HL7 Terminology (THO)
5.2.0 - Publication
This page is part of the HL7 Terminology (v5.2.0: Release) based on FHIR R4. This is the current published version in its permanent home (it will always be available at this URL). For a full list of available versions, see the Directory of published versions
Official URL: http://terminology.hl7.org/ValueSet/v3-ActAdministrativeDetectedIssueManagementCode | Version: 2.0.0 | |||
Active as of 2014-03-26 | Computable Name: ActAdministrativeDetectedIssueManagementCode | |||
Other Identifiers: id: urn:oid:2.16.840.1.113883.1.11.19431 |
Codes dealing with the management of Detected Issue observations for the administrative and patient administrative acts domains.
References
This value set is not used here; it may be used elsewhere (e.g. specifications and/or implementations that use this content)
This value set includes codes based on the following rules:
http://terminology.hl7.org/CodeSystem/v3-ActCode
where concept is-a _ActAdministrativeDetectedIssueManagementCodeThis value set excludes codes based on the following rules:
http://terminology.hl7.org/CodeSystem/v3-ActCode
Code | Display | Definition |
_ActAdministrativeDetectedIssueManagementCode | ActAdministrativeDetectedIssueManagementCode | Codes dealing with the management of Detected Issue observations for the administrative and patient administrative acts domains. |
This value set contains 2 concepts
Expansion based on ActCode v8.0.1 (CodeSystem)
Code | System | Display | Definition |
_AuthorizationIssueManagementCode | http://terminology.hl7.org/CodeSystem/v3-ActCode | Authorization Issue Management Code | |
EMAUTH | http://terminology.hl7.org/CodeSystem/v3-ActCode | emergency authorization override | Used to temporarily override normal authorization rules to gain access to data in a case of emergency. Use of this override code will typically be monitored, and a procedure to verify its proper use may be triggered when used. |
21 | http://terminology.hl7.org/CodeSystem/v3-ActCode | authorization confirmed | Description: Indicates that the permissions have been externally verified and the request should be processed. |
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
System | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |
History
Date | Action | Author | Custodian | Comment |
2022-10-18 | revise | Marc Duteau | TSMG | Fixing missing metadata; up-349 |
2020-05-06 | revise | Ted Klein | Vocabulary WG | Migrated to the UTG maintenance environment and publishing tooling. |
2014-03-26 | revise | Vocabulary (Woody Beeler) (no record of original request) | 2014T1_2014-03-26_001283 (RIM release ID) | Lock all vaue sets untouched since 2014-03-26 to trackingId 2014T1_2014_03_26 |