FHIR IG analytics| Package | hl7.fhir.uv.xver-r3.r4b.r4 |
| Resource Type | CodeSystem |
| Id | CodeSystem-extra-security-role-type.json |
| FHIR Version | R4 |
| Source | http://hl7.org/fhir/uv/xver-r3.r4b/0.0.1-snapshot-2/CodeSystem-extra-security-role-type.html |
| URL | http://hl7.org/fhir/extra-security-role-type |
| Version | 3.0.2 |
| Status | draft |
| Date | 2017-02-13T10:00:00+10:00 |
| Name | SecurityRoleType |
| Realm | uv |
| Authority | hl7 |
| Description | This CodeSystem contains Additional FHIR-defined Security Role types not defined elsewhere |
| Content | complete |
| ValueSet | |
| R3-security-role-type-for-R4B | Cross-version VS for R3.SecurityRoleType for use in FHIR R4B |
| RARecord-ProvenanceRole-1 | Reasonable Adjustments Provenance Role |
| R3-security-role-type-for-R4 | Cross-version VS for R3.SecurityRoleType for use in FHIR R4 |
| R3-security-role-type-for-R5 | Cross-version VS for R3.SecurityRoleType for use in FHIR R5 |
No resources found
Note: links and images are rebased to the (stated) source
Generated Narrative: CodeSystem extra-security-role-type
This case-sensitive code system http://hl7.org/fhir/extra-security-role-type defines the following codes:
{
"resourceType": "CodeSystem",
"id": "extra-security-role-type",
"text": {
"status": "generated",
"div": "<!-- snip (see above) -->"
},
"extension": [
{
"url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-ballot-status",
"valueString": "Informative"
},
{
"url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm",
"valueInteger": 0
},
{
"extension": [
{
"url": "packageId",
"valueId": "hl7.fhir.uv.xver-r3.r4b"
},
{
"url": "version",
"valueString": "0.0.1-snapshot-2"
}
],
"url": "http://hl7.org/fhir/StructureDefinition/package-source"
},
{
"url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
"valueCode": "fhir"
},
{
"url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status",
"valueCode": "informative",
"_valueCode": {
"extension": [
{
"url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
"valueCanonical": "http://hl7.org/fhir/3.0/ImplementationGuide/hl7.fhir.uv.xver-r3.r4b"
}
]
}
}
],
"url": "http://hl7.org/fhir/extra-security-role-type",
"version": "3.0.2",
"name": "SecurityRoleType",
"status": "draft",
"experimental": true,
"date": "2017-02-13T10:00:00+10:00",
"publisher": "FHIR Infrastructure",
"contact": [
{
"name": "FHIR Infrastructure",
"telecom": [
{
"system": "url",
"value": "http://www.hl7.org/Special/committees/fiwg"
}
]
}
],
"description": "This CodeSystem contains Additional FHIR-defined Security Role types not defined elsewhere",
"jurisdiction": [
{
"coding": [
{
"system": "http://unstats.un.org/unsd/methods/m49/m49.htm",
"code": "001",
"display": "World"
}
]
}
],
"caseSensitive": true,
"content": "complete",
"concept": [
{
"code": "authserver",
"display": "authorization server",
"definition": "An entity providing authorization services to enable the electronic sharing of health-related information based on resource owner's preapproved permissions. For example, an UMA Authorization Server[UMA]"
},
{
"code": "datacollector",
"display": "data collector",
"definition": "An entity that collects information over which the data subject may have certain rights under policy or law to control that information's management and distribution by data collectors, including the right to access, retrieve, distribute, or delete that information."
},
{
"code": "dataprocessor",
"display": "data processor",
"definition": "An entity that processes collected information over which the data subject may have certain rights under policy or law to control that information's management and distribution by data processors, including the right to access, retrieve, distribute, or delete that information."
},
{
"code": "datasubject",
"display": "data subject",
"definition": "A person whose personal information is collected or processed, and who may have certain rights under policy or law to control that information's management and distribution by data collectors or processors, including the right to access, retrieve, distribute, or delete that information."
}
]
}