This page is part of the FHIR Data Segmentation for Privacy (v0.1.0: STU 1 Ballot 1) based on FHIR R4. . For a full list of available versions, see the Directory of published versions
The following extensions are defined by this IG:
must-display
extension to require the consumer to display a specific mark on any rendering of the resource in print or electronic user interfaces.sec-label-basis
extension which enables specifying the policy or regulation based on which a label has been assigned.sec-label-related-artifact
extension which enables recording a pointer to an artifact related to the label, particularly, a consent directive based on which the label has been assigned, or a provenance resource which furhter backs up assigning an integrity lalbel.sec-label-classifer
extension which enables recording the entity that has assigned or updated the label.must-display
ExtensionThe must-display extension is based on the Annotation
Data Type, which is text note that also contains information about who made the statement and when.
This extension SHOULD be used in the context of Resource.meta
when codes from the PrivacyMark
or SecurityLabelMark
value sets, e.g., CUI or COPYMark codes, are used on the Resource which indicate that certain information is to be rendered to end users. The PrivacyMark
or SecurityLabelMark
code definitions include the information to be displayed. The must-display extension supports inclusion of the Annotation’s author and contact, and markdown for how the information is to be displayed.
The ability to convey renderable PrivacyMark
or SecurityLabelMark
security labels, including the author and the markdown role may be required by classification policies within a domain.
sec-label-basis
ExtensionThe sec-label-basis
extension is not based on an existing FHIR artifact.
This extension SHALL be used on a security label (i.e., in the context of Resource.meta.security
) if there is only one policy being conveyed by the all of the security label elements in meta. When more than one policy is conveyed by the security label elements in meta, this extension SHALL be used each security label element used to convey a specific policy.
For example, if a federal agency labels a Resource as 42 CFR Part 2 information, then the Resource would have both Part 2 and CUI security labels in the meta. As a result, all the Part 2 security labels would have a sec-label-basis extension indicating that the basis for the label is Part 2, and all the CUI security labels would have a sec-label-basis indicating that the basis for the label is CFR 32 Part 2002.
The need: In HCS, the key/value pairs in a Security Label are called Named Tag Sets/Tag Sets and the values are Tags.
A Security Label instance represents applicable policy as a specified set of Named Tag Sets/Tag Sets with applicable Tag values.
This pattern is followed explicitly in HL7 V2.9 and DS4P CDA IG.
In FHIR, there’s no differentiation between Named Tag Sets/Tag Sets, so there is no built-in way to delineate the <security>
elements belonging to a specific policy.
In order to address this in the FHIR DS4P IG, we propose the use of extension-sec-label-basis
on each <security>
within a group of <security>
elements belonging to a specific policy.
sec-label-classifier
ExtensionThe sec-label-classifier
extension is based on Contributor
MetaData Type.
This extension SHOULD be used on a security label (i.e., in the context of Resource.meta.security
) so that the type, name, and contact information for the contributor of a security label can be identified and retrieved.
For example, the security label codes may originally be assigned by a classifier authority or agent.
Later, the security label code may be reclassified with a different code when the governing policy of a Resource changes. Use cases for changing security labels include:
Permitting more or less restrictive confidentiality level protection, e.g., in the US, from normal under HIPAA to moderate once released via an Individual Right of Access Directive. For example, if a patient discloses a HIPAA governed Resource to a non-HIPAA covered entity, that Resource is no longer protected at the level of HIPAA, which is the “norm” for protection in the US. The patient disclosed information would be protected under laws that are different from the norm, and are typically less protective. So, the confidentiality label would be downgraded from normal to moderate. The entity downgrading the patient disclosed information may or may not be the patient. It could be done by the disclosing Covered Entity or a third party App based on the patient’s Right of Access Directive.
Different, broader, or narrower sensitivity, e.g., access may be to all substance use disorder information rather than limited to opioid use disorder information.
Different, broader, or narrower purposes of use, e.g., from all types of research purposes to disease specific purposes. When information is aggregated or disaggregated, there may be a need to change classification of the resulting content Declassified, i.e., removing a security label code, e.g., when information is made public with no restrictions on access.
