HL7 Terminology (THO)
5.2.0 - Publication
This page is part of the HL7 Terminology (v5.2.0: Release) based on FHIR R4. This is the current published version in its permanent home (it will always be available at this URL). For a full list of available versions, see the Directory of published versions
Official URL: http://terminology.hl7.org/ValueSet/v3-RoleLinkType | Version: 2.0.0 | |||
Active as of 2014-03-26 | Computable Name: RoleLinkType | |||
Other Identifiers: id: urn:oid:2.16.840.1.113883.1.11.11603 |
A code specifying the meaning and purpose of every RoleLink instance. Each of its values implies specific constraints to what kinds of Role objects can be related and in which way.
References
This value set is not used here; it may be used elsewhere (e.g. specifications and/or implementations that use this content)
http://terminology.hl7.org/CodeSystem/v3-RoleLinkType
This value set contains 8 concepts
Expansion based on RoleLinkType v2.1.1 (CodeSystem)
Level | Code | System | Display | Definition |
1 | REL | http://terminology.hl7.org/CodeSystem/v3-RoleLinkType | related | An action taken with respect to a subject Entity by a regulatory or authoritative body with supervisory capacity over that entity. The action is taken in response to behavior by the subject Entity that body finds to be undesirable. Suspension, license restrictions, monetary fine, letter of reprimand, mandated training, mandated supervision, etc.Examples: |
2 | BACKUP | http://terminology.hl7.org/CodeSystem/v3-RoleLinkType | is backup for | This relationship indicates the source Role is available to the target Role as a backup. An entity in a backup role will be available as a substitute or replacement in the event that the entity assigned the role is unavailable. In medical roles where it is critical that the function be performed and there is a possibility that the individual assigned may be ill or otherwise indisposed, another individual is assigned to cover for the individual originally assigned the role. A backup may be required to be identified, but unless the backup is actually used, he/she would not assume the assigned entity role. |
2 | CONT | http://terminology.hl7.org/CodeSystem/v3-RoleLinkType | has contact | This relationship indicates the target Role provides or receives information regarding the target role. For example, AssignedEntity is a contact for a ServiceDeliveryLocation. |
2 | DIRAUTH | http://terminology.hl7.org/CodeSystem/v3-RoleLinkType | has direct authority over | The source Role has direct authority over the target role in a chain of authority. |
2 | IDENT | http://terminology.hl7.org/CodeSystem/v3-RoleLinkType | Identification | Description: The source role provides identification for the target role. The source role must be IDENT. The player entity of the source role is constrained to be the same as (i.e. the equivalent of, or equal to) the player of the target role if present. If the player is absent from the source role, then it is assumed to be the same as the player of the target role. |
2 | INDAUTH | http://terminology.hl7.org/CodeSystem/v3-RoleLinkType | has indirect authority over | The source Role has indirect authority over the target role in a chain of authority. |
2 | PART | http://terminology.hl7.org/CodeSystem/v3-RoleLinkType | has part | The target Role is part of the Source Role. |
2 | REPL | http://terminology.hl7.org/CodeSystem/v3-RoleLinkType | replaces | This relationship indicates that the source Role replaces (or subsumes) the target Role. Allows for new identifiers and/or new effective time for a registry entry or a certification, etc. |
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
System | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |
History
Date | Action | Author | Custodian | Comment |
2022-10-18 | revise | Marc Duteau | TSMG | Fixing missing metadata; up-349 |
2020-05-06 | revise | Ted Klein | Vocabulary WG | Migrated to the UTG maintenance environment and publishing tooling. |
2014-03-26 | revise | Vocabulary (Woody Beeler) (no record of original request) | 2014T1_2014-03-26_001283 (RIM release ID) | Lock all vaue sets untouched since 2014-03-26 to trackingId 2014T1_2014_03_26 |