{ "description": "Base StructureDefinition for AuditEvent Resource", "_filename": "StructureDefinition-AuditEvent.json", "package_name": "hl7.fhir.r2.examples", "date": "2015-10-24T07:41:03+11:00", "meta": { "lastUpdated": "2015-10-24T07:41:03.495+11:00" }, "publisher": "Health Level Seven International (Security)", "fhirVersion": "1.0.2", "name": "AuditEvent", "mapping": [ { "uri": "http://nema.org/dicom", "name": "DICOM", "identity": "dicom" }, { "uri": "http://hl7.org/v3", "name": "RIM", "identity": "rim" }, { "uri": "http://hl7.org/fhir/w5", "name": "W5 Mapping", "identity": "w5" }, { "uri": "http://www.w3.org/ns/prov", "name": "W3C PROV", "identity": "w3c.prov" }, { "uri": "http://hl7.org/fhir/provenance", "name": "FHIR Provenance", "identity": "fhirprovenance" } ], "abstract": false, "type": null, "experimental": null, "resourceType": "StructureDefinition", "title": null, "package_version": "1.0.2", "extension": [ { "url": "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm", "valueInteger": 2 } ], "snapshot": { "element": [ { "max": "*", "min": 0, "path": "AuditEvent", "type": [ { "code": "DomainResource" } ], "short": "Event record kept for security purposes", "mapping": [ { "map": "Message", "identity": "dicom" }, { "map": "ControlAct[moodCode=EVN]", "identity": "rim" }, { "map": "infrastructure.information", "identity": "w5" } ], "comments": "Based on ATNA (RFC 3881).", "definition": "A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage." }, { "max": "1", "min": 0, "path": "AuditEvent.id", "type": [ { "code": "id" } ], "short": "Logical id of this artifact", "comments": "The only time that a resource does not have an id is when it is being submitted to the server using a create operation. Bundles always have an id, though it is usually a generated UUID.", "isSummary": true, "definition": "The logical id of the resource, as used in the URL for the resource. Once assigned, this value never changes." }, { "max": "1", "min": 0, "path": "AuditEvent.meta", "type": [ { "code": "Meta" } ], "short": "Metadata about the resource", "isSummary": true, "definition": "The metadata about the resource. This is content that is maintained by the infrastructure. Changes to the content may not always be associated with version changes to the resource." }, { "path": "AuditEvent.implicitRules", "min": 0, "definition": "A reference to a set of rules that were followed when the resource was constructed, and which must be understood when processing the content.", "isModifier": true, "short": "A set of rules under which this content was created", "comments": "Asserting this rule set restricts the content to be only understood by a limited set of trading partners. This inherently limits the usefulness of the data in the long term. However, the existing health eco-system is highly fractured, and not yet ready to define, collect, and exchange data in a generally computable sense. Wherever possible, implementers and/or specification writers should avoid using this element as much as possible.", "type": [ { "code": "uri" } ], "max": "1", "isSummary": true }, { "max": "1", "min": 0, "path": "AuditEvent.language", "type": [ { "code": "code" } ], "short": "Language of the resource content", "binding": { "strength": "required", "description": "A human language.", "valueSetUri": "http://tools.ietf.org/html/bcp47" }, "comments": "Language is provided to support indexing and accessibility (typically, services such as text to speech use the language tag). The html language tag in the narrative applies to the narrative. The language tag on the resource may be used to specify the language of other presentations generated from the data in the resource Not all the content has to be in the base language. The Resource.language should not be assumed to apply to the narrative automatically. If a language is specified, it should it also be specified on the div element in the html (see rules in HTML5 for information about the relationship between xml:lang and the html lang attribute).", "definition": "The base language in which the resource is written." }, { "path": "AuditEvent.text", "min": 0, "definition": "A human-readable narrative that contains a summary of the resource, and may be used to represent the content of the resource to a human. The narrative need not encode all the structured data, but is required to contain sufficient detail to make it \"clinically safe\" for a human to just read the narrative. Resource definitions may define what content should be represented in the narrative to ensure clinical safety.", "short": "Text summary of the resource, for human interpretation", "comments": "Contained resources do not have narrative. Resources that are not contained SHOULD have a narrative.", "mapping": [ { "map": "Act.text?", "identity": "rim" } ], "type": [ { "code": "Narrative" } ], "alias": [ "narrative", "html", "xhtml", "display" ], "max": "1", "condition": [ "dom-1" ] }, { "path": "AuditEvent.contained", "min": 0, "definition": "These resources do not have an independent existence apart from the resource that contains them - they cannot be identified independently, and nor can they have their own independent transaction scope.", "short": "Contained, inline Resources", "comments": "This should never be done when the content can be identified properly, as once identification is lost, it is extremely difficult (and context dependent) to restore it again.", "mapping": [ { "map": "N/A", "identity": "rim" } ], "type": [ { "code": "Resource" } ], "alias": [ "inline resources", "anonymous resources", "contained resources" ], "max": "*" }, { "path": "AuditEvent.extension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the resource. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.", "short": "Additional Content defined by implementations", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "N/A", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content" ], "max": "*" }, { "path": "AuditEvent.modifierExtension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the resource, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.", "isModifier": true, "short": "Extensions that cannot be ignored", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "N/A", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content" ], "max": "*" }, { "max": "1", "min": 1, "path": "AuditEvent.event", "type": [ { "code": "BackboneElement" } ], "short": "What was done", "mapping": [ { "map": "Activity", "identity": "w3c.prov" }, { "map": "EventIdentification", "identity": "dicom" }, { "map": "N/A (no nesting in v3)", "identity": "rim" } ], "definition": "Identifies the name, action type, time, and disposition of the audited event.", "requirements": "The event must be identified." }, { "max": "1", "min": 0, "path": "AuditEvent.event.id", "type": [ { "code": "id" } ], "short": "xml:id (or equivalent in JSON)", "mapping": [ { "map": "n/a", "identity": "rim" } ], "definition": "unique id for the element within a resource (for internal references).", "representation": [ "xmlAttr" ] }, { "path": "AuditEvent.event.extension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.", "short": "Additional Content defined by implementations", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "n/a", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content" ], "max": "*" }, { "path": "AuditEvent.event.modifierExtension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.", "isModifier": true, "short": "Extensions that cannot be ignored", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "N/A", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content", "modifiers" ], "max": "*" }, { "path": "AuditEvent.event.type", "requirements": "This identifies the performed function. For \"Execute\" Event Action Code audit records, this identifies the application function performed.", "min": 1, "definition": "Identifier for a family of the event. For example, a menu item, program, rule, policy, function code, application name or URL. It identifies the performed function.", "short": "Type/identifier of event", "mapping": [ { "map": "EventId", "identity": "dicom" }, { "map": ".code (type, subtype and action are pre-coordinated or sent as translations)", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Type of event.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-event-type" } }, "max": "1", "isSummary": true }, { "path": "AuditEvent.event.subtype", "requirements": "This field enables queries of messages by implementation-defined event categories.", "min": 0, "definition": "Identifier for the category of event.", "short": "More specific type/id for the event", "mapping": [ { "map": "EventTypeCode", "identity": "dicom" }, { "map": ".code (type, subtype and action are pre-coordinated or sent as translations)", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Sub-type of event.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-event-sub-type" } }, "max": "*", "isSummary": true }, { "path": "AuditEvent.event.action", "requirements": "This broadly indicates what kind of action was done on the Participant Object.", "min": 0, "definition": "Indicator for type of action performed during the event that generated the audit.", "short": "Type of action performed during the event", "mapping": [ { "map": "EventActionCode", "identity": "dicom" }, { "map": ".code (type, subtype and action are pre-coordinated or sent as translations)", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "code" } ], "binding": { "strength": "required", "description": "Indicator for type of action performed during the event that generated the audit.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-event-action" } }, "max": "1", "isSummary": true }, { "path": "AuditEvent.event.dateTime", "requirements": "This ties an event to a specific date and time. Security audits typically require a consistent time base (e.g. UTC), to eliminate time-zone issues arising from geographical distribution.", "min": 1, "definition": "The time when the event occurred on the source.", "short": "Time when the event occurred on source", "comments": "In a distributed system, some sort of common time base (e.g. an NTP [RFC1305] server) is a good implementation tactic.", "mapping": [ { "map": "Provenance.recorded", "identity": "fhirprovenance" }, { "map": "Activity.when", "identity": "w3c.prov" }, { "map": "EventDateTime", "identity": "dicom" }, { "map": ".effectiveTime", "identity": "rim" }, { "map": "when.recorded", "identity": "w5" } ], "type": [ { "code": "instant" } ], "max": "1", "isSummary": true }, { "path": "AuditEvent.event.outcome", "min": 0, "definition": "Indicates whether the event succeeded or failed.", "short": "Whether the event succeeded or failed", "comments": "In some cases a \"success\" may be partial, for example, an incomplete or interrupted transfer of a radiological study. For the purpose of establishing accountability, these distinctions are not relevant.", "mapping": [ { "map": "EventOutcomeIndicator", "identity": "dicom" }, { "map": ".actionNegationInd", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "code" } ], "binding": { "strength": "required", "description": "Indicates whether the event succeeded or failed", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-event-outcome" } }, "max": "1", "isSummary": true }, { "max": "1", "min": 0, "path": "AuditEvent.event.outcomeDesc", "type": [ { "code": "string" } ], "short": "Description of the event outcome", "mapping": [ { "map": "EventOutcomeDescription", "identity": "dicom" }, { "map": ".outboundRelationship[typeCode=OUT].target.text", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "isSummary": true, "definition": "A free text description of the outcome of the event." }, { "path": "AuditEvent.event.purposeOfEvent", "min": 0, "definition": "The purposeOfUse (reason) that was used during the event being recorded.", "short": "The purposeOfUse of the event", "comments": "Use participant.purposeOfUse when you know that is specific to the participant, otherwise use event.purposeOfEvent. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why.", "mapping": [ { "map": "Provenance.reason, Provenance.activity", "identity": "fhirprovenance" }, { "map": "Activity.Activity", "identity": "w3c.prov" }, { "map": "EventPurposeOfUse", "identity": "dicom" }, { "map": "* .reasonCode [ControlActReason when Act.class = CACT Control Act] *.outboundRelationship[typeCode=RSON].target", "identity": "rim" }, { "map": "why", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "The reason the activity took place.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/v3-PurposeOfUse" } }, "max": "*", "isSummary": true }, { "path": "AuditEvent.participant", "requirements": "The event has one or more active participants.", "min": 1, "definition": "A person, a hardware device or software process.", "short": "A person, a hardware device or software process", "comments": "There may be more than one user per event, for example, in cases of actions initiated by one user for other users, or in events that involve more than one user, hardware device, or system process. However, only one user may be the initiator/requestor for the event.", "mapping": [ { "map": "Provenance.agent", "identity": "fhirprovenance" }, { "map": "Agent", "identity": "w3c.prov" }, { "map": "ActiveParticipant", "identity": "dicom" }, { "map": ".participation", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "BackboneElement" } ], "max": "*" }, { "max": "1", "min": 0, "path": "AuditEvent.participant.id", "type": [ { "code": "id" } ], "short": "xml:id (or equivalent in JSON)", "mapping": [ { "map": "n/a", "identity": "rim" } ], "definition": "unique id for the element within a resource (for internal references).", "representation": [ "xmlAttr" ] }, { "path": "AuditEvent.participant.extension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.", "short": "Additional Content defined by implementations", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "n/a", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content" ], "max": "*" }, { "path": "AuditEvent.participant.modifierExtension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.", "isModifier": true, "short": "Extensions that cannot be ignored", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "N/A", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content", "modifiers" ], "max": "*" }, { "path": "AuditEvent.participant.role", "requirements": "This value ties an audited event to a user's role(s). It is an optional value that might be used to group events for analysis by user functional role categories.", "min": 0, "definition": "Specification of the role(s) the user plays when performing the event. Usually the codes used in this element are local codes defined by the role-based access control security system used in the local context.", "short": "User roles (e.g. local RBAC codes)", "mapping": [ { "map": "Provenance.agent.role", "identity": "fhirprovenance" }, { "map": "Agent.Attribution", "identity": "w3c.prov" }, { "map": "RoleIdCode", "identity": "dicom" }, { "map": ".typeCode and/or .functionCode", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "CodeableConcept" } ], "binding": { "strength": "extensible", "description": "Role(s) the user plays (from RBAC).", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/dicm-402-roleid" } }, "max": "*" }, { "path": "AuditEvent.participant.reference", "requirements": "This field ties an audit event to a specific resource.", "min": 0, "definition": "Direct reference to a resource that identifies the participant.", "short": "Direct reference to resource", "mapping": [ { "map": "Provenance.agent.actor", "identity": "fhirprovenance" }, { "map": "Agent.Identity", "identity": "w3c.prov" }, { "map": ".role", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Practitioner" ] }, { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Organization" ] }, { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Device" ] }, { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Patient" ] }, { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/RelatedPerson" ] } ], "max": "1", "isSummary": true }, { "path": "AuditEvent.participant.userId", "requirements": "This field ties an audit event to a specific user.", "min": 0, "definition": "Unique identifier for the user actively participating in the event.", "short": "Unique identifier for the user", "comments": "a unique value within the Audit Source ID. For node-based authentication -- where only the system hardware or process, but not a human user, is identified -- User ID would be the node name.", "mapping": [ { "map": "Provenance.agent.userId", "identity": "fhirprovenance" }, { "map": "Agent.Identity", "identity": "w3c.prov" }, { "map": "UserId", "identity": "dicom" }, { "map": ".id", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "Identifier" } ], "max": "1", "isSummary": true }, { "max": "1", "min": 0, "path": "AuditEvent.participant.altId", "type": [ { "code": "string" } ], "short": "Alternative User id e.g. authentication", "mapping": [ { "map": "Agent.Identity", "identity": "w3c.prov" }, { "map": "AlternativeUserId", "identity": "dicom" }, { "map": ".id (distinguish id type by root)", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "definition": "Alternative Participant Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g. single sign-on), if available.", "requirements": "In some situations a human user may authenticate with one identity but, to access a specific application system, may use a synonymous identify. For example, some \"single sign on\" implementations will do this. The alternative identifier would then be the original identify used for authentication, and the User ID is the one known to and used by the application." }, { "max": "1", "min": 0, "path": "AuditEvent.participant.name", "type": [ { "code": "string" } ], "short": "Human-meaningful name for the user", "mapping": [ { "map": "Agent.Identity", "identity": "w3c.prov" }, { "map": "UserName", "identity": "dicom" }, { "map": ".name", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "definition": "Human-meaningful name for the user.", "requirements": "The User ID and Authorization User ID may be internal or otherwise obscure values. This field assists the auditor in identifying the actual user." }, { "path": "AuditEvent.participant.requestor", "requirements": "This value is used to distinguish between requestor-users and recipient-users. For example, one person may initiate a report-output to be sent to another user.", "min": 1, "definition": "Indicator that the user is or is not the requestor, or initiator, for the event being audited.", "short": "Whether user is initiator", "comments": "There can only be one initiator. If the initiator is not clear, then do not choose any one participant as the initiator.", "mapping": [ { "map": "UserIsRequestor", "identity": "dicom" }, { "map": "If participation.typeCode was author, then true", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "boolean" } ], "max": "1" }, { "max": "1", "min": 0, "path": "AuditEvent.participant.location", "type": [ { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Location" ] } ], "short": "Where", "mapping": [ { "map": "Provenance.location", "identity": "fhirprovenance" }, { "map": "Activity.location", "identity": "w3c.prov" }, { "map": "* Role.Class =SDLOC *Role.Code = ServiceDeliveryLocationRoleType *Entity.Code = PlaceEntityType = df.Types of places for Entity.Class = PLC *EntityClass = PLC = df.A physical place or site with its containing structure. May be natural or man-made. The geographic position of a place may or may not be constant.", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "definition": "Where the event occurred." }, { "path": "AuditEvent.participant.policy", "requirements": "This value is used retrospectively to determine the authorization policies.", "min": 0, "definition": "The policy or plan that authorized the activity being recorded. Typically, a single activity may have multiple applicable policies, such as patient consent, guarantor funding, etc. The policy would also indicate the security token used.", "short": "Policy that authorized event", "comments": "For example: Where an OAuth token authorizes, the unique identifier from the OAuth token is placed into the policy element Where a policy engine (e.g. XACML) holds policy logic, the unique policy identifier is placed into the policy element.", "mapping": [ { "map": "Provenance.policy", "identity": "fhirprovenance" }, { "map": "ParticipantRoleIDCode", "identity": "dicom" }, { "map": "ActPolicyType", "identity": "rim" }, { "map": "why", "identity": "w5" } ], "type": [ { "code": "uri" } ], "max": "*" }, { "path": "AuditEvent.participant.media", "requirements": "Usually, this is used instead of specifying a network address. This field is not used for Media Id (i.e. the serial number of a CD).", "min": 0, "definition": "Type of media involved. Used when the event is about exporting/importing onto media.", "short": "Type of media", "mapping": [ { "map": "MediaType", "identity": "dicom" }, { "map": ".player.description.mediaType", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Used when the event is about exporting/importing onto media.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/dicm-405-mediatype" } }, "max": "1" }, { "max": "1", "min": 0, "path": "AuditEvent.participant.network", "type": [ { "code": "BackboneElement" } ], "short": "Logical network location for application activity", "mapping": [ { "map": ".player.description.reference", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "definition": "Logical network location for application activity, if the activity has a network location." }, { "max": "1", "min": 0, "path": "AuditEvent.participant.network.id", "type": [ { "code": "id" } ], "short": "xml:id (or equivalent in JSON)", "mapping": [ { "map": "n/a", "identity": "rim" } ], "definition": "unique id for the element within a resource (for internal references).", "representation": [ "xmlAttr" ] }, { "path": "AuditEvent.participant.network.extension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.", "short": "Additional Content defined by implementations", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "n/a", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content" ], "max": "*" }, { "path": "AuditEvent.participant.network.modifierExtension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.", "isModifier": true, "short": "Extensions that cannot be ignored", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "N/A", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content", "modifiers" ], "max": "*" }, { "path": "AuditEvent.participant.network.address", "requirements": "This datum identifies the user's network access point, which may be distinct from the server that performed the action. It is an optional value that may be used to group events recorded on separate servers for analysis of a specific network access point's data access across all servers.", "min": 0, "definition": "An identifier for the network access point of the user device for the audit event.", "short": "Identifier for the network access point of the user device", "comments": "This could be a device id, IP address or some other identifier associated with a device.", "mapping": [ { "map": "Agent.Location", "identity": "w3c.prov" }, { "map": "NetworkAccessPointID", "identity": "dicom" }, { "map": "pre-coordinated into URL", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "type": [ { "code": "string" } ], "max": "1" }, { "path": "AuditEvent.participant.network.type", "requirements": "This datum identifies the type of network access point identifier of the user device for the audit event. It is an optional value that may be used to group events recorded on separate servers for analysis of access according to a network access point's type.", "min": 0, "definition": "An identifier for the type of network access point that originated the audit event.", "short": "The type of network access point", "mapping": [ { "map": "NetworkAccessPointTypeCode", "identity": "dicom" }, { "map": "pre-coordinated into URL", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "type": [ { "code": "code" } ], "binding": { "strength": "required", "description": "The type of network access point of this participant in the audit event", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/network-type" } }, "max": "1" }, { "path": "AuditEvent.participant.purposeOfUse", "min": 0, "definition": "The reason (purpose of use), specific to this participant, that was used during the event being recorded.", "short": "Reason given for this user", "comments": "Use participant.purposeOfUse when you know that is specific to the participant, otherwise use event.purposeOfEvent. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why.", "mapping": [ { "map": "Agent.Activity", "identity": "w3c.prov" }, { "map": "*.reasonCode [ActHealthInformationPurposeOfUseReason codes/v:PurposeOfUse (2.16.840.1.113883.1.11.20448) * .outboundRelationship[typeCode=RSON or SUBJ].target", "identity": "rim" }, { "map": "why", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "The reason the activity took place.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/v3-PurposeOfUse" } }, "max": "*" }, { "path": "AuditEvent.source", "requirements": "The event is reported by one source.", "min": 1, "definition": "Application systems and processes.", "short": "Application systems and processes", "comments": "Since multi-tier, distributed, or composite applications make source identification ambiguous, this collection of fields may repeat for each application or process actively involved in the event. For example, multiple value-sets can identify participating web servers, application processes, and database server threads in an n-tier distributed application. Passive event participants (e.g. low-level network transports) need not be identified.", "mapping": [ { "map": "AuditSourceIdentification", "identity": "dicom" }, { "map": ".participation[typeCode=INF].role[classCode=ASSIGN].player[classCode=DEV, determinerCode=INSTANCE]", "identity": "rim" }, { "map": "who.witness", "identity": "w5" } ], "type": [ { "code": "BackboneElement" } ], "max": "1" }, { "max": "1", "min": 0, "path": "AuditEvent.source.id", "type": [ { "code": "id" } ], "short": "xml:id (or equivalent in JSON)", "mapping": [ { "map": "n/a", "identity": "rim" } ], "definition": "unique id for the element within a resource (for internal references).", "representation": [ "xmlAttr" ] }, { "path": "AuditEvent.source.extension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.", "short": "Additional Content defined by implementations", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "n/a", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content" ], "max": "*" }, { "path": "AuditEvent.source.modifierExtension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.", "isModifier": true, "short": "Extensions that cannot be ignored", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "N/A", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content", "modifiers" ], "max": "*" }, { "max": "1", "min": 0, "path": "AuditEvent.source.site", "type": [ { "code": "string" } ], "short": "Logical source location within the enterprise", "mapping": [ { "map": "AuditEnterpriseSiteId", "identity": "dicom" }, { "map": ".scopedRole[classCode=LOCE].player.desc", "identity": "rim" }, { "map": "who.witness", "identity": "w5" } ], "definition": "Logical source location within the healthcare enterprise network. For example, a hospital or other provider location within a multi-entity provider group.", "requirements": "This value differentiates among the sites in a multi-site enterprise health information system." }, { "path": "AuditEvent.source.identifier", "requirements": "This field ties the event to a specific source system. It may be used to group events for analysis according to where the event was detected.", "min": 1, "definition": "Identifier of the source where the event was detected.", "short": "The identity of source detecting the event", "mapping": [ { "map": "AuditSourceId", "identity": "dicom" }, { "map": ".id", "identity": "rim" }, { "map": "who.witness", "identity": "w5" } ], "type": [ { "code": "Identifier" } ], "max": "1", "isSummary": true }, { "path": "AuditEvent.source.type", "requirements": "This field indicates which type of source is identified by the Audit Source ID. It is an optional value that may be used to group events for analysis according to the type of source where the event occurred.", "min": 0, "definition": "Code specifying the type of source where event originated.", "short": "The type of source where event originated", "mapping": [ { "map": "AuditSourceTypeCode", "identity": "dicom" }, { "map": ".code", "identity": "rim" }, { "map": "who.witness", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Code specifying the type of system that detected and recorded the event.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-source-type" } }, "max": "*" }, { "constraint": [ { "key": "sev-1", "human": "Either a name or a query (NOT both)", "xpath": "not(exists(f:name)) or not(exists(f:query))", "severity": "error" } ], "path": "AuditEvent.object", "requirements": "The event may have other objects involved.", "min": 0, "definition": "Specific instances of data or objects that have been accessed.", "short": "Specific instances of data or objects that have been accessed", "comments": "Required unless the values for Event Identification, Active Participant Identification, and Audit Source Identification are sufficient to document the entire auditable event. Because events may have more than one participant object, this group can be a repeating set of values.", "mapping": [ { "map": "Provenance.target, Provenance.entity", "identity": "fhirprovenance" }, { "map": "Entity", "identity": "w3c.prov" }, { "map": "ParticipantObjectIdentification", "identity": "dicom" }, { "map": ".outboundRelationship[typeCode=SUBJ].target or .participation[typeCode=SBJ].role", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "BackboneElement" } ], "max": "*" }, { "max": "1", "min": 0, "path": "AuditEvent.object.id", "type": [ { "code": "id" } ], "short": "xml:id (or equivalent in JSON)", "mapping": [ { "map": "n/a", "identity": "rim" } ], "definition": "unique id for the element within a resource (for internal references).", "representation": [ "xmlAttr" ] }, { "path": "AuditEvent.object.extension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.", "short": "Additional Content defined by implementations", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "n/a", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content" ], "max": "*" }, { "path": "AuditEvent.object.modifierExtension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.", "isModifier": true, "short": "Extensions that cannot be ignored", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "N/A", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content", "modifiers" ], "max": "*" }, { "path": "AuditEvent.object.identifier", "min": 0, "definition": "Identifies a specific instance of the participant object. The reference should always be version specific.", "short": "Specific instance of object (e.g. versioned)", "comments": "Identifier detail depends on object type.", "mapping": [ { "map": "ParticipantObjectID and ParticipantObjectIDTypeCode", "identity": "dicom" }, { "map": ".id.extension", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "Identifier" } ], "max": "1", "isSummary": true }, { "max": "1", "min": 0, "path": "AuditEvent.object.reference", "type": [ { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Resource" ] } ], "short": "Specific instance of resource (e.g. versioned)", "mapping": [ { "map": "Provenance.target, Provenance.entity.reference", "identity": "fhirprovenance" }, { "map": "ParticipantObjectID", "identity": "dicom" }, { "map": "[self]", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "isSummary": true, "definition": "Identifies a specific instance of the participant object. The reference should always be version specific." }, { "path": "AuditEvent.object.type", "requirements": "To describe the object being acted upon. In addition to queries on the subject of the action in an auditable event, it is also important to be able to query on the object type for the action.", "min": 0, "definition": "The type of the object that was involved in this audit event.", "short": "Type of object involved", "comments": "This value is distinct from the user's role or any user relationship to the participant object.", "mapping": [ { "map": "Provenance.entity.type", "identity": "fhirprovenance" }, { "map": "Entity.type", "identity": "w3c.prov" }, { "map": "ParticipantObjectTypeCode", "identity": "dicom" }, { "map": "[self::Act].code or role.player.code", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Code for the object type involved audited.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/object-type" } }, "max": "1" }, { "path": "AuditEvent.object.role", "requirements": "For some detailed audit analysis it may be necessary to indicate a more granular type of participant, based on the application role it serves.", "min": 0, "definition": "Code representing the functional application role of Participant Object being audited.", "short": "What role the Object played", "comments": "See RFC 3881 for rules concerning matches between role and type.", "mapping": [ { "map": "Entity.role", "identity": "w3c.prov" }, { "map": "ParticipantObjectTypeCodeRole", "identity": "dicom" }, { "map": "role.code (not sure what this would mean for an Act)", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Code representing the role the Object played in the event.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/object-role" } }, "max": "1" }, { "path": "AuditEvent.object.lifecycle", "requirements": "Institutional policies for privacy and security may optionally fall under different accountability rules based on data life cycle. This provides a differentiating value for those cases.", "min": 0, "definition": "Identifier for the data life-cycle stage for the participant object.", "short": "Life-cycle stage for the object", "comments": "This can be used to provide an audit trail for data, over time, as it passes through the system.", "mapping": [ { "map": "Provenance.entity.role", "identity": "fhirprovenance" }, { "map": "Entity.role", "identity": "w3c.prov" }, { "map": "ParticipantObjectDataLifeCycle", "identity": "dicom" }, { "map": "target of ObservationEvent[code=\"lifecycle\"].value", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Identifier for the data life-cycle stage for the object.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/object-lifecycle" } }, "max": "1" }, { "path": "AuditEvent.object.securityLabel", "requirements": "This field identifies the security labels for a specific instance of an object, such as a patient, to detect/track privacy and security issues.", "min": 0, "definition": "Denotes security labels for the identified object.", "short": "Security labels applied to the object", "mapping": [ { "map": "ParticipantObjectSensitivity", "identity": "dicom" }, { "map": ".confidentialityCode", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Security Labels from the Healthcare Privacy and Security Classification System.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/security-labels" } }, "max": "*" }, { "path": "AuditEvent.object.name", "min": 0, "definition": "An instance-specific descriptor of the Participant Object ID audited, such as a person's name.", "short": "Instance-specific descriptor for Object", "comments": "This field may be used in a query/report to identify audit events for a specific person. For example, where multiple synonymous Participant Object IDs (patient number, medical record number, encounter number, etc.) have been used.", "mapping": [ { "map": "Entity.Label", "identity": "w3c.prov" }, { "map": "ParticipantObjectName", "identity": "dicom" }, { "map": ".title", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "string" } ], "max": "1", "condition": [ "sev-1" ], "isSummary": true }, { "max": "1", "min": 0, "path": "AuditEvent.object.description", "type": [ { "code": "string" } ], "short": "Descriptive text", "mapping": [ { "map": "ParticipantObjectDescription", "identity": "dicom" }, { "map": ".text", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "definition": "Text that describes the object in more detail." }, { "path": "AuditEvent.object.query", "requirements": "For query events it may be necessary to capture the actual query input to the query process in order to identify the specific event. Because of differences among query implementations and data encoding for them, this is a base 64 encoded data blob. It may be subsequently decoded or interpreted by downstream audit analysis processing.", "min": 0, "definition": "The actual query for a query-type participant object.", "short": "Actual query for object", "mapping": [ { "map": "ParticipantObjectQuery", "identity": "dicom" }, { "map": "No mapping", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "base64Binary" } ], "max": "1", "condition": [ "sev-1" ], "isSummary": true }, { "max": "*", "min": 0, "path": "AuditEvent.object.detail", "type": [ { "code": "BackboneElement" } ], "short": "Additional Information about the Object", "mapping": [ { "map": "ParticipantObjectDetail", "identity": "dicom" }, { "map": ".inboundRelationship[typeCode=SUBJ].target[classCode=OBS, moodCode=EVN]", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "definition": "Additional Information about the Object." }, { "max": "1", "min": 0, "path": "AuditEvent.object.detail.id", "type": [ { "code": "id" } ], "short": "xml:id (or equivalent in JSON)", "mapping": [ { "map": "n/a", "identity": "rim" } ], "definition": "unique id for the element within a resource (for internal references).", "representation": [ "xmlAttr" ] }, { "path": "AuditEvent.object.detail.extension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.", "short": "Additional Content defined by implementations", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "n/a", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content" ], "max": "*" }, { "path": "AuditEvent.object.detail.modifierExtension", "min": 0, "definition": "May be used to represent additional information that is not part of the basic definition of the element, and that modifies the understanding of the element that contains it. Usually modifier elements provide negation or qualification. In order to make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions.", "isModifier": true, "short": "Extensions that cannot be ignored", "comments": "There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.", "mapping": [ { "map": "N/A", "identity": "rim" } ], "type": [ { "code": "Extension" } ], "alias": [ "extensions", "user content", "modifiers" ], "max": "*" }, { "max": "1", "min": 1, "path": "AuditEvent.object.detail.type", "type": [ { "code": "string" } ], "short": "Name of the property", "mapping": [ { "map": "ParticipantObjectDetail.type", "identity": "dicom" }, { "map": ".code", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "definition": "Name of the property." }, { "max": "1", "min": 1, "path": "AuditEvent.object.detail.value", "type": [ { "code": "base64Binary" } ], "short": "Property value", "mapping": [ { "map": "ParticipantObjectDetail.value", "identity": "dicom" }, { "map": ".value", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "definition": "Property value." } ] }, "status": "draft", "id": "6d0a6c6a-aec9-4322-b989-4697182391df", "kind": "resource", "url": "http://hl7.org/fhir/StructureDefinition/AuditEvent", "base": "http://hl7.org/fhir/StructureDefinition/DomainResource", "version": null, "differential": { "element": [ { "max": "*", "min": 0, "path": "AuditEvent", "type": [ { "code": "DomainResource" } ], "short": "Event record kept for security purposes", "mapping": [ { "map": "Message", "identity": "dicom" }, { "map": "ControlAct[moodCode=EVN]", "identity": "rim" }, { "map": "infrastructure.information", "identity": "w5" } ], "comments": "Based on ATNA (RFC 3881).", "definition": "A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage." }, { "max": "1", "min": 1, "path": "AuditEvent.event", "type": [ { "code": "BackboneElement" } ], "short": "What was done", "mapping": [ { "map": "Activity", "identity": "w3c.prov" }, { "map": "EventIdentification", "identity": "dicom" }, { "map": "N/A (no nesting in v3)", "identity": "rim" } ], "definition": "Identifies the name, action type, time, and disposition of the audited event.", "requirements": "The event must be identified." }, { "path": "AuditEvent.event.type", "requirements": "This identifies the performed function. For \"Execute\" Event Action Code audit records, this identifies the application function performed.", "min": 1, "definition": "Identifier for a family of the event. For example, a menu item, program, rule, policy, function code, application name or URL. It identifies the performed function.", "short": "Type/identifier of event", "mapping": [ { "map": "EventId", "identity": "dicom" }, { "map": ".code (type, subtype and action are pre-coordinated or sent as translations)", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Type of event.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-event-type" } }, "max": "1", "isSummary": true }, { "path": "AuditEvent.event.subtype", "requirements": "This field enables queries of messages by implementation-defined event categories.", "min": 0, "definition": "Identifier for the category of event.", "short": "More specific type/id for the event", "mapping": [ { "map": "EventTypeCode", "identity": "dicom" }, { "map": ".code (type, subtype and action are pre-coordinated or sent as translations)", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Sub-type of event.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-event-sub-type" } }, "max": "*", "isSummary": true }, { "path": "AuditEvent.event.action", "requirements": "This broadly indicates what kind of action was done on the Participant Object.", "min": 0, "definition": "Indicator for type of action performed during the event that generated the audit.", "short": "Type of action performed during the event", "mapping": [ { "map": "EventActionCode", "identity": "dicom" }, { "map": ".code (type, subtype and action are pre-coordinated or sent as translations)", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "code" } ], "binding": { "strength": "required", "description": "Indicator for type of action performed during the event that generated the audit.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-event-action" } }, "max": "1", "isSummary": true }, { "path": "AuditEvent.event.dateTime", "requirements": "This ties an event to a specific date and time. Security audits typically require a consistent time base (e.g. UTC), to eliminate time-zone issues arising from geographical distribution.", "min": 1, "definition": "The time when the event occurred on the source.", "short": "Time when the event occurred on source", "comments": "In a distributed system, some sort of common time base (e.g. an NTP [RFC1305] server) is a good implementation tactic.", "mapping": [ { "map": "Provenance.recorded", "identity": "fhirprovenance" }, { "map": "Activity.when", "identity": "w3c.prov" }, { "map": "EventDateTime", "identity": "dicom" }, { "map": ".effectiveTime", "identity": "rim" }, { "map": "when.recorded", "identity": "w5" } ], "type": [ { "code": "instant" } ], "max": "1", "isSummary": true }, { "path": "AuditEvent.event.outcome", "min": 0, "definition": "Indicates whether the event succeeded or failed.", "short": "Whether the event succeeded or failed", "comments": "In some cases a \"success\" may be partial, for example, an incomplete or interrupted transfer of a radiological study. For the purpose of establishing accountability, these distinctions are not relevant.", "mapping": [ { "map": "EventOutcomeIndicator", "identity": "dicom" }, { "map": ".actionNegationInd", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "code" } ], "binding": { "strength": "required", "description": "Indicates whether the event succeeded or failed", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-event-outcome" } }, "max": "1", "isSummary": true }, { "max": "1", "min": 0, "path": "AuditEvent.event.outcomeDesc", "type": [ { "code": "string" } ], "short": "Description of the event outcome", "mapping": [ { "map": "EventOutcomeDescription", "identity": "dicom" }, { "map": ".outboundRelationship[typeCode=OUT].target.text", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "isSummary": true, "definition": "A free text description of the outcome of the event." }, { "path": "AuditEvent.event.purposeOfEvent", "min": 0, "definition": "The purposeOfUse (reason) that was used during the event being recorded.", "short": "The purposeOfUse of the event", "comments": "Use participant.purposeOfUse when you know that is specific to the participant, otherwise use event.purposeOfEvent. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why.", "mapping": [ { "map": "Provenance.reason, Provenance.activity", "identity": "fhirprovenance" }, { "map": "Activity.Activity", "identity": "w3c.prov" }, { "map": "EventPurposeOfUse", "identity": "dicom" }, { "map": "* .reasonCode [ControlActReason when Act.class = CACT Control Act] *.outboundRelationship[typeCode=RSON].target", "identity": "rim" }, { "map": "why", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "The reason the activity took place.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/v3-PurposeOfUse" } }, "max": "*", "isSummary": true }, { "path": "AuditEvent.participant", "requirements": "The event has one or more active participants.", "min": 1, "definition": "A person, a hardware device or software process.", "short": "A person, a hardware device or software process", "comments": "There may be more than one user per event, for example, in cases of actions initiated by one user for other users, or in events that involve more than one user, hardware device, or system process. However, only one user may be the initiator/requestor for the event.", "mapping": [ { "map": "Provenance.agent", "identity": "fhirprovenance" }, { "map": "Agent", "identity": "w3c.prov" }, { "map": "ActiveParticipant", "identity": "dicom" }, { "map": ".participation", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "BackboneElement" } ], "max": "*" }, { "path": "AuditEvent.participant.role", "requirements": "This value ties an audited event to a user's role(s). It is an optional value that might be used to group events for analysis by user functional role categories.", "min": 0, "definition": "Specification of the role(s) the user plays when performing the event. Usually the codes used in this element are local codes defined by the role-based access control security system used in the local context.", "short": "User roles (e.g. local RBAC codes)", "mapping": [ { "map": "Provenance.agent.role", "identity": "fhirprovenance" }, { "map": "Agent.Attribution", "identity": "w3c.prov" }, { "map": "RoleIdCode", "identity": "dicom" }, { "map": ".typeCode and/or .functionCode", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "CodeableConcept" } ], "binding": { "strength": "extensible", "description": "Role(s) the user plays (from RBAC).", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/dicm-402-roleid" } }, "max": "*" }, { "path": "AuditEvent.participant.reference", "requirements": "This field ties an audit event to a specific resource.", "min": 0, "definition": "Direct reference to a resource that identifies the participant.", "short": "Direct reference to resource", "mapping": [ { "map": "Provenance.agent.actor", "identity": "fhirprovenance" }, { "map": "Agent.Identity", "identity": "w3c.prov" }, { "map": ".role", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Practitioner" ] }, { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Organization" ] }, { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Device" ] }, { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Patient" ] }, { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/RelatedPerson" ] } ], "max": "1", "isSummary": true }, { "path": "AuditEvent.participant.userId", "requirements": "This field ties an audit event to a specific user.", "min": 0, "definition": "Unique identifier for the user actively participating in the event.", "short": "Unique identifier for the user", "comments": "a unique value within the Audit Source ID. For node-based authentication -- where only the system hardware or process, but not a human user, is identified -- User ID would be the node name.", "mapping": [ { "map": "Provenance.agent.userId", "identity": "fhirprovenance" }, { "map": "Agent.Identity", "identity": "w3c.prov" }, { "map": "UserId", "identity": "dicom" }, { "map": ".id", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "Identifier" } ], "max": "1", "isSummary": true }, { "max": "1", "min": 0, "path": "AuditEvent.participant.altId", "type": [ { "code": "string" } ], "short": "Alternative User id e.g. authentication", "mapping": [ { "map": "Agent.Identity", "identity": "w3c.prov" }, { "map": "AlternativeUserId", "identity": "dicom" }, { "map": ".id (distinguish id type by root)", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "definition": "Alternative Participant Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g. single sign-on), if available.", "requirements": "In some situations a human user may authenticate with one identity but, to access a specific application system, may use a synonymous identify. For example, some \"single sign on\" implementations will do this. The alternative identifier would then be the original identify used for authentication, and the User ID is the one known to and used by the application." }, { "max": "1", "min": 0, "path": "AuditEvent.participant.name", "type": [ { "code": "string" } ], "short": "Human-meaningful name for the user", "mapping": [ { "map": "Agent.Identity", "identity": "w3c.prov" }, { "map": "UserName", "identity": "dicom" }, { "map": ".name", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "definition": "Human-meaningful name for the user.", "requirements": "The User ID and Authorization User ID may be internal or otherwise obscure values. This field assists the auditor in identifying the actual user." }, { "path": "AuditEvent.participant.requestor", "requirements": "This value is used to distinguish between requestor-users and recipient-users. For example, one person may initiate a report-output to be sent to another user.", "min": 1, "definition": "Indicator that the user is or is not the requestor, or initiator, for the event being audited.", "short": "Whether user is initiator", "comments": "There can only be one initiator. If the initiator is not clear, then do not choose any one participant as the initiator.", "mapping": [ { "map": "UserIsRequestor", "identity": "dicom" }, { "map": "If participation.typeCode was author, then