R6 Ballot (2nd Draft)

Publish-box (todo)

Example CodeSystem/constraint-severity (JSON)

FHIR Infrastructure Work GroupMaturity Level: N/AStandards Status: Informative

Raw JSON (canonical form + also see JSON Format Specification)

Definition for Code SystemConstraintSeverity

{
  "resourceType" : "CodeSystem",
  "id" : "constraint-severity",
  "meta" : {
    "lastUpdated" : "2024-08-12T16:52:12.437+08:00"
  },
  "text" : {
    "status" : "generated",
    "div" : "<div xmlns=\"http://www.w3.org/1999/xhtml\"><p class=\"res-header-id\"><b>Generated Narrative: CodeSystem constraint-severity</b></p><a name=\"constraint-severity\"> </a><a name=\"hcconstraint-severity\"> </a><a name=\"constraint-severity-en-AU\"> </a><p>This case-sensitive code system <code>http://hl7.org/fhir/constraint-severity</code> defines the following codes:</p><table class=\"codes\"><tr><td style=\"white-space:nowrap\"><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr><tr><td style=\"white-space:nowrap\">error<a name=\"constraint-severity-error\"> </a></td><td>Error</td><td>If the constraint is violated, the resource is not conformant.</td></tr><tr><td style=\"white-space:nowrap\">warning<a name=\"constraint-severity-warning\"> </a></td><td>Warning</td><td>If the constraint is violated, the resource is conformant, but it is not necessarily following best practice.</td></tr></table></div>"
  },
  "extension" : [{
    "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
    "valueCode" : "fhir"
  },
  {
    "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status",
    "valueCode" : "normative"
  },
  {
    "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-normative-version",
    "valueCode" : "4.0.0"
  },
  {
    "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm",
    "valueInteger" : 5
  }],
  "url" : "http://hl7.org/fhir/constraint-severity",
  "identifier" : [{
    "system" : "urn:ietf:rfc:3986",
    "value" : "urn:oid:2.16.840.1.113883.4.642.1.82"
  }],
  "version" : "6.0.0-ballot2",
  "name" : "ConstraintSeverity",
  "title" : "ConstraintSeverity",
  "status" : "active",
  "experimental" : false,
  "date" : "2024-08-12T16:52:12+08:00",
  "publisher" : "HL7 International / FHIR Infrastructure",
  "contact" : [{
    "telecom" : [{
      "system" : "url",
      "value" : "http://hl7.org/fhir"
    },
    {
      "system" : "email",
      "value" : "fhir@lists.hl7.org"
    }]
  },
  {
    "telecom" : [{
      "system" : "url",
      "value" : "http://www.hl7.org/Special/committees/fiwg"
    }]
  }],
  "description" : "SHALL applications comply with this constraint?",
  "jurisdiction" : [{
    "coding" : [{
      "system" : "http://unstats.un.org/unsd/methods/m49/m49.htm",
      "code" : "001",
      "display" : "World"
    }]
  }],
  "caseSensitive" : true,
  "valueSet" : "http://hl7.org/fhir/ValueSet/constraint-severity",
  "content" : "complete",
  "concept" : [{
    "code" : "error",
    "display" : "Error",
    "definition" : "If the constraint is violated, the resource is not conformant."
  },
  {
    "code" : "warning",
    "display" : "Warning",
    "definition" : "If the constraint is violated, the resource is conformant, but it is not necessarily following best practice."
  }]
}

Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.