Extensions for Using Data Elements from FHIR DSTU2 in FHIR R4
0.1.0 - STU International flag

Extensions for Using Data Elements from FHIR DSTU2 in FHIR R4 - Downloaded Version null See the Directory of published versions

: R2SecurityLabelsForR4 - JSON Representation

Page standards status: Trial-use Maturity Level: 0

Raw json | Download

{
  "resourceType" : "ValueSet",
  "id" : "R2-security-labels-for-R4",
  "text" : {
    "status" : "generated",
    "div" : "<div xmlns=\"http://www.w3.org/1999/xhtml\"><p class=\"res-header-id\"><b>Generated Narrative: ValueSet R2-security-labels-for-R4</b></p><a name=\"R2-security-labels-for-R4\"> </a><a name=\"hcR2-security-labels-for-R4\"> </a><p>This value set expansion contains 24 concepts.</p><table class=\"codes\"><tr><td><b>System</b></td><td><b>Version</b></td><td style=\"white-space:nowrap\"><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ActCode-_ActInformationSensitivityPolicy\"> </a><code>http://hl7.org/fhir/v3/ActCode</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ActCode.html#v3-ActCode-_ActInformationSensitivityPolicy\">_ActInformationSensitivityPolicy</a></td><td>ActInformationSensitivityPolicy</td><td>Types of sensitivity policies that apply to Acts.  Act.confidentialityCode is defined in the RIM as &quot;constraints around appropriate disclosure of information about this Act, regardless of mood.&quot;                                                      Usage Note: ActSensitivity codes are used to bind information to an Act.confidentialityCode according to local sensitivity policy so that those confidentiality codes can then govern its handling across enterprises.  Internally to a policy domain, however, local policies guide the access control system on how end users in that policy domain are  able to use information tagged with these sensitivity values.</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ActCode-_EntitySensitivityPolicyType\"> </a><code>http://hl7.org/fhir/v3/ActCode</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ActCode.html#v3-ActCode-_EntitySensitivityPolicyType\">_EntitySensitivityPolicyType</a></td><td>EntityInformationSensitivityPolicy</td><td>Types of sensitivity policies that may apply to a sensitive attribute on an Entity.                                                      Usage Note: EntitySensitivity codes are used to convey a policy that is applicable to sensitive information conveyed by an entity attribute.  May be used to bind a Role.confidentialityCode associated with an Entity per organizational policy.  Role.confidentialityCode is defined in the RIM as &quot;an indication of the appropriate disclosure of information about this Role with respect to the playing Entity.&quot;</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ActCode-_InformationSensitivityPolicy\"> </a><code>http://hl7.org/fhir/v3/ActCode</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ActCode.html#v3-ActCode-_InformationSensitivityPolicy\">_InformationSensitivityPolicy</a></td><td>InformationSensitivityPolicy</td><td>A mandate, obligation, requirement, rule, or expectation characterizing the value or importance of a resource and may include its vulnerability. (Based on ISO7498-2:1989. Note: The vulnerability of personally identifiable sensitive information may be based on concerns that the unauthorized disclosure may result in social stigmatization or discrimination.) Description:  Types of Sensitivity policy that apply to Acts or Roles.  A sensitivity policy is adopted by an enterprise or group of enterprises (a 'policy domain') through a formal data use agreement that stipulates the value, importance, and vulnerability of information. A sensitivity code representing a sensitivity policy may be associated with criteria such as categories of information or sets of information identifiers (e.g. a value set of clinical codes or branch in a code system hierarchy).   These criteria may in turn be used for the Policy Decision Point in a Security Engine.  A sensitivity code may be used to set the confidentiality code used on information about Acts and Roles to trigger the security mechanisms required to control how security principals (i.e., a person, a machine, a software application) may act on the information (e.g. collection, access, use, or disclosure). Sensitivity codes are never assigned to the transport or business envelope containing patient specific information being exchanged outside of a policy domain as this would disclose the information intended to be protected by the policy.  When sensitive information is exchanged with others outside of a policy domain, the confidentiality code on the transport or business envelope conveys the receiver's responsibilities and indicates the how the information is to be safeguarded without unauthorized disclosure of the sensitive information.  This ensures that sensitive information is treated by receivers as the sender intends, accomplishing interoperability without point to point negotiations.                                                      Usage Note: Sensitivity codes are not useful for interoperability outside of a policy domain because sensitivity policies are typically localized and vary drastically across policy domains even for the same information category because of differing organizational business rules, security policies, and jurisdictional requirements.  For example, an employee's sensitivity code would make little sense for use outside of a policy domain.   'Taboo' would rarely be useful outside of a policy domain unless there are jurisdictional requirements requiring that a provider disclose sensitive information to a patient directly.  Sensitivity codes may be more appropriate in a legacy system's Master Files in order to notify those who access a patient's orders and observations about the sensitivity policies that apply.  Newer systems may have a security engine that uses a sensitivity policy's criteria directly.  The specializable InformationSensitivityPolicy Act.code may be useful in some scenarios if used in combination with a sensitivity identifier and/or Act.title.</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ActCode-_RoleInformationSensitivityPolicy\"> </a><code>http://hl7.org/fhir/v3/ActCode</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ActCode.html#v3-ActCode-_RoleInformationSensitivityPolicy\">_RoleInformationSensitivityPolicy</a></td><td>RoleInformationSensitivityPolicy</td><td>Types of sensitivity policies that apply to Roles.                                                      Usage Notes: RoleSensitivity codes are used to bind information to a Role.confidentialityCode per organizational policy.  Role.confidentialityCode is defined in the RIM as &quot;an indication of the appropriate disclosure of information about this Role with respect to the playing Entity.&quot;</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-B\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-B\">B</a></td><td>business</td><td>Description: Since the service class can represent knowledge structures that may be considered a trade or business secret, there is sometimes (though rarely) the need to flag those items as of business level confidentiality.  However, no patient related information may ever be of this confidentiality level.                                                      Deprecation Comment: Replced by ActCode.B</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-C\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-C\">C</a></td><td>celebrity</td><td>Description: Celebrities are people of public interest (VIP) including employees, whose information require special protection.                                                      Deprecation Comment:Replced by ActCode.CEL</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-D\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-D\">D</a></td><td>clinician</td><td>Description: Only clinicians may see this item, billing and administration persons can not access this item without special permission.                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-ETH\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-ETH\">ETH</a></td><td>substance abuse related</td><td>Description: Alcohol/drug-abuse related item                                                      Deprecation Comment:Replced by ActCode.ETH</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-HIV\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-HIV\">HIV</a></td><td>HIV related</td><td>Description: HIV and AIDS related item                                                      Deprecation Comment:Replced by ActCode.HIV</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-I\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-I\">I</a></td><td>individual</td><td>Description: Access only to individual persons who are mentioned explicitly as actors of this service and whose actor type warrants that access (cf. to actor type code).                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-PSY\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-PSY\">PSY</a></td><td>psychiatry relate</td><td>Description: Psychiatry related item                                                      Deprecation Comment:Replced by ActCode.PSY</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-S\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-S\">S</a></td><td>sensitive</td><td>Description:                           Information for which the patient seeks heightened confidentiality. Sensitive information is not to be shared with family members.  Information reported by the patient about family members is sensitive by default. Flag can be set or cleared on patient's request.                            Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-SDV\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-SDV\">SDV</a></td><td>sexual and domestic violence related</td><td>Description: Sexual assault / domestic violence related item                                                      Deprecation Comment:Replced by ActCode.SDV</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-T\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-T\">T</a></td><td>taboo</td><td>Description: Information not to be disclosed or discussed with patient except through physician assigned to patient in this case.  This is usually a temporary constraint only, example use is a new fatal diagnosis or finding, such as malignancy or HIV.                                                      Deprecation Note:Replced by ActCode.TBOO</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-_Confidentiality\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-_Confidentiality\">_Confidentiality</a></td><td>Confidentiality</td><td>A specializable code and its leaf codes used in Confidentiality value sets to value the Act.Confidentiality and Role.Confidentiality attribute in accordance with the definition for concept domain &quot;Confidentiality&quot;.</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-_ConfidentialityByAccessKind\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-_ConfidentialityByAccessKind\">_ConfidentialityByAccessKind</a></td><td>ConfidentialityByAccessKind</td><td>Description: By accessing subject / role and relationship based  rights  (These concepts are mutually exclusive, one and only one is required for a valid confidentiality coding.)                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-_ConfidentialityByInfoType\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-_ConfidentialityByInfoType\">_ConfidentialityByInfoType</a></td><td>ConfidentialityByInfoType</td><td>Description: By information type, only for service catalog entries (multiples allowed). Not to be used with actual patient data!                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-_ConfidentialityModifiers\"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-Confidentiality.html#v3-Confidentiality-_ConfidentialityModifiers\">_ConfidentialityModifiers</a></td><td>ConfidentialityModifiers</td><td>Description: Modifiers of role based access rights  (multiple allowed)                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECALTINTOBV\"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECALTINTOBV\">_SECALTINTOBV</a></td><td>alteration integrity</td><td>Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability)</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECDATINTOBV\"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECDATINTOBV\">_SECDATINTOBV</a></td><td>data integrity</td><td>Abstract security observation values used to indicate data integrity metadata.                                                      Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function.</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECINTCONOBV\"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECINTCONOBV\">_SECINTCONOBV</a></td><td>integrity confidence</td><td>Abstract security observation value used to indicate integrity confidence metadata.                                                      Examples: Codes conveying the level of reliability and trustworthiness of an IT resource.</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECINTPRVABOBV\"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECINTPRVABOBV\">_SECINTPRVABOBV</a></td><td>provenance asserted by</td><td>Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability).                                                      Examples: Codes conveying the provenance metadata about the entity asserting the resource.</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECINTPRVOBV\"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECINTPRVOBV\">_SECINTPRVOBV</a></td><td>provenance</td><td>Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability).                                                      Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.</td></tr><tr><td><a name=\"R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECINTPRVRBOBV\"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style=\"white-space:nowrap\">\u00a0\u00a0<a href=\"CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECINTPRVRBOBV\">_SECINTPRVRBOBV</a></td><td>provenance reported by</td><td>Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability).                                                      Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.</td></tr></table></div>"
  },
  "extension" : [
    {
      "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
      "valueCode" : "fhir"
    },
    {
      "extension" : [
        {
          "url" : "packageId",
          "valueId" : "hl7.fhir.uv.xver-r2.r4"
        },
        {
          "url" : "version",
          "valueString" : "0.1.0"
        },
        {
          "url" : "uri",
          "valueUri" : "http://hl7.org/fhir/uv/xver/ImplementationGuide/hl7.fhir.uv.xver-r2.r4"
        }
      ],
      "url" : "http://hl7.org/fhir/StructureDefinition/package-source"
    },
    {
      "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm",
      "valueInteger" : 0,
      "_valueInteger" : {
        "extension" : [
          {
            "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueCanonical" : "http://hl7.org/fhir/uv/xver/ImplementationGuide/hl7.fhir.uv.xver-r2.r4"
          }
        ]
      }
    },
    {
      "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status",
      "valueCode" : "trial-use",
      "_valueCode" : {
        "extension" : [
          {
            "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueCanonical" : "http://hl7.org/fhir/uv/xver/ImplementationGuide/hl7.fhir.uv.xver-r2.r4"
          }
        ]
      }
    }
  ],
  "url" : "http://hl7.org/fhir/uv/xver/ValueSet/R2-security-labels-for-R4",
  "version" : "0.1.0",
  "name" : "R2SecurityLabelsForR4",
  "title" : "Cross-version ValueSet DSTU2.All Security Labels for use in FHIR R4",
  "status" : "active",
  "experimental" : false,
  "date" : "2026-03-17T21:02:03.8104715+00:00",
  "publisher" : "FHIR Infrastructure",
  "contact" : [
    {
      "name" : "FHIR Infrastructure",
      "telecom" : [
        {
          "system" : "url",
          "value" : "http://www.hl7.org/Special/committees/fiwg"
        }
      ]
    }
  ],
  "description" : "This cross-version ValueSet represents content from http://hl7.org/fhir/ValueSet/security-labels|1.0.2 for use in FHIR R4 that is appropriate for use but unavailable in `http://hl7.org/fhir/ValueSet/security-labels|4.0.1`.",
  "jurisdiction" : [
    {
      "coding" : [
        {
          "system" : "http://unstats.un.org/unsd/methods/m49/m49.htm",
          "code" : "001",
          "display" : "World"
        }
      ]
    }
  ],
  "purpose" : "This value set is part of the cross-version definitions generated to enable use of the\r\nvalue set `http://hl7.org/fhir/ValueSet/security-labels|1.0.2` as defined in FHIR DSTU2\r\nin FHIR R4.\r\n\r\nThe source value set is bound to the following FHIR DSTU2 elements:\r\n* `AuditEvent.object.securityLabel` as Extensible\n* `DocumentReference.securityLabel` as Extensible\n* `Meta.security` as Extensible\r\n\r\nAcross FHIR versions, the value set has been mapped as:\r\n* `http://hl7.org/fhir/ValueSet/security-labels|1.0.2`\n* `http://hl7.org/fhir/ValueSet/security-labels|3.0.2`\n* `http://hl7.org/fhir/ValueSet/security-labels|4.0.1`\r\n\r\nNote that there are 325 concepts not included in this cross-version definition because they have valid representations.\r\n\r\nFollowing are the generation technical comments:\r\nOne or more source concepts are either not mapped or broader than their targets, so the value set relationship is broadened.\nThe source value set has more active concepts (174) than the target (170), so the source is broader than the target.\nOne or more source concepts are either not mapped or broader than their targets, so the value set relationship is broadened.\nThe source value set has fewer active concepts (170) than the target (207), so the source is narrower than the target.",
  "compose" : {
    "include" : [
      {
        "system" : "http://hl7.org/fhir/v3/ActCode",
        "version" : "1.0.2",
        "concept" : [
          {
            "code" : "_ActInformationSensitivityPolicy",
            "display" : "ActInformationSensitivityPolicy"
          },
          {
            "code" : "_EntitySensitivityPolicyType",
            "display" : "EntityInformationSensitivityPolicy"
          },
          {
            "code" : "_InformationSensitivityPolicy",
            "display" : "InformationSensitivityPolicy"
          },
          {
            "code" : "_RoleInformationSensitivityPolicy",
            "display" : "RoleInformationSensitivityPolicy"
          }
        ]
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "concept" : [
          {
            "code" : "B",
            "display" : "business"
          },
          {
            "code" : "C",
            "display" : "celebrity"
          },
          {
            "code" : "D",
            "display" : "clinician"
          },
          {
            "code" : "ETH",
            "display" : "substance abuse related"
          },
          {
            "code" : "HIV",
            "display" : "HIV related"
          },
          {
            "code" : "I",
            "display" : "individual"
          },
          {
            "code" : "PSY",
            "display" : "psychiatry relate"
          },
          {
            "code" : "S",
            "display" : "sensitive"
          },
          {
            "code" : "SDV",
            "display" : "sexual and domestic violence related"
          },
          {
            "code" : "T",
            "display" : "taboo"
          },
          {
            "code" : "_Confidentiality",
            "display" : "Confidentiality"
          },
          {
            "code" : "_ConfidentialityByAccessKind",
            "display" : "ConfidentialityByAccessKind"
          },
          {
            "code" : "_ConfidentialityByInfoType",
            "display" : "ConfidentialityByInfoType"
          },
          {
            "code" : "_ConfidentialityModifiers",
            "display" : "ConfidentialityModifiers"
          }
        ]
      },
      {
        "system" : "http://hl7.org/fhir/v3/ObservationValue",
        "version" : "1.0.2",
        "concept" : [
          {
            "code" : "_SECALTINTOBV",
            "display" : "alteration integrity"
          },
          {
            "code" : "_SECDATINTOBV",
            "display" : "data integrity"
          },
          {
            "code" : "_SECINTCONOBV",
            "display" : "integrity confidence"
          },
          {
            "code" : "_SECINTPRVABOBV",
            "display" : "provenance asserted by"
          },
          {
            "code" : "_SECINTPRVOBV",
            "display" : "provenance"
          },
          {
            "code" : "_SECINTPRVRBOBV",
            "display" : "provenance reported by"
          }
        ]
      }
    ]
  },
  "expansion" : {
    "timestamp" : "2026-03-17T21:02:03.8104715+00:00",
    "contains" : [
      {
        "system" : "http://hl7.org/fhir/v3/ActCode",
        "version" : "1.0.2",
        "code" : "_ActInformationSensitivityPolicy",
        "display" : "ActInformationSensitivityPolicy"
      },
      {
        "system" : "http://hl7.org/fhir/v3/ActCode",
        "version" : "1.0.2",
        "code" : "_EntitySensitivityPolicyType",
        "display" : "EntityInformationSensitivityPolicy"
      },
      {
        "system" : "http://hl7.org/fhir/v3/ActCode",
        "version" : "1.0.2",
        "code" : "_InformationSensitivityPolicy",
        "display" : "InformationSensitivityPolicy"
      },
      {
        "system" : "http://hl7.org/fhir/v3/ActCode",
        "version" : "1.0.2",
        "code" : "_RoleInformationSensitivityPolicy",
        "display" : "RoleInformationSensitivityPolicy"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "B",
        "display" : "business"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "C",
        "display" : "celebrity"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "D",
        "display" : "clinician"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "ETH",
        "display" : "substance abuse related"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "HIV",
        "display" : "HIV related"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "I",
        "display" : "individual"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "PSY",
        "display" : "psychiatry relate"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "S",
        "display" : "sensitive"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "SDV",
        "display" : "sexual and domestic violence related"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "T",
        "display" : "taboo"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "_Confidentiality",
        "display" : "Confidentiality"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "_ConfidentialityByAccessKind",
        "display" : "ConfidentialityByAccessKind"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "_ConfidentialityByInfoType",
        "display" : "ConfidentialityByInfoType"
      },
      {
        "system" : "http://hl7.org/fhir/v3/Confidentiality",
        "version" : "1.0.2",
        "code" : "_ConfidentialityModifiers",
        "display" : "ConfidentialityModifiers"
      },
      {
        "system" : "http://hl7.org/fhir/v3/ObservationValue",
        "version" : "1.0.2",
        "code" : "_SECALTINTOBV",
        "display" : "alteration integrity"
      },
      {
        "system" : "http://hl7.org/fhir/v3/ObservationValue",
        "version" : "1.0.2",
        "code" : "_SECDATINTOBV",
        "display" : "data integrity"
      },
      {
        "system" : "http://hl7.org/fhir/v3/ObservationValue",
        "version" : "1.0.2",
        "code" : "_SECINTCONOBV",
        "display" : "integrity confidence"
      },
      {
        "system" : "http://hl7.org/fhir/v3/ObservationValue",
        "version" : "1.0.2",
        "code" : "_SECINTPRVABOBV",
        "display" : "provenance asserted by"
      },
      {
        "system" : "http://hl7.org/fhir/v3/ObservationValue",
        "version" : "1.0.2",
        "code" : "_SECINTPRVOBV",
        "display" : "provenance"
      },
      {
        "system" : "http://hl7.org/fhir/v3/ObservationValue",
        "version" : "1.0.2",
        "code" : "_SECINTPRVRBOBV",
        "display" : "provenance reported by"
      }
    ]
  }
}