The ability to convey the authority or agent name, contact, and classification role may be required by classification policies within a domain.
sec-label-related-artifact
ExtensionThe sec-label-related-artifact extension
is based on the Related Artifact MetaData
Type. The RelatedArtifact
structure defines resources related to a module such as previous and next versions of documents, documentation, citations, etc. Note that the name resource here is being used in a more general sense than the FHIR-specific Resource. The related resource may be a FHIR resource, or it may be another type of resource, represented using the Attachment data type.
This extension SHOULD be used on a security label code for which justification or documentation can be found in an attached or discoverable information instance. Examples include a policy security label code, which is justified based on a law, patient consent directive, or organizational policy; a provenance security label, which is documented by a Provenance Resource; a trust security label code, which is documented by a trust accreditation certificate, trust mark, or a trust agreement such as a DURSA.
Value-sets used and defined by this IG are discussed below.
Tag Set | Card. | Description | Example Tags |
---|---|---|---|
Confidentiality | 1..1 |
Security label metadata classifying an IT resource (clinical fact, data, information object, service, or system capability) according to its level of sensitivity, which is based on an analysis of applicable privacy policies and the risk of financial, reputational, or other harm to an individual or entity that could result if made available or disclosed to unauthorized individuals, entities, or processes. | Unrestricted, Normal, Very Restricted |
Tag Set | Card. | Description | Example Tags |
---|---|---|---|
Policy* | 0..1 |
Security label metadata that “segments” an IT resource by conveying a mandate, obligation, requirement, rule, or expectation relating to its privacy. | |
Sensitivity | 0..* |
Security label metadata that “segments” an IT resource by categorizing the value, importance, and vulnerability of an IT resource perceived as undesirable to share. | STD , HIV , SUD |
Compartment | 0..* |
Security label metadata that “segments” an IT resource by indicating that access and use is restricted to members of a defined community or project. | Care Team, Research Project |
Integrity* | 0..* |
Security label metadata that “segments” an IT resource by conveying the completeness, veracity, reliability, trustworthiness, and provenance of an IT resource. | Anonymized, Digitally signed |
Provenance* | 0..* |
Security label metadata that “segments” an IT resource by conveying the provenance of the IT resource’s asserted or reported source. | Patient reported, Clinician asserted |
Trust* | 0..* |
Security label metadata that “segments” an IT resource by conveying the basis for trusting the source. | Trust Accreditation, Trust Agreement |
(*) Value-sets defined by this IG.
Tag Set | Card. | Description | Example Tags |
---|---|---|---|
Purpose of Use | 0..* |
Security label metadata that “segments” an IT resource by conveying the reason for performing one or more operations on information, which may be permitted by source system’s security policy in accordance with one or more privacy policies and consent directives. | Treatment, Payment, Operation, Research |
General Purpose of Use | 0..* |
Security label metadata that “segments” an IT resource by conveying the reason for performing one or more operations on information of purpose of use at a general level. | Coverage, Patient Requested, Emergency Treatment |
Obligation** | 0..* |
Security label metadata that “segments” an IT resource by conveying the mandated workflow action that an information custodian, receiver, or user must perform. | Encrypt, mask, comply wih policy |
Refrain** | 0..* |
Security label metadata that “segments” an IT resource by conveying prohibited actions which an information custodian, receiver, or user is not permitted to perform unless otherwise authorized or permitted under specified circumstances. | Do not disclose without consent, no reuse |
CUI Privacy Mark* | 0..* |
Security label metadata that “segments” an IT resource by conveying a displayed mark, required to be rendered to indicate that the electronic or hardcopy information is protected at the level of the subset of CUI for which the authorizing law, regulation, or Government-wide policy does not set out specific handling or dissemination controls. | CUI , SP-CUI |
Security Label Mark* | 0..* |
Security label metadata that “segments” an IT resource by conveying a displayed mark rendered as specified. | Draft, Confidential |
Security Authorization Policy* | 0..* |
Security label metadata that “segments” an IT resource by conveying specific permissions used for access control. | Authorization policy, Delegation policy |
(*) Value-sets defined by this IG.
(**) Privacy-revealing Obligation or Refrain tags (e.g., the Obligation Policy MASK
(mask) or the Refrain Policy NODSCLCD
(no disclosure without consent directive)) shall not be included in the High Watermark labels of a Bundle
, DocumentReference
, or Message Resources
.
Tag Set | Card. | Description | Example Tags |
---|---|---|---|
Contributor Type* | 0..1 |
The type of security label contributor. | author, editor, classifier, declassifier |
(*) Value-sets defined by this IG.