StructureDefinition-UKCore-AuditEvent

Canonical_URLStatusCurrent_VersionLast_UpdatedDescription
https://fhir.hl7.org.uk/StructureDefinition/UKCore-AuditEventdraft1.2.02023-12-16

This profile defines the UK constraints and extensions on the International FHIR resource AuditEvent.


Profile_Purpose

The purpose of this profile is to hold information about an event made to maintain a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.

typeΣ1..1CodingBinding
subtypeΣ0..*CodingBinding
actionΣ0..1codeBinding
periodI0..1Period
recordedΣ1..1instant
outcomeΣ0..1codeBinding
outcomeDescΣ0..1string
purposeOfEventΣ0..*CodeableConceptBinding
type0..1CodeableConceptBinding
role0..*CodeableConcept
whoΣ I0..1Reference(PractitionerRole | Practitioner | Organization | Device | Patient | RelatedPerson)
altId0..1string
name0..1string
requestorΣ1..1boolean
locationI0..1Reference(Location)
policy0..*uri
media0..1CodingBinding
address0..1string
type0..1codeBinding
purposeOfUse0..*CodeableConceptBinding
site0..1string
observerΣ I1..1Reference(PractitionerRole | Practitioner | Organization | Device | Patient | RelatedPerson)
type0..*CodingBinding
whatΣ I0..1Reference(Resource)
type0..1CodingBinding
role0..1CodingBinding
lifecycle0..1CodingBinding
securityLabel0..*CodingBinding
nameΣ I0..1string
description0..1string
queryΣ I0..1base64Binary
type1..1string
valueStringstring
valueBase64Binarybase64Binary

Detailed Descriptions

AuditEvent
DefinitionA record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.
Cardinality0...*
Comments

Based on IHE-ATNA.

Invariants
  • dom-2:If the resource is contained in another resource, it SHALL NOT contain nested Resources
    contained.contained.empty()
  • dom-4:If a resource is contained in another resource, it SHALL NOT have a meta.versionId or a meta.lastUpdated
    contained.meta.versionId.empty() and contained.meta.lastUpdated.empty()
  • dom-3:If the resource is contained in another resource, it SHALL be referred to from elsewhere in the resource or SHALL refer to the containing resource
    contained.where((('#'+id in (%resource.descendants().reference | %resource.descendants().as(canonical) | %resource.descendants().as(uri) | %resource.descendants().as(url))) or descendants().where(reference = '#').exists() or descendants().where(as(canonical) = '#').exists() or descendants().where(as(canonical) = '#').exists()).not()).trace('unmatched', id).empty()
  • dom-6:A resource should have narrative for robust management
    text.`div`.exists()
  • dom-5:If a resource is contained in another resource, it SHALL NOT have a security label
    contained.meta.security.empty()
Mappings
  • rim:Entity. Role, or Act
  • workflow:Event
  • rim:ControlAct[moodCode=EVN]
  • dicom:Message
AuditEvent.id
DefinitionThe logical id of the resource, as used in the URL for the resource. Once assigned, this value never changes.
Cardinality0...1
TypeSystem.String
SummaryTrue
Comments

The only time that a resource does not have an id is when it is being submitted to the server using a create operation.

AuditEvent.meta
DefinitionThe metadata about the resource. This is content that is maintained by the infrastructure. Changes to the content might not always be associated with version changes to the resource.
Cardinality0...1
TypeMeta
SummaryTrue
Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.implicitRules
DefinitionA reference to a set of rules that were followed when the resource was constructed, and which must be understood when processing the content. Often, this is a reference to an implementation guide that defines the special rules along with other profiles etc.
Cardinality0...1
Typeuri
ModifierTrue
SummaryTrue
Comments

Asserting this rule set restricts the content to be only understood by a limited set of trading partners. This inherently limits the usefulness of the data in the long term. However, the existing health eco-system is highly fractured, and not yet ready to define, collect, and exchange data in a generally computable sense. Wherever possible, implementers and/or specification writers should avoid using this element. Often, when used, the URL is a reference to an implementation guide that defines these special rules as part of it's narrative along with other profiles, value sets, etc.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
AuditEvent.language
DefinitionThe base language in which the resource is written.
Cardinality0...1
Typecode
Binding

A human language.

CommonLanguages (preferred)
Comments

Language is provided to support indexing and accessibility (typically, services such as text to speech use the language tag). The html language tag in the narrative applies to the narrative. The language tag on the resource may be used to specify the language of other presentations generated from the data in the resource. Not all the content has to be in the base language. The Resource.language should not be assumed to apply to the narrative automatically. If a language is specified, it should it also be specified on the div element in the html (see rules in HTML5 for information about the relationship between xml:lang and the html lang attribute).

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
AuditEvent.text
DefinitionA human-readable narrative that contains a summary of the resource and can be used to represent the content of the resource to a human. The narrative need not encode all the structured data, but is required to contain sufficient detail to make it "clinically safe" for a human to just read the narrative. Resource definitions may define what content should be represented in the narrative to ensure clinical safety.
Cardinality0...1
TypeNarrative
Aliasnarrative, html, xhtml, display
Comments

Contained resources do not have narrative. Resources that are not contained SHOULD have a narrative. In some cases, a resource may only have text with little or no additional discrete data (as long as all minOccurs=1 elements are satisfied). This may be necessary for data from legacy systems where information is captured as a "text blob" or where text is additionally entered raw or narrated and encoded information is added later.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • rim:N/A
  • rim:Act.text?
AuditEvent.contained
DefinitionThese resources do not have an independent existence apart from the resource that contains them - they cannot be identified independently, and nor can they have their own independent transaction scope.
Cardinality0...*
TypeResource
Aliasinline resources, anonymous resources, contained resources
Comments

This should never be done when the content can be identified properly, as once identification is lost, it is extremely difficult (and context dependent) to restore it again. Contained resources may have profiles and tags In their meta elements, but SHALL NOT have security labels.

Mappings
  • rim:Entity. Role, or Act
  • rim:N/A
AuditEvent.extension
DefinitionMay be used to represent additional information that is not part of the basic definition of the resource. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.
Cardinality0...*
TypeExtension
Aliasextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SlicingUnordered, Open, by url(Value)
Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.modifierExtension
DefinitionMay be used to represent additional information that is not part of the basic definition of the resource and that modifies the understanding of the element that contains it and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer is allowed to define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself).
Cardinality0...*
TypeExtension
ModifierTrue
Aliasextensions, user content
Requirements

Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions.

Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SlicingUnordered, Open, by url(Value)
Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.type
DefinitionIdentifier for a family of the event. For example, a menu item, program, rule, policy, function code, application name or URL. It identifies the performed function.
Cardinality1...1
TypeCoding
Binding

Type of event.

AuditEventID (extensible)
SummaryTrue
Requirements

This identifies the performed function. For "Execute" Event Action Code audit records, this identifies the application function performed.

Comments

Codes may be defined very casually in enumerations or code lists, up to very formal definitions such as SNOMED CT - see the HL7 v3 Core Principles for more information.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE subset one of the sets of component 1-3 or 4-6
  • rim:CV
  • orim:fhir:Coding rdfs:subClassOf dt:CDCoding
  • workflow:Event.code
  • w5:FiveWs.what[x]
  • rim:.code (type, subtype and action are pre-coordinated or sent as translations)
  • dicom:EventId
  • w3c.prov:Activity
AuditEvent.subtype
DefinitionIdentifier for the category of event.
Cardinality0...*
TypeCoding
Binding

Sub-type of event.

AuditEventSub-Type (extensible)
SummaryTrue
Requirements

This field enables queries of messages by implementation-defined event categories.

Comments

Codes may be defined very casually in enumerations or code lists, up to very formal definitions such as SNOMED CT - see the HL7 v3 Core Principles for more information.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE subset one of the sets of component 1-3 or 4-6
  • rim:CV
  • orim:fhir:Coding rdfs:subClassOf dt:CDCoding
  • w5:FiveWs.what[x]
  • rim:.code (type, subtype and action are pre-coordinated or sent as translations)
  • dicom:EventTypeCode
AuditEvent.action
DefinitionIndicator for type of action performed during the event that generated the audit.
Cardinality0...1
Typecode
Binding

Indicator for type of action performed during the event that generated the event.

AuditEventAction (required)
SummaryTrue
Requirements

This broadly indicates what kind of action was done on the AuditEvent.entity by the AuditEvent.agent.

Comments

Note that FHIR strings SHALL NOT exceed 1MB in size

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.what[x]
  • rim:.code (type, subtype and action are pre-coordinated or sent as translations)
  • dicom:EventActionCode
AuditEvent.period
DefinitionThe period during which the activity occurred.
Cardinality0...1
TypePeriod
Comments

The period can be a little arbitrary; where possible, the time should correspond to human assessment of the activity time.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • per-1:If present, start SHALL have a lower value than end
    start.hasValue().not() or end.hasValue().not() or (start <= end)
Mappings
  • rim:n/a
  • v2:DR
  • rim:IVL<TS>[lowClosed="true" and highClosed="true"] or URG<TS>[lowClosed="true" and highClosed="true"]
  • workflow:Event.occurred[x]
  • w5:FiveWs.done[x]
  • rim:./effectiveTime[type=IVL_TS]
  • dicom:EventDateTime
  • w3c.prov:Activity.startTime & Activity.endTime
  • fhirprovenance:Provenance.occurred[x]
AuditEvent.recorded
DefinitionThe time when the event was recorded.
Cardinality1...1
Typeinstant
SummaryTrue
Requirements

This ties an event to a specific date and time. Security audits typically require a consistent time base (e.g. UTC), to eliminate time-zone issues arising from geographical distribution.

Comments

In a distributed system, some sort of common time base (e.g. an NTP [RFC1305] server) is a good implementation tactic.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.recorded
  • rim:.effectiveTime
  • w3c.prov:Activity.when
  • fhirprovenance:Provenance.recorded
AuditEvent.outcome
DefinitionIndicates whether the event succeeded or failed.
Cardinality0...1
Typecode
Binding

Indicates whether the event succeeded or failed.

AuditEventOutcome (required)
SummaryTrue
Comments

In some cases a "success" may be partial, for example, an incomplete or interrupted transfer of a radiological study. For the purpose of establishing accountability, these distinctions are not relevant.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.what[x]
  • rim:.actionNegationInd
  • dicom:EventOutcomeIndicator
AuditEvent.outcomeDesc
DefinitionA free text description of the outcome of the event.
Cardinality0...1
Typestring
SummaryTrue
Comments

Note that FHIR strings SHALL NOT exceed 1MB in size

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.what[x]
  • rim:.outboundRelationship[typeCode=OUT].target.text
  • dicom:EventOutcomeDescription
AuditEvent.purposeOfEvent
DefinitionThe purposeOfUse (reason) that was used during the event being recorded.
Cardinality0...*
TypeCodeableConcept
Binding

The reason the activity took place.

v3.PurposeOfUse (extensible)
SummaryTrue
Comments

Use AuditEvent.agent.purposeOfUse when you know that it is specific to the agent, otherwise use AuditEvent.purposeOfEvent. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE
  • rim:CD
  • orim:fhir:CodeableConcept rdfs:subClassOf dt:CD
  • workflow:Event.reasonCode
  • w5:FiveWs.why[x]
  • rim:* .reasonCode [ControlActReason when Act.class = CACT Control Act] *.outboundRelationship[typeCode=RSON].target
  • dicom:EventPurposeOfUse
  • w3c.prov:Activity.Activity
  • fhirprovenance:Provenance.reason, Provenance.activity
AuditEvent.agent
DefinitionAn actor taking an active role in the event or activity that is logged.
Cardinality1...*
TypeBackboneElement
Must SupportTrue
AliasActiveParticipant
Requirements

An agent can be a person, an organization, software, device, or other actors that may be ascribed responsibility.

Comments

Several agents may be associated (i.e. have some responsibility for an activity) with an event or activity.

For example, an activity may be initiated by one user for other users or involve more than one user. However, only one user may be the initiator/requestor for the activity.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • workflow:Event.performer
  • w5:FiveWs.who
  • rim:.participation
  • dicom:ActiveParticipant
  • w3c.prov:Agent
  • fhirprovenance:Provenance.agent
AuditEvent.agent.id
DefinitionUnique id for the element within a resource (for internal references). This may be any string value that does not contain spaces.
Cardinality0...1
TypeSystem.String
Mappings
  • rim:n/a
AuditEvent.agent.extension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.
Cardinality0...*
TypeExtension
Aliasextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SlicingUnordered, Open, by url(Value)
Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.agent.modifierExtension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself).
Cardinality0...*
TypeExtension
ModifierTrue
SummaryTrue
Aliasextensions, user content, modifiers
Requirements

Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions.

Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.agent.type
DefinitionSpecification of the participation type the user plays when performing the event.
Cardinality0...1
TypeCodeableConcept
Binding

The Participation type of the agent to the event.

ParticipationRoleType (extensible)
Comments

Not all terminology uses fit this general pattern. In some cases, models should not use CodeableConcept and use Coding directly and provide their own structure for managing text, codings, translations and the relationship between elements and pre- and post-coordination.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE
  • rim:CD
  • orim:fhir:CodeableConcept rdfs:subClassOf dt:CD
  • workflow:Event.performer.function
  • w5:FiveWs.who
  • rim:.typeCode and/or .functionCode
  • dicom:RoleIdCode
  • w3c.prov:Agent.Attribution
  • fhirprovenance:Provenance.agent.type
AuditEvent.agent.role
DefinitionThe security role that the user was acting under, that come from local codes defined by the access control security system (e.g. RBAC, ABAC) used in the local context.
Cardinality0...*
TypeCodeableConcept
Binding

What security role enabled the agent to participate in the event.

SecurityRoleType (example)
Requirements

This value ties an audited event to a user's role(s). It is an optional value that might be used to group events for analysis by user functional role categories.

Comments

Should be roles relevant to the event. Should not be an exhaustive list of roles.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE
  • rim:CD
  • orim:fhir:CodeableConcept rdfs:subClassOf dt:CD
  • w5:FiveWs.who
  • rim:.role
  • dicom:RoleIdCode
  • w3c.prov:Agent.Attribution
  • fhirprovenance:Provenance.agent.role
AuditEvent.agent.who
DefinitionReference to who this agent is that was involved in the event.
Cardinality0...1
TypeReference(PractitionerRole | Practitioner | Organization | Device | Patient | RelatedPerson)
SummaryTrue
AliasuserId
Requirements

This field ties an audit event to a specific resource or identifier.

Comments

Where a User ID is available it will go into who.identifier.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ref-1:SHALL have a contained resource if a local reference is provided
    reference.startsWith('#').not() or (reference.substring(1).trace('url') in %rootResource.contained.id.trace('ids'))
Mappings
  • rim:n/a
  • rim:The target of a resource reference is a RIM entry point (Act, Role, or Entity)
  • workflow:Event.performer.actor
  • w5:FiveWs.who
  • rim:.id
  • dicom:UserId
  • w3c.prov:Agent.Identity
  • fhirprovenance:Provenance.agent.who
AuditEvent.agent.altId
DefinitionAlternative agent Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g. single sign-on), if available.
Cardinality0...1
Typestring
Requirements

In some situations, a human user may authenticate with one identity but, to access a specific application system, may use a synonymous identify. For example, some "single sign on" implementations will do this. The alternative identifier would then be the original identify used for authentication, and the User ID is the one known to and used by the application.

Comments

Note that FHIR strings SHALL NOT exceed 1MB in size

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.who
  • rim:.id (distinguish id type by root)
  • dicom:AlternativeUserId
  • w3c.prov:Agent.Identity
AuditEvent.agent.name
DefinitionHuman-meaningful name for the agent.
Cardinality0...1
Typestring
Requirements

The User ID and Authorization User ID may be internal or otherwise obscure values. This field assists the auditor in identifying the actual user.

Comments

Note that FHIR strings SHALL NOT exceed 1MB in size

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.who
  • rim:.name
  • dicom:UserName
  • w3c.prov:Agent.Identity
AuditEvent.agent.requestor
DefinitionIndicator that the user is or is not the requestor, or initiator, for the event being audited.
Cardinality1...1
Typeboolean
SummaryTrue
Requirements

This value is used to distinguish between requestor-users and recipient-users. For example, one person may initiate a report-output to be sent to another user.

