Cancer Pathology Data Sharing, published by HL7 International / Orders and Observations. This guide is not an authorized publication; it is the continuous build for version 2.0.0-ballot built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/HL7/cancer-reporting/ and changes regularly. See the Directory of published versions
Page standards status: Informative |
This guide defines 7 FHIR profiles:
This guide defines 5 value sets:
This guide defines 2 code systems:
This IG defines one extension:
This specification conforms to US Core Profiles. To claim conformance to this specification, servers SHALL:
Details on profiles and extensions present in this specification are available on the Artifact Index page.
Systems claiming to conform to a profile SHALL support the elements in a profile as defined below. This guide adopts the following definitions of MustSupport for all direct transactions between the Sending and Receiving Systems.
Sending Systems are defined as systems that generate and push data within a pathology lab workflow. These systems may be used by clinicians (ie oncologists) when ordering the pathological analysis for a patient, which will necessarily entail collecting (procedure) the specimen and sending it to a lab. These systems may also be used by a pathologists in cases of completed analysis and reports that need to be sent back to an clinician and/or to a cancer registry.
Receiving Systems are defined as systems that receive and are expected to process data within a pathology lab workflow. These systems may be used by pathologists (i.e. LIS, associated interface engines) when receiving a specimen and a request for analysis. These systems may also be used by clinicians who ordered the lab analysis/report. These systems may also represent central registries who aggregate and analyze pathology lab information.
Where this IG does not additionally constrain a US Core profile, the actors shall follow the US Core definition of Must Support and Missing Data.
Systems implementing this guide are expected to follow the general FHIR Security guidelines, as well as all additionally applicable public and private laws and policies.