FHIR © HL7.org  |  FHIRsmith 4.0.1  |  Server Home  |  XIG Home  |  XIG Stats  | 

FHIR IG analytics

Packagehl7.fhir.uv.xver-r3.r5
Resource TypeValueSet
IdValueSet-R3-v3-ConfidentialityClassification-for-R5.json
FHIR VersionR5
Sourcehttp://hl7.org/fhir/uv/xver-r3.r5/0.0.1-snapshot-2/ValueSet-R3-v3-ConfidentialityClassification-for-R5.html
URLhttp://hl7.org/fhir/3.0/ValueSet/R3-v3-ConfidentialityClassification-for-R5
Version0.0.1-snapshot-2
Statusactive
Date2025-09-01T22:36:00.502947+10:00
NameR3_v3_ConfidentialityClassification_for_R5
TitleCross-version VS for R3.ConfidentialityClassification for use in FHIR R5
Realmuv
Authorityhl7
DescriptionThis cross-version ValueSet represents concepts from http://hl7.org/fhir/ValueSet/v3-ConfidentialityClassification|2014-03-26 for use in FHIR R5. Concepts not present here have direct `equivalent` mappings crossing all versions from R3 to R5.

Resources that use this resource

StructureDefinition
extension-Composition.confidentialityCross-version Extension for R3.Composition.confidentiality for use in FHIR R5

Resources that this resource uses

CodeSystem
Confidentialityv3-Confidentiality

Narrative

Note: links and images are rebased to the (stated) source

Generated Narrative: ValueSet R3-v3-ConfidentialityClassification-for-R5

This value set expansion contains 6 concepts.

CodeSystemDisplayDefinition
  Uhttp://hl7.org/fhir/v3/Confidentialityunrestricted

Definition: Privacy metadata indicating that the information is not classified as sensitive.

                       Examples: Includes publicly available information, e.g., business name, phone, email or physical address.

                    
                       Usage Note: This metadata indicates that the receiver has no obligation to consider additional policies when making access control decisions.   Note that in some jurisdictions, personally identifiable information must be protected as confidential, so it would not be appropriate to assign a confidentiality code of "unrestricted"  to that information even if it is publicly available.
  Lhttp://hl7.org/fhir/v3/Confidentialitylow

Definition: Privacy metadata indicating that the information has been de-identified, and there are mitigating circumstances that prevent re-identification, which minimize risk of harm from unauthorized disclosure. The information requires protection to maintain low sensitivity.

                       Examples: Includes anonymized, pseudonymized, or non-personally identifiable information such as HIPAA limited data sets.

                    
                       Map: No clear map to ISO 13606-4 Sensitivity Level (1) Care Management:   RECORD_COMPONENTs that might need to be accessed by a wide range of administrative staff to manage the subject of care's access to health services.

                    
                       Usage Note: This metadata indicates the receiver may have an obligation to comply with a data use agreement.
  Mhttp://hl7.org/fhir/v3/Confidentialitymoderate

Definition: Privacy metadata indicating moderately sensitive information, which presents moderate risk of harm if disclosed without authorization.

                       Examples: Includes allergies of non-sensitive nature used inform food service; health information a patient authorizes to be used for marketing, released to a bank for a health credit card or savings account; or information in personal health record systems that are not governed under health privacy laws.

                    
                       Map: Partial Map to ISO 13606-4 Sensitivity Level (2) Clinical Management:  Less sensitive RECORD_COMPONENTs that might need to be accessed by a wider range of personnel not all of whom are actively caring for the patient (e.g. radiology staff).

                    
                       Usage Note: This metadata indicates that the receiver may be obligated to comply with the receiver's terms of use or privacy policies.
  Nhttp://hl7.org/fhir/v3/Confidentialitynormal

Definition: Privacy metadata indicating that the information is typical, non-stigmatizing health information, which presents typical risk of harm if disclosed without authorization.

                       Examples: In the US, this includes what HIPAA identifies as the minimum necessary protected health information (PHI) given a covered purpose of use (treatment, payment, or operations).  Includes typical, non-stigmatizing health information disclosed in an application for health, workers compensation, disability, or life insurance.

                    
                       Map: Partial Map to ISO 13606-4 Sensitivity Level (3) Clinical Care:   Default for normal clinical care access (i.e. most clinical staff directly caring for the patient should be able to access nearly all of the EHR).   Maps to normal confidentiality for treatment information but not to ancillary care, payment and operations.

                    
                       Usage Note: This metadata indicates that the receiver may be obligated to comply with applicable jurisdictional privacy law or disclosure authorization.
  Rhttp://hl7.org/fhir/v3/Confidentialityrestricted

Privacy metadata indicating highly sensitive, potentially stigmatizing information, which presents a high risk to the information subject if disclosed without authorization. May be pre-empted by jurisdictional law, e.g., for public health reporting or emergency treatment.

                       Examples: Includes information that is additionally protected such as sensitive conditions mental health, HIV, substance abuse, domestic violence, child abuse, genetic disease, and reproductive health; or sensitive demographic information such as a patient's standing as an employee or a celebrity. May be used to indicate proprietary or classified information that is not related to an individual, e.g., secret ingredients in a therapeutic substance; or the name of a manufacturer.