Comments

There can only be one initiator. If the initiator is not clear, then do not choose any one agent as the initiator.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.who
  • rim:If participation.typeCode was author, then true
  • dicom:UserIsRequestor
AuditEvent.agent.location
DefinitionWhere the event occurred.
Cardinality0...1
TypeReference(Location)
Comments

References SHALL be a reference to an actual FHIR resource, and SHALL be resolveable (allowing for access control, temporary unavailability, etc.). Resolution can be either by retrieval from the URL, or, where applicable by resource type, by treating an absolute reference as a canonical URL and looking it up in a local registry/repository.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ref-1:SHALL have a contained resource if a local reference is provided
    reference.startsWith('#').not() or (reference.substring(1).trace('url') in %rootResource.contained.id.trace('ids'))
Mappings
  • rim:n/a
  • rim:The target of a resource reference is a RIM entry point (Act, Role, or Entity)
  • workflow:Event.location
  • w5:FiveWs.where[x]
  • rim:* Role.Class =SDLOC *Role.Code = ServiceDeliveryLocationRoleType *Entity.Code = PlaceEntityType = df.Types of places for Entity.Class = PLC *EntityClass = PLC = df.A physical place or site with its containing structure. May be natural or man-made. The geographic position of a place might or might not be constant.
  • w3c.prov:Activity.location
  • fhirprovenance:Provenance.location
AuditEvent.agent.policy
DefinitionThe policy or plan that authorized the activity being recorded. Typically, a single activity may have multiple applicable policies, such as patient consent, guarantor funding, etc. The policy would also indicate the security token used.
Cardinality0...*
Typeuri
Requirements

This value is used retrospectively to determine the authorization policies.

Comments

For example: Where an OAuth token authorizes, the unique identifier from the OAuth token is placed into the policy element Where a policy engine (e.g. XACML) holds policy logic, the unique policy identifier is placed into the policy element.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.why[x]
  • rim:ActPolicyType
  • dicom:ParticipantRoleIDCode
  • fhirprovenance:Provenance.policy
AuditEvent.agent.media
DefinitionType of media involved. Used when the event is about exporting/importing onto media.
Cardinality0...1
TypeCoding
Binding

Used when the event is about exporting/importing onto media.

MediaTypeCode (extensible)
Requirements

Usually, this is used instead of specifying a network address. This field is not used for Media Id (i.e. the serial number of a CD).

Comments

Codes may be defined very casually in enumerations or code lists, up to very formal definitions such as SNOMED CT - see the HL7 v3 Core Principles for more information.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE subset one of the sets of component 1-3 or 4-6
  • rim:CV
  • orim:fhir:Coding rdfs:subClassOf dt:CDCoding
  • w5:FiveWs.where[x]
  • rim:.player.description.mediaType
  • dicom:MediaType
AuditEvent.agent.network
DefinitionLogical network location for application activity, if the activity has a network location.
Cardinality0...1
TypeBackboneElement
Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.where[x]
  • rim:.player.description.reference
AuditEvent.agent.network.id
DefinitionUnique id for the element within a resource (for internal references). This may be any string value that does not contain spaces.
Cardinality0...1
TypeSystem.String
Mappings
  • rim:n/a
AuditEvent.agent.network.extension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.
Cardinality0...*
TypeExtension
Aliasextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SlicingUnordered, Open, by url(Value)
Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.agent.network.modifierExtension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself).
Cardinality0...*
TypeExtension
ModifierTrue
SummaryTrue
Aliasextensions, user content, modifiers
Requirements

Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions.

Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.agent.network.address
DefinitionAn identifier for the network access point of the user device for the audit event.
Cardinality0...1
Typestring
Requirements

This datum identifies the user's network access point, which may be distinct from the server that performed the action. It is an optional value that may be used to group events recorded on separate servers for analysis of a specific network access point's data access across all servers.

Comments

This could be a device id, IP address or some other identifier associated with a device.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.where[x]
  • rim:pre-coordinated into URL
  • dicom:NetworkAccessPointID
  • w3c.prov:Agent.Location
AuditEvent.agent.network.type
DefinitionAn identifier for the type of network access point that originated the audit event.
Cardinality0...1
Typecode
Binding

The type of network access point of this agent in the audit event.

AuditEventAgentNetworkType (required)
Requirements

This datum identifies the type of network access point identifier of the user device for the audit event. It is an optional value that may be used to group events recorded on separate servers for analysis of access according to a network access point's type.

Comments

Note that FHIR strings SHALL NOT exceed 1MB in size

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.where[x]
  • rim:pre-coordinated into URL
  • dicom:NetworkAccessPointTypeCode
AuditEvent.agent.purposeOfUse
DefinitionThe reason (purpose of use), specific to this agent, that was used during the event being recorded.
Cardinality0...*
TypeCodeableConcept
Binding

The reason the activity took place.

v3.PurposeOfUse (extensible)
Comments

Use AuditEvent.agent.purposeOfUse when you know that is specific to the agent, otherwise use AuditEvent.purposeOfEvent. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE
  • rim:CD
  • orim:fhir:CodeableConcept rdfs:subClassOf dt:CD
  • w5:FiveWs.why[x]
  • rim:*.reasonCode [ActHealthInformationPurposeOfUseReason codes/v:PurposeOfUse (2.16.840.1.113883.1.11.20448) * .outboundRelationship[typeCode=RSON or SUBJ].target
  • w3c.prov:Agent.Activity
AuditEvent.source
DefinitionThe system that is reporting the event.
Cardinality1...1
TypeBackboneElement
Requirements

The event is reported by one source.

Comments

Since multi-tier, distributed, or composite applications make source identification ambiguous, this collection of fields may repeat for each application or process actively involved in the event. For example, multiple value-sets can identify participating web servers, application processes, and database server threads in an n-tier distributed application. Passive event participants (e.g. low-level network transports) need not be identified.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.witness
  • rim:.participation[typeCode=INF].role[classCode=ASSIGN].player[classCode=DEV, determinerCode=INSTANCE]
  • dicom:AuditSourceIdentification
AuditEvent.source.id
DefinitionUnique id for the element within a resource (for internal references). This may be any string value that does not contain spaces.
Cardinality0...1
TypeSystem.String
Mappings
  • rim:n/a
AuditEvent.source.extension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.
Cardinality0...*
TypeExtension
Aliasextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SlicingUnordered, Open, by url(Value)
Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.source.modifierExtension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself).
Cardinality0...*
TypeExtension
ModifierTrue
SummaryTrue
Aliasextensions, user content, modifiers
Requirements

Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions.

Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.source.site
DefinitionLogical source location within the healthcare enterprise network. For example, a hospital or other provider location within a multi-entity provider group.
Cardinality0...1
Typestring
Requirements

This value differentiates among the sites in a multi-site enterprise health information system.

Comments

Note that FHIR strings SHALL NOT exceed 1MB in size

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.witness
  • rim:.scopedRole[classCode=LOCE].player.desc
  • dicom:AuditEnterpriseSiteId
AuditEvent.source.observer
DefinitionIdentifier of the source where the event was detected.
Cardinality1...1
TypeReference(PractitionerRole | Practitioner | Organization | Device | Patient | RelatedPerson)
SummaryTrue
AliasSourceId
Requirements

This field ties the event to a specific source system. It may be used to group events for analysis according to where the event was detected.

Comments

References SHALL be a reference to an actual FHIR resource, and SHALL be resolveable (allowing for access control, temporary unavailability, etc.). Resolution can be either by retrieval from the URL, or, where applicable by resource type, by treating an absolute reference as a canonical URL and looking it up in a local registry/repository.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ref-1:SHALL have a contained resource if a local reference is provided
    reference.startsWith('#').not() or (reference.substring(1).trace('url') in %rootResource.contained.id.trace('ids'))
Mappings
  • rim:n/a
  • rim:The target of a resource reference is a RIM entry point (Act, Role, or Entity)
  • w5:FiveWs.witness
  • rim:.id
  • dicom:AuditSourceId
AuditEvent.source.type
DefinitionCode specifying the type of source where event originated.
Cardinality0...*
TypeCoding
Binding

Code specifying the type of system that detected and recorded the event.

AuditEventSourceType (extensible)
Requirements

This field indicates which type of source is identified by the Audit Source ID. It is an optional value that may be used to group events for analysis according to the type of source where the event occurred.

Comments

Codes may be defined very casually in enumerations or code lists, up to very formal definitions such as SNOMED CT - see the HL7 v3 Core Principles for more information.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE subset one of the sets of component 1-3 or 4-6
  • rim:CV
  • orim:fhir:Coding rdfs:subClassOf dt:CDCoding
  • w5:FiveWs.witness
  • rim:.code
  • dicom:AuditSourceTypeCode
AuditEvent.entity
DefinitionSpecific instances of data or objects that have been accessed.
Cardinality0...*
TypeBackboneElement
AliasParticipantObject
Requirements

The event may have other entities involved.

Comments

Required unless the values for event identification, agent identification, and audit source identification are sufficient to document the entire auditable event. Because events may have more than one entity, this group can be a repeating set of values.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • sev-1:Either a name or a query (NOT both)
    name.empty() or query.empty()
Mappings
  • rim:n/a
  • w5:FiveWs.what[x]
  • rim:.outboundRelationship[typeCode=SUBJ].target or .participation[typeCode=SBJ].role
  • dicom:ParticipantObjectIdentification
  • w3c.prov:Entity
  • fhirprovenance:Provenance.target, Provenance.entity
AuditEvent.entity.id
DefinitionUnique id for the element within a resource (for internal references). This may be any string value that does not contain spaces.
Cardinality0...1
TypeSystem.String
Mappings
  • rim:n/a
AuditEvent.entity.extension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.
Cardinality0...*
TypeExtension
Aliasextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SlicingUnordered, Open, by url(Value)
Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.entity.modifierExtension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself).
Cardinality0...*
TypeExtension
ModifierTrue
SummaryTrue
Aliasextensions, user content, modifiers
Requirements

Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions.

Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.entity.what
DefinitionIdentifies a specific instance of the entity. The reference should be version specific.
Cardinality0...1
TypeReference(Resource)
SummaryTrue
Comments

References SHALL be a reference to an actual FHIR resource, and SHALL be resolveable (allowing for access control, temporary unavailability, etc.). Resolution can be either by retrieval from the URL, or, where applicable by resource type, by treating an absolute reference as a canonical URL and looking it up in a local registry/repository.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ref-1:SHALL have a contained resource if a local reference is provided
    reference.startsWith('#').not() or (reference.substring(1).trace('url') in %rootResource.contained.id.trace('ids'))
Mappings
  • rim:n/a
  • rim:The target of a resource reference is a RIM entry point (Act, Role, or Entity)
  • w5:FiveWs.what[x]
  • rim:.id
  • dicom:ParticipantObjectID and ParticipantObjectIDTypeCode
  • fhirprovenance:Provenance.target, Provenance.entity.what
AuditEvent.entity.type
DefinitionThe type of the object that was involved in this audit event.
Cardinality0...1
TypeCoding
Binding

Code for the entity type involved in the audit event.

AuditEventEntityType (extensible)
Requirements

To describe the object being acted upon. In addition to queries on the subject of the action in an auditable event, it is also important to be able to query on the object type for the action.

Comments

This value is distinct from the user's role or any user relationship to the entity.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE subset one of the sets of component 1-3 or 4-6
  • rim:CV
  • orim:fhir:Coding rdfs:subClassOf dt:CDCoding
  • w5:FiveWs.what[x]
  • rim:[self::Act].code or role.player.code
  • dicom:ParticipantObjectTypeCode
  • w3c.prov:Entity.type
  • fhirprovenance:Provenance.entity.type
AuditEvent.entity.role
DefinitionCode representing the role the entity played in the event being audited.
Cardinality0...1
TypeCoding
Binding

Code representing the role the entity played in the audit event.

AuditEventEntityRole (extensible)
Requirements

For some detailed audit analysis it may be necessary to indicate a more granular type of entity, based on the application role it serves.

Comments

Codes may be defined very casually in enumerations or code lists, up to very formal definitions such as SNOMED CT - see the HL7 v3 Core Principles for more information.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE subset one of the sets of component 1-3 or 4-6
  • rim:CV
  • orim:fhir:Coding rdfs:subClassOf dt:CDCoding
  • w5:FiveWs.context
  • rim:role.code (not sure what this would mean for an Act)
  • dicom:ParticipantObjectTypeCodeRole
  • w3c.prov:Entity.role
AuditEvent.entity.lifecycle
DefinitionIdentifier for the data life-cycle stage for the entity.
Cardinality0...1
TypeCoding
Binding

Identifier for the data life-cycle stage for the entity.

