This page is part of the FHIR Specification v6.0.0-ballot1: Release 6 Ballot (1st Draft) (see Ballot Notes). The current version is 5.0.0. For a full list of available versions, see the Directory of published versions
Security Work Group | Maturity Level: 5 | Trial Use | Use Context: Country: World, Not yet ready for Production use |
Official URL: http://hl7.org/fhir/ValueSet/participation-role-type
|
Version: 6.0.0-ballot1 | |||
draft as of 2021-12-07 | Computable Name: ParticipationRoleType | |||
Flags: Experimental | OID: 2.16.840.1.113883.4.642.3.54 |
This value set is used in the following places:
This FHIR value set is comprised of Actor participation Type codes, which can be used to value FHIR agents, actors, and other role elements. The codes are intended to express how the agent participated in some activity. Sometimes refered to the agent functional-role relative to the activity.
This value set includes codes based on the following rules:
http://dicom.nema.org/resources/ontology/DCM
, where the codes are contained in AuditActiveParticipantRoleIDCode http://terminology.hl7.org/CodeSystem/extra-security-role-type
This expansion generated 18 Dec 2023
Expansion based on:
This value set contains 15 concepts
Code | System | Display | Definition |
enterer | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Enterer | A person entering the data into the originating system |
performer | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Performer | A person, animal, organization or device that who actually and principally carries out the activity |
author | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Author | A party that originates the resource and therefore has responsibility for the information given in the resource and ownership of this resource |
verifier | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Verifier | A person who verifies the correctness and appropriateness of activity |
legal | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Legal Authenticator | The person authenticated the content and accepted legal responsibility for its content |
attester | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Attester | A verifier who attests to the accuracy of the resource |
informant | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Informant | A person who reported information that contributed to the resource |
custodian | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Custodian | The entity that is accountable for maintaining a true an accurate copy of the original record |
assembler | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Assembler | A device that operates independently of an author on custodian's algorithms for data extraction of existing information for purpose of generating a new artifact. |
composer | http://terminology.hl7.org/CodeSystem/provenance-participant-type | Composer | A device used by an author to record new information, which may also be used by the author to select existing information for aggregation with newly recorded information for the purpose of generating a new artifact. |
authserver | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Authorization Server | An entity providing authorization services to enable the electronic sharing of health-related information based on resource owner's preapproved permissions. For example, an UMA Authorization Server[UMA] |
datacollector | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Data Collector | An entity that collects information over which the data subject may have certain rights under policy or law to control that information's management and distribution by data collectors, including the right to access, retrieve, distribute, or delete that information. |
dataprocessor | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Data Processor | An entity that processes collected information over which the data subject may have certain rights under policy or law to control that information's management and distribution by data processors, including the right to access, retrieve, distribute, or delete that information. |
datasubject | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Data Subject | A person whose personal information is collected or processed, and who may have certain rights under policy or law to control that information's management and distribution by data collectors or processors, including the right to access, retrieve, distribute, or delete that information. |
humanuser | http://terminology.hl7.org/CodeSystem/extra-security-role-type | Human User | The human user that has participated. |
See the full registry of value sets defined as part of FHIR.
Explanation of the columns that may appear on this page:
Lvl | A few code lists that FHIR defines are hierarchical - each code is assigned a level. For value sets, levels are mostly used to organize codes for user convenience, but may follow code system hierarchy - see Code System for further information |
Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance). If the code is in italics, this indicates that the code is not selectable ('Abstract') |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |