This page is part of the FHIR Data Segmentation for Privacy (v0.1.0: STU 1 Ballot 1) based on FHIR R4. . For a full list of available versions, see the Directory of published versions
Source view
{ "resourceType" : "ValueSet", "id" : "valueset-integrity", "text" : { "status" : "generated", "div" : "<div xmlns=\"http://www.w3.org/1999/xhtml\"><h2>Integrity ValueSet</h2><div><p>Security label metadata that 'segments' an IT resource by conveying the completeness, veracity, reliability, trustworthiness, and provenance of an IT resource.</p>\n</div><ul><li>Include codes from <a href=\"http://hl7.org/fhir/R4/v3/ObservationValue/cs.html\"><code>http://terminology.hl7.org/CodeSystem/v3-ObservationValue</code></a> where concept is-a <a href=\"http://hl7.org/fhir/R4/v3/ObservationValue/cs.html#v3-ObservationValue-_SECALTINTOBV\">_SECALTINTOBV</a></li><li>Include codes from <a href=\"http://hl7.org/fhir/R4/v3/ObservationValue/cs.html\"><code>http://terminology.hl7.org/CodeSystem/v3-ObservationValue</code></a> where concept is-a <a href=\"http://hl7.org/fhir/R4/v3/ObservationValue/cs.html#v3-ObservationValue-_SECDATINTOBV\">_SECDATINTOBV</a></li><li>Include codes from <a href=\"http://hl7.org/fhir/R4/v3/ObservationValue/cs.html\"><code>http://terminology.hl7.org/CodeSystem/v3-ObservationValue</code></a> where concept is-a <a href=\"http://hl7.org/fhir/R4/v3/ObservationValue/cs.html#v3-ObservationValue-_SECINTCONOBV\">_SECINTCONOBV</a></li></ul><p>This value set includes codes based on the following rules:</p></div>" }, "url" : "http://hl7.org/fhir/uv/security-label-ds4p/ValueSet/valueset-integrity", "version" : "0.2.0", "name" : "ValueSetIntegrity", "title" : "Integrity ValueSet", "status" : "draft", "date" : "2020-03-30T00:00:00+00:00", "publisher" : "HL7 International - Security Work Group", "contact" : [ { "telecom" : [ { "system" : "url", "value" : "http://hl7.org/Special/committees/secure" } ] } ], "description" : "Security label metadata that 'segments' an IT resource by conveying the completeness, veracity, reliability, trustworthiness, and provenance of an IT resource.", "jurisdiction" : [ { "coding" : [ { "system" : "http://unstats.un.org/unsd/methods/m49/m49.htm", "code" : "001" } ] } ], "compose" : { "include" : [ { "system" : "http://terminology.hl7.org/CodeSystem/v3-ObservationValue", "filter" : [ { "property" : "concept", "op" : "is-a", "value" : "_SECALTINTOBV" } ] }, { "system" : "http://terminology.hl7.org/CodeSystem/v3-ObservationValue", "filter" : [ { "property" : "concept", "op" : "is-a", "value" : "_SECDATINTOBV" } ] }, { "system" : "http://terminology.hl7.org/CodeSystem/v3-ObservationValue", "filter" : [ { "property" : "concept", "op" : "is-a", "value" : "_SECINTCONOBV" } ] } ] } }