This page is part of the FHIR Specification (v1.0.2: DSTU 2). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R5 R4B R4 R3 R2
This is a value set defined by the FHIR project.
Summary
Defining URL: | http://hl7.org/fhir/ValueSet/audit-event-sub-type |
Name: | Audit Event Sub-Type |
Definition: | More detailed code concerning the type of the audit event - defined by DICOM with some FHIR specific additions. |
OID: | 2.16.840.1.113883.4.642.2.270 (for OID based terminology systems) |
Copyright: | These codes are excerpted from Digital Imaging and Communications in Medicine (DICOM) Standard, Part 16: Content Mapping Resource, Copyright © 2011 by the National Electrical Manufacturers Association. |
Source Resource | XML / JSON |
This value set is used in the following places:
This value set includes codes from the following code systems:
Code | Display | |
110120 | Application Start | Audit event: Application Entity has started |
110121 | Application Stop | Audit event: Application Entity has stopped |
110122 | Login | Audit event: User login has been attempted |
110123 | Logout | Audit event: User logout has been attempted |
110124 | Attach | Audit event: Node has been attached |
110125 | Detach | Audit event: Node has been detached |
110126 | Node Authentication | Audit event: Node Authentication has been attempted |
110127 | Emergency Override Started | Audit event: Emergency Override has started |
110128 | Network Configuration | Audit event: Network configuration has been changed |
110129 | Security Configuration | Audit event: Security configuration has been changed |
110130 | Hardware Configuration | Audit event: Hardware configuration has been changed |
110131 | Software Configuration | Audit event: Software configuration has been changed |
110132 | Use of Restricted Function | Audit event: A use of a restricted function has been attempted |
110133 | Audit Recording Stopped | Audit event: Audit recording has been stopped |
110134 | Audit Recording Started | Audit event: Audit recording has been started |
110135 | Object Security Attributes Changed | Audit event: Security attributes of an object have been changed |
110136 | Security Roles Changed | Audit event: Security roles have been changed |
110137 | User security Attributes Changed | Audit event: Security attributes of a user have been changed |
110138 | Emergency Override Stopped | Audit event: Emergency Override has Stopped |
110139 | Remote Service Operation Started | Audit event: Remote Service Operation has Begun |
110140 | Remote Service Operation Stopped | Audit event: Remote Service Operation has Stopped |
110141 | Local Service Operation Started | Audit event: Local Service Operation has Begun |
110142 | Local Service Operation Stopped | Audit event: Local Service Operation Stopped |
This expansion generated 24 Oct 2015
This value set contains 39 concepts
Code | System | Display |
110120 | http://nema.org/dicom/dicm | Application Start |
110121 | http://nema.org/dicom/dicm | Application Stop |
110122 | http://nema.org/dicom/dicm | Login |
110123 | http://nema.org/dicom/dicm | Logout |
110124 | http://nema.org/dicom/dicm | Attach |
110125 | http://nema.org/dicom/dicm | Detach |
110126 | http://nema.org/dicom/dicm | Node Authentication |
110127 | http://nema.org/dicom/dicm | Emergency Override Started |
110128 | http://nema.org/dicom/dicm | Network Configuration |
110129 | http://nema.org/dicom/dicm | Security Configuration |
110130 | http://nema.org/dicom/dicm | Hardware Configuration |
110131 | http://nema.org/dicom/dicm | Software Configuration |
110132 | http://nema.org/dicom/dicm | Use of Restricted Function |
110133 | http://nema.org/dicom/dicm | Audit Recording Stopped |
110134 | http://nema.org/dicom/dicm | Audit Recording Started |
110135 | http://nema.org/dicom/dicm | Object Security Attributes Changed |
110136 | http://nema.org/dicom/dicm | Security Roles Changed |
110137 | http://nema.org/dicom/dicm | User security Attributes Changed |
110138 | http://nema.org/dicom/dicm | Emergency Override Stopped |
110139 | http://nema.org/dicom/dicm | Remote Service Operation Started |
110140 | http://nema.org/dicom/dicm | Remote Service Operation Stopped |
110141 | http://nema.org/dicom/dicm | Local Service Operation Started |
110142 | http://nema.org/dicom/dicm | Local Service Operation Stopped |
read | http://hl7.org/fhir/restful-interaction | read |
vread | http://hl7.org/fhir/restful-interaction | vread |
update | http://hl7.org/fhir/restful-interaction | update |
delete | http://hl7.org/fhir/restful-interaction | delete |
history | http://hl7.org/fhir/restful-interaction | history |
history-instance | http://hl7.org/fhir/restful-interaction | history-instance |
history-type | http://hl7.org/fhir/restful-interaction | history-type |
history-system | http://hl7.org/fhir/restful-interaction | history-system |
create | http://hl7.org/fhir/restful-interaction | create |
search | http://hl7.org/fhir/restful-interaction | search |
search-type | http://hl7.org/fhir/restful-interaction | search-type |
search-system | http://hl7.org/fhir/restful-interaction | search-system |
validate | http://hl7.org/fhir/restful-interaction | validate |
conformance | http://hl7.org/fhir/restful-interaction | conformance |
transaction | http://hl7.org/fhir/restful-interaction | transaction |
operation | http://hl7.org/fhir/restful-interaction | operation |
See the full registry of value sets defined as part of FHIR.
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |