HL7 Terminology (THO)
7.0.0 - Continuous Process Integration (ci build) International flag

HL7 Terminology (THO), published by HL7 International - Vocabulary Work Group. This guide is not an authorized publication; it is the continuous build for version 7.0.0 built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/HL7/UTG/ and changes regularly. See the Directory of published versions

ValueSet: ObligationPolicy

Official URL: http://terminology.hl7.org/ValueSet/v3-ObligationPolicy Version: 3.0.0
Active as of 2014-03-26 Responsible: Health Level Seven International Computable Name: ObligationPolicy
Other Identifiers: OID:2.16.840.1.113883.1.11.20445

Copyright/Legal: This material derives from the HL7 Terminology THO. THO is copyright ©1989+ Health Level Seven International and is made available under the CC0 designation. For more licensing information see: https://terminology.hl7.org/license.html

Conveys the mandated workflow action that an information custodian, receiver, or user must perform.

Examples:

  • encrypt

Usage Note: Per OASIS XACML, an obligation is an operation specified in a policy or policy that is performed in conjunction with the enforcement of an access control decision.

References

Logical Definition (CLD)

Language: en

 

Expansion

Expansion performed internally based on codesystem ActCode v9.0.0 (CodeSystem)

This value set contains 33 concepts

LevelSystemCodeDisplay (en) - English (English, en)JSONXML
1http://terminology.hl7.org/CodeSystem/v3-ActCode  ObligationPolicyobligation policy
2http://terminology.hl7.org/CodeSystem/v3-ActCode    ANONYanonymize
2http://terminology.hl7.org/CodeSystem/v3-ActCode    AODaccounting of disclosure
2http://terminology.hl7.org/CodeSystem/v3-ActCode    AUDITaudit
2http://terminology.hl7.org/CodeSystem/v3-ActCode    AUDTRaudit trail
2http://terminology.hl7.org/CodeSystem/v3-ActCode    CPLYPOLcomply with policy
3http://terminology.hl7.org/CodeSystem/v3-ActCode      CPLYCCcomply with confidentiality code
3http://terminology.hl7.org/CodeSystem/v3-ActCode      CPLYCDcomply with consent directive
3http://terminology.hl7.org/CodeSystem/v3-ActCode      CPLYCUIcomply with controlled unclassified information policy
3http://terminology.hl7.org/CodeSystem/v3-ActCode      CPLYJPPcomply with jurisdictional privacy policy
3http://terminology.hl7.org/CodeSystem/v3-ActCode      CPLYJSPcomply with jurisdictional security policy
3http://terminology.hl7.org/CodeSystem/v3-ActCode      CPLYOPPcomply with organizational privacy policy
3http://terminology.hl7.org/CodeSystem/v3-ActCode      CPLYOSPcomply with organizational security policy
2http://terminology.hl7.org/CodeSystem/v3-ActCode    DECLASSIFYLABELdeclassify security label
2http://terminology.hl7.org/CodeSystem/v3-ActCode    DEIDdeidentify
2http://terminology.hl7.org/CodeSystem/v3-ActCode    DELAUdelete after use
2http://terminology.hl7.org/CodeSystem/v3-ActCode    DOWNGRDLABELdowngrade security label
2http://terminology.hl7.org/CodeSystem/v3-ActCode    DRIVLABELderive security label
2http://terminology.hl7.org/CodeSystem/v3-ActCode    ENCRYPTencrypt
3http://terminology.hl7.org/CodeSystem/v3-ActCode      ENCRYPTRencrypt at rest
3http://terminology.hl7.org/CodeSystem/v3-ActCode      ENCRYPTTencrypt in transit
3http://terminology.hl7.org/CodeSystem/v3-ActCode      ENCRYPTUencrypt in use
2http://terminology.hl7.org/CodeSystem/v3-ActCode    HUAPRVhuman approval
2http://terminology.hl7.org/CodeSystem/v3-ActCode    LABELassign security label
2http://terminology.hl7.org/CodeSystem/v3-ActCode    MASKmask
2http://terminology.hl7.org/CodeSystem/v3-ActCode    MINECminimum necessary
2http://terminology.hl7.org/CodeSystem/v3-ActCode    PERSISTLABELpersist security label
2http://terminology.hl7.org/CodeSystem/v3-ActCode    PRIVMARKprivacy mark
3http://terminology.hl7.org/CodeSystem/v3-ActCode      CUIMarkCUI Mark
2http://terminology.hl7.org/CodeSystem/v3-ActCode    PSEUDpseudonymize
2http://terminology.hl7.org/CodeSystem/v3-ActCode    REDACTredact
2http://terminology.hl7.org/CodeSystem/v3-ActCode    UPGRDLABELupgrade security label
2http://terminology.hl7.org/CodeSystem/v3-ActCode    PROCESSINLINELABELprocess inline security label

Explanation of the columns that may appear on this page:

Level A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies
System The source of the definition of the code (when the value set draws in codes defined elsewhere)
Code The code (used as the code in the resource instance)
Display The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application
Definition An explanation of the meaning of the concept
Comments Additional notes about how to use the code

History

DateActionCustodianAuthorComment
2023-11-14reviseTSMGMarc DuteauAdd standard copyright and contact to internal content; up-476
2022-10-18reviseTSMGMarc DuteauFixing missing metadata; up-349
2020-05-06reviseVocabulary WGTed KleinMigrated to the UTG maintenance environment and publishing tooling.
2014-03-26revise2014T1_2014-03-26_001283 (RIM release ID)Vocabulary (Woody Beeler) (no record of original request)Lock all vaue sets untouched since 2014-03-26 to trackingId 2014T1_2014_03_26