Release 5

Publish-box (todo)

Example ValueSet/security-source-type (JSON)

Terminology Infrastructure Work GroupMaturity Level: N/AStandards Status: Informative

Raw JSON (canonical form + also see JSON Format Specification)

Definition for Value SetAudit Event Source Type

{
  "resourceType" : "ValueSet",
  "id" : "security-source-type",
  "meta" : {
    "lastUpdated" : "2023-03-26T15:21:02.749+11:00",
    "profile" : ["http://hl7.org/fhir/StructureDefinition/shareablevalueset"]
  },
  "text" : {
    "status" : "extensions",
    "div" : "<div xmlns=\"http://www.w3.org/1999/xhtml\"><ul><li>Include these codes as defined in <a href=\"http://terminology.hl7.org/5.1.0/CodeSystem-security-source-type.html\"><code>http://terminology.hl7.org/CodeSystem/security-source-type</code></a><table class=\"none\"><tr><td style=\"white-space:nowrap\"><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr><tr><td><a href=\"http://terminology.hl7.org/5.1.0/CodeSystem-security-source-type.html#security-source-type-1\">1</a></td><td>User Device</td><td>End-user display device, diagnostic device.</td></tr><tr><td><a href=\"http://terminology.hl7.org/5.1.0/CodeSystem-security-source-type.html#security-source-type-2\">2</a></td><td>Data Interface</td><td>Data acquisition device or instrument.</td></tr><tr><td><a href=\"http://terminology.hl7.org/5.1.0/CodeSystem-security-source-type.html#security-source-type-3\">3</a></td><td>Web Server</td><td>Web Server process or thread.</td></tr><tr><td><a href=\"http://terminology.hl7.org/5.1.0/CodeSystem-security-source-type.html#security-source-type-4\">4</a></td><td>Application Server</td><td>Application Server process or thread.</td></tr><tr><td><a href=\"http://terminology.hl7.org/5.1.0/CodeSystem-security-source-type.html#security-source-type-5\">5</a></td><td>Database Server</td><td>Database Server process or thread.</td></tr><tr><td><a href=\"http://terminology.hl7.org/5.1.0/CodeSystem-security-source-type.html#security-source-type-6\">6</a></td><td>Security Server</td><td>Security server, e.g. a domain controller.</td></tr><tr><td><a href=\"http://terminology.hl7.org/5.1.0/CodeSystem-security-source-type.html#security-source-type-7\">7</a></td><td>Network Device</td><td>ISO level 1-3 network component.</td></tr><tr><td><a href=\"http://terminology.hl7.org/5.1.0/CodeSystem-security-source-type.html#security-source-type-8\">8</a></td><td>Network Router</td><td>ISO level 4-6 operating software.</td></tr></table></li></ul></div>"
  },
  "extension" : [{
    "url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
    "valueCode" : "sec"
  }],
  "url" : "http://hl7.org/fhir/ValueSet/security-source-type",
  "identifier" : [{
    "system" : "urn:ietf:rfc:3986",
    "value" : "urn:oid:2.16.840.1.113883.4.642.3.2981"
  }],
  "version" : "5.0.0",
  "name" : "AuditEventSourceType",
  "title" : "Audit Event Source Type",
  "status" : "active",
  "experimental" : false,
  "date" : "2010-08-26",
  "publisher" : "HL7 (FHIR Project)",
  "description" : "The type of process where the audit event originated from. Use of these codes is not required but is encouraged to maintain translation with DICOM AuditMessage schema.",
  "jurisdiction" : [{
    "coding" : [{
      "system" : "http://unstats.un.org/unsd/methods/m49/m49.htm",
      "code" : "001",
      "display" : "World"
    }]
  }],
  "copyright" : "These codes are excerpted from Digital Imaging and Communications in Medicine (DICOM) Standard, Part 16: Content Mapping Resource, Copyright © 2011 by the National Electrical Manufacturers Association. Additional codes added by HL7 FHIR use-case analysis",
  "compose" : {
    "include" : [{
      "system" : "http://terminology.hl7.org/CodeSystem/security-source-type",
      "concept" : [{
        "code" : "1"
      },
      {
        "code" : "2"
      },
      {
        "code" : "3"
      },
      {
        "code" : "4"
      },
      {
        "code" : "5"
      },
      {
        "code" : "6"
      },
      {
        "code" : "7"
      },
      {
        "code" : "8"
      }]
    }]
  }
}

Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.