Extensions for Using Data Elements from FHIR DSTU2 in FHIR R4
0.1.0 - STU International flag

Extensions for Using Data Elements from FHIR DSTU2 in FHIR R4 - Downloaded Version null See the Directory of published versions

: R2SecurityLabelsForR4 - XML Representation

Page standards status: Trial-use Maturity Level: 0

Raw xml | Download


<ValueSet xmlns="http://hl7.org/fhir">
  <id value="R2-security-labels-for-R4"/>
  <text>
    <status value="generated"/>
    <div xmlns="http://www.w3.org/1999/xhtml"><p class="res-header-id"><b>Generated Narrative: ValueSet R2-security-labels-for-R4</b></p><a name="R2-security-labels-for-R4"> </a><a name="hcR2-security-labels-for-R4"> </a><p>This value set expansion contains 24 concepts.</p><table class="codes"><tr><td><b>System</b></td><td><b>Version</b></td><td style="white-space:nowrap"><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ActCode-_ActInformationSensitivityPolicy"> </a><code>http://hl7.org/fhir/v3/ActCode</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ActCode.html#v3-ActCode-_ActInformationSensitivityPolicy">_ActInformationSensitivityPolicy</a></td><td>ActInformationSensitivityPolicy</td><td>Types of sensitivity policies that apply to Acts.  Act.confidentialityCode is defined in the RIM as &quot;constraints around appropriate disclosure of information about this Act, regardless of mood.&quot;                                                      Usage Note: ActSensitivity codes are used to bind information to an Act.confidentialityCode according to local sensitivity policy so that those confidentiality codes can then govern its handling across enterprises.  Internally to a policy domain, however, local policies guide the access control system on how end users in that policy domain are  able to use information tagged with these sensitivity values.</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ActCode-_EntitySensitivityPolicyType"> </a><code>http://hl7.org/fhir/v3/ActCode</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ActCode.html#v3-ActCode-_EntitySensitivityPolicyType">_EntitySensitivityPolicyType</a></td><td>EntityInformationSensitivityPolicy</td><td>Types of sensitivity policies that may apply to a sensitive attribute on an Entity.                                                      Usage Note: EntitySensitivity codes are used to convey a policy that is applicable to sensitive information conveyed by an entity attribute.  May be used to bind a Role.confidentialityCode associated with an Entity per organizational policy.  Role.confidentialityCode is defined in the RIM as &quot;an indication of the appropriate disclosure of information about this Role with respect to the playing Entity.&quot;</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ActCode-_InformationSensitivityPolicy"> </a><code>http://hl7.org/fhir/v3/ActCode</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ActCode.html#v3-ActCode-_InformationSensitivityPolicy">_InformationSensitivityPolicy</a></td><td>InformationSensitivityPolicy</td><td>A mandate, obligation, requirement, rule, or expectation characterizing the value or importance of a resource and may include its vulnerability. (Based on ISO7498-2:1989. Note: The vulnerability of personally identifiable sensitive information may be based on concerns that the unauthorized disclosure may result in social stigmatization or discrimination.) Description:  Types of Sensitivity policy that apply to Acts or Roles.  A sensitivity policy is adopted by an enterprise or group of enterprises (a 'policy domain') through a formal data use agreement that stipulates the value, importance, and vulnerability of information. A sensitivity code representing a sensitivity policy may be associated with criteria such as categories of information or sets of information identifiers (e.g. a value set of clinical codes or branch in a code system hierarchy).   These criteria may in turn be used for the Policy Decision Point in a Security Engine.  A sensitivity code may be used to set the confidentiality code used on information about Acts and Roles to trigger the security mechanisms required to control how security principals (i.e., a person, a machine, a software application) may act on the information (e.g. collection, access, use, or disclosure). Sensitivity codes are never assigned to the transport or business envelope containing patient specific information being exchanged outside of a policy domain as this would disclose the information intended to be protected by the policy.  When sensitive information is exchanged with others outside of a policy domain, the confidentiality code on the transport or business envelope conveys the receiver's responsibilities and indicates the how the information is to be safeguarded without unauthorized disclosure of the sensitive information.  This ensures that sensitive information is treated by receivers as the sender intends, accomplishing interoperability without point to point negotiations.                                                      Usage Note: Sensitivity codes are not useful for interoperability outside of a policy domain because sensitivity policies are typically localized and vary drastically across policy domains even for the same information category because of differing organizational business rules, security policies, and jurisdictional requirements.  For example, an employee's sensitivity code would make little sense for use outside of a policy domain.   'Taboo' would rarely be useful outside of a policy domain unless there are jurisdictional requirements requiring that a provider disclose sensitive information to a patient directly.  Sensitivity codes may be more appropriate in a legacy system's Master Files in order to notify those who access a patient's orders and observations about the sensitivity policies that apply.  