true", "identity": "rim" }, { "map": "who", "identity": "w5" } ], "type": [ { "code": "boolean" } ], "max": "1" }, { "max": "1", "min": 0, "path": "AuditEvent.participant.location", "type": [ { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Location" ] } ], "short": "Where", "mapping": [ { "map": "Provenance.location", "identity": "fhirprovenance" }, { "map": "Activity.location", "identity": "w3c.prov" }, { "map": "* Role.Class =SDLOC *Role.Code = ServiceDeliveryLocationRoleType *Entity.Code = PlaceEntityType = df.Types of places for Entity.Class = PLC *EntityClass = PLC = df.A physical place or site with its containing structure. May be natural or man-made. The geographic position of a place may or may not be constant.", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "definition": "Where the event occurred." }, { "path": "AuditEvent.participant.policy", "requirements": "This value is used retrospectively to determine the authorization policies.", "min": 0, "definition": "The policy or plan that authorized the activity being recorded. Typically, a single activity may have multiple applicable policies, such as patient consent, guarantor funding, etc. The policy would also indicate the security token used.", "short": "Policy that authorized event", "comments": "For example: Where an OAuth token authorizes, the unique identifier from the OAuth token is placed into the policy element Where a policy engine (e.g. XACML) holds policy logic, the unique policy identifier is placed into the policy element.", "mapping": [ { "map": "Provenance.policy", "identity": "fhirprovenance" }, { "map": "ParticipantRoleIDCode", "identity": "dicom" }, { "map": "ActPolicyType", "identity": "rim" }, { "map": "why", "identity": "w5" } ], "type": [ { "code": "uri" } ], "max": "*" }, { "path": "AuditEvent.participant.media", "requirements": "Usually, this is used instead of specifying a network address. This field is not used for Media Id (i.e. the serial number of a CD).", "min": 0, "definition": "Type of media involved. Used when the event is about exporting/importing onto media.", "short": "Type of media", "mapping": [ { "map": "MediaType", "identity": "dicom" }, { "map": ".player.description.mediaType", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Used when the event is about exporting/importing onto media.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/dicm-405-mediatype" } }, "max": "1" }, { "max": "1", "min": 0, "path": "AuditEvent.participant.network", "type": [ { "code": "BackboneElement" } ], "short": "Logical network location for application activity", "mapping": [ { "map": ".player.description.reference", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "definition": "Logical network location for application activity, if the activity has a network location." }, { "path": "AuditEvent.participant.network.address", "requirements": "This datum identifies the user's network access point, which may be distinct from the server that performed the action. It is an optional value that may be used to group events recorded on separate servers for analysis of a specific network access point's data access across all servers.", "min": 0, "definition": "An identifier for the network access point of the user device for the audit event.", "short": "Identifier for the network access point of the user device", "comments": "This could be a device id, IP address or some other identifier associated with a device.", "mapping": [ { "map": "Agent.Location", "identity": "w3c.prov" }, { "map": "NetworkAccessPointID", "identity": "dicom" }, { "map": "pre-coordinated into URL", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "type": [ { "code": "string" } ], "max": "1" }, { "path": "AuditEvent.participant.network.type", "requirements": "This datum identifies the type of network access point identifier of the user device for the audit event. It is an optional value that may be used to group events recorded on separate servers for analysis of access according to a network access point's type.", "min": 0, "definition": "An identifier for the type of network access point that originated the audit event.", "short": "The type of network access point", "mapping": [ { "map": "NetworkAccessPointTypeCode", "identity": "dicom" }, { "map": "pre-coordinated into URL", "identity": "rim" }, { "map": "where", "identity": "w5" } ], "type": [ { "code": "code" } ], "binding": { "strength": "required", "description": "The type of network access point of this participant in the audit event", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/network-type" } }, "max": "1" }, { "path": "AuditEvent.participant.purposeOfUse", "min": 0, "definition": "The reason (purpose of use), specific to this participant, that was used during the event being recorded.", "short": "Reason given for this user", "comments": "Use participant.purposeOfUse when you know that is specific to the participant, otherwise use event.purposeOfEvent. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why.", "mapping": [ { "map": "Agent.Activity", "identity": "w3c.prov" }, { "map": "*.reasonCode [ActHealthInformationPurposeOfUseReason codes/v:PurposeOfUse (2.16.840.1.113883.1.11.20448) * .outboundRelationship[typeCode=RSON or SUBJ].target", "identity": "rim" }, { "map": "why", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "The reason the activity took place.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/v3-PurposeOfUse" } }, "max": "*" }, { "path": "AuditEvent.source", "requirements": "The event is reported by one source.", "min": 1, "definition": "Application systems and processes.", "short": "Application systems and processes", "comments": "Since multi-tier, distributed, or composite applications make source identification ambiguous, this collection of fields may repeat for each application or process actively involved in the event. For example, multiple value-sets can identify participating web servers, application processes, and database server threads in an n-tier distributed application. Passive event participants (e.g. low-level network transports) need not be identified.", "mapping": [ { "map": "AuditSourceIdentification", "identity": "dicom" }, { "map": ".participation[typeCode=INF].role[classCode=ASSIGN].player[classCode=DEV, determinerCode=INSTANCE]", "identity": "rim" }, { "map": "who.witness", "identity": "w5" } ], "type": [ { "code": "BackboneElement" } ], "max": "1" }, { "max": "1", "min": 0, "path": "AuditEvent.source.site", "type": [ { "code": "string" } ], "short": "Logical source location within the enterprise", "mapping": [ { "map": "AuditEnterpriseSiteId", "identity": "dicom" }, { "map": ".scopedRole[classCode=LOCE].player.desc", "identity": "rim" }, { "map": "who.witness", "identity": "w5" } ], "definition": "Logical source location within the healthcare enterprise network. For example, a hospital or other provider location within a multi-entity provider group.", "requirements": "This value differentiates among the sites in a multi-site enterprise health information system." }, { "path": "AuditEvent.source.identifier", "requirements": "This field ties the event to a specific source system. It may be used to group events for analysis according to where the event was detected.", "min": 1, "definition": "Identifier of the source where the event was detected.", "short": "The identity of source detecting the event", "mapping": [ { "map": "AuditSourceId", "identity": "dicom" }, { "map": ".id", "identity": "rim" }, { "map": "who.witness", "identity": "w5" } ], "type": [ { "code": "Identifier" } ], "max": "1", "isSummary": true }, { "path": "AuditEvent.source.type", "requirements": "This field indicates which type of source is identified by the Audit Source ID. It is an optional value that may be used to group events for analysis according to the type of source where the event occurred.", "min": 0, "definition": "Code specifying the type of source where event originated.", "short": "The type of source where event originated", "mapping": [ { "map": "AuditSourceTypeCode", "identity": "dicom" }, { "map": ".code", "identity": "rim" }, { "map": "who.witness", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Code specifying the type of system that detected and recorded the event.