Privacy Consent on FHIR (PCF)
1.1.1-current - ci-build International flag

Privacy Consent on FHIR (PCF), published by IHE IT Infrastructure Technical Committee. This guide is not an authorized publication; it is the continuous build for version 1.1.1-current built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/IHE/ITI.PCF/ and changes regularly. See the Directory of published versions

: Advanced Security Tag ValueSet - TTL Representation

Active as of 2024-10-21

Raw ttl | Download


@prefix fhir: <http://hl7.org/fhir/> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix xsd: <http://www.w3.org/2001/XMLSchema#> .

# - resource -------------------------------------------------------------------

 a fhir:ValueSet ;
  fhir:nodeRole fhir:treeRoot ;
  fhir:id [ fhir:v "AdvancedSecurityTagVS"] ; # 
  fhir:text [
fhir:status [ fhir:v "extensions" ] ;
fhir:div "<div xmlns=\"http://www.w3.org/1999/xhtml\"><p class=\"res-header-id\"><b>Generated Narrative: ValueSet AdvancedSecurityTagVS</b></p><a name=\"AdvancedSecurityTagVS\"> </a><a name=\"hcAdvancedSecurityTagVS\"> </a><a name=\"AdvancedSecurityTagVS-en-US\"> </a><p>This value set includes codes based on the following rules:</p><ul><li>Include these codes as defined in <a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-Confidentiality.html\"><code>http://terminology.hl7.org/CodeSystem/v3-Confidentiality</code></a><table class=\"none\"><tr><td style=\"white-space:nowrap\"><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr><tr><td><a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-Confidentiality.html#v3-Confidentiality-R\">R</a></td><td style=\"color: #cccccc\">restricted</td><td>Privacy metadata indicating the level of protection required to safeguard potentially stigmatizing information, which if disclosed without authorization, would present a high risk of harm to an individual's reputation and sense of privacy.<br/><br/>*Usage Note:* The level of protection afforded restricted confidential information is dictated by specially protective organizational or jurisdictional privacy policies, including at an authorized individual's request, intended to engender patient trust in providers of sensitive services.<br/><br/>Privacy policies mandating additional levels of protection by restricting information access preempt less protective privacy policies when the information is used in the delivery and management of healthcare. May be pre-empted by jurisdictional law (e.g., for public health reporting or emergency treatment).<br/><br/>Confidentiality code total order hierarchy: Restricted (R) is less protective than *V*, and subsumes all other protection levels (i.e., *N, M, L, and U*).<br/><br/>**Examples:** <br/><br/>Includes information that is additionally protected such as sensitive conditions mental health, HIV, substance abuse, domestic violence, child abuse, genetic disease, and reproductive health; or sensitive demographic information such as a patient's standing as an employee or a celebrity. May be used to indicate proprietary or classified information that is not related to an individual (e.g., secret ingredients in a therapeutic substance; or the name of a manufacturer).</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-Confidentiality.html#v3-Confidentiality-N\">N</a></td><td style=\"color: #cccccc\">normal</td><td>Privacy metadata indicating the level of protection required to safeguard personal and healthcare information, which if disclosed without authorization, would present a considerable risk of harm to an individual's reputation and sense of privacy.<br/><br/>*Usage Note:* The level of protection afforded normatively confidential information is dictated by the prevailing normative privacy policies, which are intended to engender patient trust in their healthcare providers.<br/><br/>Privacy policies mandating normative levels of protection, which preempt less protective privacy policies when the information is used in the delivery and management of healthcare. May be pre-empted by jurisdictional law (e.g., for public health reporting or emergency treatment).<br/><br/>Confidentiality code total order hierarchy: Normal (N) is less protective than *V* and *R*, and subsumes all other protection levels (i.e., *M, L, and U*).<br/><br/>**Map:**Partial Map to ISO 13606-4 Sensitivity Level (3) Clinical Care when purpose of use is treatment: Default for normal clinical care access (i.e., most clinical staff directly caring for the patient should be able to access nearly all of the EHR). Maps to normal confidentiality for treatment information but not to ancillary care, payment and operations.<br/><br/>**Examples:** <br/><br/>n the US, this includes what HIPAA identifies as protected health information (PHI) under 45 CFR Section 160.103.</td></tr></table></li><li>Include these codes as defined in <a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-ActCode.html\"><code>http://terminology.hl7.org/CodeSystem/v3-ActCode</code></a><table class=\"none\"><tr><td style=\"white-space:nowrap\"><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr><tr><td><a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-ActCode.html#v3-ActCode-ETH\">ETH</a></td><td style=\"color: #cccccc\">substance abuse information sensitivity</td><td>Policy for handling alcohol or drug-abuse information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to alcohol or drug-abuse information that is deemed sensitive.<br/><br/>*Usage Note:* If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-ActCode.html#v3-ActCode-ETHUD\">ETHUD</a></td><td style=\"color: #cccccc\">alcohol use disorder information sensitivity</td><td>Policy for handling information related to alcohol use disorders and conditions caused by these disorders, which is afforded heightened confidentiality.<br/><br/>*Usage Note:* If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-ActCode.html#v3-ActCode-OPIOIDUD\">OPIOIDUD</a></td><td style=\"color: #cccccc\">opioid use disorder information sensitivity</td><td>Policy for handling information related to opioid use disorders and conditions caused by these disorders, which is afforded heightened confidentiality.<br/><br/>*Usage Note:* If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law in addition to this more generic code.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-ActCode.html#v3-ActCode-PSY\">PSY</a></td><td style=\"color: #cccccc\">psychiatry disorder information sensitivity</td><td>Policy for handling psychiatry psychiatric disorder information, which is afforded heightened confidentiality.<br/><br/>*Usage Note:* If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-ActCode.html#v3-ActCode-SDV\">SDV</a></td><td style=\"color: #cccccc\">sexual assault, abuse, or domestic violence information sensitivity</td><td>Policy for handling sexual assault, abuse, or domestic violence information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to sexual assault, abuse, or domestic violence information that is deemed sensitive.<br/><br/>SDV code covers violence perpetrated by related and non-related persons. This code should be specific to physical and mental trauma caused by a related person only. The access control concerns are keeping the patient safe from the perpetrator who may have an abusive psychological control over the patient, may be stalking the patient, or may try to manipulate care givers into allowing the perpetrator to make contact with the patient. The definition needs to be clarified.<br/><br/>*Usage Note:* If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.</td></tr><tr><td><a href=\"http://terminology.hl7.org/6.0.2/CodeSystem-v3-ActCode.html#v3-ActCode-HIV\">HIV</a></td><td style=\"color: #cccccc\">HIV/AIDS information sensitivity</td><td>Policy for handling HIV or AIDS information, which will be afforded heightened confidentiality. Information handling protocols based on organizational policies related to HIV or AIDS information that is deemed sensitive.<br/><br/>*Usage Note:* If there is a jurisdictional mandate, then use the applicable ActPrivacyLaw code system, and specify the law rather than or in addition to this more generic code.</td></tr></table></li></ul></div>"
  ] ; # 
  fhir:url [ fhir:v "https://profiles.ihe.net/ITI/PCF/ValueSet/AdvancedSecurityTagVS"^^xsd:anyURI] ; # 
  fhir:version [ fhir:v "1.1.1-current"] ; # 
  fhir:name [ fhir:v "AdvancedSecurityTagVS"] ; # 
  fhir:title [ fhir:v "Advanced Security Tag ValueSet"] ; # 
  fhir:status [ fhir:v "active"] ; # 
  fhir:experimental [ fhir:v "false"^^xsd:boolean] ; # 
  fhir:date [ fhir:v "2024-10-21T22:01:31+00:00"^^xsd:dateTime] ; # 
  fhir:publisher [ fhir:v "IHE IT Infrastructure Technical Committee"] ; # 
  fhir:contact ( [
    ( fhir:telecom [
fhir:system [ fhir:v "url" ] ;
fhir:value [ fhir:v "https://www.ihe.net/ihe_domains/it_infrastructure/" ]     ] )
  ] [
    ( fhir:telecom [
fhir:system [ fhir:v "email" ] ;
fhir:value [ fhir:v "iti@ihe.net" ]     ] )
  ] [
fhir:name [ fhir:v "IHE IT Infrastructure Technical Committee" ] ;
    ( fhir:telecom [
fhir:system [ fhir:v "email" ] ;
fhir:value [ fhir:v "iti@ihe.net" ]     ] )
  ] ) ; # 
  fhir:description [ fhir:v "ValueSet of the security tags allowed in Advanced Consent Option\n\nAt a minimum the following stigmatizing [Sensitivity](https://terminology.hl7.org/ValueSet-v3-InformationSensitivityPolicy.html) classifications shall be implemented as parameters:\n\n- `ETH` -- Substance Abuse including Alcohol\n  - `ETHUD` -- Alcohol substance abuse\n  - `OPIOIDUD` -- Opioid drug abuse\n- `PSY` -- Psychiatry Disorder / Mental Health\n- `SDV` -- Sexual Assault, Abuse, or Domestic Violence\n- `HIV` -- HIV/AIDS\n\nAt a minimum the following [ConfidentialityCodes](https://terminology.hl7.org/ValueSet-v3-Confidentiality.html) shall be implemented as parameters:\n\n- `N` Normal and\n- `R` Restricted"] ; # 
  fhir:jurisdiction ( [
    ( fhir:coding [
fhir:system [ fhir:v "http://unstats.un.org/unsd/methods/m49/m49.htm"^^xsd:anyURI ] ;
fhir:code [ fhir:v "001" ]     ] )
  ] ) ; # 
  fhir:compose [
    ( fhir:include [
fhir:system [ fhir:v "http://terminology.hl7.org/CodeSystem/v3-Confidentiality"^^xsd:anyURI ] ;
      ( fhir:concept [
fhir:code [ fhir:v "R" ]       ] [
fhir:code [ fhir:v "N" ]       ] )     ] [
fhir:system [ fhir:v "http://terminology.hl7.org/CodeSystem/v3-ActCode"^^xsd:anyURI ] ;
      ( fhir:concept [
fhir:code [ fhir:v "ETH" ]       ] [
fhir:code [ fhir:v "ETHUD" ]       ] [
fhir:code [ fhir:v "OPIOIDUD" ]       ] [
fhir:code [ fhir:v "PSY" ]       ] [
fhir:code [ fhir:v "SDV" ]       ] [
fhir:code [ fhir:v "HIV" ]       ] )     ] )
  ] . #