This page is part of the FHIR Specification (v5.0.0-ballot: R5 Ballot - see ballot notes). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R5 R4B R4
Security Work Group | Maturity Level: 3 | Trial Use | Use Context: Not yet ready for Production use, Not yet ready for Production use |
This is a value set defined by the FHIR project.
Summary
Defining URL: | http://hl7.org/fhir/ValueSet/participation-role-type |
Version: | 5.0.0-ballot |
Name: | ParticipationRoleType |
Title: | ParticipationRoleType |
Status: | draft |
Definition: | This FHIR value set is comprised of Actor participation Type codes, which can be used to value FHIR agents, actors, and other role elements. The codes are intended to express how the agent participated in some activity. Sometimes refered to the agent functional-role relative to the activity. |
Committee: | Security Work Group |
OID: | 2.16.840.1.113883.4.642.3.54 (for OID based terminology systems) |
Copyright: | This is an example FHIR value set based on ASTM Standard, E1762-95 (2013) Some codes are excerpted from Digital Imaging and Communications in Medicine (DICOM) Standard, Part 16: Content Mapping Resource, Copyright © 2011 by the National Electrical Manufacturers Association. |
Flags: | Experimental |
This value set is used in the following places:
This value set includes codes based on the following rules:
http://dicom.nema.org/resources/ontology/DCM
, where the codes are contained in http://dicom.nema.org/medical/dicom/current/output/chtml/part16/sect_CID_402.html http://terminology.hl7.org/CodeSystem/extra-security-role-type
This expansion generated 10 Sep 2022
This value set contains 21 concepts
Expansion based on:
Code | System | Display | Definition |
enterer | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Enterer | A person entering the data into the originating system |
performer | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Performer | A person, animal, organization or device that who actually and principally carries out the activity |
author | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Author | A party that originates the resource and therefore has responsibility for the information given in the resource and ownership of this resource |
verifier | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Verifier | A person who verifies the correctness and appropriateness of activity |
legal | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Legal Authenticator | The person authenticated the content and accepted legal responsibility for its content |
attester | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Attester | A verifier who attests to the accuracy of the resource |
informant | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Informant | A person who reported information that contributed to the resource |
custodian | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Custodian | The entity that is accountable for maintaining a true an accurate copy of the original record |
assembler | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Assembler | A device that operates independently of an author on custodian's algorithms for data extraction of existing information for purpose of generating a new artifact. |
composer | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Composer | A device used by an author to record new information, which may also be used by the author to select existing information for aggregation with newly recorded information for the purpose of generating a new artifact. |
110150 | http://dicom.nema.org/resources/ontology/DCM | Application | Audit participant role ID of software application. |
110151 | http://dicom.nema.org/resources/ontology/DCM | Application Launcher | Audit participant role ID of software application launcher, i.e., the entity that started or stopped an application. |
110152 | http://dicom.nema.org/resources/ontology/DCM | Destination Role ID | Audit participant role ID of the receiver of data. |
110153 | http://dicom.nema.org/resources/ontology/DCM | Source Role ID | Audit participant role ID of the sender of data. |
110154 | http://dicom.nema.org/resources/ontology/DCM | Destination Media | Audit participant role ID of media receiving data during an export. |
110155 | http://dicom.nema.org/resources/ontology/DCM | Source Media | Audit participant role ID of media providing data during an import. |
authserver | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Authorization Server | An entity providing authorization services to enable the electronic sharing of health-related information based on resource owner's preapproved permissions. For example, an UMA Authorization Server[UMA] |
datacollector | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Data Collector | An entity that collects information over which the data subject may have certain rights under policy or law to control that information's management and distribution by data collectors, including the right to access, retrieve, distribute, or delete that information. |
dataprocessor | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Data Processor | An entity that processes collected information over which the data subject may have certain rights under policy or law to control that information's management and distribution by data processors, including the right to access, retrieve, distribute, or delete that information. |
datasubject | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Data Subject | A person whose personal information is collected or processed, and who may have certain rights under policy or law to control that information's management and distribution by data collectors or processors, including the right to access, retrieve, distribute, or delete that information. |
humanuser | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Human User | The human user that has participated. |
See the full registry of value sets defined as part of FHIR.
Explanation of the columns that may appear on this page:
Lvl | A few code lists that FHIR defines are hierarchical - each code is assigned a level. For value sets, levels are mostly used to organize codes for user convenience, but may follow code system hierarchy - see Code System for further information |
Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance). If the code is in italics, this indicates that the code is not selectable ('Abstract') |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |