This page is part of the FHIR Specification (v0.0.82: DSTU 1). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions

1.14.2.1.167 Value Set for codes in http://hl7.org/fhir/object-role

This is a value set defined by the FHIR project.

Summary

Code System URL:http://hl7.org/fhir/object-role
Value Set URL:http://hl7.org/fhir/vs/object-role
Definition:Code representing the functional application role of Participant Object being audited

Formal value Set definition : XML or JSON.

This value set defines its own codes:

1.14.2.1.167.1 SecurityEventObjectRole

Code representing the functional application role of Participant Object being audited

This value set defines its own terms in the system http://hl7.org/fhir/object-role

CodeDisplayDefinition
1 PatientThis object is the patient that is the subject of care related to this event. It is identifiable by patient ID or equivalent. The patient may be either human or animal.
2 LocationThis is a location identified as related to the event. This is usually the location where the event took place. Note that for shipping, the usual events are arrival at a location or departure from a location.
3 ReportThis object is any kind of persistent document created as a result of the event. This could be a paper report, film, electronic report, DICOM Study, etc. Issues related to medical records life cycle management are conveyed elsewhere.
4 ResourceA logical object related to the event. (Deprecated).
5 Master fileThis is any configurable file used to control creation of documents. Examples include the objects maintained by the HL7 Master File transactions, Value Sets, etc.
6 UserA human participant not otherwise identified by some other category.
7 List(deprecated).
8 DoctorTypically a licensed person who is providing or performing care related to the event, generally a physician. The key distinction between doctor and practitioner is with regards to their role, not the licensing. The doctor is the human who actually performed the work. The practitioner is the human or organization that is responsible for the work.
9 SubscriberA person or system that is being notified as part of the event. This is relevant in situations where automated systems provide notifications to other parties when an event took place.
10 GuarantorInsurance company, or any other organization who accepts responsibility for paying for the healthcare event.
11 Security User EntityA person or active system object involved in the event with a security role.
12 Security User GroupA person or system object involved in the event with the authority to modify security roles of other objects.
13 Security ResourceA passive object, such as a role table, that is relevant to the event.
14 Security Granularity Definition(deprecated) Relevant to certain RBAC security methodologies.
15 PractitionerAny person or organization responsible for providing care. This encompasses all forms of care, licensed or otherwise, and all sorts of teams and care groups. Note, the distinction between practitioners and the doctor that actually provided the care to the patient.
16 Data DestinationThe source or destination for data transfer, when it does not match some other role.
17 Data RepositoryA source or destination for data transfer, that acts as an archive, database, or similar role.
18 ScheduleAn object that holds schedule information. This could be an appointment book, availability information, etc.
19 CustomerAn organization or person that is the recipient of services. This could be an organization that is buying services for a patient, or a person that is buying services for an animal.
20 JobAn order, task, work item, procedure step, or other description of work to be performed. E.g., a particular instance of an MPPS.
21 Job StreamA list of jobs or a system that provides lists of jobs. E.g., an MWL SCP.
22 Table(Deprecated).
23 Routing CriteriaAn object that specifies or controls the routing or delivery of items. For example, a distribution list is the routing criteria for mail. The items delivered may be documents, jobs, or other objects.
24 QueryThe contents of a query. This is used to capture the contents of any kind of query. For security surveillance purposes knowing the queries being made is very important.

These codes are used in the following places:

OIDs

Code System URL:167
Value Set URL:2.16.840.1.113883.4.642.2.167
Note: these OIDs are not used in FHIR, but may be used in v3, or OID based terminology systems

See the full registry of value sets defined as part of FHIR.


Explanation of the columns that may appear on this page:

LevelA few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies
SourceThe source of the definition of the code (when the value set draws in codes defined elsewhere)
CodeThe code (used as the code in the resource instance)
DisplayThe display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application
DefinitionAn explanation of the meaning of the concept
CommentsAdditional notes about how to use the code

In addition, this page will include mappings to HL7 v2 or HL7 v3 code where these have been defined.


comments powered by Disqus