HL7 Electronic Health Record System Functional Model, Release 2.1.1
            
            2.1.1 - 
  
            
          
HL7 Electronic Health Record System Functional Model, Release 2.1.1, published by HL7 International / Electronic Health Records. This guide is not an authorized publication; it is the continuous build for version 2.1.1 built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/mvdzel/ehrsfm-fhir-r5/ and changes regularly. See the Directory of published versions
| Official URL: http://hl7.org/ehrs/uv/ehrsfmr2/Requirements/EHRSFMR2-TI.2.1.2.9 | Version: 2.1.1 | |||
| Standards status: Normative Active as of 2025-10-31 | Computable Name: TI_2_1_2_9_User_Permissions__Authorization__Security_Audit_Trigger | |||
Manage Audit Trigger initiated to track user permissions (authorization).
Manage Audit Trigger initiated to track user permissions (authorization).
Capture user permissions (authorization), both routine and exceptional, including key metadata (who, what, when, where, why).
| 
                
                 TI.2.1.2.9#01 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL audit each occurrence when user permissions (authorizations) are granted, removed or updated.  | 
        
| 
                
                 TI.2.1.2.9#02 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture identity of the organization.  | 
        
| 
                
                 TI.2.1.2.9#03 
                
             | 
            
                
                
                conditional
                
                
                 SHALL 
                
             | 
            
                
                 IF known, THEN the system SHALL capture identity of the user.  | 
        
| 
                
                 TI.2.1.2.9#04 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture identity of the system.  | 
        
| 
                
                 TI.2.1.2.9#05 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture the event initiating audit trigger.  | 
        
| 
                
                 TI.2.1.2.9#06 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture the date and time of the event initiating audit trigger.  | 
        
| 
                
                 TI.2.1.2.9#07 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture identity of the location (i.e., network address).  | 
        
| 
                
                 TI.2.1.2.9#08 
                
             | 
            
                
                
                
                 SHOULD 
                
             | 
            
                
                 The system SHOULD capture the rationale for granting, removing or updating user permissions.  | 
        
| 
                
                 TI.2.1.2.9#09 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture identity of user to whom permissions apply.  | 
        
| 
                
                 TI.2.1.2.9#10 
                
             | 
            
                
                
                
                 SHALL 
                
             | 
            
                
                 The system SHALL capture the new set of applicable user permissions (authorizations).  |