupings that were adjudicated as refused during the specified time period (based on adjudication date) and submitted manually.
1  _InvoiceElementPaidInvoiceElementPaidTotal counts and total net amounts paid for all Invoice Groupings that were paid within a time period based on the payment date.
2    PDNFPPELATpaid nullified prior-period electronic amountIdentifies the total net amount of all Invoice Groupings that were paid prior to the specified time period (based on payment date), subsequently nullified in the specified period and submitted electronically.
2    PDNFPPELCTpaid nullified prior-period electronic countIdentifies the total number of all Invoice Groupings that were paid prior to the specified time period (based on payment date), subsequently nullified in the specified period and submitted electronically.
2    PDNFPPMNATpaid nullified prior-period manual amountIdentifies the total net amount of all Invoice Groupings that were paid prior to the specified time period (based on payment date), subsequently nullified in the specified period and submitted manually.
2    PDNFPPMNCTpaid nullified prior-period manual countIdentifies the total number of all Invoice Groupings that were paid prior to the specified time period (based on payment date), subsequently nullified in the specified period and submitted manually.
2    PDNFSPELATpaid nullified same-period electronic amountIdentifies the total net amount of all Invoice Groupings that were paid during the specified time period (based on payment date), subsequently nullified in the specified period and submitted electronically.
2    PDNFSPELCTpaid nullified same-period electronic countIdentifies the total number of all Invoice Groupings that were paid during the specified time period (based on payment date), subsequently cancelled in the specified period and submitted electronically.
2    PDNFSPMNATpaid nullified same-period manual amountIdentifies the total net amount of all Invoice Groupings that were paid during the specified time period (based on payment date), subsequently nullified in the specified period and submitted manually.
2    PDNFSPMNCTpaid nullified same-period manual countIdentifies the total number of all Invoice Groupings that were paid during the specified time period (based on payment date), subsequently nullified in the specified period and submitted manually.
2    PDNPPPELATpaid non-payee payable prior-period electronic amountIdentifies the total net amount of all Invoice Groupings that were paid prior to the specified time period (based on payment date) that do not match a specified payee (e.g. pay patient) and submitted electronically.
2    PDNPPPELCTpaid non-payee payable prior-period electronic countIdentifies the total number of all Invoice Groupings that were paid prior to the specified time period (based on payment date) that do not match a specified payee (e.g. pay patient) and submitted electronically.
2    PDNPPPMNATpaid non-payee payable prior-period manual amountIdentifies the total net amount of all Invoice Groupings that were paid prior to the specified time period (based on payment date) that do not match a specified payee (e.g. pay patient) and submitted manually.
2    PDNPPPMNCTpaid non-payee payable prior-period manual countIdentifies the total number of all Invoice Groupings that were paid prior to the specified time period (based on payment date) that do not match a specified payee (e.g. pay patient) and submitted manually.
2    PDNPSPELATpaid non-payee payable same-period electronic amountIdentifies the total net amount of all Invoice Groupings that were paid during the specified time period (based on payment date) that do not match a specified payee (e.g. pay patient) and submitted electronically.
2    PDNPSPELCTpaid non-payee payable same-period electronic countIdentifies the total number of all Invoice Groupings that were paid during the specified time period (based on payment date) that do not match a specified payee (e.g. pay patient) and submitted electronically.
2    PDNPSPMNATpaid non-payee payable same-period manual amountIdentifies the total net amount of all Invoice Groupings that were paid during the specified time period (based on payment date) that do not match a specified payee (e.g. pay patient) and submitted manually.
2    PDNPSPMNCTpaid non-payee payable same-period manual countIdentifies the total number of all Invoice Groupings that were paid during the specified time period (based on payment date) that do not match a specified payee (e.g. pay patient) and submitted manually.
2    PDPPPPELATpaid payee payable prior-period electronic amountIdentifies the total net amount of all Invoice Groupings that were paid prior to the specified time period (based on payment date) that match a specified payee (e.g. pay provider) and submitted electronically.
2    PDPPPPELCTpaid payee payable prior-period electronic countIdentifies the total number of all Invoice Groupings that were paid prior to the specified time period (based on payment date) that match a specified payee (e.g. pay provider) and submitted electronically.
2    PDPPPPMNATpaid payee payable prior-period manual amountIdentifies the total net amount of all Invoice Groupings that were paid prior to the specified time period (based on payment date) that match a specified payee (e.g. pay provider) and submitted manually.
2    PDPPPPMNCTpaid payee payable prior-period manual countIdentifies the total number of all Invoice Groupings that were paid prior to the specified time period (based on payment date) that match a specified payee (e.g. pay provider) and submitted manually.
2    PDPPSPELATpaid payee payable same-period electronic amountIdentifies the total net amount of all Invoice Groupings that were paid during the specified time period (based on payment date) that match a specified payee (e.g. pay provider) and submitted electronically.
2    PDPPSPELCTpaid payee payable same-period electronic countIdentifies the total number of all Invoice Groupings that were paid during the specified time period (based on payment date) that match a specified payee (e.g. pay provider) and submitted electronically.
2    PDPPSPMNATpaid payee payable same-period manual amountIdentifies the total net amount of all Invoice Groupings that were paid during the specified time period (based on payment date) that match a specified payee (e.g. pay provider) and submitted manually.
2    PDPPSPMNCTpaid payee payable same-period manual countIdentifies the total number of all Invoice Groupings that were paid during the specified time period (based on payment date) that match a specified payee (e.g. pay provider) and submitted manually.
1  _InvoiceElementSubmittedInvoiceElementSubmittedTotal counts and total net amounts billed for all Invoice Groupings that were submitted within a time period. Adjudicated invoice elements are included.
2    SBBLELATsubmitted billed electronic amountIdentifies the total net amount billed for all submitted Invoice Groupings within a time period and submitted electronically. Adjudicated invoice elements are included.
2    SBBLELCTsubmitted billed electronic countIdentifies the total number of submitted Invoice Groupings within a time period and submitted electronically. Adjudicated invoice elements are included.
2    SBNFELATsubmitted nullified electronic amountIdentifies the total net amount billed for all submitted Invoice Groupings that were nullified within a time period and submitted electronically. Adjudicated invoice elements are included.
2    SBNFELCTsubmitted cancelled electronic countIdentifies the total number of submitted Invoice Groupings that were nullified within a time period and submitted electronically. Adjudicated invoice elements are included.
2    SBPDELATsubmitted pending electronic amountIdentifies the total net amount billed for all submitted Invoice Groupings that are pended or held by the payor, within a time period and submitted electronically. Adjudicated invoice elements are not included.
2    SBPDELCTsubmitted pending electronic countIdentifies the total number of submitted Invoice Groupings that are pended or held by the payor, within a time period and submitted electronically. Adjudicated invoice elements are not included.
0_ActInvoiceOverrideCodeActInvoiceOverrideCodeIncludes coded responses that will occur as a result of the adjudication of an electronic invoice at a summary level and provides guidance on interpretation of the referenced adjudication results.
1  COVGEcoverage problemInsurance coverage problems have been encountered. Additional explanation information to be supplied.
1  EFORMelectronic form to followElectronic form with supporting or additional information to follow.
1  FAXfax to followFax with supporting or additional information to follow.
1  GFTHgood faith indicatorThe medical service was provided to a patient in good faith that they had medical coverage, although no evidence of coverage was available before service was rendered.
1  LATElate invoiceKnowingly over the payor's published time limit for this invoice possibly due to a previous payor's delays in processing. Additional reason information will be supplied.
1  MANUALmanual reviewManual review of the invoice is requested. Additional information to be supplied. This may be used in the case of an appeal.
1  OOJout of jurisdictionThe medical service and/or product was provided to a patient that has coverage in another jurisdiction.
1  ORTHOorthodontic serviceThe service provided is required for orthodontic purposes. If the covered party has orthodontic coverage, then the service may be paid.
1  PAPERpaper documentation to followPaper documentation (or other physical format) with supporting or additional information to follow.
1  PIEpublic insurance exhaustedPublic Insurance has been exhausted. Invoice has not been sent to Public Insuror and therefore no Explanation Of Benefits (EOB) is provided with this Invoice submission.
1  PYRDELAYdelayed by a previous payorAllows provider to explain lateness of invoice to a subsequent payor.
1  REFNRreferral not requiredRules of practice do not require a physician's referral for the provider to perform a billable service.
1  REPSERVrepeated serviceThe same service was delivered within a time period that would usually indicate a duplicate billing. However, the repeated service is a medical necessity and therefore not a duplicate.
1  UNRELATunrelated serviceThe service provided is not related to another billed service. For example, 2 unrelated services provided on the same day to the same patient which may normally result in a refused payment for one of the items.
1  VERBAUTHverbal authorizationThe provider has received a verbal permission from an authoritative source to perform the service or supply the item being invoiced.
0_ActListCodeActListCodeProvides codes associated with ActClass value of LIST (working list)
1  _ActObservationListActObservationListActObservationList
2    CARELISTcare planList of acts representing a care plan. The acts can be in a varierty of moods including event (EVN) to record acts that have been carried out as part of the care plan.
2    CONDLISTcondition listList of condition observations.
3      INTOLISTintolerance listList of intolerance observations.
3      PROBLISTproblem listList of problem observations.
3      RISKLISTrisk factorsList of risk factor observations.
2    GOALLISTgoal listList of observations in goal mood.
1  _ActTherapyDurationWorkingListCodeActTherapyDurationWorkingListCodeCodes used to identify different types of 'duration-based' working lists. Examples include "Continuous/Chronic", "Short-Term" and "As-Needed".
2    _ActMedicationTherapyDurationWorkingListCodeact medication therapy duration working listDefinition:A collection of concepts that identifies different types of 'duration-based' mediation working lists. Examples:"Continuous/Chronic" "Short-Term" and "As Needed"
3      ACUshort term/acuteDefinition:A list of medications which the patient is only expected to consume for the duration of the current order or limited set of orders and which is not expected to be renewed.
3      CHRONcontinuous/chronicDefinition:A list of medications which are expected to be continued beyond the present order and which the patient should be assumed to be taking unless explicitly stopped.
3      ONETone timeDefinition:A list of medications which the patient is intended to be administered only once.
3      PRNas neededDefinition:A list of medications which the patient will consume intermittently based on the behavior of the condition for which the medication is indicated.
1  MEDLISTmedication listList of medications.
2    CURMEDLISTcurrent medication listList of current medications.
2    DISCMEDLISTdischarge medication listList of discharge medications.
2    HISTMEDLISTmedication historyHistorical list of medications.
0_ActMonitoringProtocolCodeActMonitoringProtocolCodeIdentifies types of monitoring programs
1  CTLSUBControlled SubstanceA monitoring program that focuses on narcotics and/or commonly abused substances that are subject to legal restriction.
1  INVinvestigationalDefinition:A monitoring program that focuses on a drug which is under investigation and has not received regulatory approval for the condition being investigated
1  LUlimited useDescription:A drug that can be prescribed (and reimbursed) only if it meets certain criteria.
1  OTCnon prescription medicineMedicines designated in this way may be supplied for patient use without a prescription. The exact form of categorisation will vary in different realms.
1  RXprescription only medicineSome form of prescription is required before the related medicine can be supplied for a patient. The exact form of regulation will vary in different realms.
1  SAspecial authorizationDefinition:A drug that requires prior approval (to be reimbursed) before being dispensed
1  SACspecial accessDescription:A drug that requires special access permission to be prescribed and dispensed.
0_ActNonObservationIndicationCodeActNonObservationIndicationCodeDescription:Concepts representing indications (reasons for clinical action) other than diagnosis and symptoms.
1  IND01imaging study requiring contrastDescription:Contrast agent required for imaging study.
1  IND02colonoscopy prepDescription:Provision of prescription or direction to consume a product for purposes of bowel clearance in preparation for a colonoscopy.
1  IND03prophylaxisDescription:Provision of medication as a preventative measure during a treatment or other period of increased risk.
1  IND04surgical prophylaxisDescription:Provision of medication during pre-operative phase; e.g., antibiotics before dental surgery or bowel prep before colon surgery.
1  IND05pregnancy prophylaxisDescription:Provision of medication for pregnancy --e.g., vitamins, antibiotic treatments for vaginal tract colonization, etc.
0_ActObservationVerificationTypeact observation verificationIdentifies the type of verification investigation being undertaken with respect to the subject of the verification activity. Examples: Verification of eligibility for coverage under a policy or program - aka enrolled/covered by a policy or program Verification of record - e.g., person has record in an immunization registry Verification of enumeration - e.g. NPI Verification of Board Certification - provider specific Verification of Certification - e.g. JAHCO, NCQA, URAC Verification of Conformance - e.g. entity use with HIPAA, conformant to the CCHIT EHR system criteria Verification of Provider Credentials Verification of no adverse findings - e.g. on National Provider Data Bank, Health Integrity Protection Data Base (HIPDB)
1  VFPAPERverify paperDefinition:Indicates that the paper version of the record has, should be or is being verified against the electronic version.
0_ActPaymentCodeActPaymentCodeCode identifying the method or the movement of payment instructions. Codes are drawn from X12 data element 591 (PaymentMethodCode)
1  ACHAutomated Clearing HouseAutomated Clearing House (ACH).
1  CHKChequeA written order to a bank to pay the amount specified from funds on deposit.
1  DDPDirect DepositElectronic Funds Transfer (EFT) deposit into the payee's bank account
1  NONNon-Payment DataNon-Payment Data.
0_ActPharmacySupplyTypeActPharmacySupplyTypeIdentifies types of dispensing events
1  DFDaily FillA fill providing sufficient supply for one day
1  EMEmergency SupplyA supply action where there is no 'valid' order for the supplied medication. E.g. Emergency vacation supply, weekend supply (when prescriber is unavailable to provide a renewal prescription)
2    SOScript OwingAn emergency supply where the expectation is that a formal order authorizing the supply will be provided at a later date.
1  FFFirst FillThe initial fill against an order. (This includes initial fills against refill orders.)
2    FFCFirst Fill - CompleteA first fill where the quantity supplied is equal to one full repetition of the ordered amount. (e.g. If the order was 90 tablets, 3 refills, a complete fill would be for the full 90 tablets).
2    FFPFirst Fill - Part FillA first fill where the quantity supplied is less than one full repetition of the ordered amount. (e.g. If the order was 90 tablets, 3 refills, a partial fill might be for only 30 tablets.)
2    FFSSfirst fill, partial strengthA first fill where the strength supplied is less than the ordered strength. (e.g. 10mg for an order of 50mg where a subsequent fill will dispense 40mg tablets).
2    TFTrial FillA fill where a small portion is provided to allow for determination of the therapy effectiveness and patient tolerance.
1  FSFloor stockA supply action to restock a smaller more local dispensary.
1  MSManufacturer SampleA supply of a manufacturer sample
1  RFRefillA fill against an order that has already been filled (or partially filled) at least once.
2    UDUnit DoseA supply action that provides sufficient material for a single dose.
2    RFCRefill - CompleteA refill where the quantity supplied is equal to one full repetition of the ordered amount. (e.g. If the order was 90 tablets, 3 refills, a complete fill would be for the full 90 tablets.)
3      RFCSrefill complete partial strengthA refill where the quantity supplied is equal to one full repetition of the ordered amount. (e.g. If the order was 90 tablets, 3 refills, a complete fill would be for the full 90 tablets.) and where the strength supplied is less than the ordered strength (e.g. 10mg for an order of 50mg where a subsequent fill will dispense 40mg tablets).
2    RFFRefill (First fill this facility)The first fill against an order that has already been filled at least once at another facility.
3      RFFSrefill partial strength (first fill this facility)The first fill against an order that has already been filled at least once at another facility and where the strength supplied is less than the ordered strength (e.g. 10mg for an order of 50mg where a subsequent fill will dispense 40mg tablets).
2    RFPRefill - Part FillA refill where the quantity supplied is less than one full repetition of the ordered amount. (e.g. If the order was 90 tablets, 3 refills, a partial fill might be for only 30 tablets.)
3      RFPSrefill part fill partial strengthA refill where the quantity supplied is less than one full repetition of the ordered amount. (e.g. If the order was 90 tablets, 3 refills, a partial fill might be for only 30 tablets.) and where the strength supplied is less than the ordered strength (e.g. 10mg for an order of 50mg where a subsequent fill will dispense 40mg tablets).
2    RFSrefill partial strengthA fill against an order that has already been filled (or partially filled) at least once and where the strength supplied is less than the ordered strength (e.g. 10mg for an order of 50mg where a subsequent fill will dispense 40mg tablets).
2    TBTrial BalanceA fill where the remainder of a 'complete' fill is provided after a trial fill has been provided.
3      TBStrial balance partial strengthA fill where the remainder of a 'complete' fill is provided after a trial fill has been provided and where the strength supplied is less than the ordered strength (e.g. 10mg for an order of 50mg where a subsequent fill will dispense 40mg tablets).
1  UDEunit dose equivalentA supply action that provides sufficient material for a single dose via multiple products. E.g. 2 50mg tablets for a 100mg unit dose.
0_ActPolicyTypeActPolicyTypeA mandate, regulation, obligation, principle, requirement, rule, or expectation of how an entity is to conduct itself or execute an activity, which may be dictated and enforced by an authority of competent jurisdiction.
1  _ActConsent_ActConsentSpecifies the type or actual definition of a contractually binding agreement or a non-binding representation of that agreement between a grantor and a grantee as to the exchange of the grantee’s considerations in return for the grantor’s control of certain assets. The type of assets exchanged include rights, license, terms of service, valued items, information and real property assets and control over such assets such as physical and locatable property; intellectual property; biospecimen; genomic and genetic information related to an individual including that disclosed by genetically related individuals with or without the individual’s consent; personal identifiable, pseudonymized, anonymized, de-identified per some rubric, and relinkable variants. Usage Note: Types or actual definitions of a contractually binding agreement or a non-binding representation of that agreement include: _ActDecision (formally ActConsentDirective), which specifies the type of decision made by the grantor. The decision types are mapped to ISO/TS 17975 Health informatics — Principles and data requirements for consent in the Collection, Use or Disclosure of personal health information; _ActPrivacyConsentDirective, which is the parent of types of registry participation consent directives, and of realm specific privacy consent directive policies such as _USPrivacyConsentDirective and _GDPRPrivacyConsentDirective.
2    _ActDecision_ActDecisionSpecifies the type of agreement between one or more grantor and grantee in which rights and obligations related to one or more shared items of interest are allocated. Usage Note: Such agreements may be considered "consent directives" or "contracts" depending on the context, and are considered closely related or synonymous from a legal perspective. Examples: Healthcare Privacy Consent Directive permitting or restricting in whole or part the collection, access, use, and disclosure of health information, and any associated handling caveats. Healthcare Medical Consent Directive to receive medical procedures after being informed of risks and benefits, thereby reducing the grantee's liability. Research Informed Consent for participation in clinical trials and disclosure of health information after being informed of risks and benefits, thereby reducing the grantee's liability. Substitute decision maker delegation in which the grantee assumes responsibility to act on behalf of the grantor. Contracts in which the agreement requires assent/dissent by the grantor of terms offered by a grantee, a consumer opts out of an "award" system for use of a retailer's marketing or credit card vendor's point collection cards in exchange for allowing purchase tracking and profiling. A mobile device or App privacy policy and terms of service to which a user must agree in whole or in part in order to utilize the service. Agreements between a client and an authorization server or between an authorization server and a resource operator and/or resource owner permitting or restricting e.g., collection, access, use, and disclosure of information, and any associated handling caveats.
3      GRANTORCHOICEgrantor choiceA grantor's terms of agreement to which a grantee may assent or dissent, and which may include an opportunity for a grantee to request restrictions or extensions. Comment: A grantor typically is able to stipulate preferred terms of agreement when the grantor has control over the topic of the agreement, which a grantee must accept in full or may be offered an opportunity to extend or restrict certain terms. Usage Note: If the grantor's term of agreement must be accepted in full, then this is considered "basic consent". If a grantee is offered an opportunity to extend or restrict certain terms, then the agreement is considered "granular consent". Examples: Healthcare: A PHR account holder [grantor] may require any PHR user [grantee] to accept the terms of agreement in full, or may permit a PHR user to extend or restrict terms selected by the account holder or requested by the PHR user. Non-healthcare: The owner of a resource server [grantor] may require any authorization server [grantee] to meet authorization requirements stipulated in the grantor's terms of agreement.
3      IMPLIEDimplied consentA grantor's presumed assent to the grantee's terms of agreement is based on the grantor's behavior, which may result from not expressly assenting to the consent directive offered, or from having no right to assent or dissent offered by the grantee. Comment: Implied or "implicit" consent occurs when the behavior of the grantor is understood by a reasonable person to signal agreement to the grantee's terms. Usage Note: Implied consent with no opportunity to assent or dissent to certain terms is considered "basic consent". Examples: Healthcare: A patient schedules an appointment with a provider, and either does not take the opportunity to expressly assent or dissent to the provider's consent directive, does not have an opportunity to do so, as in the case where emergency care is required, or simply behaves as though the patient [grantor] agrees to the rights granted to the provider [grantee] in an implicit consent directive. An injured and unconscious patient is deemed to have assented to emergency treatment by those permitted to do so under jurisdictional laws, e.g., Good Samaritan laws. Non-healthcare: Upon receiving a driver's license, the driver is deemed to have assented without explicitly consenting to undergoing field sobriety tests. A corporation that does business in a foreign nation is deemed to have deemed to have assented without explicitly consenting to abide by that nation's laws.
3      IMPLIEDDimplied consent with opportunity to dissentA grantor's presumed assent to the grantee's terms of agreement, which is based on the grantor's behavior, and includes a right to dissent to certain terms. Comment: A grantor assenting to the grantee's terms of agreement may or may not exercise a right to dissent to grantor selected terms or to grantee's selected terms to which a grantor may dissent. Usage Note: Implied or "implicit" consent with an "opportunity to dissent" occurs when the grantor's behavior is understood by a reasonable person to signal assent to the grantee's terms of agreement whether the grantor requests or the grantee approves further restrictions, is considered "granular consent". Examples: Healthcare Examples: A healthcare provider deems a patient's assent to disclosure of health information to family members and friends, but offers an opportunity or permits the patient to dissent to such disclosures. A health information exchanges deems a patient to have assented to disclosure of health information for treatment purposes, but offers the patient an opportunity to dissents to disclosure to particular provider organizations. Non-healthcare Examples: A bank deems a banking customer's assent to specified collection, access, use, or disclosure of financial information as a requirement of holding a bank account, but provides the user an opportunity to limit third-party collection, access, use or disclosure of that information for marketing purposes.
3      NOCONSENTno consentNo notification or opportunity is provided for a grantor to assent or dissent to a grantee's terms of agreement. Comment: A "No Consent" policy scheme provides no opportunity for accommodation of an individual's preferences, and may not comply with Fair Information Practice Principles [FIPP] by enabling the data subject to object, access collected information, correct errors, or have accounting of disclosures. Usage Note: The grantee's terms of agreement, may be available to the grantor by reviewing the grantee's privacy policies, but there is no notice by which a grantor is apprised of the policy directly or able to acknowledge. Examples: Healthcare: Without notification or an opportunity to assent or dissent, a patient's health information is automatically included in and available (often according to certain rules) through a health information exchange. Note that this differs from implied consent, where the patient is assumed to have consented. Without notification or an opportunity to assent or dissent, a patient's health information is collected, accessed, used, or disclosed for research, public health, security, fraud prevention, court order, or law enforcement. Non-healthcare: Without notification or an opportunity to assent or dissent, a consumer's healthcare or non-healthcare internet searches are aggregated for secondary uses such as behavioral tracking and profiling. Without notification or an opportunity to assent or dissent, a consumer's location and activities in a shopping mall are tracked by RFID tags on purchased items.
3      OPTINopt-inA grantor's assent to the terms of an agreement offered by a grantee without an opportunity for to dissent to any terms. Comment: Acceptance of a grantee's terms pertaining, for example, to permissible activities, purposes of use, handling caveats, expiry date, and revocation policies. Usage Note: Opt-in with no opportunity for a grantor to restrict certain permissions sought by the grantee is considered "basic consent". Examples: Healthcare: A patient [grantor] signs a provider's [grantee's] consent directive form, which lists permissible collection, access, use, or disclosure activities, purposes of use, handling caveats, and revocation policies. Non-healthcare: An employee [grantor] signs an employer's [grantee's] non-disclosure and non-compete agreement.
3      OPTINRopt-in with restrictionsA grantor's assent to the grantee's terms of an agreement with an opportunity for to dissent to certain grantor or grantee selected terms. Comment: A grantor dissenting to the grantee's terms of agreement may or may not exercise a right to assent to grantor's pre-approved restrictions or to grantee's selected terms to which a grantor may dissent. Usage Note: Opt-in with restrictions is considered "granular consent" because the grantor has an opportunity to narrow the permissions sought by the grantee. Examples: Healthcare: A patient assent to grantee's consent directive terms for collection, access, use, or disclosure of health information, and dissents to disclosure to certain recipients as allowed by the provider's pre-approved restriction list. Non-Healthcare: A cell phone user assents to the cell phone's privacy practices and terms of use, but dissents from location tracking by turning off the cell phone's tracking capability.
3      OPTOUTop-outA grantor's dissent to the terms of agreement offered by a grantee without an opportunity for to assent to any terms. Comment: Rejection of a grantee's terms of agreement pertaining, for example, to permissible activities, purposes of use, handling caveats, expiry date, and revocation policies. Usage Note: Opt-out with no opportunity for a grantor to permit certain permissions sought by the grantee is considered "basic consent". Examples: Healthcare: A patient [grantor] declines to sign a provider's [grantee's] consent directive form, which lists permissible collection, access, use, or disclosure activities, purposes of use, handling caveats, revocation policies, and consequences of not assenting. Non-healthcare: An employee [grantor] refuses to sign an employer's [grantee's] agreement not to join unions or participate in a strike where state law protects employee's collective bargaining rights. A citizen [grantor] refuses to enroll in mandatory government [grantee] health insurance based on religious beliefs, which is an exemption.
3      OPTOUTEopt-out with exceptionsA grantor's dissent to the grantee's terms of agreement except for certain grantor or grantee selected terms. Comment: A rejection of a grantee's terms of agreement while assenting to certain permissions sought by the grantee or requesting approval of additional grantor terms. Usage Note: Opt-out with exceptions is considered a "granular consent" because the grantor has an opportunity to accept certain permissions sought by the grantee or request additional grantor terms, while rejecting other grantee terms. Examples: Healthcare: A patient [grantor] dissents to a health information exchange consent directive with the exception of disclosure based on a limited "time to live" shared secret [e.g., a token or password], which the patient can give to a provider when seeking care. Non-healthcare: A social media user [grantor] dissents from public access to their account, but assents to access to a circle of friends.
2    _ActPrivacyConsentDirective_ActPrivacyConsentDirectiveSpecifies types of consent directives governing the collection, access, use, or disclosure of personal information, including de-identified information, and personal effects, such as biometrics, biospecimen or genetic material, which may be used to identify an individual.
3      _ActGDPRConsentDirective_ActGDPRConsentDirectiveEuropean Union General Data Protection Regulation (GDPR) consent directives.
4        GDPRCDGDPR Consent DirectiveA consent directive compliant with the European Union General Data Protection Regulation (GDPR) definition: Consent of the data subject means any freely given, specific, informed and unambiguous indication of the data subject's wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her. Where processing is based on consent, the controller shall be able to demonstrate that the data subject has consented to processing of his or her personal data. If the data subject's consent is given in the context of a written declaration which also concerns other matters, the request for consent shall be presented in a manner which is clearly distinguishable from the other matters, in an intelligible and easily accessible form, using clear and plain language. Any part of such a declaration which constitutes an infringement of this Regulation shall not be binding. The data subject shall have the right to withdraw his or her consent at any time. The withdrawal of consent shall not affect the lawfulness of processing based on consent before its withdrawal. Prior to giving consent, the data subject shall be informed thereof. It shall be as easy to withdraw as to give consent. When assessing whether consent is freely given, utmost account shall be taken of whether, inter alia, the performance of a contract, including the provision of a service, is conditional on consent to the processing of personal data that is not necessary for the performance of that contract. Consent should be given by a clear affirmative act establishing a freely given, specific, informed and unambiguous indication of the data subject's agreement to the processing of personal data relating to him or her, such as by a written statement, including by electronic means, or an oral statement. This could include ticking a box when visiting an internet website, choosing technical settings for information society services or another statement or conduct which clearly indicates in this context the data subject's acceptance of the proposed processing of his or her personal data. Silence, pre-ticked boxes or inactivity should not therefore constitute consent. Consent should cover all processing activities carried out for the same purpose or purposes. When the processing has multiple purposes, consent should be given for all of them. If the data subject's consent is to be given following a request by electronic means, the request must be clear, concise and not unnecessarily disruptive to the use of the service for which it is provided. Usage Note: Article 4.11 GDPR Definitions https://gdpr-info.eu/art-4-gdpr/ 11) 'Consent' of the data subject means any freely given, specific, informed and unambiguous indication of the data subject's wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her. Article 7 GDPR Conditions for consent https://gdpr-info.eu/art-7-gdpr Recital 32 Conditions for consent* https://gdpr-info.eu/recitals/no-32 Recital 42 Burden of proof and requirements for consent* https://gdpr-info.eu/recitals/no-42/> Recital 43 Freely given consent* https://gdpr-info.eu/recitals/no-43 GDPR Consent Brief https://gdpr-info.eu/issues/consent/ Art. 4 GDPR Definitions Art. 6 GDPR Lawfulness of processing Art. 7 GDPR Conditions for consent Art. 8 GDPR Conditions applicable to child's consent in relation to information society services Art. 9 GDPR Processing of special categories of personal data Art. 22 GDPR Automated individual decision-making, including profiling Art. 49 GDPR Derogations for specific situations Relevant GDPR Recitals: (32) Conditions for consent (33) Consent to certain areas of scientific research (38) Special protection of children's personal data (40) Lawfulness of data processing (42) Burden of proof and requirements for consent (43) Freely given consent (50) Further processing of personal data (51) Protecting sensitive personal data (54) Processing of sensitive data in public health sector (71) Profiling (111) Exceptions for certain cases of international transfers (155) Processing in the employment context (161) Consenting to the participation in clinical trials (171) Repeal of Directive 95/46/EC and transitional provisions
4        GDPRResearchCDGDPR Research Consent DirectiveA consent directive that complies with regulatory requirements for a consent directive compliant with the European Union General Data Protection Regulation (GDPR) definition: Consent of the data subject means any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her. GDPR research consent directive has the additional caveat that it is often not possible to fully identify the purpose of personal data processing for scientific research purposes at the time of data collection. Therefore, data subjects should be allowed to give their consent to certain areas of scientific research when in keeping with recognized ethical standards for scientific research. Data subjects should have the opportunity to give their consent only to certain areas of research or parts of research projects to the extent allowed by the intended purpose. Usage Note: HL7 Purpose of Use codes include specialize research purposes of use, which could be used to convey a data subject’s purpose of use restrictions related to areas of research or parts of research projects. See citations for GDPRResearchCD and below: Recital 33 Consent to certain areas of scientific research https://gdpr-info.eu/recitals/no-33/> Recital 157 Information from registries and scientific research https://gdpr-info.eu/recitals/no-157 Recital 159 Processing for scientific research purposes* https://gdpr-info.eu/recitals/no-159/
3      _ActGenericConsentDirective_ActGenericConsentDirectiveSpecifies types of consent directives authorizing a registry or repository to collect and, under certain terms, manage the access, use, and disclosure of personal information, including de-identified information, and personal effects, such as biometrics, biospecimen or genetic material, which may be used to identify an individual. Registries governed by registry consent directives are data management systems, which use metadata to support the collection, access, use, and disclosure of personal information or effects as well as observational or analytic information generated about personal information or effects stored in federated repositories. Such registries are used for a variety of purposes by federated health information exchanges, health information systems, personal record systems, and research organizations to locate and retrieve personal information or effects as well as observational or analytic information generated about personal information stored externally to their systems. Repositories governed by registry consent directives are data stores used to collect, access, use, and disclose personal information or effects as well as observational or analytic information generated about personal information or effects and metadata used to manage the repository contents. Such repositories are used for a variety of purposes by centralized health information exchanges, health information systems used by providers and payers, personal record systems, and research organizations. A repository typically includes a registry component that provides the data store with content management capabilities for internal purposes. A repository may also interface with one or more external registries, which provide federated content management.
4        OICopt-in to personal information or effect collection in a registry or repositoryAn expressed privacy consent directive permitting the collection of a some or all personal information, including de-identified information, and personal effects, such as biometrics, biospecimen or genetic material, which may be used to identify an individual in a registry or repository for purposes such as treatment, payment, operations, research, information exchange, public health, data analytics, marketing, and profiling. Usage Note: Useful when a more specific jurisdictional or organizational consent directive policy or form is not specified, available, or known, for example, where an individual wishes to opt-in to collection of some or all of the individual’s information by multiple registries and repositories. Map: An “expressedâ€? consent directive maps to ISO/TS 17975:2015(E) definitions for “Express or Expressed: Consent to Collect, Use and Disclose personal health information is expressly given by the subject of careâ€? and “Opt-inâ€?.
4        OISopt-in to personal information or effect sharing via a registry or repositoryAn expressed privacy consent directive permitting access, use, or disclosure of a some or all personal information, including de-identified information, and personal effects, such as biometrics, biospecimen or genetic material, which may be used to identify an individual in a registry or repository for purposes such as treatment, payment, operations, research, information exchange, public health, data analytics, marketing, and profiling. Usage Note: Useful when a more specific jurisdictional or organizational consent directive policy or form is not specified, available, or known, for example, where an individual wishes to opt-in to access, use, or disclosure of some or all of the individual’s information by multiple registries and repositories. Map: An “expressedâ€? consent directive maps to ISO/TS 17975:2015(E) Express or Expressed: Consent to Collect, Use and Disclose personal health information is expressly given by the subject of care and “Opt-inâ€?.
4        OOCopt-out of personal information or effect collection in a registry or repositoryAn expressed privacy consent directive restricting or prohibiting collection of personal information, including de-identified information, and personal effects, such as biometrics, biospecimen or genetic material, which may be used to identify an individual in a registry or repository for purposes such as treatment, payment, operations, research, information exchange, public health, data analytics, marketing, and profiling. Usage Note: Useful when a more specific jurisdictional or organizational consent directive policy or form is not specified, available, or known, for example, where an individual wishes to opt-out of access, use, or disclosure of some or all of the individual’s information by multiple registries and repositories. Map: An “expressedâ€? opt-out to collection consent directive maps to ISO/TS 17975:2015(E) definitions for “Express or Expressed: Consent to Collect, Use and Disclose personal health information is expressly given by the subject of careâ€? and “Express or Expressed (and Informed) Denialâ€?.
4        OOSopt-out of personal information or effect sharing via a registry or repositoryAn expressed privacy consent directive restricting or prohibiting access, use, or disclosure of personal information, including de-identified information, and personal effects, such as biometrics, biospecimen or genetic material, which may be used to identify an individual in a registry or repository for purposes such as treatment, payment, operations, research, information exchange, public health, data analytics, marketing, and profiling. Usage Note: Useful when a more specific jurisdictional or organizational consent directive policy or form is not specified, available, or known, for example, where an individual wishes to opt-out of access, use, or disclosure of some or all of the individual’s information by multiple registries and repositories. Map: An “expressedâ€? opt-out to sharing consent directive maps to ISO/TS 17975:2015(E) definitions for “Express or Expressed: Consent to Collect, Use and Disclose personal health information is expressly given by the subject of careâ€? and “Express or Expressed (and Informed) Denialâ€?.
3      _ActUSPrivacyConsentDirective_ActUSPrivacyConsentDirectiveSpecific US privacy consent directives in accordance with US federal, state, regional, organizational, or personal privacy policies.
4        42CFRPart2CD42 CFR Part 2 consent directiveA code representing an individual’s privacy consent directive that complies with 42 CFR Part 2.31 Consent requirements https://www.gpo.gov/fdsys/pkg/CFR-2017-title42-vol1/pdf/CFR-2017-title42-vol1-sec2-31.pdf, which is a US Federal law stipulating the policy elements of a written consent to a disclosure under the regulations in Part 2. (1) The name of the patient. (2) The specific name(s) or general designation(s) of the part 2 program(s), entity(ies), or individual(s) permitted to make the disclosure. (3) How much and what kind of information is to be disclosed, including an explicit description of the substance use disorder information that may be disclosed. (4) (i) The name(s) of the individual(s) to whom a disclosure is to be made; or (ii)Entities with a treating provider relationship with the patient. If the recipient entity has a treating provider relationship with the patient whose information is being disclosed, such as a hospital, a health care clinic, or a private practice, the name of that entity; or (iii)Entities without a treating provider relationship with the patient. (A) If the recipient entity does not have a treating provider relationship with the patient whose information is being disclosed and is a third-party payer, the name of the entity; or (B) If the recipient entity does not have a treating provider relationship with the patient whose information is being disclosed and is not covered by paragraph (a)(4)(iii)(A) of this section, such as an entity that facilitates the exchange of health information or a research institution, the name(s) of the entity(-ies); and (1) The name(s) of an individual participant(s); or (2) The name(s) of an entity participant(s) that has a treating provider relationship with the patient whose information is being disclosed; or (3) A general designation of an individual or entity participant(s) or class of participants that must be limited to a participant(s) who has a treating provider relationship with the patient whose information is being disclosed. (i) When using a general designation, a statement must be included on the consent form that the patient (or other individual authorized to sign in lieu of the patient), confirms their understanding that, upon their request and consistent with this part, they must be provided a list of entities to which their information has been disclosed pursuant to the general designation (see Section 2.13(d)). (ii) [Reserved] (5) The purpose of the disclosure. In accordance with Section 2.13(a), the disclosure must be limited to that information which is necessary to carry out the stated purpose. (6) A statement that the consent is subject to revocation at any time except to the extent that the part 2 program or other lawful holder of patient identifying information that is permitted to make the disclosure has already acted in reliance on it. Acting in reliance includes the provision of treatment services in reliance on a valid consent to disclose information to a third-party payer (7) The date, event, or condition upon which the consent will expire if not revoked before. This date, event, or condition must ensure that the consent will last no longer than reasonably necessary to serve the purpose for which it is provided. (8) The signature of the patient and, when required for a patient who is a minor, the signature of an individual authorized to give consent under Section 2.14; or, when required for a patient who is incompetent or deceased, the signature of an individual authorized to sign under Section 2.15. Electronic signatures are permitted to the extent that they are not prohibited by any applicable law. (9) The date on which the consent is signed. Usage Note: Used to indicate the legal authority for assigning security labels to governed information. In this case, where collection, access, use, or disclosure of healthcare information is governed by an individual’s 42 CFR Part 2.31 consent directive, “42CFRPart2CDâ€? as the security label policy code. Since information governed by an individual’s 42 CFR Part 2.31 consent directive has a level of confidentiality protection that is more stringent than the normal level of protection under HIPAA 45 CFR § 164.506 Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf, assign the HL7 Confidentiality code “Râ€? (restricted).
4        CompoundResearchCDCompound HIPAA Research Authorization and Informed Consent for ResearchA code representing an individual’s consent directive that complies with HIPAA Privacy rule 45 CFR Section 164.508 Uses and disclosures for which an authorization is required https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-508.pdf, which is a US Federal law stipulating the policy elements of a valid authorization under this Section specific to disclosures for purposes of research when combined with a Common Rule or Federal Drug Administration consent to participate in research also known as a compound authorization. Usage Note: The Agency for Healthcare Research and Quality (AHRQ) has developed the Informed Consent and Authorization Toolkit for Minimal Risk Research to facilitate the process of obtaining informed consent and Health Insurance Portability and Accountability Act (HIPAA) authorization from potential research subjects. This toolkit contains information for people responsible for ensuring that potential research subjects are informed in a manner that is consistent with medical ethics and regulatory guidelines. From https://www.ahrq.gov/sites/default/files/publications/files/ictoolkit.pdf. Used to indicate the legal authority for assigning security labels to governed information. In this case, where collection, access, use, or disclosure of healthcare information is governed by an individual’s right of access directive under 45 CFR Section 164.508 use “CompoundResearchCDâ€? as the security label policy code. Information or biospecimen disclosed under the Common Rule are not protected by the HIPAA Privacy Rule. If protected under other laws such as confidentiality provisions under the Common Rule, assign the HL7 Confidentiality code “Mâ€? (moderate). See ActCode._ActPolicyType._ActPrivacyPolicy._ActPrivacyLaw._ActUSPrivacyLaw.HIPAAAuth (HIPAA Authorization for Disclosure). See: HIPAAAuth and NIH Sample Authorization Language for Research Uses and Disclosures of Individually Identifiable Health Information by a Covered Health Care Provider https://privacyruleandresearch.nih.gov/authorization.asp
4        HIPAAAuthCDHIPAA Authorization Consent DirectiveA code representing an individual’s consent directive that complies with HIPAA Privacy rule 45 CFR Section 164.508 Uses and disclosures for which an authorization is required https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-508.pdf, which is a US Federal law stipulating the policy elements of a valid authorization under this Section. An “authorizationâ€? is required by the Privacy Rule for uses and disclosures of protected health information not otherwise allowed by the Rule. Where the Privacy Rule requires patient authorization, voluntary consent is not sufficient to permit a use or disclosure of protected health information unless it also satisfies the requirements of a valid authorization. An authorization is a detailed document that gives covered entities permission to use protected health information for specified purposes, which are generally other than treatment, payment, or health care operations, or to disclose protected health information to a third party specified by the individual. An authorization must specify a number of elements, including a description of the protected health information to be used and disclosed, the person authorized to make the use or disclosure, the person to whom the covered entity may make the disclosure, an expiration date, and, in some cases, the purpose for which the information may be used or disclosed. With limited exceptions, covered entities may not condition treatment or coverage on the individual providing an authorization. https://www.hhs.gov/hipaa/for-professionals/faq/264/what-is-the-difference-between-consent-and-authorization/index.html A HIPAA Authorization must comply with 45 CFR Section164.508(c) Implementation specifications: Core elements and requirements – (1) Core elements. A valid authorization under this Section must contain at least the following elements: (i) A description of the information to be used or disclosed that identifies the information in a specific and meaningful fashion. (ii) The name or other specific identification of the person(s), or class of persons, authorized to make the requested use or disclosure. (iii) The name or other specific identification of the person(s), or class of persons, to whom the covered entity may make the requested use or disclosure. (iv) A description of each purpose of the requested use or disclosure. The statement “at the request of the individualâ€? is a sufficient description of the purpose when an individual initiates the authorization and does not, or elects not to, provide a statement of the purpose. (v) An expiration date or an expiration event that relates to the individual or the purpose of the use or disclosure. The statement “end of the research study,â€? “none,â€? or similar language is sufficient if the authorization is for a use or disclosure of protected health information for research, including for the creation and maintenance of a research database or research repository. (vi) Signature of the individual and date. If the authorization is signed by a personal representative of the individual, a description of such representative's authority to act for the individual must also be provided. (2)Required statements. In addition to the core elements, the authorization must contain statements adequate to place the individual on notice of all of the following: (i) The individual's right to revoke the authorization in writing, and either: (A) The exceptions to the right to revoke and a description of how the individual may revoke the authorization; or (B) To the extent that the information in paragraph (c)(2)(i)(A) of this section is included in the notice required by Section 164.520, a reference to the covered entity's notice. https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-508.pdf Usage Note: Used to indicate the legal authority for assigning security labels to HIPAA governed information. In this case, where collection, access, use, or disclosure of healthcare information is governed by a an individual’s HIPAA Authorization for Disclosure, use “HIPAAAuthCDâ€? as the security label policy code. Information governed under a HIPAA Authorization for Disclosure has the level of confidentiality protection afforded under the 45 CFR Section 164.506 - Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf, which is considered the “normâ€?, assign the HL7 Confidentiality code “Nâ€? (normal).
4        HIPAAConsentCDHIPAA Consent DirectiveA code representing U.S. Public Law 104-191 Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule 45 CFR Section 164.522 Rights to request privacy protection for protected health information https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-522.pdf, which stipulates the process by which a covered entity seeks agreement from an individual regarding how it will use and disclose the individual's protected health information for treatment, payment, and health care operations is termed a "consent." Usage Note: Used to indicate the legal authority for assigning security labels to governed information. In this case, where collection, access, use, or disclosure of healthcare information is governed by an individual’s consent directive under 45 CFR Section 164.522 use “HIPAAConsentCDâ€? as the security label policy code. Since information governed by a 45 CFR Section 164.522 has a level of confidentiality protection that is more stringent than the normal level of protection under HIPAA 45 CFR Section 164.506 Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf, assign the HL7 Confidentiality code “Râ€? (restricted).
4        HIPAAResearchAuthCDHIPAA Authorization for Disclosure for Research Consent DirectiveA code representing an individual’s consent directive that complies with HIPAA Privacy rule 45 CFR Section 164.508 Uses and disclosures for which an authorization is required https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-508.pdf, which is a US Federal law stipulating the policy elements of a valid authorization under this Section specific to disclosures for purposes of research. Usage Note: Used to indicate the legal authority for assigning security labels to governed information. In this case, where collection, access, use, or disclosure of healthcare information is governed by an individual’s HIPAA Authorization for Disclosure for Research under 45 CFR Section 164.508 use “HIPAAResearchAuthCDâ€? as the security label policy code. Information disclosed under an individual’s HIPAA Authorization for Disclosure for Research are not protected by the HIPAA Privacy Rule. If protected under other laws such as confidentiality provisions under the Common Rule, assign the HL7 Confidentiality code “Mâ€? (moderate). See ActCode._ActPolicyType._ActPrivacyPolicy._ActPrivacyLaw._ActUSPrivacyLaw.HIPAAAuth (HIPAA Authorization for Disclosure). See: HIPAAAuth and NIH Sample Authorization Language for Research Uses and Disclosures of Individually Identifiable Health Information by a Covered Health Care Provider https://privacyruleandresearch.nih.gov/authorization.asp
4        HIPAAROADHIPAA Right of Access DirectiveA code representing U.S. Public Law 104-191 Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule 45 CFR Section 164.524 Access of individuals to protected health information https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-524.pdf, stipulating the policy elements of an individual’s written and signed right of access directive requesting that a covered entity send the individual’s protected health information (PHI) to a third party. See 45 CFR 164.524(c)(3)(ii) If an individual's request for access directs the covered entity to transmit the copy of protected health information directly to another person designated by the individual, the covered entity must provide the copy to the person designated by the individual. The individual's request must be in writing, signed by the individual, and clearly identify the designated person and where to send the copy of protected health information. https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-524.pdf This right applies to PHI in a designated record set, which is defined as “Designated record set means: (1) A group of records maintained by or for a covered entity that is: (i) The medical records and billing records about individuals maintained by or for a covered health care provider; (ii) The enrollment, payment, claims adjudication, and case or medical management record systems maintained by or for a health plan; or (iii) Used, in whole or in part, by or for the covered entity to make decisions about individuals. [https://www.law.cornell.edu/cfr/text/45/164.501]. Also see HHS Individuals’ Right under HIPAA to Access their Health Information 45 CFR Section 164.524 [https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/access/index.html#maximumflatfee]. Usage Note: Used to indicate the legal authority for assigning security labels to governed information. In this case, where collection, access, use, or disclosure of healthcare information is governed by an individual’s right of access directive under 45 CFR Section 164.524 use “HIPAAROADâ€? as the security label policy code. Information disclosed under a HIPAA 42 CFR Section 164.524 no longer has the level of confidentiality protection afforded under the 45 CFR Section 164.506 - Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-508.pdf, which is considered the “normâ€?, assign the HL7 Confidentiality code “Mâ€? (moderate), which may be protected under other laws such as the Federal Trade Commission privacy and security regulations.
4        MDHHS-5515Michigan Consent to Share Behavioral Health Information for Care Coordination PurposesMichigan’s standard consent form for the sharing of health information specific to behavioral health and substance use treatment in accordance with Public Act 129 of 2014. In Michigan, while providers are not required to use this new standard form (MDHHS-5515), they are required to accept it. Usage Note: For legislative background, current MDHHS-5515 consent directive form, and provider and patient FAQs see http://www.michigan.gov/mdhhs/0,5885,7-339-71550_2941_58005-343686--,00.html
1  _ActInformationActionPolicy_ActInformationActionPolicyThe type of action permitted on information by jurisdictional, organizational, or personal policy.
2    INFOACCESSaccess informationAuthorization to obtain information with no further permission to collect and store it.
2    INFOCOLLECTcollect informationAuthorization to gather and store information.
2    INFODEIDENTIFIYdeidentify informationAuthorization to alter or remove identifying characteristics of an entity or individual that is a subject of the information.
2    INFODISCLOSEdisclose informationAuthorization to make information known to another party.
2    INFOMASKmask informationAuthorization to alter information in order to conceal it from unauthorized recipients.
2    INFOREADONLYread only informationAuthorization to access information within a specific context for communication purposes only. Storing, manipulating, and further disclosure are prohibited and may be technically disabled.
2    INFOREDACTredact informationAuthorization to remove information that a recipient is not authorized to access.
2    INFOREDISCLOSEredisclose informationAuthorization to make disclosed information known to another party.
2    INFOREIDENTIFYreidentify informationAuthorization to alter or relink deidentified information so that an entity or individual that is the subject of that information identifiable.
2    INFOUSEuse informationAuthorization to employ or alter information.
1  _ActInformationPolicy_ActInformationPolicyInformation management directives related to privacy, security, integrity, and control concerns, which may be governed by specific laws; based on private sector self-governance; adopted "best practices" recognized by a community of interest; or terms of license, participation, or service as implemented in jurisdictional, organizational, or personal policies.
2    JurisIPjurisdictional information policyJurisdictional policy on collection, access, use, or disclosure of information as defined by applicable jurisdictional law.
3      JurisCUIjurisdictional controlled unclassified information policyJurisdictional policy on collection, access, use, or disclosure of controlled unclassified information as defined by applicable jurisdictional law.
3      JurisDEIDjurisdictional de-identified information policyJurisdictional policy on collection, access, use, or disclosure of de-identified information as defined by applicable jurisdictional law.
3      JurisLDSjurisdictional limited data setJurisdictional policy on collection, access, use, or disclosure of information in a limited data set as defined by applicable jurisdictional law.
3      JurisNSIjurisdictional non-sensitive information policyJurisdictional policy on collection, access, use, or disclosure of information deemed non-sensitive by applicable jurisdiction law.
3      JurisPIjurisdictional public information policyJurisdictional policy on collection, access, use, or disclosure of information deemed public by applicable jurisdiction law.
3      JurisSP-CUIjurisdictional specified controlled unclassified information policyJurisdictional policy on collection, access, use, or disclosure of specified controlled unclassified information as defined by applicable jurisdictional policy.
3      JurisUUIjurisdictional uncontrolled unclassified information policyJurisdictional policy on collection, access, use, or disclosure of uncontrolled unclassified information as defined by applicable jurisdictional policy.
2    OrgIPorganizational information policyOrganizational policy on collection, access, use, or disclosure of information, which does not conflict with jurisdictional law.
3      OrgCUIorganizational basic controlled unclassified information policyOrganizational policy on collection, access, use, or disclosure of basic controlled unclassified information as defined by the organization or by applicable jurisdictional law.
3      OrgDEIDorganizational de-identified informati)on policyOrganizational policy on collection, access, use, or disclosure of de-identified information as defined by the organization or by applicable jurisdictional law.
3      OrgLDSorganizational limited data set information policyOrganizational policy on collection, access, use, or disclosure of information in a limited data set as defined by the organization or by applicable jurisdictional law.
3      OrgNSIorganizational non-sensitive information policyOrganizational policy on collection, access, use, or disclosure of information deemed non-sensitive by the organization or by applicable jurisdictional law.
3      OrgPIorganizational public information policyOrganizational policy on collection, access, use, or disclosure of public information as defined by the organization or by applicable jurisdictional law.
3      OrgSP-CUIorganizational specified controlled unclassified information policyOrganizational policy on collection, access, use, or disclosure of specified controlled unclassified information as defined by the organization or by applicable jurisdictional law.
3      OrgUUIorganizational uncontrolled unclassified information policyOrganizational policy on collection, access, use, or disclosure of uncontrolled unclassified information as defined by the organization or governing jurisdiction.
2    PersIPpersonal information policyPersonal policy on collection, access, use, or disclosure of information.
3      PersDEIDpersonal de-identified information policyPersonal policy on collection, access, use, or disclosure of de-identified information as defined by the information subject or by applicable jurisdictional law.
3      PersLDSpersonal limited data set information policyPersonal policy personal policy on collection, access, use, or disclosure of information in a limited data set by the information subject.
3      PersNSIpersonal non-sensitive information policyPersonal policy on collection, access, use, or disclosure of information deemed non-sensitive by the information subject.
3      PersPIpersonal public information policyPersonal policy on collection, access, use, or disclosure of information deemed public by the information subject.
1  _ActPrivacyPolicyActPrivacyPolicyA policy deeming certain information to be private to an individual or organization. Definition: A mandate, obligation, requirement, rule, or expectation relating to privacy. Discussion: ActPrivacyPolicyType codes support the designation of the 1..* policies that are applicable to an Act such as a Consent Directive, a Role such as a VIP Patient, or an Entity such as a patient who is a minor. 1..* ActPrivacyPolicyType values may be associated with an Act or Role to indicate the policies that govern the assignment of an Act or Role confidentialityCode. Use of multiple ActPrivacyPolicyType values enables fine grain specification of applicable policies, but must be carefully assigned to ensure cogency and avoid creation of conflicting policy mandates. Usage Note: Statutory title may be named in the ActClassPolicy Act Act.title to specify which privacy policy is being referenced.
2    _ActPrivacyLawActPrivacyLawA jurisdictional mandate, regulation, obligation, requirement, rule, or expectation deeming certain information to be private to an individual or organization, which is imposed on: The activity of a governed party The behavior of a governed party The manner in which an act is executed by a governed party
3      _ActGDPRPrivacyLawGeneral Data Protection RegulationGDPR is a regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (Data Protection Directive). Promulgated by the European Parliament and Council of the European Union. Regulation available at L119, 4 May 2016, p. 1–88. GDPR privacy policies specifying types of lawful personal data processing based on a controller meeting one or more processing condition such as specified by law, compliance with data controller legal obligations, protection of data subject’s vital interests, perform tasks in the public interest, related to legal claims, research and statistics, management of health or social care systems, legitimate interests of controller or third party. Processing sensitive personal data, including genetic, biometric and health data, as well as personal data from which racial and ethnic origin, political opinions, religious or ideological convictions or membership in a union can be attributed to a person, requires meeting at least one sensitive personal processing condition. GDPR ‘processing’ means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction. Article 4 https://gdpr-info.eu/art-4-gdpr/ Usage Note: Confidentiality: e.g., U (unrestricted) for anonymized personal information; L (low) for pseudonymized U (unrestricted) for anonymized personal information; M (moderate) for indirectly identifiable information such as test scores and work times; N (normal) for personal information; and R (restricted) for sensitive personal information DPR sensitivity [personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, and the processing of genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health or data concerning a natural person’s sex life or sexual orientation, some of which are defined at Article 4 https://gdpr-info.eu/art-4-gdpr/ GDPR processing policies and GDPR ConsentDirectiveTypes, such as data subject consent and research consent. Other security category codes, such as compartment codes for legitimate relationship, Handling instructions including Purpose of use stipulated in a GDPR consent or contract restricting processing or related to the scope of the processing policy such as public health, research, and legal obligations Obligation policies such as GDPR Information Obligations https://gdpr-info.eu/issues/information-obligations, data minimization and deleting when processing is complete Refrain policies such as no relinking See Intersoft GDPR at https://gdpr-info.eu/issues/personal-data/ Art. 4 GDPR Definitions https://gdpr-info.eu/art-4-gdpr/ Art. 9 GDPR Processing of special categories of personal data https://gdpr-info.eu/art-9-gdpr/ Relevant Recitals (26) Not applicable to anonymous data (30) Online identifiers for profiling and identification (34) Genetic data (35) Health data (51) Protecting sensitive personal data at Intersoft GDPR briefing papers and navigating tool https://gdpr-info.eu/ Authorities European Data Protection Supervisor - Security Measures for Personal Data Processing (Link) Data Protection Authority Isle of Man - Know your data – Mapping the 5 W’s (Link) Data Protection Authority UK - Key definitions (Link) European Commission - What is personal data? (Link) European Commission - What personal data is considered sensitive? (Link) EU publications - Handbook on European data protection law – Personal data, page 83 (Link) Expert contribution A&L Goodbody - The GDPR: A Guide for Businesses – Definition of Personal & Sensitive Data, Page 8 (Link) Bird & Bird - Sensitive data and lawful processing (Link) https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en General Data Protection Regulation https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1528874672298&uri=CELEX%3A32016R0679 Communication on data protection – guidance on direct application of the GDPR http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1517578296944&uri=CELEX%3A52018DC0043 Intersoft GDPR briefing papers and navigating tool https://gdpr-info.eu/
4        GDPRCONSENTGDPR ConsentProcessing of personal data, inclusive of the special categories of data, is lawful only if the data subject has given explicit consent to the processing of his or her personal data, inclusive of the special categories of data, for one or more specific purposes, except where Union or Member State law provide that the prohibition to use the data may not be lifted by the data subject; and for personal data which are manifestly made public by the data subject. Usage Note: The description is based on the following GDPR provisions: Article 6.1.a https://gdpr-info.eu/art-6-gdpr/ 1Processing shall be lawful only if and to the extent that at least one of the following applies: (a) the data subject has given consent to the processing of his or her personal data for one or more specific purposes. Article 9.1, 9.2a., 9.2.e https://gdpr-info.eu/art-9-gdpr/ 1. Processing of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, and the processing of genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health or data concerning a natural person’s sex life or sexual orientation shall be prohibited. 2. Paragraph 1 shall not apply if one of the following applies: (a) the data subject has given explicit consent to the processing of those personal data for one or more specified purposes, except where Union or Member State law provide that the prohibition referred to in paragraph 1 may not be lifted by the data subject; and (e) processing relates to personal data which are manifestly made public by the data subject.
3      _ActUSPrivacyLaw_ActUSPrivacyLawDefinition: A jurisdictional mandate in the U.S. relating to privacy. Usage Note: ActPrivacyLaw codes may be associated with an Act or a Role to indicate the legal provision to which the assignment of an Act.confidentialityCode or Role.confidentialtyCode complies. May be used to further specify rationale for assignment of other ActPrivacyPolicy codes in the US realm, e.g., ETH and 42CFRPart2 can be differentiated from ETH and Title38Part1.
4        42CFRPart242 CFR Part2A code representing 42 CFR Part 2 Confidentiality of Substance Use Disorder Patient Records. 42 CFR Part 2 stipulates the privacy rights of an individual who has applied for or been given diagnosis or treatment for alcohol or drug abuse at a federally assisted program, which includes non-disclosure of health information relating to health care paid for by a federally assisted substance use disorder program without patient consent. https://www.gpo.gov/fdsys/pkg/CFR-2010-title42-vol1/pdf/CFR-2010-title42-vol1-part2.pdf Usage Note: Used to indicate the legal authority for assigning security labels to governed information. In this case, the collection, access, use, and disclosure of healthcare information is governed by 42 CFR Part 2 Confidentiality of Substance Use Disorder Patient Records https://www.gpo.gov/fdsys/pkg/CFR-2010-title42-vol1/pdf/CFR-2010-title42-vol1-part2.pdf use “42CFRPart2â€? as the security label policy code. Since information governed by a 42 CFR Part 2 has a level of confidentiality protection that is more stringent than the normal level of protection under HIPAA 45 CFR Section 164.506 Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf assign the HL7 Confidentiality code “Râ€? (restricted).
4        a) HIPAAConsentHIPAA ConsentA code representing U.S. Public Law 104-191 Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule (45 CFR Section 164.522), which stipulates the process by which a covered entity seeks agreement from an individual regarding how it will use and disclose the individual's protected health information for treatment, payment, and health care operations is termed a "consent." The Privacy Rule permits, but does not require, a covered entity to voluntarily obtain patient consent for uses and disclosures of protected health information for treatment, payment, and health care operations. Covered entities that do so have complete discretion to design a process that best suits their needs. From https://www.hhs.gov/hipaa/for-professionals/faq/264/what-is-the-difference-between-consent-and-authorization/index.html. The provisions relating to consent are largely contained in Section 164.522 Rights to request privacy protection for protected health information https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-522.pdf. Usage Note: Used to indicate the legal authority for assigning security labels to governed information. In this case, where collection, access, use, or disclosure of healthcare information is governed by 45 CFR Section 164.522 use “HIPAAConsentâ€? as the security label policy code. Since information governed by a 45 CFR Section 164.522 has a level of confidentiality protection that is more stringent than the normal level of protection under HIPAA 45 CFR Section 164.506 Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf, assign the HL7 Confidentiality code “Râ€? (restricted).
4        CommonRuleCommon RuleA code representing U.S. Federal laws governing research-related privacy policies known as the “Common Ruleâ€?. The Common Rule is the U.S. Federal regulations governing the protection of human subjects in research (codified at Subpart A of 45 CFR part 46), which has been adopted by 15 U.S. Federal departments and agencies in an effort to promote uniformity, understanding, and compliance with human subject protections. Existing regulations governing the protection of human subjects in Food and Drug Administration (FDA)-regulated research (21 CFR parts 50, 56, 312, and 812) are separate from the Common Rule but include similar requirements. Usage Note: Used to indicate the legal authority for assigning security labels to governed information. In this case, where collection, access, use, or disclosure of healthcare information or biospecimen is governed by the Common Rule use “COMMONRULEâ€? as the security label policy code. Information or biospecimen disclosed under the Common Rule are not protected by the HIPAA Privacy Rule. If protected under other laws such as confidentiality provisions under the Common Rule, assign the HL7 Confidentiality code “Mâ€? (moderate).
4        HIPAAAuthHIPAA Authorization for DisclosureA code representing U.S. Public Law 104-191 Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule (45 CFR Section 164.508) Uses and disclosures for which an authorization is required https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-508.pdf, which stipulates the process by which a covered entity seeks agreement from an individual to use or disclose protected health information for other purposes, or to authorize another covered entity to disclose protected health information to the requesting covered entity, are termed "authorizations". An “authorizationâ€? is required by the Privacy Rule for uses and disclosures of protected health information not otherwise allowed by the Rule. Where the Privacy Rule requires patient authorization, voluntary consent is not sufficient to permit a use or disclosure of protected health information unless it also satisfies the requirements of a valid authorization. An authorization is a detailed document that gives covered entities permission to use protected health information for specified purposes, which are generally other than treatment, payment, or health care operations, or to disclose protected health information to a third party specified by the individual. An authorization must specify a number of elements, including a description of the protected health information to be used and disclosed, the person authorized to make the use or disclosure, the person to whom the covered entity may make the disclosure, an expiration date, and, in some cases, the purpose for which the information may be used or disclosed. With limited exceptions, covered entities may not condition treatment or coverage on the individual providing an authorization. https://www.hhs.gov/hipaa/for-professionals/faq/264/what-is-the-difference-between-consent-and-authorization/index.html Usage Note: Used to indicate the legal authority for assigning security labels to HIPAA governed information. In this case, where use or disclosure of healthcare information is governed by a covered entity’s HIPAA Authorization for Disclosure, use “HIPAAAuthâ€? as the security label policy code. Information disclosed under a HIPAA Authorization for Disclosure no longer has the level of confidentiality protection afforded under the 45 CFR Section 164.506 - Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-508.pdf, which is considered the “normâ€?, assign the HL7 Confidentiality code “Mâ€? (moderate), which may be protected under other laws such as the Federal Trade Commission privacy and security regulations.
4        HIPAANOPPHIPAA notice of privacy practicesA code representing U.S. Public Law 104-191 Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule (45 CFR Section 164.520), which stipulates an individual’s right to adequate notice of the uses and disclosures of protected health information that may be made by the covered entity, and of the individual's rights and the covered entity's legal duties with respect to protected health information. Relevant HIPAA Privacy Rule provisions are at Section 164.520 (a) Standard: Notice of privacy practices. https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-520.pdf Usage Note: Used to indicate the legal authority for assigning security labels to HIPAA governed information. In this case, if collection, access, use, or disclosure of healthcare information is governed by a covered entity’s HIPAA Notice of Privacy Practices, use “HIPAANOPPâ€? as the security label policy code. Information governed under a HIPAA Notice of Privacy Practices has the level of confidentiality protection afforded under the 45 CFR Section 164.506 - Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf , which is considered the “normâ€?, assign the HL7 Confidentiality code “Nâ€? (normal).
4        HIPAAPsyNotesHIPAA psychotherapy notesA code representing U.S. Public Law 104-191 Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule (45 CFR Section 164.508), which stipulates the privacy rights of an individual who is the subject of psychotherapy notes, and requires authorization for certain uses and disclosure of that information. Definition of Psychotherapy notes 45 CFR Section 164.501 https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-501.pdf: Psychotherapy notes means notes recorded (in any medium) by a health care provider who is a mental health professional documenting or analyzing the contents of conversation during a private counseling session or a group, joint, or family counseling session and that are separated from the rest of the individual's medical record. Psychotherapy notes excludes medication prescription and monitoring, counseling session start and stop times, the modalities and frequencies of treatment furnished, results of clinical tests, and any summary of the following items: Diagnosis, functional status, the treatment plan, symptoms, prognosis, and progress to date. See Section 164.508 Uses and disclosures for which an authorization is required. (2)Authorization required: Psychotherapy notes https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-508.pdf: Notwithstanding any provision of this subpart, other than the transition provisions in Section 164.532, a covered entity must obtain an authorization for any use or disclosure of psychotherapy notes, except: (i) To carry out the following treatment, payment, or health care operations: (A) Use by the originator of the psychotherapy notes for treatment; (B) Use or disclosure by the covered entity for its own training programs in which students, trainees, or practitioners in mental health learn under supervision to practice or improve their skills in group, joint, family, or individual counseling; or (C) Use or disclosure by the covered entity to defend itself in a legal action or other proceeding brought by the individual; and (ii) A use or disclosure that is required by Section 164.502(a)(2)(ii) or permitted by Section 164.512(a); Section 164.512(d) with respect to the oversight of the originator of the psychotherapy notes; Section 164.512(g)(1); Section 164.512(j)(1)(i). Usage Note: Used to indicate the legal authority for assigning security labels to HIPAA governed information. In this case, the collection, access, use, or disclosure of healthcare information is governed by HIPAA 45 CFR 164.508 (2) Authorization required: Psychotherapy notes https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf , use “HIPAAPsyNotesâ€? as the security label policy code. Since information governed by a HIPAA 45 CFR 164.508 (2) has a level of confidentiality protection that is more stringent than the normal level of protection under 45 CFR Section 164.506 Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf, assign the HL7 Confidentiality code “Râ€? (restricted).
4        HIPAAROAHIPAA Right of AccessA code representing U.S. Public Law 104-191 Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule 45 CFR Section 164.524 Access of individuals to protected health information https://www.govinfo.gov/app/details/CFR-2017-title45-vol1/CFR-2017-title45-vol1-sec164-524, which stipulates that an individual has a right of access to inspect and obtain a copy of protected health information about the individual in a designated record set, for as long as the protected health information is maintained in the designated record set with exceptions stipulated in HIPAA Privacy Rule Section 164.524. Exceptions include psychotherapy notes and information compiled in reasonable anticipation of, or for use in, a civil, criminal, or administrative action or proceeding. If an individual's request for access directs the covered entity to transmit the copy of protected health information directly to another person designated by the individual, the covered entity must provide the copy to the person designated by the individual. The individual's request must be in writing, signed by the individual, and clearly identify the designated person and where to send the copy of protected health information. For discussion on extent of right, grounds for denial, and documentation requirements see: HHS Individuals’ Right under HIPAA to Access their Health Information 45 CFR Section 164.524 https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/access/index.html and HHS FAQ on Right of Access vs. HIPAA Authorization https://www.hhs.gov/hipaa/for-professionals/faq/2041/why-depend-on-the-individuals-right/index.html Usage Note: Used to indicate the legal authority for assigning security labels to governed information. In this case, where collection, access, use, or disclosure of healthcare information is governed under 45 CFR Section 164.5224 use “HIPAAROAâ€? as the security label policy code. Information disclosed under a HIPAA 42 CFR Section 164.524 no longer has the level of confidentiality protection afforded under the 45 CFR Section 164.506 - Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-508.pdf, which is considered the “normâ€?, assign the HL7 Confidentiality code “Mâ€? (moderate), which may be protected under other laws such as the Federal Trade Commission privacy and security regulations.
4        HIPAASelfPayHIPAA self-payA code representing 45 CFR 164.522 Rights to request privacy protection for protected health information, which is a US Federal law stipulating the privacy rights of an individual to restrict disclosure of information related to health care items or services for which the individual pays out of pocket in full to a health plan or payer. See 45 CFR 164.522 https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-522.pdf. (vi) A covered entity must agree to the request of an individual to restrict disclosure of protected health information about the individual to a health plan if: (A) The disclosure is for the purpose of carrying out payment or health care operations and is not otherwise required by law; and (B) The protected health information pertains solely to a health care item or service for which the individual, or person other than the health plan on behalf of the individual, has paid the covered entity in full. Usage Note: Used to indicate the legal authority for assigning security labels to HIPAA governed information. In this case, the collection, access, use, or disclosure of healthcare information is governed by HIPAA 45 CFR 164.522 https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-522.pdf use “HIPAASelfPayâ€? as the security label policy code. Since information governed by a HIPAA 45 CFR 164.522 has a level of confidentiality protection that is more stringent than the normal level of protection under 45 CFR Section 164.506 Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf, assign the HL7 Confidentiality code “Râ€? (restricted).
4        Title38Section7332Title 38 Section 7332A code representing Title 38 Section 7332, which is a US Federal law stipulating the privacy rights of veterans diagnosed and treated for substance use disorders, infection with the human immunodeficiency virus, or sickle cell anemia. https://www.gpo.gov/fdsys/granule/USCODE-2011-title38/USCODE-2011-title38-partV-chap73-subchapIII-sec7332/content-detail.html . (1) Records of the identity, diagnosis, prognosis, or treatment of any patient or subject which are maintained in connection with the performance of any program or activity (including education, training, treatment, rehabilitation, or research) relating to drug abuse, alcoholism or alcohol abuse, infection with the human immunodeficiency virus, or sickle cell anemia which is carried out by or for the Department under this title shall, except as provided in subsections (e) and (f), be confidential, and (section 5701 of this title to the contrary notwithstanding) such records may be disclosed only for the purposes and under the circumstances expressly authorized under subsection (b). (2) Paragraph (1) prohibits the disclosure to any person or entity other than the patient or subject concerned of the fact that a special written consent is required in order for such records to be disclosed. (b) (1) The content of any record referred to in subsection (a) may be disclosed by the Secretary in accordance with the prior written consent of the patient or subject with respect to whom such record is maintained, but only to such extent, under such circumstances, and for such purposes as may be allowed in regulations prescribed by the Secretary. (2) Whether or not any patient or subject, with respect to whom any given record referred to in subsection (a) is maintained, gives written consent, the content of such record may be disclosed by the Secretary as follows: (A) To medical personnel to the extent necessary to meet a bona fide medical emergency. (B) To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, but such personnel may not identify, directly or indirectly, any individual patient or subject in any report of such research, audit, or evaluation, or otherwise disclose patient or subject identities in any manner. (C) (i) In the case of any record which is maintained in connection with the performance of any program or activity relating to infection with the human immunodeficiency virus, to a Federal, State, or local public-health authority charged under Federal or State law with the protection of the public health, and to which Federal or State law requires disclosure of such record, if a qualified representative of such authority has made a written request that such record be provided as required pursuant to such law for a purpose authorized by such law. (ii) A person to whom a record is disclosed under this paragraph may not redisclose or use such record for a purpose other than that for which the disclosure was made. (D) If authorized by an appropriate order of a court of competent jurisdiction granted after application showing good cause therefor. In assessing good cause the court shall weigh the public interest and the need for disclosure against the injury to the patient or subject, to the physician-patient relationship, and to the treatment services. Upon the granting of such order, the court, in determining the extent to which any disclosure of all or any part of any record is necessary, shall impose appropriate safeguards against unauthorized disclosure. (E) To an entity described in paragraph (1)(B) of section 5701(k) of this title, but only to the extent authorized by such section. (F) (i) To a representative of a patient who lacks decision-making capacity, when a practitioner deems the content of the given record necessary for that representative to make an informed decision regarding the patient's treatment. (ii) In this subparagraph, the term “representativeâ€? means an individual, organization, or other body authorized under section 7331 of this title and its implementing regulations to give informed consent on behalf of a patient who lacks decision-making capacity. (G) To a State controlled substance monitoring program, including a program approved by the Secretary of Health and Human Services under section 399O of the Public Health Service Act (42 U.S.C. 280g-3), to the extent necessary to prevent misuse and diversion of prescription medicines. (H) (i) To a non-Department entity (including private entities and other Federal agencies) for purposes of providing health care, including hospital care, medical services, and extended care services, to Veterans or performing other health care-related activities or functions. (ii) An entity to which a record is disclosed under this subparagraph may not disclose or use such record for a purpose other than that for which the disclosure was made or as permitted by law. (I) To a third party in order to recover or collect reasonable charges for care furnished to, or paid on behalf of, a Veteran in connection with a non-service connected disability as permitted by section 1729 of this title or for a condition for which recovery is authorized or with respect to which the United States is deemed to be a third party beneficiary under the Act entitled 'An Act to provide for the recovery from tortiously liable third persons of the cost of hospital and medical care and treatment furnished by the United States' (Public Law 87-693; 42 U.S.C. 2651 et seq.; commonly known as the 'Federal Medical Care Recovery Act'). Usage Note: Used to indicate the legal authority for assigning security labels to governed information. In this case, where collection, access, use, or disclosure of healthcare information is governed by 38 U.S. Code Section 7332 - Confidentiality of certain medical records https://www.gpo.gov/fdsys/granule/USCODE-2011-title38/USCODE-2011-title38-partV-chap73-subchapIII-sec7332/content-detail.html use "Title38Section7332" as the security label policy code. Since information governed by a Title 38 Section 7332 has a level of confidentiality protection that is more stringent than the normal level of protection under HIPAA 45 CFR Section 164.506 Uses and disclosures to carry out treatment, payment, or health care operations https://www.gpo.gov/fdsys/pkg/CFR-2017-title45-vol1/pdf/CFR-2017-title45-vol1-sec164-506.pdf, assign the HL7 Confidentiality code "R" (restricted).
2    _InformationSensitivityPolicyInformationSensitivityPolicyA mandate, obligation, requirement, rule, or expectation characterizing the value or importance of a resource and may include its vulnerability. (Based on ISO7498-2:1989. Note: The vulnerability of personally identifiable sensitive information may be based on concerns that the unauthorized disclosure may result in social stigmatization or discrimination.) Description: Types of Sensitivity policy that apply to Acts or Roles. A sensitivity policy is adopted by an enterprise or group of enterprises (a 'policy domain') through a formal data use agreement that stipulates the value, importance, and vulnerability of information. A sensitivity code representing a sensitivity policy may be associated with criteria such as categories of information or sets of information identifiers (e.g., a value set of clinical codes or branch in a code system hierarchy). These criteria may in turn be used for the Policy Decision Point in a Security Engine. A sensitivity code may be used to set the confidentiality code used on information about Acts and Roles to trigger the security mechanisms required to control how security principals (i.e., a person, a machine, a software application) may act on the information (e.g., collection, access, use, or disclosure). Sensitivity codes are never assigned to the transport or business envelope containing patient specific information being exchanged outside of a policy domain as this would disclose the information intended to be protected by the policy. When sensitive information is exchanged with others outside of a policy domain, the confidentiality code on the transport or business envelope conveys the receiver's responsibilities and indicates the how the information is to be safeguarded without unauthorized disclosure of the sensitive information. This ensures that sensitive information is treated by receivers as the sender intends, accomplishing interoperability without point to point negotiations. Usage Note: Sensitivity codes are not useful for interoperability outside of a policy domain because sensitivity policies are typically localized and vary drastically across policy domains even for the same information category because of differing organizational business rules, security policies, and jurisdictional requirements. For example, an employee's sensitivity code would make little sense for use outside of a policy domain. 'Taboo' would rarely be useful outside of a policy domain unless there are jurisdictional requirements requiring that a provider disclose sensitive information to a patient directly. Sensitivity codes may be more appropriate in a legacy system's Master Files in order to notify those who access a patient's orders and observations about the sensitivity policies that apply. Newer systems may have a security engine that uses a sensitivity policy's criteria directly. The specializable InformationSensitivityPolicy Act.code may be useful in some scenarios if used in combination with a sensitivity identifier and/or Act.title.
3      _ActInformationSensitivityPolicyActInformationSensitivityPolicyTypes of sensitivity policies that apply to Acts. Act.confidentialityCode is defined in the RIM as "constraints around appropriate disclosure of information about this Act, regardless of mood." Usage Note: ActSensitivity codes are used to bind information to an Act.confidentialityCode according to local sensitivity policy so that those confidentiality codes can then govern its handling across enterprises. Internally to a policy domain, however, local policies guide the access control system on how end users in that policy domain are able to use information tagged with these sensitivity values.
4        ETHsubstance abuse information sensitivityPolicy for handling alcohol or drug-abuse information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to alcohol or drug-abuse information that is deemed sensitive. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        GDISgenetic disease information sensitivityPolicy for handling genetic disease information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to genetic disease information that is deemed sensitive. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        HIVHIV/AIDS information sensitivityPolicy for handling HIV or AIDS information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to HIV or AIDS information that is deemed sensitive. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        MSTmilitary sexual trauma information sensitivityPolicy for handling information related to sexual assault or repeated, threatening sexual harassment that occurred while the patient was in the military, which is afforded heightened confidentiality. Access control concerns for military sexual trauma is based on the patient being subject to control by a higher ranking military perpetrator and/or censure by others within the military unit. Due to the relatively unfettered access to healthcare information by higher ranking military personnel and those who have command over the patient, there is a need to sequester this information outside of the typical controls on access to military health records. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.
4        PREGNANTpregnancy information sensitivityPolicy for handling information about an individual's current or past pregnancy status, deemed sensitive by the individual or by policy, which may be afforded heightened confidentiality. Usage Note: Information about a patient's current or past pregnancy status may be considered sensitive in circumstances in which that status could result in discrimination or stigmatization.
4        SCAsickle cell anemia information sensitivityPolicy for handling sickle cell disease information, which is afforded heightened confidentiality. Information handling protocols are based on organizational policies related to sickle cell disease information, which is deemed sensitive. Usage Note: If there is a jurisdictional mandate, then the Act valued with this ActCode should be associated with an Act valued with any applicable laws from the ActPrivacyLaw code system.
4        SDVsexual assault, abuse, or domestic violence information sensitivityPolicy for handling sexual assault, abuse, or domestic violence information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to sexual assault, abuse, or domestic violence information that is deemed sensitive. SDV code covers violence perpetrated by related and non-related persons. This code should be specific to physical and mental trauma caused by a related person only. The access control concerns are keeping the patient safe from the perpetrator who may have an abusive psychological control over the patient, may be stalking the patient, or may try to manipulate care givers into allowing the perpetrator to make contact with the patient. The definition needs to be clarified. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        SEXsexuality and reproductive health information sensitivityPolicy for handling sexuality and reproductive health information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to sexuality and reproductive health information that is deemed sensitive. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        SPIspecially protected information sensitivityPolicy for handling information deemed specially protected by law or policy including substance abuse, substance use, psychiatric, mental health, behavioral health, and cognitive disorders, which is afforded heightened confidentiality. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.
5          BHbehavioral health information sensitivityPolicy for handling information related to behavioral and emotional disturbances affecting social adjustment and physical health, which is afforded heightened confidentiality. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.
6            COGNcognitive disability information sensitivityPolicy for handling information related to cognitive disability disorders and conditions caused by these disorders, which are afforded heightened confidentiality. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code. Examples may include dementia, traumatic brain injury, attention deficit, hearing and visual disability such as dyslexia and other disorders and related conditions which impair learning and self-sufficiency. However, the cognitive disabilities to which this term may apply versus other behavioral health categories varies by jurisdiction and organizational policy in part due to overlap with other behavioral health conditions. Implementers should constrain to those diagnoses applicable in the domain in which this code is used.
6            DVDdevelopmental disability information sensitivityPolicy for handling information related to developmental disability disorders and conditions caused by these disorders, which is afforded heightened confidentiality. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code. A diverse group of chronic conditions that are due to mental or physical impairments impacting activities of daily living, self-care, language acuity, learning, mobility, independent living and economic self-sufficiency. Examples may include Down syndrome and Autism spectrum. However, the developmental disabilities to which this term applies versus other behavioral health categories varies by jurisdiction and organizational policy in part due to overlap with other behavioral health conditions. Implementers should constrain to those diagnoses applicable in the domain in which this code is used.
6            EMOTDISemotional disturbance information sensitivityPolicy for handling information related to emotional disturbance disorders and conditions caused by these disorders, which is afforded heightened confidentiality. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code. Typical used to characterize behavioral and mental health issues of adolescents where the disorder may be temporarily diagnosed in order to avoid the potential and unnecessary stigmatizing diagnoses of disorder long term.
5          MHmental health information sensitivityPolicy for handling information related to psychological disorders, which is afforded heightened confidentiality. Mental health information may be deemed specifically sensitive and distinct from physical health, substance use disorders, and behavioral disabilities and disorders in some jurisdictions. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.
5          PSYpsychiatry disorder information sensitivityPolicy for handling psychiatry psychiatric disorder information, which is afforded heightened confidentiality. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
5          PSYTHPNpsychotherapy note information sensitivityPolicy for handling psychotherapy note information, which is afforded heightened confidentiality. Usage Note: In some jurisdiction, disclosure of psychotherapy notes requires patient consent. If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
5          SUDsubstance use disorder information sensitivityPolicy for handling information related to alcohol or drug use disorders and conditions caused by these disorders, which is afforded heightened confidentiality. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.
6            ETHUDalcohol use disorder information sensitivityPolicy for handling information related to alcohol use disorders and conditions caused by these disorders, which is afforded heightened confidentiality. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.
6            OPIOIDUDopioid use disorder information sensitivityPolicy for handling information related to opioid use disorders and conditions caused by these disorders, which is afforded heightened confidentiality. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.
4        STDsexually transmitted disease information sensitivityPolicy for handling sexually transmitted disease information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to sexually transmitted disease information that is deemed sensitive. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        TBOOtabooPolicy for handling information not to be initially disclosed or discussed with patient except by a physician assigned to patient in this case. Information handling protocols based on organizational policies related to sensitive patient information that must be initially discussed with the patient by an attending physician before being disclosed to the patient. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code. Open Issue: This definition conflates a rule and a characteristic, and there may be a similar issue with ts sibling codes.
4        VIOviolence information sensitivityPolicy for handling information related to harm by violence, which is afforded heightened confidentiality. Harm by violence is perpetrated by an unrelated person. Access control concerns for information about mental or physical harm resulting from violence caused by an unrelated person may include manipulation of care givers or access to records that enable the perpetrator contact or locate the patient, but the perpetrator will likely not have established abusive psychological control over the patient. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.
4        SICKLEsickle cellTypes of sensitivity policies that apply to Acts. Act.confidentialityCode is defined in the RIM as "constraints around appropriate disclosure of information about this Act, regardless of mood." Usage Note: ActSensitivity codes are used to bind information to an Act.confidentialityCode according to local sensitivity policy so that those confidentiality codes can then govern its handling across enterprises. Internally to a policy domain, however, local policies guide the access control system on how end users in that policy domain are able to use information tagged with these sensitivity values.
3      _EntitySensitivityPolicyTypeEntityInformationSensitivityPolicyTypes of sensitivity policies that may apply to a sensitive attribute on an Entity. Usage Note: EntitySensitivity codes are used to convey a policy that is applicable to sensitive information conveyed by an entity attribute. May be used to bind a Role.confidentialityCode associated with an Entity per organizational policy. Role.confidentialityCode is defined in the RIM as "an indication of the appropriate disclosure of information about this Role with respect to the playing Entity."
4        DEMOall demographic information sensitivityPolicy for handling all demographic information about an information subject, which will be afforded heightened confidentiality. Policies may govern sensitivity of information related to all demographic about an information subject, the disclosure of which could impact the privacy, well-being, or safety of that subject. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        DOBdate of birth information sensitivityPolicy for handling information related to an information subject's date of birth, which will be afforded heightened confidentiality.Policies may govern sensitivity of information related to an information subject's date of birth, the disclosure of which could impact the privacy, well-being, or safety of that subject. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        GENDERgender and sexual orientation information sensitivityPolicy for handling information related to an information subject's gender and sexual orientation, which will be afforded heightened confidentiality. Policies may govern sensitivity of information related to an information subject's gender and sexual orientation, the disclosure of which could impact the privacy, well-being, or safety of that subject. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        LIVARGliving arrangement information sensitivityPolicy for handling information related to an information subject's living arrangement, which will be afforded heightened confidentiality. Policies may govern sensitivity of information related to an information subject's living arrangement, the disclosure of which could impact the privacy, well-being, or safety of that subject. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        MARSTmarital status information sensitivityPolicy for handling information related to an information subject's marital status, which will be afforded heightened confidentiality. Policies may govern sensitivity of information related to an information subject's marital status, the disclosure of which could impact the privacy, well-being, or safety of that subject. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        PATLOCpatient locationPolicy for handling information related to an individual's location, which is deemed sensitive when the disclosure could impact the privacy, well-being, or safety of that subject, and requires additional protection. Usage Note: If there is a jurisdictional, organizational, or individual mandate, then use the applicable ActPrivacyLaw or ActConsentDirective code from the ActCode system to and specify the law in addition to this more generic code.
4        RACErace information sensitivityPolicy for handling information related to an information subject's race, which will be afforded heightened confidentiality. Policies may govern sensitivity of information related to an information subject's race, the disclosure of which could impact the privacy, well-being, or safety of that subject. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        RELreligion information sensitivityPolicy for handling information related to an information subject's religious affiliation, which will be afforded heightened confidentiality. Policies may govern sensitivity of information related to an information subject's religion, the disclosure of which could impact the privacy, well-being, or safety of that subject. Usage Notes: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
3      _RoleInformationSensitivityPolicyRoleInformationSensitivityPolicyTypes of sensitivity policies that apply to Roles. Usage Notes: RoleSensitivity codes are used to bind information to a Role.confidentialityCode per organizational policy. Role.confidentialityCode is defined in the RIM as "an indication of the appropriate disclosure of information about this Role with respect to the playing Entity."
4        Bbusiness information sensitivityPolicy for handling trade secrets such as financial information or intellectual property, which will be afforded heightened confidentiality. Description: Since the service class can represent knowledge structures that may be considered a trade or business secret, there is sometimes (though rarely) the need to flag those items as of business level confidentiality. Usage Notes: No patient related information may ever be of this confidentiality level. If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        EMPLemployer information sensitivityPolicy for handling information related to an employer which is deemed classified to protect an employee who is the information subject, and which will be afforded heightened confidentiality. Description: Policies may govern sensitivity of information related to an employer, such as law enforcement or national security, the identity of which could impact the privacy, well-being, or safety of an information subject who is an employee. Usage Notes: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        LOCISlocation information sensitivityPolicy for handling information related to the location of the information subject, which will be afforded heightened confidentiality. Description: Policies may govern sensitivity of information related to the location of the information subject, the disclosure of which could impact the privacy, well-being, or safety of that subject. Usage Notes: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
4        SSPsensitive service provider information sensitivityPolicy for handling information related to a provider of sensitive services, which will be afforded heightened confidentiality. Description: Policies may govern sensitivity of information related to providers who deliver sensitive healthcare services in order to protect the privacy, well-being, and safety of the provider and of patients receiving sensitive services. Usage Notes: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
3      ADOLadolescent information sensitivityPolicy for handling information related to an adolescent, which will be afforded heightened confidentiality per applicable organizational or jurisdictional policy. An enterprise may have a policy that requires that adolescent patient information be provided heightened confidentiality. Information deemed sensitive typically includes health information and patient role information including patient status, demographics, next of kin, and location. Usage Note: For use within an enterprise in which an adolescent is the information subject. If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
3      CELcelebrity information sensitivityPolicy for handling information related to a celebrity (people of public interest (VIP), which will be afforded heightened confidentiality. Celebrities are people of public interest (VIP) about whose information an enterprise may have a policy that requires heightened confidentiality. Information deemed sensitive may include health information and patient role information including patient status, demographics, next of kin, and location. Usage Note: For use within an enterprise in which the information subject is deemed a celebrity or very important person. If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
3      DIAdiagnosis information sensitivityPolicy for handling information related to a diagnosis, health condition or health problem, which will be afforded heightened confidentiality. Diagnostic, health condition or health problem related information may be deemed sensitive by organizational policy, and require heightened confidentiality. Usage Note: For use within an enterprise that provides heightened confidentiality to diagnostic, health condition or health problem related information deemed sensitive. If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
3      DRGISdrug information sensitivityPolicy for handling information related to a drug, which will be afforded heightened confidentiality. Drug information may be deemed sensitive by organizational policy, and require heightened confidentiality. Usage Note: For use within an enterprise that provides heightened confidentiality to drug information deemed sensitive. If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
3      EMPemployee information sensitivityPolicy for handling information related to an employee, which will be afforded heightened confidentiality. When a patient is an employee, an enterprise may have a policy that requires heightened confidentiality. Information deemed sensitive typically includes health information and patient role information including patient status, demographics, next of kin, and location. Usage Note: Policy for handling information related to an employee, which will be afforded heightened confidentiality. Description: When a patient is an employee, an enterprise may have a policy that requires heightened confidentiality. Information deemed sensitive typically includes health information and patient role information including patient status, demographics, next of kin, and location.
3      PDSpatient default information sensitivityPolicy for specially protecting information reported by or about a patient, which is deemed sensitive within the enterprise (i.e., by default regardless of whether the patient requested that the information be deemed sensitive for another reason.) For example information reported by the patient about another person, e.g., a family member, may be deemed sensitive by default. Organizational policy may allow the sensitivity tag to be cleared on patient's request. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code. For example, VA deems employee information sensitive by default. Information about a patient who is being stalked or a victim of abuse or violence may be deemed sensitive by default per a provider organization's policies.
3      PHYphysician requested information sensitivityPolicy for handling information about a patient, which a physician or other licensed healthcare provider deems sensitive. Once tagged by the provider, this may trigger alerts for follow up actions according to organizational policy or jurisdictional law. Usage Note: For use within an enterprise that provides heightened confidentiality to certain types of information designated by a physician as sensitive. If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code. Use cases in which this code could be used are, e.g., in systems that lack the ability to automatically detect sensitive information and must rely on manual tagging; a system that lacks an applicable sensitivity tag, or for ad hoc situations where criticality of the situation requires that the tagging be done immediately by the provider before coding or transcription of consult notes can be completed, e.g., upon detection of a patient with suicidal tendencies or potential for violence.
3      PRSpatient requested information sensitivityPolicy for specially protecting information reported by or about a patient, which the patient deems sensitive, and the patient requests that collection, access, use, or disclosure of that information be restricted. For example, a minor patient may request that information about reproductive health not be disclosed to the patient's family or to particular providers and payers. Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.
2    COMPTcompartmentThis is the healthcare analog to the US Intelligence Community's concept of a Special Access Program. Compartment codes may be used in as a field value in an initiator's clearance to indicate permission to access and use an IT Resource with a security label having the same compartment value in security category label field. Map: Aligns with ISO 2382-8 definition of Compartment - "A division of data into isolated blocks with separate security controls for the purpose of reducing risk."
3      ACOCOMPTaccountable care organization compartmentA group of health care entities, which may include health care providers, care givers, hospitals, facilities, health plans, and other health care constituents who coordinate care for reimbursement based on quality metrics for improving outcomes and lowering costs, and may be authorized to access the consumer's health information because of membership in that group. Security Compartment Labels assigned to a consumer's information use in accountable care workflows should be met or exceeded by the Security Compartment attribute claimed by a participant in a an accountable care workflow who is requesting access to that information
3      CTCOMPTcare team compartmentCare coordination across participants in a care plan requires sharing of a healthcare consumer's information specific to that workflow. A care team member should only have access to that information while participating in that workflow or for other authorized uses. Security Compartment Labels assigned to a consumer's information use in care coordination workflows should be met or exceeded by the Security Compartment attribute claimed by a participant in a care team member workflow who is requesting access to that information
3      FMCOMPTfinancial management compartmentFinancial management department members who have access to healthcare consumer information as part of a patient account, billing and claims workflows. Security Compartment Labels assigned to consumer information used in these workflows should be met or exceeded by the Security Compartment attribute claimed by a participant in a financial management workflow who is requesting access to that information.
3      HRCOMPThuman resource compartmentA security category label field value, which indicates that access and use of an IT resource is restricted to members of human resources department or workflow.
3      LRCOMPTlegitimate relationship compartmentProviders and care givers who have an established relationship per criteria determined by policy are considered to have an established care provision relations with a healthcare consumer, and may be authorized to access the consumer's health information because of that relationship. Providers and care givers should only have access to that information while participating in legitimate relationship workflows or for other authorized uses. Security Compartment Labels assigned to a consumer's information use in legitimate relationship workflows should be met or exceeded by the Security Compartment attribute claimed by a participant in a legitimate relationship workflow who is requesting access to that information.
3      PACOMPTpatient administration compartmentPatient administration members who have access to healthcare consumer information as part of a patient administration workflows. Security Compartment Labels assigned to consumer information used in these workflows should be met or exceeded by the Security Compartment attribute claimed by a participant in a patient administration workflow who is requesting access to that information.
3      RESCOMPTresearch project compartmentA security category label field value, which indicates that access and use of an IT resource is restricted to members of a research project.
3      RMGTCOMPTrecords management compartmentA security category label field value, which indicates that access and use of an IT resource is restricted to members of records management department or workflow.
1  ActTrustPolicyTypetrust policyA mandate, obligation, requirement, rule, or expectation conveyed as security metadata between senders and receivers required to establish the reliability, authenticity, and trustworthiness of their transactions. Trust security metadata are observation made about aspects of trust applicable to an IT resource (data, information object, service, or system capability). Trust applicable to IT resources is established and maintained in and among security domains, and may be comprised of observations about the domain's trust authority, trust framework, trust policy, trust interaction rules, means for assessing and monitoring adherence to trust policies, mechanisms that enforce trust, and quality and reliability measures of assurance in those mechanisms. [Based on ISO IEC 10181-1 and NIST SP 800-63-2] For example, identity proofing , level of assurance, and Trust Framework.
