HL7 Terminology (THO)
5.2.0 - Publication International flag

This page is part of the HL7 Terminology (v5.2.0: Release) based on FHIR R4. This is the current published version in its permanent home (it will always be available at this URL). For a full list of available versions, see the Directory of published versions

ValueSet: SecurityIntegrityProvenanceAssertedByObservationValue

Official URL: http://terminology.hl7.org/ValueSet/v3-SecurityIntegrityProvenanceAssertedByObservationValue Version: 2.0.0
Active as of 2019-03-20 Computable Name: SecurityIntegrityProvenanceAssertedByObservationValue
Other Identifiers: id: urn:oid:2.16.840.1.113883.1.11.20486

No description

References

This value set is not used here; it may be used elsewhere (e.g. specifications and/or implementations that use this content)

Logical Definition (CLD)

This value set includes codes based on the following rules:

This value set excludes codes based on the following rules:

  • Exclude these codes as defined in http://terminology.hl7.org/CodeSystem/v3-ObservationValue
    CodeDisplayDefinition
    _SECINTPRVABOBVprovenance asserted byAbstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability).

    **Examples:** Codes conveying the provenance metadata about the entity asserting the resource.

 

Expansion

This value set contains 8 concepts

Expansion based on ObservationValue v2.1.0 (CodeSystem)

CodeSystemDisplayDefinition
  CLINASThttp://terminology.hl7.org/CodeSystem/v3-ObservationValueclinician asserted

Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a clinician.

  DEVASThttp://terminology.hl7.org/CodeSystem/v3-ObservationValuedevice asserted

Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a device.

  HCPASThttp://terminology.hl7.org/CodeSystem/v3-ObservationValuehealthcare professional asserted

Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a healthcare professional.

  PACQASThttp://terminology.hl7.org/CodeSystem/v3-ObservationValuepatient acquaintance asserted

Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient acquaintance.

  PATASThttp://terminology.hl7.org/CodeSystem/v3-ObservationValuepatient asserted

Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient.

  PAYASThttp://terminology.hl7.org/CodeSystem/v3-ObservationValuepayer asserted

Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a payer.

  PROASThttp://terminology.hl7.org/CodeSystem/v3-ObservationValueprofessional asserted

Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a professional.

  SDMASThttp://terminology.hl7.org/CodeSystem/v3-ObservationValuesubstitute decision maker asserted

Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a substitute decision maker.


Explanation of the columns that may appear on this page:

Level A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies
System The source of the definition of the code (when the value set draws in codes defined elsewhere)
Code The code (used as the code in the resource instance)
Display The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application
Definition An explanation of the meaning of the concept
Comments Additional notes about how to use the code

History

DateActionAuthorCustodianComment
2022-10-18reviseMarc DuteauTSMGFixing missing metadata; up-349
2020-05-06reviseTed KleinVocabulary WGMigrated to the UTG maintenance environment and publishing tooling.