Newer systems may have a security engine that uses a sensitivity policy's criteria directly.  The specializable InformationSensitivityPolicy Act.code may be useful in some scenarios if used in combination with a sensitivity identifier and/or Act.title.</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ActCode-_RoleInformationSensitivityPolicy"> </a><code>http://hl7.org/fhir/v3/ActCode</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ActCode.html#v3-ActCode-_RoleInformationSensitivityPolicy">_RoleInformationSensitivityPolicy</a></td><td>RoleInformationSensitivityPolicy</td><td>Types of sensitivity policies that apply to Roles.                                                      Usage Notes: RoleSensitivity codes are used to bind information to a Role.confidentialityCode per organizational policy.  Role.confidentialityCode is defined in the RIM as &quot;an indication of the appropriate disclosure of information about this Role with respect to the playing Entity.&quot;</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-B"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-B">B</a></td><td>business</td><td>Description: Since the service class can represent knowledge structures that may be considered a trade or business secret, there is sometimes (though rarely) the need to flag those items as of business level confidentiality.  However, no patient related information may ever be of this confidentiality level.                                                      Deprecation Comment: Replced by ActCode.B</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-C"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-C">C</a></td><td>celebrity</td><td>Description: Celebrities are people of public interest (VIP) including employees, whose information require special protection.                                                      Deprecation Comment:Replced by ActCode.CEL</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-D"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-D">D</a></td><td>clinician</td><td>Description: Only clinicians may see this item, billing and administration persons can not access this item without special permission.                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-ETH"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-ETH">ETH</a></td><td>substance abuse related</td><td>Description: Alcohol/drug-abuse related item                                                      Deprecation Comment:Replced by ActCode.ETH</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-HIV"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-HIV">HIV</a></td><td>HIV related</td><td>Description: HIV and AIDS related item                                                      Deprecation Comment:Replced by ActCode.HIV</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-I"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-I">I</a></td><td>individual</td><td>Description: Access only to individual persons who are mentioned explicitly as actors of this service and whose actor type warrants that access (cf. to actor type code).                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-PSY"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-PSY">PSY</a></td><td>psychiatry relate</td><td>Description: Psychiatry related item                                                      Deprecation Comment:Replced by ActCode.PSY</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-S"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-S">S</a></td><td>sensitive</td><td>Description:                           Information for which the patient seeks heightened confidentiality. Sensitive information is not to be shared with family members.  Information reported by the patient about family members is sensitive by default. Flag can be set or cleared on patient's request.                            Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-SDV"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-SDV">SDV</a></td><td>sexual and domestic violence related</td><td>Description: Sexual assault / domestic violence related item                                                      Deprecation Comment:Replced by ActCode.SDV</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-T"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-T">T</a></td><td>taboo</td><td>Description: Information not to be disclosed or discussed with patient except through physician assigned to patient in this case.  This is usually a temporary constraint only, example use is a new fatal diagnosis or finding, such as malignancy or HIV.                                                      Deprecation Note:Replced by ActCode.TBOO</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-_Confidentiality"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-_Confidentiality">_Confidentiality</a></td><td>Confidentiality</td><td>A specializable code and its leaf codes used in Confidentiality value sets to value the Act.Confidentiality and Role.Confidentiality attribute in accordance with the definition for concept domain &quot;Confidentiality&quot;.</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-_ConfidentialityByAccessKind"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-_ConfidentialityByAccessKind">_ConfidentialityByAccessKind</a></td><td>ConfidentialityByAccessKind</td><td>Description: By accessing subject / role and relationship based  rights  (These concepts are mutually exclusive, one and only one is required for a valid confidentiality coding.)                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-_ConfidentialityByInfoType"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-_ConfidentialityByInfoType">_ConfidentialityByInfoType</a></td><td>ConfidentialityByInfoType</td><td>Description: By information type, only for service catalog entries (multiples allowed). Not to be used with actual patient data!                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/Confidentiality-_ConfidentialityModifiers"> </a><code>http://hl7.org/fhir/v3/Confidentiality</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-Confidentiality.html#v3-Confidentiality-_ConfidentialityModifiers">_ConfidentialityModifiers</a></td><td>ConfidentialityModifiers</td><td>Description: Modifiers of role based access rights  (multiple allowed)                                                      Deprecation Comment:Deprecated due to updated confidentiality codes under ActCode</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECALTINTOBV"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECALTINTOBV">_SECALTINTOBV</a></td><td>alteration integrity</td><td>Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability)</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECDATINTOBV"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECDATINTOBV">_SECDATINTOBV</a></td><td>data integrity</td><td>Abstract security observation values used to indicate data integrity metadata.                                                      Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function.</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECINTCONOBV"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECINTCONOBV">_SECINTCONOBV</a></td><td>integrity confidence</td><td>Abstract security observation value used to indicate integrity confidence metadata.                                                      Examples: Codes conveying the level of reliability and trustworthiness of an IT resource.</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECINTPRVABOBV"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECINTPRVABOBV">_SECINTPRVABOBV</a></td><td>provenance asserted by</td><td>Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability).                                                      Examples: Codes conveying the provenance metadata about the entity asserting the resource.</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECINTPRVOBV"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECINTPRVOBV">_SECINTPRVOBV</a></td><td>provenance</td><td>Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability).                                                      Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.</td></tr><tr><td><a name="R2-security-labels-for-R4-http://hl7.org/fhir/v3/ObservationValue-_SECINTPRVRBOBV"> </a><code>http://hl7.org/fhir/v3/ObservationValue</code></td><td>1.0.2</td><td style="white-space:nowrap">  <a href="CodeSystem-v3-ObservationValue.html#v3-ObservationValue-_SECINTPRVRBOBV">_SECINTPRVRBOBV</a></td><td>provenance reported by</td><td>Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability).                                                      Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.</td></tr></table></div>
  </text>
  <extension
             url="http://hl7.org/fhir/StructureDefinition/structuredefinition-wg">
    <valueCode value="fhir"/>
  </extension>
  <extension url="http://hl7.org/fhir/StructureDefinition/package-source">
    <extension url="packageId">
      <valueId value="hl7.fhir.uv.xver-r2.r4"/>
    </extension>
    <extension url="version">
      <valueString value="0.1.0"/>
    </extension>
    <extension url="uri">
      <valueUri
                value="http://hl7.org/fhir/uv/xver/ImplementationGuide/hl7.fhir.uv.xver-r2.r4"/>
    </extension>
  </extension>
  <extension
             url="http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm">
    <valueInteger value="0">
      <extension
                 url="http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom">
        <valueCanonical
                        value="http://hl7.org/fhir/uv/xver/ImplementationGuide/hl7.fhir.uv.xver-r2.r4"/>
      </extension>
    </valueInteger>
  </extension>
  <extension
             url="http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status">
    <valueCode value="trial-use">
      <extension
                 url="http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom">
        <valueCanonical
                        value="http://hl7.org/fhir/uv/xver/ImplementationGuide/hl7.fhir.uv.xver-r2.r4"/>
      </extension>
    </valueCode>
  </extension>
  <url
       value="http://hl7.org/fhir/uv/xver/ValueSet/R2-security-labels-for-R4"/>
  <version value="0.1.0"/>
  <name value="R2SecurityLabelsForR4"/>
  <title
         value="Cross-version ValueSet DSTU2.All Security Labels for use in FHIR R4"/>
  <status value="active"/>
  <experimental value="false"/>
  <date value="2026-03-17T21:02:03.8104715+00:00"/>
  <publisher value="FHIR Infrastructure"/>
  <contact>
    <name value="FHIR Infrastructure"/>
    <telecom>
      <system value="url"/>
      <value value="http://www.hl7.org/Special/committees/fiwg"/>
    </telecom>
  </contact>
  <description
               value="This cross-version ValueSet represents content from http://hl7.org/fhir/ValueSet/security-labels|1.0.2 for use in FHIR R4 that is appropriate for use but unavailable in `http://hl7.org/fhir/ValueSet/security-labels|4.0.1`."/>
  <jurisdiction>
    <coding>
      <system value="http://unstats.un.org/unsd/methods/m49/m49.htm"/>
      <code value="001"/>
      <display value="World"/>
    </coding>
  </jurisdiction>
  <purpose
           value="This value set is part of the cross-version definitions generated to enable use of the
value set `http://hl7.org/fhir/ValueSet/security-labels|1.0.2` as defined in FHIR DSTU2
in FHIR R4.

