This page is part of the FHIR Data Segmentation for Privacy (v0.1.0: STU 1 Ballot 1) based on FHIR R4. . For a full list of available versions, see the Directory of published versions
This page provides a list of the FHIR artifacts defined as part of this implementation guide.
These define constraints on FHIR data types that need to be complied with by conformant implementations
Structure definition for the must-display extension | Structure definition for the must-display extension. |
Structure definition for the extension-sec-label-basis extension | Structure definition for the extension-sec-label-basis extension. |
Structure definition for the extension-sec-label-classifier extension | Structure definition for the extension-sec-label-classifier extension. |
Structure definition for the extension-sec-label-related-artifact extension | Structure definition for the extension-sec-label-related-artifact extension. |
These define sets of codes used by systems conforming with this implementation guide
Value set definition for Security Label Contributor Type | Value set definition for Security Label Contributor Type. |
Value set definition for Security Label Mark | Security label metadata that 'segments' an IT resource by conveying a displayed mark rendered as specified. |
Value set definition for CUI Mark | Security label metadata that 'segments' an IT resource by conveying a displayed mark, required to be rendered to indicate that the electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. |
Value set definition for Privacy Policy | Security label metadata that 'segments' an IT resource by conveying a mandate, obligation, requirement, rule, or expectation relating to its privacy. |
Value set definition for Security Authorization | Security label metadata that 'segments' an IT resource by conveying specific permissions used for access control. |
Value set definition for Provenance | Security label metadata that 'segments' an IT resource by conveying the provenance of the IT resource's asserted or reported source. |
Value set definition for Integrity | Security label metadata that 'segments' an IT resource by conveying the completeness, veracity, reliability, trustworthiness, and provenance of an IT resource. |
Value set definition for Trust | Security label metadata that 'segments' an IT resource by conveying the basis for trusting the source. |
These are example instances that show what data produced and consumed by systems conforming with this implementation guide might look like
Simple use of the must-display extension | A simple example showing how to use the must-display extension to require the consumer to display Controlled Unclassified Information (CUI) markings. |
Simple use of the must-display extension on a patient | A simple example showing how to use the must-display extension to require the consumer to display Controlled Unclassified Information (CUI) markings. |
Simple use of the sec-label-basis extension on an observation | A simple example showing how to use the sec-label-basis extension to specify the basis for assigning the security label. |
Simple use of the sec-label-related-artifact extension with a consent | A simple example showing how to use the sec-label-related-artifact extension to specify related artifacts to a security label, in this case, a patient consent resource. |
Simple use of the sec-label-related-artifact extension with a provenance | A simple example showing how to use the sec-label-related-artifact extension to specify related artifacts to a security label, in this case, a provenance resource. |
Simple use of the sec-label-classifier extension | A simple example showing how to use the sec-label-classifier extension to specify the entity that assigned the security label. |