HL7 Electronic Health Record System Functional Model, Release 2.1.1
            
            2.1.1 - 
  
            
          
HL7 Electronic Health Record System Functional Model, Release 2.1.1, published by HL7 International / Electronic Health Records. This guide is not an authorized publication; it is the continuous build for version 2.1.1 built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/mvdzel/ehrsfm-fhir-r5/ and changes regularly. See the Directory of published versions
| Official URL: http://hl7.org/ehrs/uv/ehrsfmr2/Requirements/EHRSFMR2-TI.2.1.2.4 | Version: 2.1.1 | |||
| Standards status: Normative Active as of 2025-10-31 | Computable Name: TI_2_1_2_4_User_Request_to_Change_Password_Security_Audit_Trigger | |||
Manage Audit Trigger initiated to track user request to change password.
Manage Audit Trigger initiated to track user request to change password.
Capture user request to change password, both routine and exceptional, including key metadata (who, what, when, where, why).
| 
                
                 TI.2.1.2.4#01 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL audit each occurrence of user authentication when user requests password change.  | 
        
| 
                
                 TI.2.1.2.4#02 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture identity of the organization.  | 
        
| 
                
                 TI.2.1.2.4#03 
                
             | 
            
                
                
                conditional
                
                
                 SHALL 
                
             | 
            
                
                 IF known, THEN the system SHALL capture identity of the user.  | 
        
| 
                
                 TI.2.1.2.4#04 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture identity of the system.  | 
        
| 
                
                 TI.2.1.2.4#05 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture the event initiating audit trigger.  | 
        
| 
                
                 TI.2.1.2.4#06 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture the date and time of the event initiating audit trigger.  | 
        
| 
                
                 TI.2.1.2.4#07 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture identity of the location (i.e., network address).  | 
        
| 
                
                 TI.2.1.2.4#08 
                
             | 
            
                
                
                
                 MAY 
                
             | 
            
                
                 The system MAY capture the rationale for the event initiating audit trigger.  | 
        
| 
                
                 TI.2.1.2.4#09 
                
             | 
            
                
                
                conditional
                
                
                 SHALL 
                
             | 
            
                
                 IF password change successful, THEN the system SHALL capture the new password.  |