This page is part of the FHIR Specification (v5.0.0-draft-final: Final QA Preview for R5 - see ballot notes). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions
Security Work Group | Maturity Level: 1 | Draft | Use Context: Country: World, Not Intended for Production use |
Official URL: http://hl7.org/fhir/ValueSet/security-label-event-examples
|
Version: 5.0.0-draft-final | |||
draft as of 2022-05-10 | Computable Name: SecurityLabelEventExamples | |||
Flags: Experimental | OID: 2.16.840.1.113883.4.642.3.3008 |
This value set is used in the following places:
A sample of security labels from Healthcare Privacy and Security Classification System that are used on events and requests/responses (aka user context or organization context) made up of PurposeOfUse and maybe a refrain/obligation.
This value set includes codes based on the following rules:
http://terminology.hl7.org/CodeSystem/v3-ActReason
Code | Display | Definition |
TREAT | treatment | To perform one or more operations on information for provision of health care. |
HPAYMT | healthcare payment | To perform one or more operations on information for conducting financial or contractual activities related to payment for provision of health care. |
ETREAT | Emergency Treatment | To perform one or more operations on information for provision of immediately needed health care for an emergent condition. |
http://terminology.hl7.org/CodeSystem/v3-ActCode
Code | Display | Definition |
NOAUTH | no disclosure without subject authorization | Prohibition on disclosure without information subject's authorization. |
DELAU | delete after use | Custodian system must remove target information from access after use. |
NORDSCLCD | no redisclosure without consent directive | Prohibition on redisclosure without patient consent directive. |
See the full registry of value sets defined as part of FHIR.
Explanation of the columns that may appear on this page:
Lvl | A few code lists that FHIR defines are hierarchical - each code is assigned a level. For value sets, levels are mostly used to organize codes for user convenience, but may follow code system hierarchy - see Code System for further information |
Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance). If the code is in italics, this indicates that the code is not selectable ('Abstract') |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |