This page is part of the FHIR Specification (v0.11: DSTU 1 Ballot 3). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions

Codes defined in http://hl7.org/fhir/object-role

Code representing the functional application role of Participant Object being audited

Formal value Set definition (identifier http://hl7.org/fhir/vs/object-role): XML or JSON.

This value set defines its own codes:

SecurityEventObjectRole

Code representing the functional application role of Participant Object being audited

This value set defines it's own terms in the system http://hl7.org/fhir/object-role

CodeDisplayDefinition
1PatientThis object is the patient that is the subject of care related to this event. It is identifiable by patient ID or equivalent. The patient may be either human or animal.
2LocationThis is a location identified as related to the event. This is usually the location where the event took place. Note that for shipping, the usual events are arrival at a location or departure from a location.
3ReportThis object is any kind of persistent document created as a result of the event. This could be a paper report, film, electronic report, DICOM Study, etc. Issues related to medical records life cycle management are conveyed elsewhere.
4ResourceA logical object related to the event. (Deprecated).
5Master fileThis is any configurable file used to control creation of documents. Examples include the objects maintained by the HL7 Master File transactions, Value Sets, etc.
6UserA human participant not otherwise identified by some other category.
7List(deprecated).
8DoctorTypically a licensed person who is providing or performing care related to the event, generally a physician. The key distinction between doctor and practitioner is with regards to their role, not the licensing. The doctor is the human who actually performed the work. The practitioner is the human or organization that is responsible for the work.
9SubscriberA person or system that is being notified as part of the event. This is relevant in situations where automated systems provide notifications to other parties when an event took place.
10GuarantorInsurance company, or any other organization who accepts responsibility for paying for the healthcare event.
11Security User EntityA person or active system object involved in the event with a security role.
12Security User GroupA person or system object involved in the event with the authority to modify security roles of other objects.
13Security ResourceA passive object, such as a role table, that is relevant to the event.
14Security Granularity Definition(deprecated) Relevant to certain RBAC security methodologies.
15PractitionerAny person or organization responsible for providing care. This encompasses all forms of care, licensed or otherwise, and all sorts of teams and care groups. Note, the distinction between practitioners and the doctor that actually provided the care to the patient.
16Data DestinationThe source or destination for data transfer, when it does not match some other role.
17Data RepositoryA source or destination for data transfer, that acts as an archive, database, or similar role.
18ScheduleAn object that holds schedule information. This could be an appointment book, availability information, etc.
19CustomerAn organization or person that is the recipient of services. This could be an organization that is buying services for a patient, or a person that is buying services for an animal.
20JobAn order, task, work item, procedure step, or other description of work to be performed. E.g., a particular instance of an MPPS.
21Job StreamA list of jobs or a system that provides lists of jobs. E.g., an MWL SCP.
22Table(Deprecated).
23Routing CriteriaAn object that specifies or controls the routing or delivery of items. For example, a distribution list is the routing criteria for mail. The items delivered may be documents, jobs, or other objects.
24QueryThe contents of a query. This is used to capture the contents of any kind of query. For security surveillance purposes knowing the queries being made is very important.

These codes are used in the following places:

See the full registry of codes defined as part of FHIR.

The OID for the value set is 2.16.840.1.113883.4.642.2.167 (and the OID for the implicit code system is 2.16.840.1.113883.4.642.1.167) (OIDs are not used in FHIR, but may be used in v3, or OID based terminology systems).


Explanation of the columns that may appear on this page:

IdThe internal identifier for the concept (when the value set defines its own codes)
LevelA few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies
SourceThe source of the definition of the code (when the value set draws in codes defined elsewhere)
CodeThe code (used as the code in the resource instance)
DisplayThe display (used in the display element of a Coding)
DefinitionAn explanation of the meaning of the concept
CommentsAdditional notes about how to use the code