This page is part of the FHIR Data Segmentation for Privacy (v0.2.0: STU 1 Ballot 2) based on FHIR R4. . For a full list of available versions, see the Directory of published versions
Summary
Defining URL: | http://hl7.org/fhir/uv/security-label-ds4p/ValueSet/valueset-sec-label-contributor-type |
Version: | 0.2.0 |
Name: | ValueSetSecurityLabelContributorType |
Title: | Security Label Contributor Type ValueSet |
Status: | Draft as of 2020-03-30 |
Definition: | Type of security label contributor. |
Publisher: | HL7 International - Security Work Group |
Source Resource: | XML / JSON / Turtle |
References
This value set is not used here; it may be used elsewhere (e.g. specifications and/or implementations that use this content)
This value set includes codes based on the following rules:
http://hl7.org/fhir/contributor-type
Code | Display | Definition |
author | Author | An author of the content of the module. |
editor | Editor | An editor of the content of the module. |
reviewer | Reviewer | A reviewer of the content of the module. |
endorser | Endorser | An endorser of the content of the module. |
http://terminology.hl7.org/CodeSystem/v3-RoleCode
Code | Display | Definition |
CLASSIFIER | classifier | An individual authorized to assign an original classification to information, including compilations of unclassified information, based on a determination that the information requires protection against unauthorized disclosure. The individual marks the information with immutable, computable, and human readable security labels in accordance with applicable security labeling policies. The labeling policies provide instructions on whether and if so how the security labels may be later reclassified \[i.e., upgraded, downgraded, used in derivative classification, or declassified\] in a manner that preserves the overridden original classification binding and provenance. |
DECLASSIFIER | declassifier | An individual which is authorized to declassify information based on a determination that the information no longer requires protection against unauthorized disclosure. The individual marks the information being declassified using computable and human readable security labels indicating that this is copy of previously classified information is unclassified in accordance with applicable security labeling policies. The labeling policies provide instructions on whether and if so how the security labels may be later reclassified \[i.e., upgraded or used in derivative classification\] in a manner that preserves the overridden original classification binding and provenance. |
DOWNGRDER | downgrader | An individual authorized to lower the classification level of labeled content and provide rationale for doing so as directed by a classification guide. |
DRIVCLASSIFIER | derivative classifier | An individual who is only authorized to classify reproduced, extracted, or summarized classified information, or compile classified and unclassified information by applying classification markings derived from source material or as directed by a classification guide. |
UPGRDER |
This value set contains 9 concepts
Expansion based on:
Code | System | Display | Definition |
author | http://hl7.org/fhir/contributor-type | Author | An author of the content of the module. |
editor | http://hl7.org/fhir/contributor-type | Editor | An editor of the content of the module. |
reviewer | http://hl7.org/fhir/contributor-type | Reviewer | A reviewer of the content of the module. |
endorser | http://hl7.org/fhir/contributor-type | Endorser | An endorser of the content of the module. |
CLASSIFIER | http://terminology.hl7.org/CodeSystem/v3-RoleCode | classifier | An individual authorized to assign an original classification to information, including compilations of unclassified information, based on a determination that the information requires protection against unauthorized disclosure. The individual marks the information with immutable, computable, and human readable security labels in accordance with applicable security labeling policies. The labeling policies provide instructions on whether and if so how the security labels may be later reclassified \[i.e., upgraded, downgraded, used in derivative classification, or declassified\] in a manner that preserves the overridden original classification binding and provenance. |
DECLASSIFIER | http://terminology.hl7.org/CodeSystem/v3-RoleCode | declassifier | An individual which is authorized to declassify information based on a determination that the information no longer requires protection against unauthorized disclosure. The individual marks the information being declassified using computable and human readable security labels indicating that this is copy of previously classified information is unclassified in accordance with applicable security labeling policies. The labeling policies provide instructions on whether and if so how the security labels may be later reclassified \[i.e., upgraded or used in derivative classification\] in a manner that preserves the overridden original classification binding and provenance. |
DOWNGRDER | http://terminology.hl7.org/CodeSystem/v3-RoleCode | downgrader | An individual authorized to lower the classification level of labeled content and provide rationale for doing so as directed by a classification guide. |
DRIVCLASSIFIER | http://terminology.hl7.org/CodeSystem/v3-RoleCode | derivative classifier | An individual who is only authorized to classify reproduced, extracted, or summarized classified information, or compile classified and unclassified information by applying classification markings derived from source material or as directed by a classification guide. |
UPGRDER | http://terminology.hl7.org/CodeSystem/v3-RoleCode |
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |