Package | hl7.terminology.r4b |
Type | ValueSet |
Id | v3-SecurityAlterationIntegrityObservationType |
FHIR Version | R4B |
Source | http://terminology.hl7.org/http://terminology.hl7.org/6.0.2/ValueSet-v3-SecurityAlterationIntegrityObservationType.html |
URL | http://terminology.hl7.org/ValueSet/v3-SecurityAlterationIntegrityObservationType |
Version | 3.0.0 |
Status | active |
Date | 2014-03-26 |
Name | SecurityAlterationIntegrityObservationType |
Title | SecurityAlterationIntegrityObservationType |
Realm | uv |
Authority | hl7 |
Description | <pType of security metadata observation made about the alteration integrity of an IT resource (data, information object, service, or system capability), which indicates the mechanism used for authorized transformations of the resource.</p> |
Copyright | This material derives from the HL7 Terminology THO. THO is copyright ©1989+ Health Level Seven International and is made available under the CC0 designation. For more licensing information see: https://terminology.hl7.org/license.html |
No resources found
CodeSystem | |
v3-ActCode | ActCode |
v3-ActCode | ActCode |
Note: links and images are rebased to the (stated) source
Generated Narrative: ValueSet v3-SecurityAlterationIntegrityObservationType
Language: en
http://terminology.hl7.org/CodeSystem/v3-ActCode
where concept is-a SECALTINTOBS{ "resourceType": "ValueSet", "id": "v3-SecurityAlterationIntegrityObservationType", "language": "en", "text": { "status": "generated", "div": "<!-- snip (see above) -->" }, "url": "http://terminology.hl7.org/ValueSet/v3-SecurityAlterationIntegrityObservationType", "identifier": [ { "system": "urn:ietf:rfc:3986", "value": "urn:oid:2.16.840.1.113883.1.11.20465" } ], "version": "3.0.0", "name": "SecurityAlterationIntegrityObservationType", "title": "SecurityAlterationIntegrityObservationType", "status": "active", "experimental": false, "date": "2014-03-26", "publisher": "Health Level Seven International", "contact": [ { "telecom": [ { "system": "url", "value": "http://hl7.org" }, { "system": "email", "value": "hq@HL7.org" } ] } ], "description": "<pType of security metadata observation made about the alteration integrity of an IT resource (data, information object, service, or system capability), which indicates the mechanism used for authorized transformations of the resource.</p>", "immutable": true, "copyright": "This material derives from the HL7 Terminology THO. THO is copyright ©1989+ Health Level Seven International and is made available under the CC0 designation. For more licensing information see: https://terminology.hl7.org/license.html", "compose": { "include": [ { "system": "http://terminology.hl7.org/CodeSystem/v3-ActCode", "filter": [ { "property": "concept", "op": "is-a", "value": "SECALTINTOBS" } ] } ] } }