Tanzania FHIR Facade Implementation Guide
0.1.0 - ci-build
Tanzania
Tanzania FHIR Facade Implementation Guide, published by Ministry of Health – Tanzania. This guide is not an authorized publication; it is the continuous build for version 0.1.0 built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/Speedykom/tz-fhir-ig/ and changes regularly. See the Directory of published versions
Contents:
This page provides a list of the FHIR artifacts defined as part of this implementation guide.
These define data models that represent the domain covered by this implementation guide in more business-friendly terms than the underlying FHIR resources.
| ZHSF Authorization API Payload |
Logical model for ZHSF /api/v1/members/authorize response. |
| ZHSF Claim Submission API Payload |
Logical model for ZHSF /api/v1/claims/submit response. |
These define constraints on FHIR resources for systems conforming to this implementation guide.
| Tanzania Claim Profile |
Minimal Claim profile for NHIF–ZHSF claim submissions. |
| Tanzania ClaimResponse Profile |
Minimal ClaimResponse profile for ZHSF authorization, eligibility, and claim submission responses. |
These define sets of codes used by systems conforming to this implementation guide.
| TZ Legacy Gender ValueSet |
ValueSet representing legacy gender codes used in Tanzania. |
These define new code systems used by systems conforming to this implementation guide.
| TZ Legacy Gender Codes |
Legacy gender codes used in Tanzania systems (M, F, U). |
These define transformations to convert between data structures used by systems conforming to this implementation guide.
| ZHSFAuthorizationToClaimResponse |
| ZHSFClaimSubmissionToClaim |
These define transformations to convert between codes by systems conforming with this implementation guide.
| Mapping Legacy TZ Gender Codes to FHIR Administrative Gender |
Maps legacy Tanzanian gender codes (M, F, U) to FHIR administrative gender codes (male, female, unknown). |
These are example instances that show what data produced and consumed by systems conforming with this implementation guide might look like.
| example-zhsf-authorization-parameters |
| example-zhsf-claimsubmission-parameters |
| zhsf-authorization-accepted |
| zhsf-claim-submission |