FHIR © HL7.org  |  FHIRsmith 4.0.1  |  Server Home  |  XIG Home  |  XIG Stats  | 

FHIR IG analytics

Packagehl7.fhir.uv.xver-r5.r4.r4
Resource TypeValueSet
IdValueSet-R5-v3-SecurityControlObservationType-for-R4.json
FHIR VersionR4
Sourcehttp://hl7.org/fhir/uv/xver-r5.r4/0.0.1-snapshot-2/ValueSet-R5-v3-SecurityControlObservationType-for-R4.html
URLhttp://hl7.org/fhir/5.0/ValueSet/R5-v3-SecurityControlObservationType-for-R4
Version0.0.1-snapshot-2
Statusactive
Date2025-09-01T22:37:05.394188+10:00
NameR5_v3_SecurityControlObservationType_for_R4
TitleCross-version VS for R5.SecurityControlObservationType for use in FHIR R4
Realmuv
Authorityhl7
DescriptionThis cross-version ValueSet represents concepts from http://terminology.hl7.org/ValueSet/v3-SecurityControlObservationType|2.0.0 for use in FHIR R4. Concepts not present here have direct `equivalent` mappings crossing all versions from R5 to R4.

Resources that use this resource

No resources found


Resources that this resource uses

CodeSystem
v3-ActCodeActCode

Narrative

Note: links and images are rebased to the (stated) source

Generated Narrative: ValueSet R5-v3-SecurityControlObservationType-for-R4

This value set expansion contains 1 concepts.

CodeSystemDisplayDefinition
  SECCONOBShttp://terminology.hl7.org/CodeSystem/v3-ActCodesecurity control observation

Type of security metadata observation made about the control of an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Security control metadata convey instructions to users and receivers for secure distribution, transmission, and storage; dictate obligations or mandated actions; specify any action prohibited by refrain policy such as dissemination controls; and stipulate the permissible purpose of use of an IT resource.

Rationale: A security control observation supports requirement to specify applicable management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. [FIPS 199]

Examples: Types of security control metadata include:

  • handling caveats
  • dissemination controls
  • obligations
  • refrain policies
  • purpose of use constraints

Source1

{
  "resourceType": "ValueSet",
  "id": "R5-v3-SecurityControlObservationType-for-R4",
  "text": {
    "status": "generated",
    "div": "<!-- snip (see above) -->"
  },
  "extension": [
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
      "valueCode": "fhir"
    },
    {
      "extension": [
        {
          "url": "packageId",
          "valueId": "hl7.fhir.uv.xver-r5.r4"
        },
        {
          "url": "version",
          "valueString": "0.0.1-snapshot-2"
        }
      ],
      "url": "http://hl7.org/fhir/StructureDefinition/package-source"
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm",
      "valueInteger": 0,
      "_valueInteger": {
        "extension": [
          {
            "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueCanonical": "http://hl7.org/fhir/5.0/ImplementationGuide/hl7.fhir.uv.xver-r5.r4"
          }
        ]
      }
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status",
      "valueCode": "trial-use",
      "_valueCode": {
        "extension": [
          {
            "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueCanonical": "http://hl7.org/fhir/5.0/ImplementationGuide/hl7.fhir.uv.xver-r5.r4"
          }
        ]
      }
    }
  ],
  "url": "http://hl7.org/fhir/5.0/ValueSet/R5-v3-SecurityControlObservationType-for-R4",
  "version": "0.0.1-snapshot-2",
  "name": "R5_v3_SecurityControlObservationType_for_R4",
  "title": "Cross-version VS for R5.SecurityControlObservationType for use in FHIR R4",
  "status": "active",
  "experimental": false,
  "date": "2025-09-01T22:37:05.394188+10:00",
  "publisher": "FHIR Infrastructure",
  "contact": [
    {
      "name": "FHIR Infrastructure",
      "telecom": [
        {
          "system": "url",
          "value": "http://www.hl7.org/Special/committees/fiwg"
        }
      ]
    }
  ],
  "description": "This cross-version ValueSet represents concepts from http://terminology.hl7.org/ValueSet/v3-SecurityControlObservationType|2.0.0 for use in FHIR R4. Concepts not present here have direct `equivalent` mappings crossing all versions from R5 to R4.",
  "jurisdiction": [
    {
      "coding": [
        {
          "system": "http://unstats.un.org/unsd/methods/m49/m49.htm",
          "code": "001",
          "display": "World"
        }
      ]
    }
  ],
  "compose": {
    "include": [
      {
        "system": "http://terminology.hl7.org/CodeSystem/v3-ActCode",
        "version": "8.0.0",
        "concept": [
          {
            "code": "SECCONOBS",
            "display": "security control observation"
          }
        ]
      }
    ]
  },
  "expansion": {
    "timestamp": "2025-09-01T22:37:05.394186+10:00",
    "contains": [
      {
        "system": "http://terminology.hl7.org/CodeSystem/v3-ActCode",
        "version": "8.0.0",
        "code": "SECCONOBS",
        "display": "security control observation"
      }
    ]
  }
}