HL7 Terminology (THO)
6.0.1 - Publication
This page is part of the HL7 Terminology (v6.0.1: Release) based on FHIR (HL7® FHIR® Standard) v5.0.0. This is the current published version in its permanent home (it will always be available at this URL). For a full list of available versions, see the Directory of published versions
Official URL: http://terminology.hl7.org/ValueSet/v3-SecurityClassificationObservationValue | Version: 3.0.0 | |||
Active as of 2014-03-26 | Responsible: Health Level Seven International | Computable Name: SecurityClassificationObservationValue | ||
Other Identifiers: OID:2.16.840.1.113883.1.11.20479 | ||||
Copyright/Legal: This material derives from the HL7 Terminology THO. THO is copyright ©1989+ Health Level Seven International and is made available under the CC0 designation. For more licensing information see: https://terminology.hl7.org/license.html |
Security observation values used to indicate security classification metadata.
References
Generated Narrative: ValueSet v3-SecurityClassificationObservationValue
Language: en
This value set includes codes based on the following rules:
http://terminology.hl7.org/CodeSystem/v3-Confidentiality
Generated Narrative: ValueSet
Language: en
Expansion based on:
This value set contains 20 concepts
Code | System | Display | Inactive | Definition |
L | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | low | Privacy metadata indicating that a low level of protection is required to safeguard personal and healthcare information, which has been altered in such a way as to minimize the need for confidentiality protections with some residual risks associated with re-linking. The risk of harm to an individual's reputation and sense of privacy if disclosed without authorization is considered negligible, and mitigations are in place to address reidentification risk. Usage Note: The level of protection afforded anonymized and pseudonymized, and non-personally identifiable information (e.g., a limited data set) is dictated by privacy policies and data use agreements intended to engender trust that health information can be used and disclosed with little or no risk of re-identification. Example: Personal and healthcare information, which excludes 16 designated categories of direct identifiers in a HIPAA Limited Data Set. This information may be disclosed by HIPAA Covered Entities without patient authorization for a research, public health, and operations purposes if conditions are met, which includes obtaining a signed data use agreement from the recipient. See 45 CFR Section 164.514. This metadata indicates that the receiver may have an obligation to comply with a data use agreement with the discloser. The discloser may have obligations to comply with policies dictating the methods for de-identification. Confidentiality code total order hierarchy: Low (L) is less protective than V, R, N, and M, and subsumes U. | |
M | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | moderate | Privacy metadata indicating the level of protection required to safeguard personal and healthcare information, which if disclosed without authorization, would present a moderate risk of harm to an individual's reputation and sense of privacy. Usage Note: The level of protection afforded moderately confidential information is dictated by privacy policies intended to engender trust in a service provider. May include publicly available information in jurisdictions that restrict uses of that information without the consent of the data subject. Privacy policies mandating moderate levels of protection, which preempt less protective privacy policies. "Moderate" confidentiality policies differ from and would be preempted by the prevailing privacy policies mandating the normative level of protection for information used in the delivery and management of healthcare. Confidentiality code total order hierarchy: Moderate (M) is less protective than V, R, and N, and subsumes all other protection levels (i.e., L and U). Examples: Includes personal and health information that an individual authorizes to be collected, accessed, used or disclosed to a bank for a health credit card or savings account; to health oversight authorities; to a hospital patient directory; to worker compensation, disability, property and casualty or life insurers; and to personal health record systems, consumer-controlled devices, social media accounts and online Apps; or for marketing purposes | |
N | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | normal | Privacy metadata indicating the level of protection required to safeguard personal and healthcare information, which if disclosed without authorization, would present a considerable risk of harm to an individual's reputation and sense of privacy. Usage Note: The level of protection afforded normatively confidential information is dictated by the prevailing normative privacy policies, which are intended to engender patient trust in their healthcare providers. Privacy policies mandating normative levels of protection, which preempt less protective privacy policies when the information is used in the delivery and management of healthcare. May be pre-empted by jurisdictional law (e.g., for public health reporting or emergency treatment). Confidentiality code total order hierarchy: Normal (N) is less protective than V and R, and subsumes all other protection levels (i.e., M, L, and U). **Map:**Partial Map to ISO 13606-4 Sensitivity Level (3) Clinical Care when purpose of use is treatment: Default for normal clinical care access (i.e., most clinical staff directly caring for the patient should be able to access nearly all of the EHR). Maps to normal confidentiality for treatment information but not to ancillary care, payment and operations. Examples: n the US, this includes what HIPAA identifies as protected health information (PHI) under 45 CFR Section 160.103. | |
R | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | restricted | Privacy metadata indicating the level of protection required to safeguard potentially stigmatizing information, which if disclosed without authorization, would present a high risk of harm to an individual's reputation and sense of privacy. Usage Note: The level of protection afforded restricted confidential information is dictated by specially protective organizational or jurisdictional privacy policies, including at an authorized individual's request, intended to engender patient trust in providers of sensitive services. Privacy policies mandating additional levels of protection by restricting information access preempt less protective privacy policies when the information is used in the delivery and management of healthcare. May be pre-empted by jurisdictional law (e.g., for public health reporting or emergency treatment). Confidentiality code total order hierarchy: Restricted (R) is less protective than V, and subsumes all other protection levels (i.e., N, M, L, and U). Examples: Includes information that is additionally protected such as sensitive conditions mental health, HIV, substance abuse, domestic violence, child abuse, genetic disease, and reproductive health; or sensitive demographic information such as a patient's standing as an employee or a celebrity. May be used to indicate proprietary or classified information that is not related to an individual (e.g., secret ingredients in a therapeutic substance; or the name of a manufacturer). | |
U | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | unrestricted | Privacy metadata indicating that no level of protection is required to safeguard personal and healthcare information that has been disclosed by an authorized individual without restrictions on its use. Examples: Includes publicly available information e.g., business name, phone, email and physical address. Usage Note: The authorization to collect, access, use, and disclose this information may be stipulated in a contract of adhesion by a data user (e.g., via terms of service or data user privacy policies) in exchange for the data subject's use of a service. This metadata indicates that the receiver has no obligation to consider privacy policies other than its own when making access control decisions. This metadata indicates that the receiver has no obligation to consider privacy policies other than its own when making access control decisions. Confidentiality code total order hierarchy: Unrestricted (U) is less protective than V, R, N, M, and L, and is the lowest protection levels. | |
V | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | very restricted | Privacy metadata indicating the level of protection required under atypical cicumstances to safeguard potentially damaging or harmful information, which if disclosed without authorization, would (1) present an extremely high risk of harm to an individual's reputation, sense of privacy, and possibly safety; or (2) impact an individual's or organization's legal matters. Usage Note: The level of protection afforded very restricted confidential information is dictated by specially protective privacy or legal policies intended to ensure that under atypical circumstances additional protections limit access to only those with a high 'need to know' and the information is kept in highest confidence.. Privacy and legal policies mandating the highest level of protection by stringently restricting information access, preempt less protective privacy policies when the information is used in the delivery and management of healthcare including legal proceedings related to healthcare. May be pre-empted by jurisdictional law (e.g., for public health reporting or emergency treatment but only under limited circumstances). Confidentiality code total order hierarchy: Very Restricted (V) is the highest protection level and subsumes all other protection levels s (i.e., R, N, M, L, and UI). Examples: Includes information about a victim of abuse, patient requested information sensitivity, and taboo subjects relating to health status that must be discussed with the patient by an attending provider before sharing with the patient. May also include information held under a legal hold or attorney-client privilege. | |
_Confidentiality | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | Confidentiality | A specializable code and its leaf codes used in Confidentiality value sets to value the Act.Confidentiality and Role.Confidentiality attribute in accordance with the definition for concept domain "Confidentiality". | |
_ConfidentialityByAccessKind | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | ConfidentialityByAccessKind | inactive | Description: By accessing subject / role and relationship based rights (These concepts are mutually exclusive, one and only one is required for a valid confidentiality coding.) *Deprecation Comment:*Deprecated due to updated confidentiality codes under ActCode |
B | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | business | inactive | Description: Since the service class can represent knowledge structures that may be considered a trade or business secret, there is sometimes (though rarely) the need to flag those items as of business level confidentiality. However, no patient related information may ever be of this confidentiality level. Deprecation Comment: Replced by ActCode.B |
D | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | clinician | inactive | Description: Only clinicians may see this item, billing and administration persons can not access this item without special permission. *Deprecation Comment:*Deprecated due to updated confidentiality codes under ActCode |
I | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | individual | inactive | Description: Access only to individual persons who are mentioned explicitly as actors of this service and whose actor type warrants that access (cf. to actor type code). *Deprecation Comment:*Deprecated due to updated confidentiality codes under ActCode |
_ConfidentialityByInfoType | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | ConfidentialityByInfoType | inactive | Description: By information type, only for service catalog entries (multiples allowed). Not to be used with actual patient data! *Deprecation Comment:*Deprecated due to updated confidentiality codes under ActCode |
ETH | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | substance abuse related | inactive | Description: Alcohol/drug-abuse related item *Deprecation Comment:*Replced by ActCode.ETH |
HIV | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | HIV related | inactive | Description: HIV and AIDS related item *Deprecation Comment:*Replced by ActCode.HIV |
PSY | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | psychiatry relate | inactive | Description: Psychiatry related item *Deprecation Comment:*Replced by ActCode.PSY |
SDV | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | sexual and domestic violence related | inactive | Description: Sexual assault / domestic violence related item *Deprecation Comment:*Replced by ActCode.SDV |
_ConfidentialityModifiers | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | ConfidentialityModifiers | inactive | Description: Modifiers of role based access rights (multiple allowed) *Deprecation Comment:*Deprecated due to updated confidentiality codes under ActCode |
C | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | celebrity | inactive | Description: Celebrities are people of public interest (VIP) including employees, whose information require special protection. *Deprecation Comment:*Replced by ActCode.CEL |
S | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | sensitive | inactive | Description: Information for which the patient seeks heightened confidentiality. Sensitive information is not to be shared with family members. Information reported by the patient about family members is sensitive by default. Flag can be set or cleared on patient's request. *Deprecation Comment:*Deprecated due to updated confidentiality codes under ActCode |
T | http://terminology.hl7.org/CodeSystem/v3-Confidentiality | taboo | inactive | Description: Information not to be disclosed or discussed with patient except through physician assigned to patient in this case. This is usually a temporary constraint only, example use is a new fatal diagnosis or finding, such as malignancy or HIV. *Deprecation Note:*Replced by ActCode.TBOO |
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
System | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |
History
Date | Action | Author | Custodian | Comment |
2023-11-14 | revise | Marc Duteau | TSMG | Add standard copyright and contact to internal content; up-476 |
2022-10-18 | revise | Marc Duteau | TSMG | Fixing missing metadata; up-349 |
2020-05-06 | revise | Ted Klein | Vocabulary WG | Migrated to the UTG maintenance environment and publishing tooling. |
2014-03-26 | revise | Vocabulary (Woody Beeler) (no record of original request) | 2014T1_2014-03-26_001283 (RIM release ID) | Lock all vaue sets untouched since 2014-03-26 to trackingId 2014T1_2014_03_26 |