URL | http://hl7.org/fhir/5.0/StructureDefinition/extension-Permission.rule.data.security |
Version | |
Status | active |
Description | Cross-Version Extension for Permission.rule.data.security. Valid in versions R2, R3, R4, R4B This is a valid cross-version extension because it's counted as a new element |
Context of Use
This extension may be used in the following contexts:
Name | Flags | Card. | Type | Description & Constraints![]() |
---|---|---|---|---|
![]() ![]() | 0..* | Extension | Security tag code on .meta.security | |
![]() ![]() ![]() | ..0 | |||
![]() ![]() ![]() | 1.. | Coding | ||
![]() ![]() ![]() | "http://hl7.org/fhir/5.0/StructureDefinition/extension-Permission.rule.data.security" | |||
![]() |
{ "resourceType" : "StructureDefinition", "id" : "xv-r5-perm.rul.dat.security", "url" : "http://hl7.org/fhir/5.0/StructureDefinition/extension-Permission.rule.data.security", "name" : "XVerExtensionPermission.rule.data.securityR5", "title" : "Cross-Version Extension for Permission.rule.data.security in R5", "status" : "active", "experimental" : false, "publisher" : "Health Level Seven International (Security)", "contact" : [{ "telecom" : [{ "system" : "url", "value" : "http://hl7.org/fhir" }] }, { "telecom" : [{ "system" : "url", "value" : "http://www.hl7.org/Special/committees/secure/index.cfm" }] }], "description" : "Cross-Version Extension for Permission.rule.data.security. Valid in versions R2, R3, R4, R4B\r\n\r\nThis is a valid cross-version extension because it's counted as a new element", "jurisdiction" : [{ "coding" : [{ "system" : "http://unstats.un.org/unsd/methods/m49/m49.htm", "code" : "001" }] }], "fhirVersion" : "5.0.0", "kind" : "complex-type", "abstract" : false, "context" : [{ "type" : "extension", "expression" : "http://hl7.org/fhir/5.0/StructureDefinition/extension-Permission.rule.data" }, { "type" : "extension", "expression" : "http://hl7.org/fhir/5.0/StructureDefinition/extension-Permission.rule.data" }, { "type" : "extension", "expression" : "http://hl7.org/fhir/5.0/StructureDefinition/extension-Permission.rule.data" }, { "type" : "extension", "expression" : "http://hl7.org/fhir/5.0/StructureDefinition/extension-Permission.rule.data" }], "type" : "Extension", "baseDefinition" : "http://hl7.org/fhir/StructureDefinition/Extension", "derivation" : "constraint", "differential" : { "element" : [{ "path" : "Extension", "short" : "Security tag code on .meta.security", "definition" : "The data in scope are those with the given codes present in that data .meta.security element.", "comment" : "Note the ConfidentialityCode vocabulary indicates the highest value, thus a security label of \"R\" then it applies to all resources that are labeled \"R\" or lower. E.g. for Confidentiality, it's a high water mark. For other kinds of security labels, subsumption logic applies. When the purpose of use tag is on the data, access request purpose of use shall not conflict.", "min" : 0, "max" : "*", "isModifier" : false, "mapping" : [{ "identity" : "fhirconsent", "map" : "Consent.provision.securityLabel" }] }, { "path" : "Extension.extension", "max" : "0" }, { "path" : "Extension.value[x]", "min" : 1, "type" : [{ "code" : "Coding" }] }, { "path" : "Extension.url", "fixedUri" : "http://hl7.org/fhir/5.0/StructureDefinition/extension-Permission.rule.data.security" }] } }