                    
                       Map: Partial Map to ISO 13606-4 Sensitivity Level (3) Clinical Care: Default for normal clinical care access (i.e. most clinical staff directly caring for the patient should be able to access nearly all of the EHR). Maps to normal confidentiality for treatment information but not to ancillary care, payment and operations..

                    
                       Usage Note: This metadata indicates that the receiver may be obligated to comply with applicable, prevailing (default) jurisdictional privacy law or disclosure authorization..
  Vhttp://hl7.org/fhir/v3/Confidentialityvery restricted

. Privacy metadata indicating that the information is extremely sensitive and likely stigmatizing health information that presents a very high risk if disclosed without authorization. This information must be kept in the highest confidence.

                       Examples:  Includes information about a victim of abuse, patient requested information sensitivity, and taboo subjects relating to health status that must be discussed with the patient by an attending provider before sharing with the patient.  May also include information held under “legal lock� or attorney-client privilege

                    
                       Map:  This metadata indicates that the receiver may not disclose this information except as directed by the information custodian, who may be the information subject.

                    
                       Usage Note:  This metadata indicates that the receiver may not disclose this information except as directed by the information custodian, who may be the information subject.

Source1

{
  "resourceType": "ValueSet",
  "id": "R3-v3-ConfidentialityClassification-for-R5",
  "text": {
    "status": "generated",
    "div": "<!-- snip (see above) -->"
  },
  "extension": [
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm",
      "valueInteger": 2
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
      "valueCode": "sd"
    },
    {
      "extension": [
        {
          "url": "packageId",
          "valueId": "hl7.fhir.uv.xver-r3.r5"
        },
        {
          "url": "version",
          "valueString": "0.0.1-snapshot-2"
        }
      ],
      "url": "http://hl7.org/fhir/StructureDefinition/package-source"
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status",
      "valueCode": "trial-use",
      "_valueCode": {
        "extension": [
          {
            "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueCanonical": "http://hl7.org/fhir/3.0/ImplementationGuide/hl7.fhir.uv.xver-r3.r5"
          }
        ]
      }
    }
  ],
  "url": "http://hl7.org/fhir/3.0/ValueSet/R3-v3-ConfidentialityClassification-for-R5",
  "version": "0.0.1-snapshot-2",
  "name": "R3_v3_ConfidentialityClassification_for_R5",
  "title": "Cross-version VS for R3.ConfidentialityClassification for use in FHIR R5",
  "status": "active",
  "experimental": false,
  "date": "2025-09-01T22:36:00.502947+10:00",
  "publisher": "Structured Documents",
  "contact": [
    {
      "name": "Structured Documents",
      "telecom": [
        {
          "system": "url",
          "value": "http://www.hl7.org/Special/committees/structure"
        }
      ]
    }
  ],
  "description": "This cross-version ValueSet represents concepts from http://hl7.org/fhir/ValueSet/v3-ConfidentialityClassification|2014-03-26 for use in FHIR R5. Concepts not present here have direct `equivalent` mappings crossing all versions from R3 to R5.",
  "jurisdiction": [
    {
      "coding": [
        {
          "system": "http://unstats.un.org/unsd/methods/m49/m49.htm",
          "code": "001",
          "display": "World"
        }
      ]
    }
  ],
  "compose": {
    "include": [
      {
        "system": "http://hl7.org/fhir/v3/Confidentiality",
        "version": "2016-11-11",
        "concept": [
          {
            "code": "U",
            "display": "unrestricted"
          },
          {
            "code": "L",
            "display": "low"
          },
          {
            "code": "M",
            "display": "moderate"
          },
          {
            "code": "N",
            "display": "normal"
          },
          {
            "code": "R",
            "display": "restricted"
          },
          {
            "code": "V",
            "display": "very restricted"
          }
        ]
      }
    ]
  },
  "expansion": {
    "timestamp": "2025-09-01T22:36:00.50293+10:00",
    "contains": [
      {
        "system": "http://hl7.org/fhir/v3/Confidentiality",
        "version": "2016-11-11",
        "code": "U",
        "display": "unrestricted"
      },
      {
        "system": "http://hl7.org/fhir/v3/Confidentiality",
        "version": "2016-11-11",
        "code": "L",
        "display": "low"
      },
      {
        "system": "http://hl7.org/fhir/v3/Confidentiality",
        "version": "2016-11-11",
        "code": "M",
        "display": "moderate"
      },
      {
        "system": "http://hl7.org/fhir/v3/Confidentiality",
        "version": "2016-11-11",
        "code": "N",
        "display": "normal"
      },
      {
        "system": "http://hl7.org/fhir/v3/Confidentiality",
        "version": "2016-11-11",
        "code": "R",
        "display": "restricted"
      },
      {
        "system": "http://hl7.org/fhir/v3/Confidentiality",
        "version": "2016-11-11",
        "code": "V",
        "display": "very restricted"
      }
    ]
  }
}