This is the Continuous Integration Build of FHIR (will be incorrect/inconsistent at times).
See the Directory of published versions icon ValueSet http://hl7.org/fhir/ValueSet/security-label-event-examples

Security icon Work Group Maturity Level: 1Draft Use Context: Country: World, Not Intended for Production use, Not Intended for Production use
Official URL: http://hl7.org/fhir/ValueSet/security-label-event-examples Version: 5.0.0-cibuild
draft as of 2022-05-10 Computable Name: SecurityLabelEventExamples
Flags: Experimental OID: 2.16.840.1.113883.4.642.3.3008

This value set is used in the following places:

A sample of security labels from Healthcare Privacy and Security Classification System that are used on events and requests/responses (aka user context or organization context) made up of PurposeOfUse and maybe a refrain/obligation.

This value set includes codes based on the following rules:

  • Include these codes as defined in http://terminology.hl7.org/CodeSystem/v3-ActReason icon
    TREAT icontreatmentTo perform one or more operations on information for provision of health care.
    HPAYMT iconhealthcare paymentTo perform one or more operations on information for conducting financial or contractual activities related to payment for provision of health care.
    ETREAT iconEmergency TreatmentTo perform one or more operations on information for provision of immediately needed health care for an emergent condition.
  • Include these codes as defined in http://terminology.hl7.org/CodeSystem/v3-ActCode icon
    NOAUTH iconno disclosure without subject authorizationProhibition on disclosure without information subject's authorization.
    DELAU icondelete after useCustodian system must remove target information from access after use.
    NORDSCLCD iconno redisclosure without consent directiveProhibition on redisclosure without patient consent directive.


See the full registry of value sets defined as part of FHIR.

Explanation of the columns that may appear on this page:

LvlA few code lists that FHIR defines are hierarchical - each code is assigned a level. For value sets, levels are mostly used to organize codes for user convenience, but may follow code system hierarchy - see Code System for further information
SourceThe source of the definition of the code (when the value set draws in codes defined elsewhere)
CodeThe code (used as the code in the resource instance). If the code is in italics, this indicates that the code is not selectable ('Abstract')
DisplayThe display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application
DefinitionAn explanation of the meaning of the concept
CommentsAdditional notes about how to use the code