Package | hl7.ehrs.uv.ehrsfmr2 |
Type | Requirements |
Id | EHRSFMR2-TI.1 |
FHIR Version | R5 |
Source | http://hl7.org/ehrs/uv/ehrsfmr2/https://build.fhir.org/ig/mvdzel/ehrsfm-fhir-r5/Requirements-EHRSFMR2-TI.1.html |
URL | http://hl7.org/ehrs/uv/ehrsfmr2/Requirements/EHRSFMR2-TI.1 |
Version | 2.1.1-ballot |
Status | active |
Date | 2025-05-13T15:11:00+00:00 |
Name | TI_1_Security |
Title | TI.1 Security (Header) |
Realm | uv |
Authority | hl7 |
Description | Manage EHR-S security. |
Purpose | EHR-S security consists of entity authentication, entity authorization, entity access control, patient access management, secure data exchange, attestation, patient privacy and confidentiality. EHR audit functions are described in [TI.2](Requirements-EHRSFMR2-TI.2.html). |
No resources found
No resources found
Note: links and images are rebased to the (stated) source
Manage EHR-S security.
EHR-S security consists of entity authentication, entity authorization, entity access control, patient access management, secure data exchange, attestation, patient privacy and confidentiality. EHR audit functions are described in TI.2.
{ "resourceType": "Requirements", "id": "EHRSFMR2-TI.1", "meta": { "profile": [ "http://hl7.org/ehrs/uv/ehrsfmr2/StructureDefinition/FMHeader" ] }, "text": { "status": "extensions", "div": "<!-- snip (see above) -->" }, "extension": [ { "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg", "valueCode": "ehr" } ], "url": "http://hl7.org/ehrs/uv/ehrsfmr2/Requirements/EHRSFMR2-TI.1", "version": "2.1.1-ballot", "name": "TI_1_Security", "title": "TI.1 Security (Header)", "status": "active", "date": "2025-05-13T15:11:00+00:00", "publisher": "HL7 International / Electronic Health Records", "contact": [ { "telecom": [ { "system": "url", "value": "http://www.hl7.org/Special/committees/ehr" } ] } ], "description": "Manage EHR-S security.", "jurisdiction": [ { "coding": [ { "system": "http://unstats.un.org/unsd/methods/m49/m49.htm", "code": "001", "display": "World" } ] } ], "purpose": "EHR-S security consists of entity authentication, entity authorization, entity access control, patient access management, secure data exchange, attestation, patient privacy and confidentiality. EHR audit functions are described in [TI.2](Requirements-EHRSFMR2-TI.2.html)." }