FHIR Data Segmentation for Privacy
0.2.0 - 2021May Ballot

This page is part of the FHIR Data Segmentation for Privacy (v0.2.0: STU 1 Ballot 2) based on FHIR R4. . For a full list of available versions, see the Directory of published versions

ValueSet: Value set definition for Security Label Contributor Type

Summary

Defining URL:http://hl7.org/fhir/uv/security-label-ds4p/ValueSet/valueset-sec-label-contributor-type
Version:0.2.0
Name:ValueSetSecurityLabelContributorType
Title:Security Label Contributor Type ValueSet
Status:Draft as of 2020-03-30
Definition:

Type of security label contributor.

Publisher:HL7 International - Security Work Group
Source Resource:XML / JSON / Turtle

References

This value set is not used here; it may be used elsewhere (e.g. specifications and/or implementations that use this content)

Logical Definition (CLD)

This value set includes codes based on the following rules:

  • Include these codes as defined in http://hl7.org/fhir/contributor-type
    CodeDisplayDefinition
    authorAuthorAn author of the content of the module.
    editorEditorAn editor of the content of the module.
    reviewerReviewerA reviewer of the content of the module.
    endorserEndorserAn endorser of the content of the module.
  • Include these codes as defined in http://terminology.hl7.org/CodeSystem/v3-RoleCode
    CodeDisplayDefinition
    CLASSIFIERclassifierAn individual authorized to assign an original classification to information, including compilations of unclassified information, based on a determination that the information requires protection against unauthorized disclosure. The individual marks the information with immutable, computable, and human readable security labels in accordance with applicable security labeling policies. The labeling policies provide instructions on whether and if so how the security labels may be later reclassified \[i.e., upgraded, downgraded, used in derivative classification, or declassified\] in a manner that preserves the overridden original classification binding and provenance.
    DECLASSIFIERdeclassifierAn individual which is authorized to declassify information based on a determination that the information no longer requires protection against unauthorized disclosure. The individual marks the information being declassified using computable and human readable security labels indicating that this is copy of previously classified information is unclassified in accordance with applicable security labeling policies. The labeling policies provide instructions on whether and if so how the security labels may be later reclassified \[i.e., upgraded or used in derivative classification\] in a manner that preserves the overridden original classification binding and provenance.
    DOWNGRDERdowngraderAn individual authorized to lower the classification level of labeled content and provide rationale for doing so as directed by a classification guide.
    DRIVCLASSIFIERderivative classifierAn individual who is only authorized to classify reproduced, extracted, or summarized classified information, or compile classified and unclassified information by applying classification markings derived from source material or as directed by a classification guide.
    UPGRDER

 

Expansion

This value set contains 9 concepts

CodeSystemDisplayDefinition
authorhttp://hl7.org/fhir/contributor-typeAuthorAn author of the content of the module.
editorhttp://hl7.org/fhir/contributor-typeEditorAn editor of the content of the module.
reviewerhttp://hl7.org/fhir/contributor-typeReviewerA reviewer of the content of the module.
endorserhttp://hl7.org/fhir/contributor-typeEndorserAn endorser of the content of the module.
CLASSIFIERhttp://terminology.hl7.org/CodeSystem/v3-RoleCodeclassifierAn individual authorized to assign an original classification to information, including compilations of unclassified information, based on a determination that the information requires protection against unauthorized disclosure. The individual marks the information with immutable, computable, and human readable security labels in accordance with applicable security labeling policies. The labeling policies provide instructions on whether and if so how the security labels may be later reclassified \[i.e., upgraded, downgraded, used in derivative classification, or declassified\] in a manner that preserves the overridden original classification binding and provenance.
DECLASSIFIERhttp://terminology.hl7.org/CodeSystem/v3-RoleCodedeclassifierAn individual which is authorized to declassify information based on a determination that the information no longer requires protection against unauthorized disclosure. The individual marks the information being declassified using computable and human readable security labels indicating that this is copy of previously classified information is unclassified in accordance with applicable security labeling policies. The labeling policies provide instructions on whether and if so how the security labels may be later reclassified \[i.e., upgraded or used in derivative classification\] in a manner that preserves the overridden original classification binding and provenance.
DOWNGRDERhttp://terminology.hl7.org/CodeSystem/v3-RoleCodedowngraderAn individual authorized to lower the classification level of labeled content and provide rationale for doing so as directed by a classification guide.
DRIVCLASSIFIERhttp://terminology.hl7.org/CodeSystem/v3-RoleCodederivative classifierAn individual who is only authorized to classify reproduced, extracted, or summarized classified information, or compile classified and unclassified information by applying classification markings derived from source material or as directed by a classification guide.
UPGRDERhttp://terminology.hl7.org/CodeSystem/v3-RoleCode

Explanation of the columns that may appear on this page:

Level A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies
Source The source of the definition of the code (when the value set draws in codes defined elsewhere)
Code The code (used as the code in the resource instance)
Display The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application
Definition An explanation of the meaning of the concept
Comments Additional notes about how to use the code