HL7 Terminology
2.1.0 - Publication
This page is part of the HL7 Terminology (v2.1.0: Release) based on FHIR (HL7® FHIR® Standard) R4. The current version which supersedes this version is 7.0.0. For a full list of available versions, see the Directory of published versions
Summary
| Defining URL: | http://terminology.hl7.org/ValueSet/v3-ActAdministrativeDetectedIssueManagementCode |
| Version: | 2.0.0 |
| Name: | ActAdministrativeDetectedIssueManagementCode |
| Status: | Active as of 2014-03-26 |
| Definition: | Codes dealing with the management of Detected Issue observations for the administrative and patient administrative acts domains. |
| OID: | 2.16.840.1.113883.1.11.19431 (for OID based terminology systems) |
| Source Resource: | XML / JSON / Turtle |
References
This value set is not used here; it may be used elsewhere (e.g. specifications and/or implementations that use this content)
This value set includes codes based on the following rules:
http://terminology.hl7.org/CodeSystem/v3-ActCode where concept is-a _ActAdministrativeDetectedIssueManagementCodeThis value set excludes codes based on the following rules:
http://terminology.hl7.org/CodeSystem/v3-ActCode| Code | Display | Definition |
| _ActAdministrativeDetectedIssueManagementCode | ActAdministrativeDetectedIssueManagementCode | Codes dealing with the management of Detected Issue observations for the administrative and patient administrative acts domains. |
This value set contains 2 concepts
Expansion based on ActCode v5.0.0 (CodeSystem)
All codes from system http://terminology.hl7.org/CodeSystem/v3-ActCode
| Code | Display | Definition |
| _AuthorizationIssueManagementCode | Authorization Issue Management Code | |
| EMAUTH | emergency authorization override | Used to temporarily override normal authorization rules to gain access to data in a case of emergency. Use of this override code will typically be monitored, and a procedure to verify its proper use may be triggered when used. |
| 21 | authorization confirmed | **Description:** Indicates that the permissions have been externally verified and the request should be processed. |
Explanation of the columns that may appear on this page:
| Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
| Source | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
| Code | The code (used as the code in the resource instance) |
| Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
| Definition | An explanation of the meaning of the concept |
| Comments | Additional notes about how to use the code |
History
| Date | Action | Author | Custodian | Comment |
| 2020-05-06 | revise | Ted Klein | Vocabulary WG | Migrated to the UTG maintenance environment and publishing tooling. |
| 2014-03-26 | revise | Vocabulary (Woody Beeler) (no record of original request) | 2014T1_2014-03-26_001283 (RIM release ID) | Lock all vaue sets untouched since 2014-03-26 to trackingId 2014T1_2014_03_26 |