FHIR © HL7.org  |  FHIRsmith 4.0.1  |  Server Home  |  XIG Home  |  XIG Stats  | 

FHIR IG analytics

Packagehl7.fhir.uv.xver-r5.r4b
Resource TypeValueSet
IdValueSet-R5-v3-SecurityControlObservationType-for-R4B.json
FHIR VersionR4B
Sourcehttp://hl7.org/fhir/uv/xver-r5.r4b/0.0.1-snapshot-2/ValueSet-R5-v3-SecurityControlObservationType-for-R4B.html
URLhttp://hl7.org/fhir/5.0/ValueSet/R5-v3-SecurityControlObservationType-for-R4B
Version0.0.1-snapshot-2
Statusactive
Date2025-09-01T22:37:05.394185+10:00
NameR5_v3_SecurityControlObservationType_for_R4B
TitleCross-version VS for R5.SecurityControlObservationType for use in FHIR R4B
Realmuv
Authorityhl7
DescriptionThis cross-version ValueSet represents concepts from http://terminology.hl7.org/ValueSet/v3-SecurityControlObservationType|2.0.0 for use in FHIR R4B. Concepts not present here have direct `equivalent` mappings crossing all versions from R5 to R4B.

Resources that use this resource

No resources found


Resources that this resource uses

CodeSystem
v3-ActCodeActCode

Narrative

Note: links and images are rebased to the (stated) source

Generated Narrative: ValueSet R5-v3-SecurityControlObservationType-for-R4B

This value set expansion contains 1 concepts.

CodeSystemDisplayDefinition
  SECCONOBShttp://terminology.hl7.org/CodeSystem/v3-ActCodesecurity control observation

Type of security metadata observation made about the control of an IT resource (data, information object, service, or system capability), which may be used to make access control decisions. Security control metadata convey instructions to users and receivers for secure distribution, transmission, and storage; dictate obligations or mandated actions; specify any action prohibited by refrain policy such as dissemination controls; and stipulate the permissible purpose of use of an IT resource.

Rationale: A security control observation supports requirement to specify applicable management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. [FIPS 199]

Examples: Types of security control metadata include:

  • handling caveats
  • dissemination controls
  • obligations
  • refrain policies
  • purpose of use constraints

Source1

{
  "resourceType": "ValueSet",
  "id": "R5-v3-SecurityControlObservationType-for-R4B",
  "text": {
    "status": "generated",
    "div": "<!-- snip (see above) -->"
  },
  "extension": [
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
      "valueCode": "fhir"
    },
    {
      "extension": [
        {
          "url": "packageId",
          "valueId": "hl7.fhir.uv.xver-r5.r4b"
        },
        {
          "url": "version",
          "valueString": "0.0.1-snapshot-2"
        }
      ],
      "url": "http://hl7.org/fhir/StructureDefinition/package-source"
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm",
      "valueInteger": 0,
      "_valueInteger": {
        "extension": [
          {
            "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueCanonical": "http://hl7.org/fhir/5.0/ImplementationGuide/hl7.fhir.uv.xver-r5.r4b"
          }
        ]
      }
    },
    {
      "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-standards-status",
      "valueCode": "trial-use",
      "_valueCode": {
        "extension": [
          {
            "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-conformance-derivedFrom",
            "valueCanonical": "http://hl7.org/fhir/5.0/ImplementationGuide/hl7.fhir.uv.xver-r5.r4b"
          }
        ]
      }
    }
  ],
  "url": "http://hl7.org/fhir/5.0/ValueSet/R5-v3-SecurityControlObservationType-for-R4B",
  "version": "0.0.1-snapshot-2",
  "name": "R5_v3_SecurityControlObservationType_for_R4B",
  "title": "Cross-version VS for R5.SecurityControlObservationType for use in FHIR R4B",
  "status": "active",
  "experimental": false,
  "date": "2025-09-01T22:37:05.394185+10:00",
  "publisher": "FHIR Infrastructure",
  "contact": [
    {
      "name": "FHIR Infrastructure",
      "telecom": [
        {
          "system": "url",
          "value": "http://www.hl7.org/Special/committees/fiwg"
        }
      ]
    }
  ],
  "description": "This cross-version ValueSet represents concepts from http://terminology.hl7.org/ValueSet/v3-SecurityControlObservationType|2.0.0 for use in FHIR R4B. Concepts not present here have direct `equivalent` mappings crossing all versions from R5 to R4B.",
  "jurisdiction": [
    {
      "coding": [
        {
          "system": "http://unstats.un.org/unsd/methods/m49/m49.htm",
          "code": "001",
          "display": "World"
        }
      ]
    }
  ],
  "compose": {
    "include": [
      {
        "system": "http://terminology.hl7.org/CodeSystem/v3-ActCode",
        "version": "8.0.0",
        "concept": [
          {
            "code": "SECCONOBS",
            "display": "security control observation"
          }
        ]
      }
    ]
  },
  "expansion": {
    "timestamp": "2025-09-01T22:37:05.394186+10:00",
    "contains": [
      {
        "system": "http://terminology.hl7.org/CodeSystem/v3-ActCode",
        "version": "8.0.0",
        "code": "SECCONOBS",
        "display": "security control observation"
      }
    ]
  }
}