FHIR © HL7.org  |  FHIRsmith 4.0.1  |  Server Home  |  XIG Home  |  XIG Stats  | 

FHIR IG analytics

Packagehl7.fhir.uv.xver-r5.r3
Resource TypeValueSet
IdValueSet-R5-v3-SecurityIntegrityProvenanceObservationType-for-R3.json
FHIR VersionR3
Sourcehttp://hl7.org/fhir/uv/xver-r5.r3/0.1.0/ValueSet-R5-v3-SecurityIntegrityProvenanceObservationType-for-R3.html
URLhttp://hl7.org/fhir/uv/xver/ValueSet/R5-v3-SecurityIntegrityProvenanceObservationType-for-R3
Version0.1.0
Statusactive
Date2026-03-17T21:02:03.8104715+00:00
NameR5V3SecurityIntegrityProvenanceObservationTypeForR3
TitleCross-version ValueSet R5.SecurityIntegrityProvenanceObservationType for use in FHIR STU3
Realmuv
Authorityhl7
DescriptionThis cross-version ValueSet represents content from `http://terminology.hl7.org/ValueSet/v3-SecurityIntegrityProvenanceObservationType|2.0.0` for use in FHIR STU3.
PurposeThis value set is part of the cross-version definitions generated to enable use of the value set `http://terminology.hl7.org/ValueSet/v3-SecurityIntegrityProvenanceObservationType|2.0.0` as defined in FHIR R5 in FHIR STU3. The source value set is bound to the following FHIR R5 elements: * Note that all concepts are included in this cross-version definition because no concepts have compatible representations Following are the generation technical comments: FHIR ValueSet `http://terminology.hl7.org/ValueSet/v3-SecurityIntegrityProvenanceObservationType|2.0.0`, defined in FHIR R5 does not have any mapping to FHIR STU3

Resources that use this resource

No resources found


Resources that this resource uses

CodeSystem
hl7.terminology#currentv3-ActCodeActCode

Narrative

Note: links and images are rebased to the (stated) source

Generated Narrative: ValueSet R5-v3-SecurityIntegrityProvenanceObservationType-for-R3

This value set expansion contains 3 concepts.

SystemVersionCodeDisplayDefinition
http://terminology.hl7.org/CodeSystem/v3-ActCode8.0.0  SECINTPRVABOBSsecurity integrity provenance asserted by observation

Type of security metadata observation made about the integrity provenance of an IT resource (data, information object, service, or system capability), which indicates the entity that made assertions about the resource. The asserting entity may not be the original informant about the resource.

Examples: Types of security integrity provenance asserted by observation metadata, which may value the observation, including:

  • assertions about an IT resource by a patient
  • assertions about an IT resource by a clinician
  • assertions about an IT resource by a device
http://terminology.hl7.org/CodeSystem/v3-ActCode8.0.0  SECINTPRVOBSsecurity integrity provenance observation

Type of security metadata observation made about the provenance integrity of an IT resource (data, information object, service, or system capability), which indicates the lifecycle completeness of an IT resource in terms of workflow status such as its creation, modification, suspension, and deletion; locations in which the resource has been collected or archived, from which it may be retrieved, and the history of its distribution and disclosure. Integrity provenance metadata about an IT resource may be used to assess its veracity, reliability, and trustworthiness.

Examples: Types of security integrity provenance observation metadata, which may value the observation about an IT resource, include:

  • completeness or workflow status, such as authentication
  • the entity responsible for original authoring or informing about an IT resource
  • the entity responsible for a report or assertion about an IT resource relayed “second-handâ€?
  • the entity responsible for excerpting, transforming, or compiling an IT resource
http://terminology.hl7.org/CodeSystem/v3-ActCode8.0.0  SECINTPRVRBOBSsecurity integrity provenance reported by observation

Type of security metadata observation made about the integrity provenance of an IT resource (data, information object, service, or system capability), which indicates the entity that reported the existence of the resource. The reporting entity may not be the original author of the resource.

Examples: Types of security integrity provenance reported by observation metadata, which may value the observation, include:

  • reports about an IT resource by a patient
  • reports about an IT resource by a clinician
  • reports about an IT resource by a device

Source1

{
  "resourceType": "ValueSet",
  "id": "R5-v3-SecurityIntegrityProvenanceObservationType-for-R3",
  "text": {
    "status": "generated",
    "div": "<!-- snip (see above) -->"
  },
  "extension": [
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
      "valueCode": "fhir"
    },
    {
      "extension": [
        {
          "url": "packageId",
          "valueId": "hl7.fhir.uv.xver-r5.r3"
        },
        {
          "url": "version",
          "valueString": "0.1.0"
        },
        {
          "url": "uri",
          "valueUri": "http://hl7.org/fhir/uv/xver/ImplementationGuide/hl7.fhir.uv.xver-r5.r3"
        }
      ],
      "url": "http://hl7.org/fhir/StructureDefinition/package-source"
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm",
      "valueInteger": 0,
      "_valueInteger": {
        "extension": [
          {
            "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueUri": "http://hl7.org/fhir/uv/xver/ImplementationGuide/hl7.fhir.uv.xver-r5.r3"
          }
        ]
      }
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status",
      "valueCode": "trial-use",
      "_valueCode": {
        "extension": [
          {
            "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueUri": "http://hl7.org/fhir/uv/xver/ImplementationGuide/hl7.fhir.uv.xver-r5.r3"
          }
        ]
      }
    }
  ],
  "url": "http://hl7.org/fhir/uv/xver/ValueSet/R5-v3-SecurityIntegrityProvenanceObservationType-for-R3",
  "version": "0.1.0",
  "name": "R5V3SecurityIntegrityProvenanceObservationTypeForR3",
  "title": "Cross-version ValueSet R5.SecurityIntegrityProvenanceObservationType for use in FHIR STU3",
  "status": "active",
  "experimental": false,
  "date": "2026-03-17T21:02:03.8104715+00:00",
  "publisher": "FHIR Infrastructure",
  "contact": [
    {
      "name": "FHIR Infrastructure",
      "telecom": [
        {
          "system": "url",
          "value": "http://www.hl7.org/Special/committees/fiwg"
        }
      ]
    }
  ],
  "description": "This cross-version ValueSet represents content from `http://terminology.hl7.org/ValueSet/v3-SecurityIntegrityProvenanceObservationType|2.0.0` for use in FHIR STU3.",
  "jurisdiction": [
    {
      "coding": [
        {
          "system": "http://unstats.un.org/unsd/methods/m49/m49.htm",
          "code": "001",
          "display": "World"
        }
      ]
    }
  ],
  "purpose": "This value set is part of the cross-version definitions generated to enable use of the\r\nvalue set `http://terminology.hl7.org/ValueSet/v3-SecurityIntegrityProvenanceObservationType|2.0.0` as defined in FHIR R5\r\nin FHIR STU3.\r\n\r\nThe source value set is bound to the following FHIR R5 elements:\r\n* \r\n\r\nNote that all concepts are included in this cross-version definition because no concepts have compatible representations\r\n\r\nFollowing are the generation technical comments:\r\n\nFHIR ValueSet `http://terminology.hl7.org/ValueSet/v3-SecurityIntegrityProvenanceObservationType|2.0.0`, defined in FHIR R5 does not have any mapping to FHIR STU3",
  "compose": {
    "include": [
      {
        "system": "http://terminology.hl7.org/CodeSystem/v3-ActCode",
        "version": "8.0.0",
        "concept": [
          {
            "code": "SECINTPRVABOBS",
            "display": "security integrity provenance asserted by observation"
          },
          {
            "code": "SECINTPRVOBS",
            "display": "security integrity provenance observation"
          },
          {
            "code": "SECINTPRVRBOBS",
            "display": "security integrity provenance reported by observation"
          }
        ]
      }
    ]
  },
  "expansion": {
    "timestamp": "2026-03-17T21:02:03.8104715+00:00",
    "contains": [
      {
        "system": "http://terminology.hl7.org/CodeSystem/v3-ActCode",
        "version": "8.0.0",
        "code": "SECINTPRVABOBS",
        "display": "security integrity provenance asserted by observation"
      },
      {
        "system": "http://terminology.hl7.org/CodeSystem/v3-ActCode",
        "version": "8.0.0",
        "code": "SECINTPRVOBS",
        "display": "security integrity provenance observation"
      },
      {
        "system": "http://terminology.hl7.org/CodeSystem/v3-ActCode",
        "version": "8.0.0",
        "code": "SECINTPRVRBOBS",
        "display": "security integrity provenance reported by observation"
      }
    ]
  }
}