2    TRSTACCRDtrust accreditationType of security metadata about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework.
2    TRSTAGREtrust agreementType of security metadata about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1]
2    TRSTASSURtrust assuranceType of security metadata about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol.
2    TRSTCERTtrust certificateType of security metadata about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1]
2    TRSTFWKtrust frameworkType of security metadata about a complete set of contracts, regulations, or commitments that enable participating actors to rely on certain assertions by other actors to fulfill their information security requirements. [Kantara Initiative]
2    TRSTMECtrust mechanismType of security metadata about a security architecture system component that supports enforcement of security policies.
1  COVPOLbenefit policyDescription:A mandate, obligation, requirement, rule, or expectation unilaterally imposed on benefit coverage under a policy or program by a sponsor, underwriter or payor on: The activity of another party The behavior of another party The manner in which an act is executed Examples:A clinical protocol imposed by a payer to which a provider must adhere in order to be paid for providing the service. A formulary from which a provider must select prescribed drugs in order for the patient to incur a lower copay.
1  SecurityPolicysecurity policyTypes of security policies that further specify the ActClassPolicy value set. Examples: obligation to encrypt refrain from redisclosure without consent
2    AUTHPOLauthorization policyAuthorisation policies are essentially security policies related to access-control and specify what activities a subject is permitted or forbidden to do, to a set of target objects. They are designed to protect target objects so are interpreted by access control agents or the run-time systems at the target system. A positive authorisation policy defines the actions that a subject is permitted to perform on a target. A negative authorisation policy specifies the actions that a subject is forbidden to perform on a target. Positive authorisation policies may also include filters to transform the parameters associated with their actions. (Based on PONDERS)
3      ACCESSCONSCHEMEaccess control schemeAn access control policy specific to the type of access control scheme, which is used to enforce one or more authorization policies. Usage Note: Access control schemes are the type of access control policy, which is comprised of access control policy rules concerning the provision of the access control service. There are two categories of access control policies, rule-based and identity-based, which are identified in CCITT Rec. X.800 aka ISO 7498-2. Rule-based access control policies are intended to apply to all access requests by any initiator on any target in a security domain. Identity-based access control policies are based on rules specific to an individual initiator, a group of initiators, entities acting on behalf of initiators, or originators acting in a specific role. Context can modify rule-based or identity-based access control policies. Context rules may define the entire policy in effect. Real systems will usually employ a combination of these policy types; if a rule-based policy is used, then an identity-based policy is usually in effect also. An access control scheme may be based on access control lists, capabilities, labels, and context or a combination of these. An access control scheme is a component of an access control mechanism or "service") along with the supporting mechanisms required by that scheme to provide access control decision information (ADI) supplied by the scheme to the access decision facility (ADF also known as a PDP). (Based on ISO/IEC 10181-3:1996) Examples: Attribute Based Access Control (ABAC) Discretionary Access Control (DAC) History Based Access Control (HBAC) Identity Based Access Control (IBAC) Mandatory Access Control (MAC) Organization Based Access Control (OrBAC) Relationship Based Access Control (RelBac) Responsibility Based Access Control (RespBAC) Risk Adaptable Access Control (RAdAC) >
2    DELEPOLdelegation policyDelegation policies specify which actions subjects are allowed to delegate to others. A delegation policy thus specifies an authorisation to delegate. Subjects must already possess the access rights to be delegated. Delegation policies are aimed at subjects delegating rights to servers or third parties to perform actions on their behalf and are not meant to be the means by which security administrators would assign rights to subjects. A negative delegation policy identifies what delegations are forbidden. A Delegation policy specifies the authorisation policy from which delegated rights are derived, the grantors, which are the entities which can delegate these access rights, and the grantees, which are the entities to which the access rights can be delegated. There are two types of delegation policy, positive and negative. (Based on PONDERS)
2    ObligationPolicyobligation policyConveys the mandated workflow action that an information custodian, receiver, or user must perform. Usage Notes: Per ISO 22600-2, ObligationPolicy instances 'are event-triggered and define actions to be performed by manager agent'. Per HL7 Composite Security and Privacy Domain Analysis Model: This value set refers to the action required to receive the permission specified in the privacy rule. Per OASIS XACML, an obligation is an operation specified in a policy or policy that is performed in conjunction with the enforcement of an access control decision.
3      ANONYanonymizeCustodian system must remove any information that could result in identifying the information subject.
3      AODaccounting of disclosureCustodian system must make available to an information subject upon request an accounting of certain disclosures of the individual’s protected health information over a period of time. Policy may dictate that the accounting include information about the information disclosed, the date of disclosure, the identification of the receiver, the purpose of the disclosure, the time in which the disclosing entity must provide a response and the time period for which accountings of disclosure can be requested.
3      AUDITauditCustodian system must monitor systems to ensure that all users are authorized to operate on information objects.
3      AUDTRaudit trailCustodian system must monitor and maintain retrievable log for each user and operation on information.
3      CPLYCCcomply with confidentiality codeCustodian security system must retrieve, evaluate, and comply with the information handling directions of the Confidentiality Code associated with an information target.
3      CPLYCDcomply with consent directiveCustodian security system must retrieve, evaluate, and comply with applicable information subject consent directives.
3      CPLYJPPcomply with jurisdictional privacy policyCustodian security system must retrieve, evaluate, and comply with applicable jurisdictional privacy policies associated with the target information.
3      CPLYOPPcomply with organizational privacy policyCustodian security system must retrieve, evaluate, and comply with applicable organizational privacy policies associated with the target information.
3      CPLYOSPcomply with organizational security policyCustodian security system must retrieve, evaluate, and comply with the organizational security policies associated with the target information.
3      CPLYPOLcomply with policyCustodian security system must retrieve, evaluate, and comply with applicable policies associated with the target information.
3      DECLASSIFYLABELdeclassify security labelCustodian security system must declassify information assigned security labels by instantiating a new version of the classified information so as to break the binding of the classifying security label when assigning a new security label that marks the information as unclassified in accordance with applicable jurisdictional privacy policies associated with the target information. The system must retain an immutable record of the previous assignment and binding.
3      DEIDdeidentifyCustodian system must strip information of data that would allow the identification of the source of the information or the information subject.
3      DELAUdelete after useCustodian system must remove target information from access after use.
3      DOWNGRDLABELdowngrade security labelCustodian security system must downgrade information assigned security labels by instantiating a new version of the classified information so as to break the binding of the classifying security label when assigning a new security label that marks the information as classified at a less protected level in accordance with applicable jurisdictional privacy policies associated with the target information. The system must retain an immutable record of the previous assignment and binding.
3      DRIVLABELderive security labelCustodian security system must assign and bind security labels derived from compilations of information by aggregation or disaggregation in order to classify information compiled in the information systems under its control for collection, access, use and disclosure in accordance with applicable jurisdictional privacy policies associated with the target information. The system must retain an immutable record of the previous assignment and binding.
3      ENCRYPTencryptCustodian system must render information unreadable by algorithmically transforming plaintext into ciphertext. Usage Notes: A mathematical transposition of a file or data stream so that it cannot be deciphered at the receiving end without the proper key. Encryption is a security feature that assures that only the parties who are supposed to be participating in a videoconference or data transfer are able to do so. It can include a password, public and private keys, or a complex combination of all. (Per Infoway.)
4        ENCRYPTRencrypt at restCustodian system must render information unreadable and unusable by algorithmically transforming plaintext into ciphertext when "at rest" or in storage.
4        ENCRYPTTencrypt in transitCustodian system must render information unreadable and unusable by algorithmically transforming plaintext into ciphertext while "in transit" or being transported by any means.
4        ENCRYPTUencrypt in useCustodian system must render information unreadable and unusable by algorithmically transforming plaintext into ciphertext while in use such that operations permitted on the target information are limited by the license granted to the end user.
3      HUAPRVhuman approvalCustodian system must require human review and approval for permission requested.
3      LABELassign security labelCustodian security system must assign and bind security labels in order to classify information created in the information systems under its control for collection, access, use and disclosure in accordance with applicable jurisdictional privacy policies associated with the target information. The system must retain an immutable record of the assignment and binding. Usage Note: In security systems, security policy label assignments do not change, they may supersede prior assignments, and such reassignments are always tracked for auditing and other purposes.
3      MASKmaskCustodian system must render information unreadable and unusable by algorithmically transforming plaintext into ciphertext. User may be provided a key to decrypt per license or "shared secret".
3      MINECminimum necessaryCustodian must limit access and disclosure to the minimum information required to support an authorized user's purpose of use. Usage Note: Limiting the information available for access and disclosure to that an authorized user or receiver "needs to know" in order to perform permitted workflow or purpose of use.
3      PERSISTLABELpersist security labelCustodian security system must persist the binding of security labels to classify information received or imported by information systems under its control for collection, access, use and disclosure in accordance with applicable jurisdictional privacy policies associated with the target information. The system must retain an immutable record of the assignment and binding.
3      PRIVMARKprivacy markCustodian must create and/or maintain human readable security label tags as required by policy. Map: Aligns with ISO 22600-3 Section A.3.4.3 description of privacy mark: "If present, the privacy-mark is not used for access control. The content of the privacy-mark may be defined by the security policy in force (identified by the security-policy-identifier) which may define a list of values to be used. Alternately, the value may be determined by the originator of the security-label."
3      PSEUDpseudonymizeCustodian system must strip information of data that would allow the identification of the source of the information or the information subject. Custodian may retain a key to relink data necessary to reidentify the information subject.
3      REDACTredactCustodian system must remove information, which is not authorized to be access, used, or disclosed from records made available to otherwise authorized users.
3      UPGRDLABELupgrade security labelCustodian security system must declassify information assigned security labels by instantiating a new version of the classified information so as to break the binding of the classifying security label when assigning a new security label that marks the information as classified at a more protected level in accordance with applicable jurisdictional privacy policies associated with the target information. The system must retain an immutable record of the previous assignment and binding.
2    PrivacyMarkprivacy markAn abstract code for human readable marks indicating, e.g., the level of confidentiality protection, an authorized compartment, the integrity, or the handling instruction required by applicable policy. Such markings must be displayed as directed by applicable policy on electronically rendered information content and any electronic transmittal envelope or container; or on hardcopy information and any physical transmittal envelope or container. Examples of protocols for marking displays on electronic or hardcopy rendered content: Across the top or "banner" of each page ; as a watermark placed diagonally cross each page; at the bottom or "footer" of each page; and may be displayed at the beginning of any portion within the content that required markings different than other portions of the content. The banner or top of page marking typically acts as a "high watermark" by including all of the markings made on any marked portions within the entirety of the information content. Usage Note: A "Privacy Mark" is a Security Control Observation (SECCONOBS) named tag set as specified by the HL7 Privacy and Security Classification System (HCS). A Privacy Mark Named Tag Set is valued with a Privacy Mark leaf code "tag", which is a member of the Security Control Observation Value (_SecurityObservationValue) tag set. Related Security Control Observation named tag sets are Purpose of Use, Obligation Policy, and Refrain Policy, each with their own Security Control Observation Value tag sets. Foundational standard definitions: ISO 22600-3 Section A.3.4.3 - If present, the privacy-mark is not used for access control. The content of the privacy-mark may be defined by the security policy in force (identified by the security-policy-identifier) which may define a list of values to be used. Alternately, the value may be determined by the originator of the security-label. IEEE Security Glossary Compendium 93- CESG Memorandum No.1 Issue 1.2 Oct 1992 - Human readable word or phrase acting as an indicator of all or part of the security constraints that apply to a document so marked. NOTE: A machine readable representation of a marking. Comment: While policies requiring creators, processors, custodians, senders or recipients apply, enforce, and persist applicable Privacy Marks may be dictated by a jurisdiction, organization or personal privacy, security, or integrity policy, those required to comply may be governed under different policies, so compliance may need to be enforced through trust contracts. For example, information content marked with GDPR related policies may require adherence by processors or recipients outside of the European Union. For this reason, this code system is likely to evolve with the inclusion of multiple policy domains needing to communicate encoded policies in a standard, interoperable manner.
3      ControlledUnclassifiedInformationControlledUnclassifiedInformationInformation the US Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that a law, regulation, or Government-wide policy requires or permits an agency to handle using safeguarding or dissemination controls. However, CUI does not include classified information (see definition above) or information a non-executive branch entity possesses and maintains in its own systems that did not come from, or was not created or possessed by or for, an executive branch agency or an entity acting for an agency. Law, regulation, or Government-wide policy may require or permit safeguarding or dissemination controls in three ways: Requiring or permitting agencies to control or protect the information but providing no specific controls, which makes the information CUI Basic; requiring or permitting agencies to control or protect the information and providing specific controls for doing so, which makes the information CUI Specified; or requiring or permitting agencies to control the information and specifying only some of those controls, which makes the information CUI Specified, but with CUI Basic controls where the authority does not specify. Based on CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html . Usage Note: Mandatory control marking, which must be displayed on the top portion of each rendered or printed page containing controlled information. Should be displayed at the bottom of each rendered or printed page containing controlled information. Must be displayed on each portion of controlled information at the portion level if portions are uncontrolled unclassified information. Based on CUI Marking Handbook https://www.archives.gov/files/cui/20161206-cui-marking-handbook-v1-1.pdf. For definitions of key terms see CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html.
4        CONTROLLEDCONTROLLEDA displayed mark, required to be rendered as "CONTROLLED", indicating that the electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Mandatory control marking, which must be displayed on the top portion of each rendered or printed page containing controlled information. Should be displayed at the bottom of each rendered or printed page containing controlled information. Must be displayed on each portion of controlled information at the portion level if portions are uncontrolled unclassified information. Based on CUI Marking Handbook https://www.archives.gov/files/cui/20161206-cui-marking-handbook-v1-1.pdf.
4        CUICUIA displayed mark, required to be rendered as "CUI", indicating that the electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Mandatory control marking, which must be displayed on the top portion of each rendered or printed page containing controlled information. Should be displayed at the bottom of each rendered or printed page containing controlled information. Must be displayed on each portion of controlled information at the portion level if portions are uncontrolled unclassified information. Based on CUI Marking Handbook https://www.archives.gov/files/cui/20161206-cui-marking-handbook-v1-1.pdf.
4        CUIHLTHCUI//HLTHA displayed mark, required to be rendered as "CUI//HLTH", indicating that the electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Examples of healthcare regulation governing CUI Basic marking include HIPAA Unique Identifier provisions 42 USC 1320d-2 note(b) https://www.govinfo.gov/content/pkg/USCODE-2016-title42/pdf/USCODE-2016-title42-chap7-subchapXI-partC-sec1320d-2.pdf; Title 38 Section 7332 https://www.govinfo.gov/content/pkg/USCODE-2016-title38/pdf/USCODE-2016-title38-partV-chap73-subchapIII-sec7332.pdf; and several sections of 42 CFR Part 2.related to consent and confidentiality, e.g., https://www.govinfo.gov/content/pkg/CFR-2017-title42-vol1/pdf/CFR-2017-title42-vol1-sec2-12.pdf
4        CUIHLTHP(CUI//HLTH)A displayed mark, required to be rendered as "(CUI//HLTH)", indicating that a portion of an electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Examples of healthcare regulation governing CUI Basic marking include HIPAA Unique Identifier provisions 42 USC 1320d-2 note(b) https://www.govinfo.gov/content/pkg/USCODE-2016-title42/pdf/USCODE-2016-title42-chap7-subchapXI-partC-sec1320d-2.pdf; Title 38 Section 7332 https://www.govinfo.gov/content/pkg/USCODE-2016-title38/pdf/USCODE-2016-title38-partV-chap73-subchapIII-sec7332.pdf; and several sections of 42 CFR Part 2.related to consent and confidentiality, e.g., https://www.govinfo.gov/content/pkg/CFR-2017-title42-vol1/pdf/CFR-2017-title42-vol1-sec2-12.pdf
4        CUIP(CUI)A displayed mark, required to be rendered as "(CUI)", indicating that a portion of an electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Examples of healthcare regulation governing CUI Basic marking include HIPAA Unique Identifier provisions 42 USC 1320d-2 note(b) https://www.govinfo.gov/content/pkg/USCODE-2016-title42/pdf/USCODE-2016-title42-chap7-subchapXI-partC-sec1320d-2.pdf; Title 38 Section 7332 https://www.govinfo.gov/content/pkg/USCODE-2016-title38/pdf/USCODE-2016-title38-partV-chap73-subchapIII-sec7332.pdf; and several sections of 42 CFR Part 2.related to consent and confidentiality, e.g., https://www.govinfo.gov/content/pkg/CFR-2017-title42-vol1/pdf/CFR-2017-title42-vol1-sec2-12.pdf
4        CUIPRVCYCUI//PRVCYA displayed mark, required to be rendered as "CUI//PRVCY", indicating that the electronic or hardcopy controlled unclassified basic privacy information is private and must be protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Examples of privacy regulation governing CUI Basic marking include 20 CFR 401.100 related to SSA disclosure of personal, program, and non-program information. https://www.govinfo.gov/content/pkg/CFR-2017-title20-vol2/pdf/CFR-2017-title20-vol2-sec401-100.pdf.
4        CUIPRVCYP(CUI//PRVCY)A displayed mark, required to be rendered as "(CUI//PRVCY)", indicating that a portion of an electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Examples of privacy regulation governing CUI Basic marking include 20 CFR 401.100 related to SSA disclosure of personal, program, and non-program information. https://www.govinfo.gov/content/pkg/CFR-2017-title20-vol2/pdf/CFR-2017-title20-vol2-sec401-100.pdf.
4        CUISP-HLTHCUI//SP-HLTHA displayed mark, required to be rendered as "CUI//SP-HLTH", indicating that the electronic or hardcopy information is protected at the level of the subset of CUI in which the authorizing law, regulation, or Government-wide policy contains specific handling controls that it requires or permits agencies to use that differ from those for CUI Basic. The CUI Registry indicates which laws, regulations, and Government-wide policies include such specific requirements. CUI Specified controls may be more stringent than, or may simply differ from, those required by CUI Basic; the distinction is that the underlying authority spells out the controls for CUI Specified information and does not for CUI Basic information. CUI Basic controls apply to those aspects of CUI Specified where the authorizing laws, regulations, and Government-wide policies do not provide specific guidance. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Examples of healthcare regulation governing CUI Specified marking include HIPAA Transaction and Code Sets and references the Congressional requirement that HHS promulgate Privacy, and Security rules https://www.govinfo.gov/content/pkg/USCODE-2016-title42/pdf/USCODE-2016-title42-chap7-subchapXI-partC-sec1320d-2.pdf.
4        CUISP-HLTHP(CUI//SP-HLTH)A displayed mark, required to be rendered as "(CUI//SP-HLTH)", indicating that a portion of an electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Examples of healthcare regulation governing CUI Specified marking include HIPAA Transaction and Code Sets and references the Congressional requirement that HHS promulgate Privacy, and Security rules https://www.govinfo.gov/content/pkg/USCODE-2016-title42/pdf/USCODE-2016-title42-chap7-subchapXI-partC-sec1320d-2.pdf
4        CUISP-PRVCYCUI//SP-PRVCYA displayed mark, required to be rendered as "CUI//SP-PRVCY", indicating that the electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Examples of privacy regulation governing CUI Specified marking is OMB M-17-12ï‡? This Memorandum sets forth the policy for Federal agencies to prepare for and respond to a breach of personally identifiable information (PII). It includes a framework for assessing and mitigating the risk of harm to individuals potentially affected by a breach, as well as guidance on whether and how to provide notification and services to those individuals. https://www.whitehouse.gov/sites/whitehouse.gov/files/omb/memoranda/2017/m-17-12_0.pdf.
4        CUISP-PRVCYP(CUI//SP-PRVCY)A displayed mark, required to be rendered as "(CUI//SP-PRVCY)", indicating that a portion of an electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in this part and the CUI Registry. CUI Basic differs from CUI Specified (see definition for CUI Specified), and CUI Basic controls apply whenever CUI Specified ones do not cover the involved CUI. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html. Usage Note: Examples of privacy regulation governing CUI Specified marking is OMB M-17-12ï‡? This Memorandum sets forth the policy for Federal agencies to prepare for and respond to a breach of personally identifiable information (PII). It includes a framework for assessing and mitigating the risk of harm to individuals potentially affected by a breach, as well as guidance on whether and how to provide notification and services to those individuals. https://www.whitehouse.gov/sites/whitehouse.gov/files/omb/memoranda/2017/m-17-12_0.pdf.
4        UUI(U)A displayed mark, required to be rendered as "(U)", indicating that a portion of an electronic or hardcopy information is neither Executive Order 13556 nor classified information authorities cover as protected. Although this information is not controlled or classified, agencies must still handle it in accordance with Federal Information Security Modernization Act (FISMA) requirements. From CUI Glossary https://www.archives.gov/cui/registry/cui-glossary.html Usage Note: Regulatory Source: 32 CFR § 2002.20 Marking. Federal Register Page 63344 63344 (ii) Authorized holders permitted to designate CUI must portion mark both CUI and uncontrolled unclassified portions. CUI Marking Handbook https://www.archives.gov/files/cui/20161206-cui-marking-handbook-v1-1.pdf CUI Portion Marking: Portion marking of CUI is optional in a fully unclassified document, but is permitted and encouraged to facilitate information sharing and proper handling of the information. Agency heads may approve the required use of CUI Portion marking on all CUI generated within their agency. As such, users should consult their agency CUI policy when creating CUI documents. When CUI Portion Markings are used and a portion does not contain CUI a “Uâ€? is placed in parentheses to indicate that the portion contains Uncontrolled Unclassified Information. (Page 14) CUI Portion Markings are placed at the beginning of the portion to which they apply and must be used throughout the entire document. They are presented in all capital letters and separated as indicated in this handbook and the CUI Registry. The presence of EVEN ONE item of CUI in a document requires CUI marking of that document. Because of this, CUI Portion Markings can be of great assistance in determining if a document contains CUI and therefore must be marked as such. Remember: When portion markings are used and any portion does not contain CUI, a “(U)â€? is placed in front of that portion to indicate that it contains Uncontrolled - or non-CUI - Unclassified Information. (Page 15)
3      SecurityLabelMarkSecurity Label MarkAn abstract code for displayed Security Label tags. Usage Note: These marks may be based on any of the HL7 Security Labeling related codes from various code systems and values sets, which are organized according to the HL7 Privacy and Security Classification System into HL7 Security Observation Type Named Tag Sets and valued with codes associated with the HL7 Security Observation Value Tag Set Names.
4        ConfidentialMarkconfidential markA displayed mark rendered as "Confidential", which indicates to end users that the electronic or hardcopy information they are viewing must be protected at a level of protection as dictated by applicable policy. May be used to indicate proprietary or classified information that is, for example, business, intelligence, or project related, e.g., secret ingredients in a therapeutic substance; location of disaster health facilities and providers, or the name of a manufacturer or project contractor. Example use cases include a display to alert authorized business system users that they are viewing additionally protected proprietary and business confidential information deemed proprietary under an applicable jurisdictional or organizational policy. Usage Note: The ConfidentialMark (confidential mark) description is based on the HL7 Confidentiality Concept Domain: Types of privacy metadata classifying an IT resource (data, information object, service, or system capability) according to its level of sensitivity, which is based on an analysis of applicable privacy policies and the risk of financial, reputational, or other harm to an individual or entity that could result if made available or disclosed to unauthorized individuals, entities, or processes. Usage Note: Confidentiality codes may be used in security labels and privacy markings to classify IT resources based on sensitivity to indicate the obligation of a custodian or receiver to ensure that the protected resource is not made available or disclosed to individuals, entities, or processes (security principals) unless authorized per applicable policies. Confidentiality codes may also be used in the clearances of initiators requesting access to protected resources. Map: Definition aligns with ISO 7498-2:1989 - Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
4        COPYMarkcopy of original markA displayed mark indicating that the electronic or hardcopy information is a copy of an authoritative source for the information. The copy is not considered authoritative but is a duplicate of the authoritative content. Usage Note: Applicable policy will dictate how the COPY mark will be displayed. Typical renderings include the marking appearing at the top or "banner" of electronic or hardcopy pages, or as watermarks set diagonally across each page.