The source value set is bound to the following FHIR DSTU2 elements:
* `AuditEvent.object.securityLabel` as Extensible
* `DocumentReference.securityLabel` as Extensible
* `Meta.security` as Extensible

Across FHIR versions, the value set has been mapped as:
* `http://hl7.org/fhir/ValueSet/security-labels|1.0.2`
* `http://hl7.org/fhir/ValueSet/security-labels|3.0.2`
* `http://hl7.org/fhir/ValueSet/security-labels|4.0.1`

Note that there are 325 concepts not included in this cross-version definition because they have valid representations.

Following are the generation technical comments:
One or more source concepts are either not mapped or broader than their targets, so the value set relationship is broadened.
The source value set has more active concepts (174) than the target (170), so the source is broader than the target.
One or more source concepts are either not mapped or broader than their targets, so the value set relationship is broadened.
The source value set has fewer active concepts (170) than the target (207), so the source is narrower than the target."/>
  <compose>
    <include>
      <system value="http://hl7.org/fhir/v3/ActCode"/>
      <version value="1.0.2"/>
      <concept>
        <code value="_ActInformationSensitivityPolicy"/>
        <display value="ActInformationSensitivityPolicy"/>
      </concept>
      <concept>
        <code value="_EntitySensitivityPolicyType"/>
        <display value="EntityInformationSensitivityPolicy"/>
      </concept>
      <concept>
        <code value="_InformationSensitivityPolicy"/>
        <display value="InformationSensitivityPolicy"/>
      </concept>
      <concept>
        <code value="_RoleInformationSensitivityPolicy"/>
        <display value="RoleInformationSensitivityPolicy"/>
      </concept>
    </include>
    <include>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <concept>
        <code value="B"/>
        <display value="business"/>
      </concept>
      <concept>
        <code value="C"/>
        <display value="celebrity"/>
      </concept>
      <concept>
        <code value="D"/>
        <display value="clinician"/>
      </concept>
      <concept>
        <code value="ETH"/>
        <display value="substance abuse related"/>
      </concept>
      <concept>
        <code value="HIV"/>
        <display value="HIV related"/>
      </concept>
      <concept>
        <code value="I"/>
        <display value="individual"/>
      </concept>
      <concept>
        <code value="PSY"/>
        <display value="psychiatry relate"/>
      </concept>
      <concept>
        <code value="S"/>
        <display value="sensitive"/>
      </concept>
      <concept>
        <code value="SDV"/>
        <display value="sexual and domestic violence related"/>
      </concept>
      <concept>
        <code value="T"/>
        <display value="taboo"/>
      </concept>
      <concept>
        <code value="_Confidentiality"/>
        <display value="Confidentiality"/>
      </concept>
      <concept>
        <code value="_ConfidentialityByAccessKind"/>
        <display value="ConfidentialityByAccessKind"/>
      </concept>
      <concept>
        <code value="_ConfidentialityByInfoType"/>
        <display value="ConfidentialityByInfoType"/>
      </concept>
      <concept>
        <code value="_ConfidentialityModifiers"/>
        <display value="ConfidentialityModifiers"/>
      </concept>
    </include>
    <include>
      <system value="http://hl7.org/fhir/v3/ObservationValue"/>
      <version value="1.0.2"/>
      <concept>
        <code value="_SECALTINTOBV"/>
        <display value="alteration integrity"/>
      </concept>
      <concept>
        <code value="_SECDATINTOBV"/>
        <display value="data integrity"/>
      </concept>
      <concept>
        <code value="_SECINTCONOBV"/>
        <display value="integrity confidence"/>
      </concept>
      <concept>
        <code value="_SECINTPRVABOBV"/>