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/audit-source-type" } }, "max": "*" }, { "constraint": [ { "key": "sev-1", "human": "Either a name or a query (NOT both)", "xpath": "not(exists(f:name)) or not(exists(f:query))", "severity": "error" } ], "path": "AuditEvent.object", "requirements": "The event may have other objects involved.", "min": 0, "definition": "Specific instances of data or objects that have been accessed.", "short": "Specific instances of data or objects that have been accessed", "comments": "Required unless the values for Event Identification, Active Participant Identification, and Audit Source Identification are sufficient to document the entire auditable event. Because events may have more than one participant object, this group can be a repeating set of values.", "mapping": [ { "map": "Provenance.target, Provenance.entity", "identity": "fhirprovenance" }, { "map": "Entity", "identity": "w3c.prov" }, { "map": "ParticipantObjectIdentification", "identity": "dicom" }, { "map": ".outboundRelationship[typeCode=SUBJ].target or .participation[typeCode=SBJ].role", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "BackboneElement" } ], "max": "*" }, { "path": "AuditEvent.object.identifier", "min": 0, "definition": "Identifies a specific instance of the participant object. The reference should always be version specific.", "short": "Specific instance of object (e.g. versioned)", "comments": "Identifier detail depends on object type.", "mapping": [ { "map": "ParticipantObjectID and ParticipantObjectIDTypeCode", "identity": "dicom" }, { "map": ".id.extension", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "Identifier" } ], "max": "1", "isSummary": true }, { "max": "1", "min": 0, "path": "AuditEvent.object.reference", "type": [ { "code": "Reference", "profile": [ "http://hl7.org/fhir/StructureDefinition/Resource" ] } ], "short": "Specific instance of resource (e.g. versioned)", "mapping": [ { "map": "Provenance.target, Provenance.entity.reference", "identity": "fhirprovenance" }, { "map": "ParticipantObjectID", "identity": "dicom" }, { "map": "[self]", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "isSummary": true, "definition": "Identifies a specific instance of the participant object. The reference should always be version specific." }, { "path": "AuditEvent.object.type", "requirements": "To describe the object being acted upon. In addition to queries on the subject of the action in an auditable event, it is also important to be able to query on the object type for the action.", "min": 0, "definition": "The type of the object that was involved in this audit event.", "short": "Type of object involved", "comments": "This value is distinct from the user's role or any user relationship to the participant object.", "mapping": [ { "map": "Provenance.entity.type", "identity": "fhirprovenance" }, { "map": "Entity.type", "identity": "w3c.prov" }, { "map": "ParticipantObjectTypeCode", "identity": "dicom" }, { "map": "[self::Act].code or role.player.code", "identity": "rim" }, { "map": "what", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Code for the object type involved audited.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/object-type" } }, "max": "1" }, { "path": "AuditEvent.object.role", "requirements": "For some detailed audit analysis it may be necessary to indicate a more granular type of participant, based on the application role it serves.", "min": 0, "definition": "Code representing the functional application role of Participant Object being audited.", "short": "What role the Object played", "comments": "See RFC 3881 for rules concerning matches between role and type.", "mapping": [ { "map": "Entity.role", "identity": "w3c.prov" }, { "map": "ParticipantObjectTypeCodeRole", "identity": "dicom" }, { "map": "role.code (not sure what this would mean for an Act)", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Code representing the role the Object played in the event.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/object-role" } }, "max": "1" }, { "path": "AuditEvent.object.lifecycle", "requirements": "Institutional policies for privacy and security may optionally fall under different accountability rules based on data life cycle. This provides a differentiating value for those cases.", "min": 0, "definition": "Identifier for the data life-cycle stage for the participant object.", "short": "Life-cycle stage for the object", "comments": "This can be used to provide an audit trail for data, over time, as it passes through the system.", "mapping": [ { "map": "Provenance.entity.role", "identity": "fhirprovenance" }, { "map": "Entity.role", "identity": "w3c.prov" }, { "map": "ParticipantObjectDataLifeCycle", "identity": "dicom" }, { "map": "target of ObservationEvent[code=\"lifecycle\"].value", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Identifier for the data life-cycle stage for the object.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/object-lifecycle" } }, "max": "1" }, { "path": "AuditEvent.object.securityLabel", "requirements": "This field identifies the security labels for a specific instance of an object, such as a patient, to detect/track privacy and security issues.", "min": 0, "definition": "Denotes security labels for the identified object.", "short": "Security labels applied to the object", "mapping": [ { "map": "ParticipantObjectSensitivity", "identity": "dicom" }, { "map": ".confidentialityCode", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "Coding" } ], "binding": { "strength": "extensible", "description": "Security Labels from the Healthcare Privacy and Security Classification System.", "valueSetReference": { "reference": "http://hl7.org/fhir/ValueSet/security-labels" } }, "max": "*" }, { "path": "AuditEvent.object.name", "min": 0, "definition": "An instance-specific descriptor of the Participant Object ID audited, such as a person's name.", "short": "Instance-specific descriptor for Object", "comments": "This field may be used in a query/report to identify audit events for a specific person. For example, where multiple synonymous Participant Object IDs (patient number, medical record number, encounter number, etc.) have been used.", "mapping": [ { "map": "Entity.Label", "identity": "w3c.prov" }, { "map": "ParticipantObjectName", "identity": "dicom" }, { "map": ".title", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "string" } ], "max": "1", "condition": [ "sev-1" ], "isSummary": true }, { "max": "1", "min": 0, "path": "AuditEvent.object.description", "type": [ { "code": "string" } ], "short": "Descriptive text", "mapping": [ { "map": "ParticipantObjectDescription", "identity": "dicom" }, { "map": ".text", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "definition": "Text that describes the object in more detail." }, { "path": "AuditEvent.object.query", "requirements": "For query events it may be necessary to capture the actual query input to the query process in order to identify the specific event. Because of differences among query implementations and data encoding for them, this is a base 64 encoded data blob. It may be subsequently decoded or interpreted by downstream audit analysis processing.", "min": 0, "definition": "The actual query for a query-type participant object.", "short": "Actual query for object", "mapping": [ { "map": "ParticipantObjectQuery", "identity": "dicom" }, { "map": "No mapping", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "type": [ { "code": "base64Binary" } ], "max": "1", "condition": [ "sev-1" ], "isSummary": true }, { "max": "*", "min": 0, "path": "AuditEvent.object.detail", "type": [ { "code": "BackboneElement" } ], "short": "Additional Information about the Object", "mapping": [ { "map": "ParticipantObjectDetail", "identity": "dicom" }, { "map": ".inboundRelationship[typeCode=SUBJ].target[classCode=OBS, moodCode=EVN]", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "definition": "Additional Information about the Object." }, { "max": "1", "min": 1, "path": "AuditEvent.object.detail.type", "type": [ { "code": "string" } ], "short": "Name of the property", "mapping": [ { "map": "ParticipantObjectDetail.type", "identity": "dicom" }, { "map": ".code", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "definition": "Name of the property." }, { "max": "1", "min": 1, "path": "AuditEvent.object.detail.value", "type": [ { "code": "base64Binary" } ], "short": "Property value", "mapping": [ { "map": "ParticipantObjectDetail.value", "identity": "dicom" }, { "map": ".value", "identity": "rim" }, { "map": "context", "identity": "w5" } ], "definition": "Property value." } ] }, "contact": [ { "telecom": [ { "value": "http://hl7.org/fhir", "system": "other" } ] }, { "telecom": [ { "value": "http://www.hl7.org/Special/committees/secure/index.cfm", "system": "other" } ] } ] }