Release 5 Ballot

This page is part of the FHIR Specification (v5.0.0-ballot: FHIR R5 Ballot Preview). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions

4.4.1.370 ValueSet http://hl7.org/fhir/ValueSet/security-label-examples

Security Work Group Maturity Level: 1Draft Use Context: Not Intended for Production use, Not Intended for Production use

This is a value set defined by the FHIR project.

Summary

Defining URL:http://hl7.org/fhir/ValueSet/security-label-examples
Version:5.0.0-ballot
Name:SecurityLabelExamples
Title:Example set of Security Labels
Status:draft
Definition:

A sample of security labels from Healthcare Privacy and Security Classification System as the combination of data and event codes.

Committee:Security Work Group
OID:2.16.840.1.113883.4.642.3.3011 (for OID based terminology systems)
Flags:Experimental

This value set is used in the following places:


This value set includes codes based on the following rules:

 

This expansion generated 07 Sep 2022


This value set contains 11 concepts

CodeSystemDisplayDefinition
  N http://terminology.hl7.org/CodeSystem/v3-Confidentialitynormal

Privacy metadata indicating the level of protection required to safeguard personal and healthcare information, which if disclosed without authorization, would present a considerable risk of harm to an individual's reputation and sense of privacy.

Usage Note: The level of protection afforded normatively confidential information is dictated by the prevailing normative privacy policies, which are intended to engender patient trust in their healthcare providers.

Privacy policies mandating normative levels of protection, which preempt less protective privacy policies when the information is used in the delivery and management of healthcare. May be pre-empted by jurisdictional law (e.g., for public health reporting or emergency treatment).

Confidentiality code total order hierarchy: Normal (N) is less protective than V and R, and subsumes all other protection levels (i.e., M, L, and U).

**Map:**Partial Map to ISO 13606-4 Sensitivity Level (3) Clinical Care when purpose of use is treatment: Default for normal clinical care access (i.e., most clinical staff directly caring for the patient should be able to access nearly all of the EHR). Maps to normal confidentiality for treatment information but not to ancillary care, payment and operations.

Examples:

n the US, this includes what HIPAA identifies as protected health information (PHI) under 45 CFR Section 160.103.

  R http://terminology.hl7.org/CodeSystem/v3-Confidentialityrestricted

Privacy metadata indicating the level of protection required to safeguard potentially stigmatizing information, which if disclosed without authorization, would present a high risk of harm to an individual's reputation and sense of privacy.

Usage Note: The level of protection afforded restricted confidential information is dictated by specially protective organizational or jurisdictional privacy policies, including at an authorized individual’s request, intended to engender patient trust in providers of sensitive services.

Privacy policies mandating additional levels of protection by restricting information access preempt less protective privacy policies when the information is used in the delivery and management of healthcare. May be pre-empted by jurisdictional law (e.g., for public health reporting or emergency treatment).

Confidentiality code total order hierarchy: Restricted (R) is less protective than V, and subsumes all other protection levels (i.e., N, M, L, and U).

Examples:

Includes information that is additionally protected such as sensitive conditions mental health, HIV, substance abuse, domestic violence, child abuse, genetic disease, and reproductive health; or sensitive demographic information such as a patient’s standing as an employee or a celebrity. May be used to indicate proprietary or classified information that is not related to an individual (e.g., secret ingredients in a therapeutic substance; or the name of a manufacturer).

  ETH http://terminology.hl7.org/CodeSystem/v3-ActCodesubstance abuse information sensitivity

Policy for handling alcohol or drug-abuse information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to alcohol or drug-abuse information that is deemed sensitive.

Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.

  PSY http://terminology.hl7.org/CodeSystem/v3-ActCodepsychiatry disorder information sensitivity

Policy for handling psychiatry psychiatric disorder information, which is afforded heightened confidentiality.

Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.

  STD http://terminology.hl7.org/CodeSystem/v3-ActCodesexually transmitted disease information sensitivity

Policy for handling sexually transmitted disease information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to sexually transmitted disease information that is deemed sensitive.

Usage Note: If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.

  TREAT http://terminology.hl7.org/CodeSystem/v3-ActReasontreatment

To perform one or more operations on information for provision of health care.

  HPAYMT http://terminology.hl7.org/CodeSystem/v3-ActReasonhealthcare payment

To perform one or more operations on information for conducting financial or contractual activities related to payment for provision of health care.

  ETREAT http://terminology.hl7.org/CodeSystem/v3-ActReasonEmergency Treatment

To perform one or more operations on information for provision of immediately needed health care for an emergent condition.

  NOAUTH http://terminology.hl7.org/CodeSystem/v3-ActCodeno disclosure without subject authorization

Prohibition on disclosure without information subject's authorization.

  DELAU http://terminology.hl7.org/CodeSystem/v3-ActCodedelete after use

Custodian system must remove target information from access after use.

  NORDSCLCD http://terminology.hl7.org/CodeSystem/v3-ActCodeno redisclosure without consent directive

Prohibition on redisclosure without patient consent directive.

 

See the full registry of value sets defined as part of FHIR.


Explanation of the columns that may appear on this page:

LvlA few code lists that FHIR defines are hierarchical - each code is assigned a level. For value sets, levels are mostly used to organize codes for user convenience, but may follow code system hierarchy - see Code System for further information
SourceThe source of the definition of the code (when the value set draws in codes defined elsewhere)
CodeThe code (used as the code in the resource instance). If the code is in italics, this indicates that the code is not selectable ('Abstract')
DisplayThe display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application
DefinitionAn explanation of the meaning of the concept
CommentsAdditional notes about how to use the code