        <display value="provenance asserted by"/>
      </concept>
      <concept>
        <code value="_SECINTPRVOBV"/>
        <display value="provenance"/>
      </concept>
      <concept>
        <code value="_SECINTPRVRBOBV"/>
        <display value="provenance reported by"/>
      </concept>
    </include>
  </compose>
  <expansion>
    <timestamp value="2026-03-17T21:02:03.8104715+00:00"/>
    <contains>
      <system value="http://hl7.org/fhir/v3/ActCode"/>
      <version value="1.0.2"/>
      <code value="_ActInformationSensitivityPolicy"/>
      <display value="ActInformationSensitivityPolicy"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/ActCode"/>
      <version value="1.0.2"/>
      <code value="_EntitySensitivityPolicyType"/>
      <display value="EntityInformationSensitivityPolicy"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/ActCode"/>
      <version value="1.0.2"/>
      <code value="_InformationSensitivityPolicy"/>
      <display value="InformationSensitivityPolicy"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/ActCode"/>
      <version value="1.0.2"/>
      <code value="_RoleInformationSensitivityPolicy"/>
      <display value="RoleInformationSensitivityPolicy"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="B"/>
      <display value="business"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="C"/>
      <display value="celebrity"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="D"/>
      <display value="clinician"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="ETH"/>
      <display value="substance abuse related"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="HIV"/>
      <display value="HIV related"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="I"/>
      <display value="individual"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="PSY"/>
      <display value="psychiatry relate"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="S"/>
      <display value="sensitive"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="SDV"/>
      <display value="sexual and domestic violence related"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="T"/>
      <display value="taboo"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="_Confidentiality"/>
      <display value="Confidentiality"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="_ConfidentialityByAccessKind"/>
      <display value="ConfidentialityByAccessKind"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="_ConfidentialityByInfoType"/>
      <display value="ConfidentialityByInfoType"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/Confidentiality"/>
      <version value="1.0.2"/>
      <code value="_ConfidentialityModifiers"/>
      <display value="ConfidentialityModifiers"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/ObservationValue"/>
      <version value="1.0.2"/>
      <code value="_SECALTINTOBV"/>
      <display value="alteration integrity"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/ObservationValue"/>
      <version value="1.0.2"/>
      <code value="_SECDATINTOBV"/>
      <display value="data integrity"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/ObservationValue"/>
      <version value="1.0.2"/>
      <code value="_SECINTCONOBV"/>
      <display value="integrity confidence"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/ObservationValue"/>
      <version value="1.0.2"/>
      <code value="_SECINTPRVABOBV"/>
      <display value="provenance asserted by"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/ObservationValue"/>
      <version value="1.0.2"/>
      <code value="_SECINTPRVOBV"/>
      <display value="provenance"/>
    </contains>
    <contains>
      <system value="http://hl7.org/fhir/v3/ObservationValue"/>
      <version value="1.0.2"/>
      <code value="_SECINTPRVRBOBV"/>
      <display value="provenance reported by"/>
    </contains>
  </expansion>
</ValueSet>