4        DeliverToAddresseeOnlyMarkdeliver only to addressee markA displayed mark on an electronic transmission or physical container such as an electronic transmittal wrapper, batch file, message header, or a physical envelop or package indicating that the contents, whether electronic or hardcopy information, must only be delivered to the authorized recipient(s) named in the address. Usage Note: Required by US 32 CRF Part 2002 for container storing or transmitting CUI.
4        RedisclosureProhibitionMarkprohibition against redisclosure markA displayed mark rendered to end users as a prescribed text warning that the electronic or hardcopy information shall not be further disclosed without consent of the subject of the information. For example, in order to warn a recipient of 42 CFR Part 2 information of the redisclosure restrictions, the rule mandates that end users receive a written prohibition against redisclosure unless authorized by patient consent or otherwise permitted by Part 2. See 42 CFR § 2.32 Prohibition on re-disclosure. (a)Notice to accompany disclosure. Each disclosure made with the patient's written consent must be accompanied by one of the following written statements: (1) This information has been disclosed to you from records protected by federal confidentiality rules ( 42 CFR part 2). The federal rules prohibit you from making any further disclosure of information in this record that identifies a patient as having or having had a substance use disorder either directly, by reference to publicly available information, or through verification of such identification by another person unless further disclosure is expressly permitted by the written consent of the individual whose information is being disclosed or as otherwise permitted by 42 CFR part 2. A general authorization for the release of medical or other information is NOT sufficient for this purpose (see § 2.31). The federal rules restrict any use of the information to investigate or prosecute with regard to a crime any patient with a substance use disorder, except as provided at §§ 2.12(c)(5) and 2.65; or (2) 42 CFR part 2 prohibits unauthorized disclosure of these records. https://www.law.cornell.edu/cfr/text/42/2.32 Usage Note: Example of marking requirement from SAMHSA FAQ Response to question 13: Would a logon or splash page notification on an HIO’s portal that contains the Part 2 notice prohibiting redisclosure be sufficient to meet Part 2’s requirement that disclosures made with patient consent be accompanied by such a statement? No. Part 2 requires each disclosure made with written patient consent to be accompanied by a written statement that the information disclosed is protected by federal law and that the recipient cannot make any further disclosure of it unless permitted by the regulations (42 CFR § 2.32). A logon page is the page where a user logs onto a computer system; a splash page is an introductory page to a web site. A logon or splash page notification on a HIO's portal including the statement as required by § 2.32 would not be sufficient notification regarding prohibitions on redisclosure since it would not accompany a specific disclosure. The notification must be tied to the Part 2 information being disclosed in order to ensure that the recipient of that information knows that specific information is protected by Part 2 and cannot be redisclosed except as authorized by the express written consent of the person to whom it pertains or as otherwise permitted by Part 2. https://www.samhsa.gov/about-us/who-we-are/laws-regulations/confidentiality-regulations-faqs
4        RestrictedConfidentialityMarkrestricted confidentiality markA displayed mark rendered to end users as "Restricted Confidentiality", which indicates that the electronic or hardcopy information they are viewing, must be protected at a restricted level of confidentiality protection as defined by HL7 Confidentiality code "R" (restricted). Examples: Includes information that is additionally protected such as sensitive conditions mental health, HIV, substance abuse, domestic violence, child abuse, genetic disease, and reproductive health; or sensitive demographic information such as a patient's standing as an employee or a celebrity. Use cases include a display to alert authorized EHR users that they are viewing additionally protected health information deemed sensitive by an applicable jurisdictional, organizational, or personal privacy policy. Usage Note: The definition is based on HL7 Confidentiality code "R" (restricted), which is described as: Privacy metadata indicating highly sensitive, potentially stigmatizing information, which presents a high risk to the information subject if disclosed without authorization. May be pre-empted by jurisdictional law, e.g., for public health reporting or emergency treatment. Foundational definitions of Confidentiality: From HL7 Confidentiality Concept Domain: Types of privacy metadata classifying an IT resource (data, information object, service, or system capability) according to its level of sensitivity, which is based on an analysis of applicable privacy policies and the risk of financial, reputational, or other harm to an individual or entity that could result if made available or disclosed to unauthorized individuals, entities, or processes. Usage Note from HL7 Confidentiality code "R": Confidentiality codes may be used in security labels and privacy markings to classify IT resources based on sensitivity to indicate the obligation of a custodian or receiver to ensure that the protected resource is not made available or disclosed to individuals, entities, or processes (security principals) unless authorized per applicable policies. Confidentiality codes may also be used in the clearances of initiators requesting access to protected resources. This metadata indicates that the receiver may be obligated to comply with applicable, prevailing (default) jurisdictional privacy law or disclosure authorization. Map: Definition aligns with ISO 7498-2:1989 - Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes. Map: Partial Map to ISO 13606-4 Sensitivity Level (3) Clinical Care: Default for normal clinical care access (i.e. most clinical staff directly caring for the patient should be able to access nearly all of the EHR). Maps to normal confidentiality for treatment information but not to ancillary care, payment and operations.
2    RefrainPolicyrefrain policyConveys prohibited actions which an information custodian, receiver, or user is not permitted to perform unless otherwise authorized or permitted under specified circumstances. Usage Notes: ISO 22600-2 species that a Refrain Policy "defines actions the subjects must refrain from performing". Per HL7 Composite Security and Privacy Domain Analysis Model: May be used to indicate that a specific action is prohibited based on specific access control attributes e.g., purpose of use, information type, user role, etc.
3      NOAUTHno disclosure without subject authorizationProhibition on disclosure without information subject's authorization.
3      NOCOLLECTno collectionProhibition on collection or storage of the information.
3      NODSCLCDno disclosure without consent directiveProhibition on disclosure without organizational approved patient restriction.
3      NODSCLCDSno disclosure without information subject's consent directiveProhibition on disclosure without a consent directive from the information subject.
3      NOINTEGRATEno integrationProhibition on Integration into other records.
3      NOLISTno unlisted entity disclosureProhibition on disclosure except to entities on specific access list.
3      NOMOUno disclosure without MOUProhibition on disclosure without an interagency service agreement or memorandum of understanding (MOU).
3      NOORGPOLno disclosure without organizational authorizationProhibition on disclosure without organizational authorization.
3      NOPATno disclosure to patient, family or caregivers without attending provider's authorizationProhibition on disclosing information to patient, family or caregivers without attending provider's authorization. Usage Note: The information may be labeled with the ActInformationSensitivity TBOO code, triggering application of this RefrainPolicy code as a handling caveat controlling access. Maps to FHIR NOPAT: Typically, this is used on an Alert resource, when the alert records information on patient abuse or non-compliance. FHIR print name is "keep information from patient". Maps to the French realm - code: INVISIBLE_PATIENT. displayName: Document non visible par le patient codingScheme: 1.2.250.1.213.1.1.4.13 French use case: A label for documents that the author chose to hide from the patient until the content can be disclose to the patient in a face to face meeting between a healthcare professional and the patient (in French law some results like cancer diagnosis or AIDS diagnosis must be announced to the patient by a healthcare professional and should not be find out by the patient alone).
3      NOPERSISTPno collection beyond purpose of useProhibition on collection of the information beyond time necessary to accomplish authorized purpose of use is prohibited.
3      NORDSCLCDno redisclosure without consent directiveProhibition on redisclosure without patient consent directive.
3      NORDSCLCDSno redisclosure without information subject's consent directiveProhibition on redisclosure without a consent directive from the information subject.
3      NORDSCLWno disclosure without jurisdictional authorizationProhibition on disclosure without authorization under jurisdictional law.
3      NORELINKno relinkingProhibition on associating de-identified or pseudonymized information with other information in a manner that could or does result in disclosing information intended to be masked.
3      NOREUSEno reuse beyond purpose of useProhibition on use of the information beyond the purpose of use initially authorized.
3      NOVIPno unauthorized VIP disclosureProhibition on disclosure except to principals with access permission to specific VIP information.
3      ORCONno disclosure without originator authorizationProhibition on disclosure except as permitted by the information originator.
0EMRGONLYemergency onlyPrivacy consent directive restricting or prohibiting access, use, or disclosure of personal information, including de-identified information, and personal effects, such as biometrics, biospecimen or genetic material, which may be used to identify an individual in a registry or repository for all purposes except for emergency treatment generally, which may include treatment during a disaster, a threat, in an emergency department and for break the glass purposes of use as specified by applicable domain policy. Usage Note: To specify the scope of an “EMRGONLY� consent directive within a policy domain, use one or more of the following Purpose of Use codes in the ActReason code system OID: 2.16.840.1.113883.5.8. ETREAT (Emergency Treatment): To perform one or more operations on information for provision of immediately needed health care for an emergent condition. BTG (break the glass): To perform policy override operations on information for provision of immediately needed health care for an emergent condition affecting potential harm, death or patient safety by end users who are not provisioned for this purpose of use. Includes override of organizational provisioning policies and may include override of subject of care consent directive restricting access. ERTREAT (emergency room treatment): To perform one or more operations on information for provision of immediately needed health care for an emergent condition in an emergency room or similar emergent care context by end users provisioned for this purpose, which does not constitute as policy override such as in a "Break the Glass" purpose of use. THREAT (threat): To perform one or more operations on information used to prevent injury or disease to living subjects who may be the target of violence. DISASTER (disaster): To perform one or more operations on information used for provision of immediately needed health care to a population of living subjects located in a disaster zone. Map: An “emergency only� consent directive maps to ISO/TS 17975:2015(E) 5.13 Exceptional access
0NOPPnotice of privacy practicesAn implied privacy consent directive or notification, which the data subject may or may not acknowledge. The notification specifies permitted actions, which may include access, use, or disclosure of any and all personal information. The notification specifies the scope of personal information, which may include de-identified information, and personal effects, such as biometrics, biospecimen or genetic material, that may be used to identify an individual in a registry or repository. The notification specifies the purposes for which personal information may be used such as treatment, payment, operations, research, information exchange, public health, disaster, quality and safety reporting; as required by law including court order, law enforcement, national security, military authorities; and for data analytics, marketing, and profiling. Usage Notes: Map: An "implied" consent directive maps to ISO/TS 17975:2015(E) definition forImplied: Consent to Collect, Use and Disclose personal health information is implied by the actions or inactions of the individual and the circumstances under which it was implied".
0_ActProductAcquisitionCodeActProductAcquisitionCodeThe method that a product is obtained for use by the subject of the supply act (e.g. patient). Product examples are consumable or durable goods.
1  LOANLoanTemporary supply of a product without transfer of ownership for the product.
2    RENTRentTemporary supply of a product with financial compensation, without transfer of ownership for the product.
1  TRANSFERTransferTransfer of ownership for a product.
2    SALESaleTransfer of ownership for a product for financial compensation.
0_ActSpecimenTransportCodeActSpecimenTransportCodeTransportation of a specimen.
1  SRECspecimen receivedDescription:Specimen has been received by the participating organization/department.
1  SSTORspecimen in storageDescription:Specimen has been placed into storage at a participating location.
1  STRANspecimen in transitDescription:Specimen has been put in transit to a participating receiver.
0_ActSpecimenTreatmentCodeActSpecimenTreatmentCodeSet of codes related to specimen treatments
1  ACIDAcidificationThe lowering of specimen pH through the addition of an acid
1  ALKAlkalizationThe act rendering alkaline by impregnating with an alkali; a conferring of alkaline qualities.
1  DEFBDefibrinationThe removal of fibrin from whole blood or plasma through physical or chemical means
1  FILTFiltrationThe passage of a liquid through a filter, accomplished by gravity, pressure or vacuum (suction).
1  LDLPLDL PrecipitationLDL Precipitation
1  NEUTNeutralizationThe act or process by which an acid and a base are combined in such proportions that the resulting compound is neutral.
1  RECARecalcificationThe addition of calcium back to a specimen after it was removed by chelating agents
1  UFILUltrafiltrationThe filtration of a colloidal substance through a semipermeable medium that allows only the passage of small molecules.
0_ActSubstanceAdministrationCodeActSubstanceAdministrationCodeDescription: Describes the type of substance administration being performed. This should not be used to carry codes for identification of products. Use an associated role or entity to carry such information.
1  DRUGDrug therapyThe introduction of a drug into a subject with the intention of altering its biologic state with the intent of improving its health status.
1  FDfoodDescription: The introduction of material into a subject with the intent of providing nutrition or other dietary supplements (e.g. minerals or vitamins).
1  IMMUNIZImmunizationThe introduction of an immunogen with the intent of stimulating an immune response, aimed at preventing subsequent infections by more viable agents.
2    BOOSTERBooster ImmunizationAn additional immunization administration within a series intended to bolster or enhance immunity.
2    INITIMMUNIZInitial ImmunizationThe first immunization administration in a series intended to produce immunity
0_ActTaskCodeActTaskCodeDescription: A task or action that a user may perform in a clinical information system (e.g., medication order entry, laboratory test results review, problem list entry).
1  OEorder entry taskA clinician creates a request for a service to be performed for a given patient.
2    LABOElaboratory test order entry taskA clinician creates a request for a laboratory test to be done for a given patient.
2    MEDOEmedication order entry taskA clinician creates a request for the administration of one or more medications to a given patient.
1  PATDOCpatient documentation taskA person enters documentation about a given patient.
2    ALLERLREVallergy list reviewDescription: A person reviews a list of known allergies of a given patient.
2    CLINNOTEEclinical note entry taskA clinician enters a clinical note about a given patient
3      DIAGLISTEdiagnosis list entry taskA clinician enters a diagnosis for a given patient.
3      DISCHINSTEdischarge instruction entryA person provides a discharge instruction to a patient.
3      DISCHSUMEdischarge summary entry taskA clinician enters a discharge summary for a given patient.
3      PATEDUEpatient education entryA person provides a patient-specific education handout to a patient.
3      PATREPEpathology report entry taskA pathologist enters a report for a given patient.
3      PROBLISTEproblem list entry taskA clinician enters a problem for a given patient.
3      RADREPEradiology report entry taskA radiologist enters a report for a given patient.
2    IMMLREVimmunization list reviewDescription: A person reviews a list of immunizations due or received for a given patient.
2    REMLREVreminder list reviewDescription: A person reviews a list of health care reminders for a given patient.
3      WELLREMLREVwellness reminder list reviewDescription: A person reviews a list of wellness or preventive care reminders for a given patient.
1  PATINFOpatient information review taskA person (e.g., clinician, the patient herself) reviews patient information in the electronic medical record.
2    ALLERLEallergy list entryDescription: A person enters a known allergy for a given patient.
2    CDSREVclinical decision support intervention reviewA person reviews a recommendation/assessment provided automatically by a clinical decision support application for a given patient.
2    CLINNOTEREVclinical note review taskA person reviews a clinical note of a given patient.
3      DISCHSUMREVdischarge summary review taskA person reviews a discharge summary of a given patient.
2    DIAGLISTREVdiagnosis list review taskA person reviews a list of diagnoses of a given patient.
2    IMMLEimmunization list entryDescription: A person enters an immunization due or received for a given patient.
2    LABRREVlaboratory results review taskA person reviews a list of laboratory results of a given patient.
2    MICRORREVmicrobiology results review taskA person reviews a list of microbiology results of a given patient.
3      MICROORGRREVmicrobiology organisms results review taskA person reviews organisms of microbiology results of a given patient.
3      MICROSENSRREVmicrobiology sensitivity test results review taskA person reviews the sensitivity test of microbiology results of a given patient.
2    MLREVmedication list review taskA person reviews a list of medication orders submitted to a given patient
3      MARWLREVmedication administration record work list review taskA clinician reviews a work list of medications to be administered to a given patient.
2    OREVorders review taskA person reviews a list of orders submitted to a given patient.
2    PATREPREVpathology report review taskA person reviews a pathology report of a given patient.
2    PROBLISTREVproblem list review taskA person reviews a list of problems of a given patient.
2    RADREPREVradiology report review taskA person reviews a radiology report of a given patient.
2    REMLEreminder list entryDescription: A person enters a health care reminder for a given patient.
3      WELLREMLEwellness reminder list entryDescription: A person enters a wellness or preventive care reminder for a given patient.
2    RISKASSESSrisk assessment instrument taskA person reviews a Risk Assessment Instrument report of a given patient.
3      FALLRISKfalls risk assessment instrument taskA person reviews a Falls Risk Assessment Instrument report of a given patient.
0_ActTransportationModeCodeActTransportationModeCodeCharacterizes how a transportation act was or will be carried out. Examples: Via private transport, via public transit, via courier.
1  _ActPatientTransportationModeCodeActPatientTransportationModeCodeDefinition: Characterizes how a patient was or will be transported to the site of a patient encounter. Examples: Via ambulance, via public transit, on foot.
2    AFOOTpedestrian transportpedestrian transport
2    AMBTambulance transportambulance transport
3      AMBAIRfixed-wing ambulance transportfixed-wing ambulance transport
3      AMBGRNDground ambulance transportground ambulance transport
3      AMBHELOhelicopter ambulance transporthelicopter ambulance transport
2    LAWENFlaw enforcement transportlaw enforcement transport
2    PRVTRNprivate transportprivate transport
2    PUBTRNpublic transportpublic transport
0_ObservationTypeObservationTypeIdentifies the kinds of observations that can be performed
1  _ActSpecObsCodeActSpecObsCodeIdentifies the type of observation that is made about a specimen that may affect its processing, analysis or further result interpretation
2    ARTBLDActSpecObsArtBldCodeDescribes the artificial blood identifier that is associated with the specimen.
2    DILUTIONActSpecObsDilutionCodeAn observation that reports the dilution of a sample.
3      AUTO-HIGHAuto-High DilutionThe dilution of a sample performed by automated equipment. The value is specified by the equipment
3      AUTO-LOWAuto-Low DilutionThe dilution of a sample performed by automated equipment. The value is specified by the equipment
3      PREPre-DilutionThe dilution of the specimen made prior to being loaded onto analytical equipment
3      RERUNRerun DilutionThe value of the dilution of a sample after it had been analyzed at a prior dilution value
2    EVNFCTSActSpecObsEvntfctsCodeDomain provides codes that qualify the ActLabObsEnvfctsCode domain. (Environmental Factors)
2    INTFRActSpecObsInterferenceCodeAn observation that relates to factors that may potentially cause interference with the observation
3      FIBRINFibrinThe Fibrin Index of the specimen. In the case of only differentiating between Absent and Present, recommend using 0 and 1
3      HEMOLYSISHemolysisAn observation of the hemolysis index of the specimen in g/L
3      ICTERUSIcterusAn observation that describes the icterus index of the specimen. It is recommended to use mMol/L of bilirubin
3      LIPEMIALipemiaAn observation used to describe the Lipemia Index of the specimen. It is recommended to use the optical turbidity at 600 nm (in absorbance units).
2    VOLUMEActSpecObsVolumeCodeAn observation that reports the volume of a sample.
3      AVAILABLEAvailable VolumeThe available quantity of specimen. This is the current quantity minus any planned consumption (e.g., tests that are planned)
3      CONSUMPTIONConsumption VolumeThe quantity of specimen that is used each time the equipment uses this substance
3      CURRENTCurrent VolumeThe current quantity of the specimen, i.e., initial quantity minus what has been actually used.
3      INITIALInitial VolumeThe initial quantity of the specimen in inventory
1  _AnnotationTypeAnnotationTypeAnnotationType
2    _ActPatientAnnotationTypeActPatientAnnotationTypeDescription:Provides a categorization for annotations recorded directly against the patient .
3      ANNDIdiagnostic image noteDescription:A note that is specific to a patient's diagnostic images, either historical, current or planned.
3      ANNGENgeneral noteDescription:A general or uncategorized note.
3      ANNIMMimmunization noteA note that is specific to a patient's immunizations, either historical, current or planned.
3      ANNLABlaboratory noteDescription:A note that is specific to a patient's laboratory results, either historical, current or planned.
3      ANNMEDmedication noteDescription:A note that is specific to a patient's medications, either historical, current or planned.
1  _GeneticObservationTypeGeneticObservationTypeDescription: None provided
2    GENEgeneDescription: A DNA segment that contributes to phenotype/function. In the absence of demonstrated function a gene may be characterized by sequence, transcription or homology
1  _ImmunizationObservationTypeImmunizationObservationTypeDescription: Observation codes which describe characteristics of the immunization material.
2    OBSANTCantigen countDescription: Indicates the valid antigen count.
2    OBSANTVantigen validityDescription: Indicates whether an antigen is valid or invalid.
1  _IndividualCaseSafetyReportTypeIndividual Case Safety Report TypeA code that is used to indicate the type of case safety report received from sender. The current code example reference is from the International Conference on Harmonisation (ICH) Expert Workgroup guideline on Clinical Safety Data Management: Data Elements for Transmission of Individual Case Safety Reports. The unknown/unavailable option allows the transmission of information from a secondary sender where the initial sender did not specify the type of report. Example concepts include: Spontaneous, Report from study, Other.
2    PAT_ADV_EVNTpatient adverse eventIndicates that the ICSR is describing problems that a patient experienced after receiving a vaccine product.
2    VAC_PROBLEMvaccine product problemIndicates that the ICSR is describing a problem with the actual vaccine product such as physical defects (cloudy, particulate matter) or inability to confer immunity.
1  _LOINCObservationActContextAgeTypeLOINCObservationActContextAgeTypeDefinition:The set of LOINC codes for the act of determining the period of time that has elapsed since an entity was born or created.
2    21611-9age patient qn estDefinition:Estimated age.
2    21612-7age patient qn reportedDefinition:Reported age.
2    29553-5age patient qn calcDefinition:Calculated age.
2    30525-0age patient qn definitionDefinition:General specification of age with no implied method of determination.
2    30972-4age at onset of adverse eventDefinition:Age at onset of associated adverse event; no implied method of determination.
1  _MedicationObservationTypeMedicationObservationTypeMedicationObservationType
2    REP_HALF_LIFErepresentative half-lifeDescription:This observation represents an 'average' or 'expected' half-life typical of the product.
2    SPLCOATINGcoatingDefinition: A characteristic of an oral solid dosage form of a medicinal product, indicating whether it has one or more coatings such as sugar coating, film coating, or enteric coating. Only coatings to the external surface or the dosage form should be considered (for example, coatings to individual pellets or granules inside a capsule or tablet are excluded from consideration). Constraints: The Observation.value must be a Boolean (BL) with true for the presence or false for the absence of one or more coatings on a solid dosage form.
2    SPLCOLORcolorDefinition: A characteristic of an oral solid dosage form of a medicinal product, specifying the color or colors that most predominantly define the appearance of the dose form. SPLCOLOR is not an FDA specification for the actual color of solid dosage forms or the names of colors that can appear in labeling. Constraints: The Observation.value must be a single coded value or a list of multiple coded values, specifying one or more distinct colors that approximate of the color(s) of distinct areas of the solid dosage form, such as the different sides of a tablet or one-part capsule, or the different halves of a two-part capsule. Bands on banded capsules, regardless of the color, are not considered when assigning an SPLCOLOR. Imprints on the dosage form, regardless of their color are not considered when assigning an SPLCOLOR. If more than one color exists on a particular side or half, then the most predominant color on that side or half is recorded. If the gelatin capsule shell is colorless and transparent, use the predominant color of the contents that appears through the colorless and transparent capsule shell. Colors can include: Black;Gray;White;Red;Pink;Purple;Green;Yellow;Orange;Brown;Blue;Turquoise.
2    SPLIMAGEimageDescription: A characteristic representing a single file reference that contains two or more views of the same dosage form of the product; in most cases this should represent front and back views of the dosage form, but occasionally additional views might be needed in order to capture all of the important physical characteristics of the dosage form. Any imprint and/or symbol should be clearly identifiable, and the viewer should not normally need to rotate the image in order to read it. Images that are submitted with SPL should be included in the same directory as the SPL file.
2    SPLIMPRINTimprintDefinition: A characteristic of an oral solid dosage form of a medicinal product, specifying the alphanumeric text that appears on the solid dosage form, including text that is embossed, debossed, engraved or printed with ink. The presence of other non-textual distinguishing marks or symbols is recorded by SPLSYMBOL. Examples: Included in SPLIMPRINT are alphanumeric text that appears on the bands of banded capsules and logos and other symbols that can be interpreted as letters or numbers. Constraints: The Observation.value must be of type Character String (ST). Excluded from SPLIMPRINT are internal and external cut-outs in the form of alphanumeric text and the letter 'R' with a circle around it (when referring to a registered trademark) and the letters 'TM' (when referring to a 'trade mark'). To record text, begin on either side or part of the dosage form. Start at the top left and progress as one would normally read a book. Enter a semicolon to show separation between words or line divisions.
2    SPLSCORINGscoringDefinition: A characteristic of an oral solid dosage form of a medicinal product, specifying the number of equal pieces that the solid dosage form can be divided into using score line(s). Example: One score line creating two equal pieces is given a value of 2, two parallel score lines creating three equal pieces is given a value of 3. Constraints: Whether three parallel score lines create four equal pieces or two intersecting score lines create two equal pieces using one score line and four equal pieces using both score lines, both have the scoring value of 4. Solid dosage forms that are not scored are given a value of 1. Solid dosage forms that can only be divided into unequal pieces are given a null-value with nullFlavor other (OTH).
2    SPLSHAPEshapeDescription: A characteristic of an oral solid dosage form of a medicinal product, specifying the two dimensional representation of the solid dose form, in terms of the outside perimeter of a solid dosage form when the dosage form, resting on a flat surface, is viewed from directly above, including slight rounding of corners. SPLSHAPE does not include embossing, scoring, debossing, or internal cut-outs. SPLSHAPE is independent of the orientation of the imprint and logo. Shapes can include: Triangle (3 sided); Square; Round; Semicircle; Pentagon (5 sided); Diamond; Double circle; Bullet; Hexagon (6 sided); Rectangle; Gear; Capsule; Heptagon (7 sided); Trapezoid; Oval; Clover; Octagon (8 sided); Tear; Freeform.
2    SPLSIZEsizeDefinition: A characteristic of an oral solid dosage form of a medicinal product, specifying the longest single dimension of the solid dosage form as a physical quantity in the dimension of length (e.g., 3 mm). The length is should be specified in millimeters and should be rounded to the nearest whole millimeter. Example: SPLSIZE for a rectangular shaped tablet is the length and SPLSIZE for a round shaped tablet is the diameter.
2    SPLSYMBOLsymbolDefinition: A characteristic of an oral solid dosage form of a medicinal product, to describe whether or not the medicinal product has a mark or symbol appearing on it for easy and definite recognition. Score lines, letters, numbers, and internal and external cut-outs are not considered marks or symbols. See SPLSCORING and SPLIMPRINT for these characteristics. Constraints: The Observation.value must be a Boolean (BL) with <u>true</u> indicating the presence and <u>false</u> for the absence of marks or symbols. Example:
1  _ObservationIssueTriggerCodedObservationTypeObservationIssueTriggerCodedObservationTypeDistinguishes the kinds of coded observations that could be the trigger for clinical issue detection. These are observations that are not measurable, but instead can be defined with codes. Coded observation types include: Allergy, Intolerance, Medical Condition, Pregnancy status, etc.
2    _CaseTransmissionModecase transmission modeCode for the mechanism by which disease was acquired by the living subject involved in the public health case. Includes sexually transmitted, airborne, bloodborne, vectorborne, foodborne, zoonotic, nosocomial, mechanical, dermal, congenital, environmental exposure, indeterminate.
3      AIRTRNSairborne transmissionCommunication of an agent from a living subject or environmental source to a living subject through indirect contact via oral or nasal inhalation.
3      ANANTRNSanimal to animal transmissionCommunication of an agent from one animal to another proximate animal.
3      ANHUMTRNSanimal to human transmissionCommunication of an agent from an animal to a proximate person.
3      BDYFLDTRNSbody fluid contact transmissionCommunication of an agent from one living subject to another living subject through direct contact with any body fluid.
3      BLDTRNSblood borne transmissionCommunication of an agent to a living subject through direct contact with blood or blood products whether the contact with blood is part of a therapeutic procedure or not.
3      DERMTRNStransdermal transmissionCommunication of an agent from a living subject or environmental source to a living subject via agent migration through intact skin.
3      ENVTRNSenvironmental exposure transmissionCommunication of an agent from an environmental surface or source to a living subject by direct contact.
3      FECTRNSfecal-oral transmissionCommunication of an agent from a living subject or environmental source to a living subject through oral contact with material contaminated by person or animal fecal material.
3      FOMTRNSfomite transmissionCommunication of an agent from an non-living material to a living subject through direct contact.
3      FOODTRNSfood-borne transmissionCommunication of an agent from a food source to a living subject via oral consumption.
3      HUMHUMTRNShuman to human transmissionCommunication of an agent from a person to a proximate person.
3      INDTRNSindeterminate disease transmission modeCommunication of an agent to a living subject via an undetermined route.
3      LACTTRNSlactation transmissionCommunication of an agent from one living subject to another living subject through direct contact with mammalian milk or colostrum.
3      NOSTRNSnosocomial transmissionCommunication of an agent from any entity to a living subject while the living subject is in the patient role in a healthcare facility.
3      PARTRNSparenteral transmissionCommunication of an agent from a living subject or environmental source to a living subject where the acquisition of the agent is not via the alimentary canal.
3      PLACTRNStransplacental transmissionCommunication of an agent from a living subject to the progeny of that living subject via agent migration across the maternal-fetal placental membranes while in utero.
3      SEXTRNSsexual transmissionCommunication of an agent from one living subject to another living subject through direct contact with genital or oral tissues as part of a sexual act.
3      TRNSFTRNStransfusion transmissionCommunication of an agent from one living subject to another living subject through direct contact with blood or blood products where the contact with blood is part of a therapeutic procedure.
3      VECTRNSvector-borne transmissionCommunication of an agent from a living subject acting as a required intermediary in the agent transmission process to a recipient living subject via direct contact.
3      WATTRNSwater-borne transmissionCommunication of an agent from a contaminated water source to a living subject whether the water is ingested as a food or not. The route of entry of the water may be through any bodily orifice.
1  _ObservationQualityMeasureAttributeObservationQualityMeasureAttributeCodes used to define various metadata aspects of a health quality measure.
2    AGGREGATEaggregate measure observationIndicates that the observation is carrying out an aggregation calculation, contained in the value element.
2    CMPMSRMTHcomposite measure methodIndicates what method is used in a quality measure to combine the component measure results included in an composite measure.
2    CMPMSRSCRWGHTcomponent measure scoring weightAn attribute of a quality measure describing the weight this component measure score is to carry in determining the overall composite measure final score. The value is real value greater than 0 and less than 1.0. Each component measure score will be multiplied by its CMPMSRSCRWGHT and then summed with the other component measures to determine the final overall composite measure score. The sum across all CMPMSRSCRWGHT values within a single composite measure SHALL be 1.0. The value assigned is scoped to the composite measure referencing this component measure only.
2    COPYcopyrightIdentifies the organization(s) who own the intellectual property represented by the eMeasure.
2    CRSclinical recommendation statementSummary of relevant clinical guidelines or other clinical recommendations supporting this eMeasure.
2    DEFdefinitionDescription of individual terms, provided as needed.
2    DISCdisclaimerDisclaimer information for the eMeasure.
2    FINALDTfinalized date/timeThe timestamp when the eMeasure was last packaged in the Measure Authoring Tool.
2    GUIDEguidanceUsed to allow measure developers to provide additional guidance for implementers to understand greater specificity than could be provided in the logic for data criteria.
2    IDURimprovement notationInformation on whether an increase or decrease in score is the preferred result (e.g., a higher score indicates better quality OR a lower score indicates better quality OR quality is within a range).
2    ITMCNTitems countedDescribes the items counted by the measure (e.g., patients, encounters, procedures, etc.)
2    KEYkeywordA significant word that aids in discoverability.
2    MEDTmeasurement end dateThe end date of the measurement period.
2    MSDmeasurement start dateThe start date of the measurement period.
2    MSRADJrisk adjustmentThe method of adjusting for clinical severity and conditions present at the start of care that can influence patient outcomes for making valid comparisons of outcome measures across providers. Indicates whether an eMeasure is subject to the statistical process for reducing, removing, or clarifying the influences of confounding factors to allow more useful comparisons.
2    MSRAGGrate aggregationDescribes how to combine information calculated based on logic in each of several populations into one summarized result. It can also be used to describe how to risk adjust the data based on supplemental data elements described in the eMeasure. (e.g., pneumonia hospital measures antibiotic selection in the ICU versus non-ICU and then the roll-up of the two). Open Issue: The description does NOT align well with the definition used in the HQMF specfication; correct the MSGAGG definition, and the possible distinction of MSRAGG as a child of AGGREGATE.
2    MSRIMPROVhealth quality measure improvement notationInformation on whether an increase or decrease in score is the preferred result. This should reflect information on which way is better, an increase or decrease in score.
2    MSRJURjurisdictionThe list of jurisdiction(s) for which the measure applies.
2    MSRRPTRreporter typeType of person or organization that is expected to report the issue.
2    MSRRPTTIMEtimeframe for reportingThe maximum time that may elapse following completion of the measure until the measure report must be sent to the receiver.
2    MSRSCOREmeasure scoringIndicates how the calculation is performed for the eMeasure (e.g., proportion, continuous variable, ratio)
2    MSRSEThealth quality measure care settingLocation(s) in which care being measured is rendered Usage Note: MSRSET is used rather than RoleCode because the setting applies to what is being measured, as opposed to participating directly in the health quality measure documantion itself).
2    MSRTOPIChealth quality measure topic typehealth quality measure topic type
2    MSRTPmeasurement periodThe time period for which the eMeasure applies.
2    MSRTYPEmeasure typeIndicates whether the eMeasure is used to examine a process or an outcome over time (e.g., Structure, Process, Outcome).
2    RATrationaleSuccinct statement of the need for the measure. Usually includes statements pertaining to Importance criterion: impact, gap in care and evidence.
2    REFreferenceIdentifies bibliographic citations or references to clinical practice guidelines, sources of evidence, or other relevant materials supporting the intent and rationale of the eMeasure.
2    SDEsupplemental data elementsComparison of results across strata can be used to show where disparities exist or where there is a need to expose differences in results. For example, Centers for Medicare & Medicaid Services (CMS) in the U.S. defines four required Supplemental Data Elements (payer, ethnicity, race, and gender), which are variables used to aggregate data into various subgroups. Additional supplemental data elements required for risk adjustment or other purposes of data aggregation can be included in the Supplemental Data Element section.
2    STRATstratificationDescribes the strata for which the measure is to be evaluated. There are three examples of reasons for stratification based on existing work. These include: (1) evaluate the measure based on different age groupings within the population described in the measure (e.g., evaluate the whole [age 14-25] and each sub-stratum [14-19] and [20-25]); (2) evaluate the eMeasure based on either a specific condition, a specific discharge location, or both; (3) evaluate the eMeasure based on different locations within a facility (e.g., evaluate the overall rate for all intensive care units and also some strata include additional findings [specific birth weights for neonatal intensive care units]).
2    TRANFtransmission formatCan be a URL or hyperlinks that link to the transmission formats that are specified for a particular reporting program.
2    USEnotice of useUsage notes.
1  _ObservationSequenceTypeObservationSequenceTypeObservationSequenceType
2    TIME_ABSOLUTEabsolute time sequenceA sequence of values in the "absolute" time domain. This is the same time domain that all HL7 timestamps use. It is time as measured by the Gregorian calendar
2    TIME_RELATIVErelative time sequenceA sequence of values in a "relative" time domain. The time is measured relative to the earliest effective time in the Observation Series containing this sequence.
1  _ObservationSeriesTypeObservationSeriesTypeObservationSeriesType
2    _ECGObservationSeriesTypeECGObservationSeriesTypeECGObservationSeriesType
3      REPRESENTATIVE_BEATECG representative beat waveformsThis Observation Series type contains waveforms of a "representative beat" (a.k.a. "median beat" or "average beat"). The waveform samples are measured in relative time, relative to the beginning of the beat as defined by the Observation Series effective time. The waveforms are not directly acquired from the subject, but rather algorithmically derived from the "rhythm" waveforms.
3      RHYTHMECG rhythm waveformsThis Observation type contains ECG "rhythm" waveforms. The waveform samples are measured in absolute time (a.k.a. "subject time" or "effective time"). These waveforms are usually "raw" with some minimal amount of noise reduction and baseline filtering applied.
1  _PatientImmunizationRelatedObservationTypePatientImmunizationRelatedObservationTypeDescription: Reporting codes that are related to an immunization event.
2    CLSSRMclassroomDescription: The class room associated with the patient during the immunization event.
2    GRADEgradeDescription: The school grade or level the patient was in when immunized.
2    SCHLschoolDescription: The school the patient attended when immunized.
2    SCHLDIVschool divisionDescription: The school division or district associated with the patient during the immunization event.
2    TEACHERteacherDescription: The patient's teacher when immunized.
1  _PopulationInclusionObservationTypePopulationInclusionObservationTypeObservation types for specifying criteria used to assert that a subject is included in a particular population.
2    DENEXdenominator exclusionsCriteria which specify subjects who should be removed from the eMeasure population and denominator before determining if numerator criteria are met. Denominator exclusions are used in proportion and ratio measures to help narrow the denominator.
2    DENEXCEPdenominator exceptionsCriteria which specify the removal of a subject, procedure or unit of measurement from the denominator, only if the numerator criteria are not met. Denominator exceptions allow for adjustment of the calculated score for those providers with higher risk populations. Denominator exceptions are used only in proportion eMeasures. They are not appropriate for ratio or continuous variable eMeasures. Denominator exceptions allow for the exercise of clinical judgment and should be specifically defined where capturing the information in a structured manner fits the clinical workflow. Generic denominator exception reasons used in proportion eMeasures fall into three general categories: Medical reasons Patient (or subject) reasons System reasons
2    DENOMdenominatorCriteria for specifying the entities to be evaluated by a specific quality measure, based on a shared common set of characteristics (within a specific measurement set to which a given measure belongs). The denominator can be the same as the initial population, or it may be a subset of the initial population to further constrain it for the purpose of the eMeasure. Different measures within an eMeasure set may have different denominators. Continuous Variable eMeasures do not have a denominator, but instead define a measure population.
2    IPOPinitial populationCriteria for specifying the entities to be evaluated by a specific quality measure, based on a shared common set of characteristics (within a specific measurement set to which a given measure belongs).
3      IPPOPinitial patient populationCriteria for specifying the patients to be evaluated by a specific quality measure, based on a shared common set of characteristics (within a specific measurement set to which a given measure belongs). Details often include information based upon specific age groups, diagnoses, diagnostic and procedure codes, and enrollment periods.
2    MSROBSmeasure observationDefines the observation to be performed for each patient or event in the measure population. Measure observations for each case in the population are aggregated to determine the overall measure score for the population. Examples: the median time from arrival in the Emergency Room to departure the median time from decision to admit to a hospital to the actual admission for Emergency Room patients
2    MSRPOPLmeasure populationCriteria for specifying the measure population as a narrative description (e.g., all patients seen in the Emergency Department during the measurement period). This is used only in continuous variable eMeasures.
2    MSRPOPLEXmeasure population exclusionsCriteria for specifying subjects who should be removed from the eMeasure's Initial Population and Measure Population. Measure Population Exclusions are used in Continuous Variable measures to help narrow the Measure Population before determining the value(s) of the continuous variable(s).
2    NUMERnumeratorCriteria for specifying the processes or outcomes expected for each patient, procedure, or other unit of measurement defined in the denominator for proportion measures, or related to (but not directly derived from) the denominator for ratio measures (e.g., a numerator listing the number of central line blood stream infections and a denominator indicating the days per thousand of central line usage in a specific time period).
2    NUMEXnumerator exclusionsCriteria for specifying instances that should not be included in the numerator data. (e.g., if the number of central line blood stream infections per 1000 catheter days were to exclude infections with a specific bacterium, that bacterium would be listed as a numerator exclusion). Numerator Exclusions are used only in ratio eMeasures.
1  _PreferenceObservationType_PreferenceObservationTypeTypes of observations that can be made about Preferences.
2    PREFSTRENGTHpreference strengthAn observation about how important a preference is to the target of the preference.
1  ADVERSE_REACTIONAdverse ReactionIndicates that the observation is of an unexpected negative occurrence in the subject suspected to result from the subject's exposure to one or more agents. Observation values would be the symptom resulting from the reaction.
1  ASSERTIONAssertionDescription:Refines classCode OBS to indicate an observation in which observation.value contains a finding or other nominalized statement, where the encoded information in Observation.value is not altered by Observation.code. For instance, observation.code="ASSERTION" and observation.value="fracture of femur present" is an assertion of a clinical finding of femur fracture.
1  CASESERcase seriousness criteriaDefinition:An observation that provides a characterization of the level of harm to an investigation subject as a result of a reaction or event.
1  CDIOcase disease imported observationAn observation that states whether the disease was likely acquired outside the jurisdiction of observation, and if so, the nature of the inter-jurisdictional relationship. OpenIssue: This code could be moved to LOINC if it can be done before there are significant implemenations using it.
1  CRITcriticalityA clinical judgment as to the worst case result of a future exposure (including substance administration). When the worst case result is assessed to have a life-threatening or organ system threatening potential, it is considered to be of high criticality.
1  CTMOcase transmission mode observationAn observation that states the mechanism by which disease was acquired by the living subject involved in the public health case. OpenIssue: This code could be moved to LOINC if it can be done before there are significant implemenations using it.
1  DXObservationDiagnosisTypesIncludes all codes defining types of indications such as diagnosis, symptom and other indications such as contrast agents for lab tests.
2    ADMDXadmitting diagnosisAdmitting diagnosis are the diagnoses documented for administrative purposes as the basis for a hospital admission.
2    DISDXdischarge diagnosisDischarge diagnosis are the diagnoses documented for administrative purposes as the time of hospital discharge.
2    INTDXintermediate diagnosisIntermediate diagnoses are those diagnoses documented for administrative purposes during the course of a hospital stay.
2    NOInature of injuryThe type of injury that the injury coding specifies.
1  GISTIERGIS tierDescription: Accuracy determined as per the GIS tier code system.
1  HHOBShousehold situation observationIndicates that the observation is of a person’s living situation in a household including the household composition and circumstances.
1  ISSUEdetected issueThere is a clinical issue for the therapy that makes continuation of the therapy inappropriate. Open Issue: The definition of this code does not correctly represent the concept space of its specializations (children)
2    _ActAdministrativeDetectedIssueCodeActAdministrativeDetectedIssueCodeIdentifies types of detectyed issues for Act class "ALRT" for the administrative and patient administrative acts domains.
3      _ActAdministrativeAuthorizationDetectedIssueCodeActAdministrativeAuthorizationDetectedIssueCodeActAdministrativeAuthorizationDetectedIssueCode
4        NATInsufficient authorizationThe requesting party has insufficient authorization to invoke the interaction.
4        SUPPRESSEDrecord suppressedDescription: One or more records in the query response have been suppressed due to consent or privacy restrictions.
4        VALIDATvalidation issueDescription:The specified element did not pass business-rule validation.
5          KEY204Unknown key identifierThe ID of the patient, order, etc., was not found. Used for transactions other than additions, e.g. transfer of a non-existent patient.
5          KEY205Duplicate key identifierThe ID of the patient, order, etc., already exists. Used in response to addition transactions (Admit, New Order, etc.).
5          COMPLYCompliance AlertThere may be an issue with the patient complying with the intentions of the proposed therapy
6            DUPTHPYDuplicate Therapy AlertThe proposed therapy appears to duplicate an existing therapy
7              DUPTHPCLSduplicate therapeutic alass alertDescription:The proposed therapy appears to have the same intended therapeutic benefit as an existing therapy, though the specific mechanisms of action vary.
7              DUPTHPGENduplicate generic alertDescription:The proposed therapy appears to have the same intended therapeutic benefit as an existing therapy and uses the same mechanisms of action as the existing therapy.
6            ABUSEcommonly abused/misused alertDescription:The proposed therapy is frequently misused or abused and therefore should be used with caution and/or monitoring.
6            FRAUDpotential fraudDescription:The request is suspected to have a fraudulent basis.
6            PLYDOCPoly-orderer AlertA similar or identical therapy was recently ordered by a different practitioner.
6            PLYPHRMPoly-supplier AlertThis patient was recently supplied a similar or identical therapy from a different pharmacy or supplier.
5          DOSEDosage problemProposed dosage instructions for therapy differ from standard practice.
6            DOSECONDdosage-condition alertDescription:Proposed dosage is inappropriate due to patient's medical condition.
6            DOSEDURDose-Duration AlertProposed length of therapy differs from standard practice.
7              DOSEDURHDose-Duration High AlertProposed length of therapy is longer than standard practice
8                DOSEDURHINDDose-Duration High for Indication AlertProposed length of therapy is longer than standard practice for the identified indication or diagnosis
7              DOSEDURLDose-Duration Low AlertProposed length of therapy is shorter than that necessary for therapeutic effect
8                DOSEDURLINDDose-Duration Low for Indication AlertProposed length of therapy is shorter than standard practice for the identified indication or diagnosis
6            DOSEHHigh Dose AlertProposed dosage exceeds standard practice
7              DOSEHINDAHigh Dose for Age AlertProposed dosage exceeds standard practice for the patient's age
7              DOSEHINDHigh Dose for Indication AlertHigh Dose for Indication Alert
7              DOSEHINDSAHigh Dose for Height/Surface Area AlertProposed dosage exceeds standard practice for the patient's height or body surface area
7              DOSEHINDWHigh Dose for Weight AlertProposed dosage exceeds standard practice for the patient's weight
6            DOSEIVLDose-Interval AlertProposed dosage interval/timing differs from standard practice
7              DOSEIVLINDDose-Interval for Indication AlertProposed dosage interval/timing differs from standard practice for the identified indication or diagnosis
6            DOSELLow Dose AlertProposed dosage is below suggested therapeutic levels
7              DOSELINDALow Dose for Age AlertProposed dosage is below suggested therapeutic levels for the patient's age
7              DOSELINDLow Dose for Indication AlertLow Dose for Indication Alert
7              DOSELINDSALow Dose for Height/Surface Area AlertProposed dosage is below suggested therapeutic levels for the patient's height or body surface area
7              DOSELINDWLow Dose for Weight AlertProposed dosage is below suggested therapeutic levels for the patient's weight
6            MDOSEmaximum dosage reachedDescription:The maximum quantity of this drug allowed to be administered within a particular time-range (month, year, lifetime) has been reached or exceeded.
5          OBSAObservation AlertProposed therapy may be inappropriate or contraindicated due to conditions or characteristics of the patient
6            AGEAge AlertProposed therapy may be inappropriate or contraindicated due to patient age
7              ADALRTadult alertProposed therapy is outside of the standard practice for an adult patient.
7              GEALRTgeriatric alertProposed therapy is outside of standard practice for a geriatric patient.
7              PEALRTpediatric alertProposed therapy is outside of the standard practice for a pediatric patient.
6            CONDCondition AlertProposed therapy may be inappropriate or contraindicated due to an existing/recent patient condition or diagnosis
7              HGHT
7              LACTLactation AlertProposed therapy may be inappropriate or contraindicated when breast-feeding
7              PREGPregnancy AlertProposed therapy may be inappropriate or contraindicated during pregnancy
7              WGHT
6            CREACTcommon reaction alertDescription:Proposed therapy may be inappropriate or contraindicated because of a common but non-patient specific reaction to the product. Example:There is no record of a specific sensitivity for the patient, but the presence of the sensitivity is common and therefore caution is warranted.
6            GENGenetic AlertProposed therapy may be inappropriate or contraindicated due to patient genetic indicators.
6            GENDGender AlertProposed therapy may be inappropriate or contraindicated due to patient gender.
6            LABLab AlertProposed therapy may be inappropriate or contraindicated due to recent lab test results
6            REACTReaction AlertProposed therapy may be inappropriate or contraindicated based on the potential for a patient reaction to the proposed product
7              ALGYAllergy AlertProposed therapy may be inappropriate or contraindicated because of a recorded patient allergy to the proposed product. (Allergies are immune based reactions.)
7              INTIntolerance AlertProposed therapy may be inappropriate or contraindicated because of a recorded patient intolerance to the proposed product. (Intolerances are non-immune based sensitivities.)
6            RREACTRelated Reaction AlertProposed therapy may be inappropriate or contraindicated because of a potential patient reaction to a cross-sensitivity related product.
7              RALGRelated Allergy AlertProposed therapy may be inappropriate or contraindicated because of a recorded patient allergy to a cross-sensitivity related product. (Allergies are immune based reactions.)
7              RARRelated Prior Reaction AlertProposed therapy may be inappropriate or contraindicated because of a recorded prior adverse reaction to a cross-sensitivity related product.
7              RINTRelated Intolerance AlertProposed therapy may be inappropriate or contraindicated because of a recorded patient intolerance to a cross-sensitivity related product. (Intolerances are non-immune based sensitivities.)
5          BUSbusiness constraint violationDescription:A local business rule relating multiple elements has been violated.
5          CODE_INVALcode is not validDescription:The specified code is not valid against the list of codes allowed for the element.
6            CODE_DEPRECcode has been deprecatedDescription:The specified code has been deprecated and should no longer be used. Select another code from the code system.
5          FORMATinvalid formatDescription:The element does not follow the formatting or type rules defined for the field.
5          ILLEGALillegalDescription:The request is missing elements or contains elements which cause it to not meet the legal standards for actioning.
5          LEN_RANGElength out of rangeDescription:The length of the data specified falls out of the range defined for the element.
6            LEN_LONGlength is too longDescription:The length of the data specified is greater than the maximum length defined for the element.
6            LEN_SHORTlength is too shortDescription:The length of the data specified is less than the minimum length defined for the element.
5          MISSCONDconditional element missingDescription:The specified element must be specified with a non-null value under certain conditions. In this case, the conditions are true but the element is still missing or null.
5          MISSMANDmandatory element missingDescription:The specified element is mandatory and was not included in the instance.
5          NODUPSduplicate values are not permittedDescription:More than one element with the same value exists in the set. Duplicates not permission in this set in a set.
5          NOPERSISTelement will not be persistedDescription: Element in submitted message will not persist in data storage based on detected issue.
5          REP_RANGErepetitions out of rangeDescription:The number of repeating elements falls outside the range of the allowed number of repetitions.
6            MAXOCCURSrepetitions above maximumDescription:The number of repeating elements is above the maximum number of repetitions allowed.
6            MINOCCURSrepetitions below minimumDescription:The number of repeating elements is below the minimum number of repetitions allowed.
3      _ActAdministrativeRuleDetectedIssueCodeActAdministrativeRuleDetectedIssueCodeActAdministrativeRuleDetectedIssueCode
4        KEY206non-matching identificationDescription: Metadata associated with the identification (e.g. name or gender) does not match the identification being verified.
4        OBSOLETEobsolete record returnedDescription: One or more records in the query response have a status of 'obsolete'.
2    _ActSuppliedItemDetectedIssueCodeActSuppliedItemDetectedIssueCodeIdentifies types of detected issues regarding the administration or supply of an item to a patient.
3      _AdministrationDetectedIssueCodeAdministrationDetectedIssueCodeAdministration of the proposed therapy may be inappropriate or contraindicated as proposed
4        _AppropriatenessDetectedIssueCodeAppropriatenessDetectedIssueCodeAppropriatenessDetectedIssueCode
5          _InteractionDetectedIssueCodeInteractionDetectedIssueCodeInteractionDetectedIssueCode
6            FOODFood Interaction AlertProposed therapy may interact with certain foods
6            TPRODTherapeutic Product AlertProposed therapy may interact with an existing or recent therapeutic product
7              DRGDrug Interaction AlertProposed therapy may interact with an existing or recent drug therapy
7              NHPNatural Health Product AlertProposed therapy may interact with existing or recent natural health product therapy
7              NONRXNon-Prescription Interaction AlertProposed therapy may interact with a non-prescription drug (e.g. alcohol, tobacco, Aspirin)
5          PREVINEFpreviously ineffectiveDefinition:The same or similar treatment has previously been attempted with the patient without achieving a positive effect.
4        DACTdrug action detected issueDescription:Proposed therapy may be contraindicated or ineffective based on an existing or recent drug therapy.
4        TIMEtiming detected issueDescription:Proposed therapy may be inappropriate or ineffective based on the proposed start or end time.
5          ALRTENDLATEend too late alertDefinition:Proposed therapy may be inappropriate or ineffective because the end of administration is too close to another planned therapy.
5          ALRTSTRTLATEstart too late alertDefinition:Proposed therapy may be inappropriate or ineffective because the start of administration is too late after the onset of the condition.
4        _TimingDetectedIssueCodeTimingDetectedIssueCodeProposed therapy may be inappropriate or ineffective based on the proposed start or end time.
5          ENDLATEEnd Too Late AlertProposed therapy may be inappropriate or ineffective because the end of administration is too close to another planned therapy
5          STRTLATEStart Too Late AlertProposed therapy may be inappropriate or ineffective because the start of administration is too late after the onset of the condition
3      _SupplyDetectedIssueCodeSupplyDetectedIssueCodeSupplying the product at this time may be inappropriate or indicate compliance issues with the associated therapy
4        ALLDONEalready performedDefinition:The requested action has already been performed and so this request has no effect
4        FULFILfulfillment alertDefinition:The therapy being performed is in some way out of alignment with the requested therapy.
5          NOTACTNno longer actionableDefinition:The status of the request being fulfilled has changed such that it is no longer actionable. This may be because the request has expired, has already been completely fulfilled or has been otherwise stopped or disabled. (Not used for 'suspended' orders.)
5          NOTEQUIVnot equivalent alertDefinition:The therapy being performed is not sufficiently equivalent to the therapy which was requested.
6            NOTEQUIVGENnot generically equivalent alertDefinition:The therapy being performed is not generically equivalent (having the identical biological action) to the therapy which was requested.
6            NOTEQUIVTHERnot therapeutically equivalent alertDefinition:The therapy being performed is not therapeutically equivalent (having the same overall patient effect) to the therapy which was requested.
5          TIMINGevent timing incorrect alertDefinition:The therapy is being performed at a time which diverges from the time the therapy was requested
6            INTERVALoutside requested timeDefinition:The therapy action is being performed outside the bounds of the time period requested
6            MINFREQtoo soon within frequency based on the usageDefinition:The therapy action is being performed too soon after the previous occurrence based on the requested frequency
4        HELDheld/suspended alertDefinition:There should be no actions taken in fulfillment of a request that has been held or suspended.
4        TOOLATERefill Too Late AlertThe patient is receiving a subsequent fill significantly later than would be expected based on the amount previously supplied and the therapy dosage instructions
4        TOOSOONRefill Too Soon AlertThe patient is receiving a subsequent fill significantly earlier than would be expected based on the amount previously supplied and the therapy dosage instructions
3      HISTORICrecord recorded as historicalDescription: While the record was accepted in the repository, there is a more recent version of a record of this type.
3      PATPREFviolates stated preferencesDefinition:The proposed therapy goes against preferences or consent constraints recorded in the patient's record.
4        PATPREFALTviolates stated preferences, alternate availableDefinition:The proposed therapy goes against preferences or consent constraints recorded in the patient's record. An alternate therapy meeting those constraints is available.
1  KSUBJknowledge subjectCategorization of types of observation that capture the main clinical knowledge subject which may be a medication, a laboratory test, a disease.
1  KSUBTknowledge subtopicCategorization of types of observation that capture a knowledge subtopic which might be treatment, etiology, or prognosis.
1  OINTintoleranceHypersensitivity resulting in an adverse reaction upon exposure to an agent.
2    ALGAllergyHypersensitivity to an agent caused by an immunologic response to an initial exposure
3      DALGDrug AllergyAn allergy to a pharmaceutical product.
3      EALGEnvironmental AllergyAn allergy to a substance other than a drug or a food. E.g. Latex, pollen, etc.
3      FALGFood AllergyAn allergy to a substance generally consumed for nutritional purposes.
2    DINTDrug IntoleranceHypersensitivity resulting in an adverse reaction upon exposure to a drug.
3      DNAINTDrug Non-Allergy IntoleranceHypersensitivity to an agent caused by a mechanism other than an immunologic response to an initial exposure
2    EINTEnvironmental IntoleranceHypersensitivity resulting in an adverse reaction upon exposure to environmental conditions.
3      ENAINTEnvironmental Non-Allergy IntoleranceHypersensitivity to an agent caused by a mechanism other than an immunologic response to an initial exposure
2    FINTFood IntoleranceHypersensitivity resulting in an adverse reaction upon exposure to food.
3      FNAINTFood Non-Allergy IntoleranceHypersensitivity to an agent caused by a mechanism other than an immunologic response to an initial exposure
2    NAINTNon-Allergy IntoleranceHypersensitivity to an agent caused by a mechanism other than an immunologic response to an initial exposure
1  SEVSeverity ObservationA subjective evaluation of the seriousness or intensity associated with another observation.
1  _FDALabelDataFDALabelDataFDA label data
2    FDACOATINGcoatingFDA label coating
2    FDACOLORcolorFDA label color
2    FDAIMPRINTCDimprint codeFDA label imprint code
2    FDALOGOlogoFDA label logo
2    FDASCORINGscoringFDA label scoring
2    FDASHAPEshapeFDA label shape
2    FDASIZEsizeFDA label size
0_ROIOverlayShapeROIOverlayShapeShape of the region on the object being referenced
1  CIRCLEcircleA circle defined by two (column,row) pairs. The first point is the center of the circle and the second point is a point on the perimeter of the circle.
1  ELLIPSEellipseAn ellipse defined by four (column,row) pairs, the first two points specifying the endpoints of the major axis and the second two points specifying the endpoints of the minor axis.
1  POINTpointA single point denoted by a single (column,row) pair, or multiple points each denoted by a (column,row) pair.
1  POLYpolylineA series of connected line segments with ordered vertices denoted by (column,row) pairs; if the first and last vertices are the same, it is a closed polygon.
0CcorrectedDescription:Indicates that result data has been corrected.
0DIETDietCode set to define specialized/allowed diets
1  BRbreikost (GE)A diet exclusively composed of oatmeal, semolina, or rice, to be extremely easy to eat and digest.
1  DMdiabetes mellitus dietA diet that uses carbohydrates sparingly. Typically with a restriction in daily energy content (e.g. 1600-2000 kcal).
1  FASTfastingNo enteral intake of foot or liquids whatsoever, no smoking. Typically 6 to 8 hours before anesthesia.
1  FORMULAformula dietA diet consisting of a formula feeding, either for an infant or an adult, to provide nutrition either orally or through the gastrointestinal tract via tube, catheter or stoma.
1  GFgluten freeGluten free diet for celiac disease.
1  LFlow fatA diet low in fat, particularly to patients with hepatic diseases.
1  LPlow proteinA low protein diet for patients with renal failure.
1  LQliquidA strictly liquid diet, that can be fully absorbed in the intestine, and therefore may not contain fiber. Used before enteral surgeries.
1  LSlow sodiumA diet low in sodium for patients with congestive heart failure and/or renal failure.
1  Nnormal dietA normal diet, i.e. no special preparations or restrictions for medical reasons. This is notwithstanding any preferences the patient might have regarding special foods, such as vegetarian, kosher, etc.
1  NFno fatA no fat diet for acute hepatic diseases.
1  PAFphenylalanine freePhenylketonuria diet.
1  PARparenteralPatient is supplied with parenteral nutrition, typically described in terms of i.v. medications.
1  RDreduction dietA diet that seeks to reduce body fat, typically low energy content (800-1600 kcal).
1  SCHschonkost (GE)A diet that avoids ingredients that might cause digestion problems, e.g., avoid excessive fat, avoid too much fiber (cabbage, peas, beans).
1  SUPPLEMENTnutritional supplementA diet that is not intended to be complete but is added to other diets.
1  Ttea onlyThis is not really a diet, since it contains little nutritional value, but is essentially just water. Used before coloscopy examinations.
1  VLIlow valin, leucin, isoleucinDiet with low content of the amino-acids valin, leucin, and isoleucin, for "maple syrup disease."
0DRUGPRGdrug programDefinition: A public or government health program that administers and funds coverage for prescription drugs to assist program eligible who meet financial and health status criteria.
0FfinalDescription:Indicates that a result is complete. No further results are to come. This maps to the 'complete' state in the observation result status code.
0PRLMNpreliminaryDescription:Indicates that a result is incomplete. There are further results to come. This maps to the 'active' state in the observation result status code.
0SECOBSSecurityObservationTypeAn observation identifying security metadata about an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Security metadata are used to name security labels. Rationale: According to ISO/TS 22600-3:2009(E) A.9.1.7 SECURITY LABEL MATCHING, Security label matching compares the initiator's clearance to the target's security label. All of the following must be true for authorization to be granted: The security policy identifiers shall be identical The classification level of the initiator shall be greater than or equal to that of the target (that is, there shall be at least one value in the classification list of the clearance greater than or equal to the classification of the target), and For each security category in the target label, there shall be a security category of the same type in the initiator's clearance and the initiator's classification level shall dominate that of the target. Examples: SecurityObservationType security label fields include: Confidentiality classification Compartment category Sensitivity category Security mechanisms used to ensure data integrity or to perform authorized data transformation Indicators of an IT resource completeness, veracity, reliability, trustworthiness, or provenance. Usage Note: SecurityObservationType codes designate security label field types, which are valued with an applicable SecurityObservationValue code as the "security label tag".
1  SECCATOBSsecurity category observationType of security metadata observation made about the category of an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Security category metadata is defined by ISO/IEC 2382-8:1998(E/F)/ T-REC-X.812-1995 as: "A nonhierarchical grouping of sensitive information used to control access to data more finely than with hierarchical security classification alone." Rationale: A security category observation supports requirement to specify the type of IT resource to facilitate application of appropriate levels of information security according to a range of levels of impact or consequences that might result from the unauthorized disclosure, modification, or use of the information or information system. A resource is assigned to a specific category of information (e.g., privacy, medical, proprietary, financial, investigative, contractor sensitive, security management) defined by an organization or in some instances, by a specific law, Executive Order, directive, policy, or regulation. [FIPS 199] Examples: Types of security categories include: Compartment: A division of data into isolated blocks with separate security controls for the purpose of reducing risk. (ISO 2382-8). A security label tag that "segments" an IT resource by indicating that access and use is restricted to members of a defined community or project. (HL7 Healthcare Classification System) Sensitivity: The characteristic of an IT resource which implies its value or importance and may include its vulnerability. (ISO 7492-2) Privacy metadata for information perceived as undesirable to share. (HL7 Healthcare Classification System)
1  SECCLASSOBSsecurity classification observationType of security metadata observation made about the classification of an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Security classification is defined by ISO/IEC 2382-8:1998(E/F)/ T-REC-X.812-1995 as: "The determination of which specific degree of protection against access the data or information requires, together with a designation of that degree of protection." Security classification metadata is based on an analysis of applicable policies and the risk of financial, reputational, or other harm that could result from unauthorized disclosure. Rationale: A security classification observation may indicate that the confidentiality level indicated by an Act or Role confidentiality attribute has been overridden by the entity responsible for ascribing the SecurityClassificationObservationValue. This supports the business requirement for increasing or decreasing the level of confidentiality (classification or declassification) based on parameters beyond the original assignment of an Act or Role confidentiality. Examples: Types of security classification include: HL7 Confidentiality Codes such as very restricted, unrestricted, and normal. Intelligence community examples include top secret, secret, and confidential. Usage Note: Security classification observation type codes designate security label field types, which are valued with an applicable SecurityClassificationObservationValue code as the "security label tag".
1  SECCONOBSsecurity control observationType of security metadata observation made about the control of an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Security control metadata convey instructions to users and receivers for secure distribution, transmission, and storage; dictate obligations or mandated actions; specify any action prohibited by refrain policy such as dissemination controls; and stipulate the permissible purpose of use of an IT resource. Rationale: A security control observation supports requirement to specify applicable management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. [FIPS 199] Examples: Types of security control metadata include: handling caveats dissemination controls obligations refrain policies purpose of use constraints
1  SECINTOBSsecurity integrity observationType of security metadata observation made about the integrity of an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Rationale: A security integrity observation supports the requirement to guard against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. (44 U.S.C., SEC. 3542) Examples: Types of security integrity metadata include: Integrity status, which indicates the completeness or workflow status of an IT resource (data, information object, service, or system capability) Integrity confidence, which indicates the reliability and trustworthiness of an IT resource Integrity control, which indicates pertinent handling caveats, obligations, refrain policies, and purpose of use for the resource Data integrity, which indicate the security mechanisms used to ensure that the accuracy and consistency are preserved regardless of changes made (ISO/IEC DIS 2382-8) Alteration integrity, which indicate the security mechanisms used for authorized transformations of the resource Integrity provenance, which indicates the entity responsible for a report or assertion relayed "second-hand" about an IT resource
2    SECALTINTOBSsecurity alteration integrity observationType of security metadata observation made about the alteration integrity of an IT resource (data, information object, service, or system capability), which indicates the mechanism used for authorized transformations of the resource. Examples: Types of security alteration integrity observation metadata, which may value the observation with a code used to indicate the mechanism used for authorized transformation of an IT resource, including: translation syntactic transformation semantic mapping redaction masking pseudonymization anonymization
2    SECDATINTOBSsecurity data integrity observationType of security metadata observation made about the data integrity of an IT resource (data, information object, service, or system capability), which indicates the security mechanism used to preserve resource accuracy and consistency. Data integrity is defined by ISO 22600-23.3.21 as: "The property that data has not been altered or destroyed in an unauthorized manner", and by ISO/IEC 2382-8: The property of data whose accuracy and consistency are preserved regardless of changes made." Examples: Types of security data integrity observation metadata, which may value the observation, include cryptographic hash function and digital signature.
2    SECINTCONOBSsecurity integrity confidence observationType of security metadata observation made about the integrity confidence of an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Examples: Types of security integrity confidence observation metadata, which may value the observation, include highly reliable, uncertain reliability, and not reliable. Usage Note: A security integrity confidence observation on an Act may indicate that a valued Act.uncertaintycode attribute has been overridden by the entity responsible for ascribing the SecurityIntegrityConfidenceObservationValue. This supports the business requirements for increasing or decreasing the assessment of the reliability or trustworthiness of an IT resource based on parameters beyond the original assignment of an Act statement level of uncertainty.
2    SECINTPRVOBSsecurity integrity provenance observationType of security metadata observation made about the provenance integrity of an IT resource (data, information object, service, or system capability), which indicates the lifecycle completeness of an IT resource in terms of workflow status such as its creation, modification, suspension, and deletion; locations in which the resource has been collected or archived, from which it may be retrieved, and the history of its distribution and disclosure. Integrity provenance metadata about an IT resource may be used to assess its veracity, reliability, and trustworthiness. Examples: Types of security integrity provenance observation metadata, which may value the observation about an IT resource, include: completeness or workflow status, such as authentication the entity responsible for original authoring or informing about an IT resource the entity responsible for a report or assertion about an IT resource relayed “second-handâ€? the entity responsible for excerpting, transforming, or compiling an IT resource
3      SECINTPRVABOBSsecurity integrity provenance asserted by observationType of security metadata observation made about the integrity provenance of an IT resource (data, information object, service, or system capability), which indicates the entity that made assertions about the resource. The asserting entity may not be the original informant about the resource. Examples: Types of security integrity provenance asserted by observation metadata, which may value the observation, including: assertions about an IT resource by a patient assertions about an IT resource by a clinician assertions about an IT resource by a device
3      SECINTPRVRBOBSsecurity integrity provenance reported by observationType of security metadata observation made about the integrity provenance of an IT resource (data, information object, service, or system capability), which indicates the entity that reported the existence of the resource. The reporting entity may not be the original author of the resource. Examples: Types of security integrity provenance reported by observation metadata, which may value the observation, include: reports about an IT resource by a patient reports about an IT resource by a clinician reports about an IT resource by a device
2    SECINTSTOBSsecurity integrity status observationType of security metadata observation made about the integrity status of an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Indicates the completeness of an IT resource in terms of workflow status, which may impact users that are authorized to access and use the resource. Examples: Types of security integrity status observation metadata, which may value the observation, include codes from the HL7 DocumentCompletion code system such as legally authenticated, in progress, and incomplete.
1  SECTRSTOBSSECTRSTOBSAn observation identifying trust metadata about an IT resource (data, information object, service, or system capability), which may be used as a trust attribute to populate a computable trust policy, trust credential, trust assertion, or trust label field in a security label or trust policy, which are principally used for authentication, authorization, and access control decisions.
2    TRSTACCRDOBStrust accreditation observationType of security metadata observation made about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework.
2    TRSTAGREOBStrust agreement observationType of security metadata observation made about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1]
2    TRSTCERTOBStrust certificate observationType of security metadata observation made about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1] For example, A Certificate Policy (CP), which is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. For example, a particular Certificate Policy might indicate the applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range. [Trust Service Principles and Criteria for Certification Authorities Version 2.0 March 2011 Copyright 2011 by Canadian Institute of Chartered Accountants. A Certificate Practice Statement (CSP), which is a statement of the practices which an Authority employs in issuing and managing certificates. [Trust Service Principles and Criteria for Certification Authorities Version 2.0 March 2011 Copyright 2011 by Canadian Institute of Chartered Accountants.]
2    TRSTFWKOBStrust framework observationType of security metadata observation made about a complete set of contracts, regulations or commitments that enable participating actors to rely on certain assertions by other actors to fulfill their information security requirements. [Kantara Initiative]
2    TRSTLOAOBStrust assurance observationType of security metadata observation made about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol.
2    TRSTMECOBStrust mechanism observationType of security metadata observation made about a security architecture system component that supports enforcement of security policies.
0SUBSIDFFSsubsidized fee for service programDefinition: A government health program that provides coverage on a fee for service basis for health services to persons meeting eligibility criteria such as income, location of residence, access to other coverages, health condition, and age, the cost of which is to some extent subsidized by public funds. Discussion: The structure and business processes for underwriting and administering a subsidized fee for service program is further specified by the Underwriter and Payer Role.class and Role.code.
0WRKCOMP(workers compensation programDefinition: Government mandated program providing coverage, disability income, and vocational rehabilitation for injuries sustained in the work place or in the course of employment. Employers may either self-fund the program, purchase commercial coverage, or pay a premium to a government entity that administers the program. Employees may be required to pay premiums toward the cost of coverage as well.
0_ActProcedureCodeActProcedureCodeAn identifying code for healthcare interventions/procedures.
1  _ActBillableServiceCodeActBillableServiceCodeDefinition: An identifying code for billable services, as opposed to codes for similar services used to identify them for functional purposes.
0_HL7DefinedActCodesHL7DefinedActCodesDomain provides the root for HL7-defined detailed or rich codes for the Act classes.
0COPAY
0DEDUCT
0DOSEIND
0PRA