ObjectLifecycleEvents (extensible)
Requirements

Institutional policies for privacy and security may optionally fall under different accountability rules based on data life cycle. This provides a differentiating value for those cases.

Comments

This can be used to provide an audit trail for data, over time, as it passes through the system.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE subset one of the sets of component 1-3 or 4-6
  • rim:CV
  • orim:fhir:Coding rdfs:subClassOf dt:CDCoding
  • w5:FiveWs.context
  • rim:target of ObservationEvent[code="lifecycle"].value
  • dicom:ParticipantObjectDataLifeCycle
  • w3c.prov:Entity.role
  • fhirprovenance:Provenance.entity.role
AuditEvent.entity.securityLabel
DefinitionSecurity labels for the identified entity.
Cardinality0...*
TypeCoding
Binding

Security Labels from the Healthcare Privacy and Security Classification System.

All Security Labels (extensible)
Requirements

This field identifies the security labels for a specific instance of an object, such as a patient, to detect/track privacy and security issues.

Comments

Copied from entity meta security tags.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • v2:CE/CNE/CWE subset one of the sets of component 1-3 or 4-6
  • rim:CV
  • orim:fhir:Coding rdfs:subClassOf dt:CDCoding
  • w5:FiveWs.context
  • rim:.confidentialityCode
  • dicom:ParticipantObjectSensitivity
AuditEvent.entity.name
DefinitionA name of the entity in the audit event.
Cardinality0...1
Typestring
SummaryTrue
Requirements

Use only where entity can't be identified with an identifier.

Comments

This field may be used in a query/report to identify audit events for a specific person. For example, where multiple synonymous entity identifiers (patient number, medical record number, encounter number, etc.) have been used.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.context
  • rim:.title
  • dicom:ParticipantObjectName
  • w3c.prov:Entity.Label
AuditEvent.entity.description
DefinitionText that describes the entity in more detail.
Cardinality0...1
Typestring
Requirements

Use only where entity can't be identified with an identifier.

Comments

Note that FHIR strings SHALL NOT exceed 1MB in size

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.context
  • rim:.text
  • dicom:ParticipantObjectDescription
AuditEvent.entity.query
DefinitionThe query parameters for a query-type entities.
Cardinality0...1
Typebase64Binary
SummaryTrue
Requirements

For query events, it may be necessary to capture the actual query input to the query process in order to identify the specific event. Because of differences among query implementations and data encoding for them, this is a base 64 encoded data blob. It may be subsequently decoded or interpreted by downstream audit analysis processing.

Comments

The meaning and secondary-encoding of the content of base64 encoded blob is specific to the AuditEvent.type, AuditEvent.subtype, AuditEvent.entity.type, and AuditEvent.entity.role. The base64 is a general-use and safe container for event specific data blobs regardless of the encoding used by the transaction being recorded. An AuditEvent consuming application must understand the event it is consuming and the formats used by the event. For example, if auditing an Oracle network database access, the Oracle formats must be understood as they will be simply encoded in the base64binary blob.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.context
  • rim:No mapping
  • dicom:ParticipantObjectQuery
AuditEvent.entity.detail
DefinitionTagged value pairs for conveying additional information about the entity.
Cardinality0...*
TypeBackboneElement
Requirements

Implementation-defined data about specific details of the object accessed or used.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.context
  • rim:.inboundRelationship[typeCode=SUBJ].target[classCode=OBS, moodCode=EVN]
  • dicom:ParticipantObjectDetail
AuditEvent.entity.detail.id
DefinitionUnique id for the element within a resource (for internal references). This may be any string value that does not contain spaces.
Cardinality0...1
TypeSystem.String
Mappings
  • rim:n/a
AuditEvent.entity.detail.extension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension.
Cardinality0...*
TypeExtension
Aliasextensions, user content
Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

SlicingUnordered, Open, by url(Value)
Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.entity.detail.modifierExtension
DefinitionMay be used to represent additional information that is not part of the basic definition of the element and that modifies the understanding of the element in which it is contained and/or the understanding of the containing element's descendants. Usually modifier elements provide negation or qualification. To make the use of extensions safe and manageable, there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension, there is a set of requirements that SHALL be met as part of the definition of the extension. Applications processing a resource are required to check for modifier extensions. Modifier extensions SHALL NOT change the meaning of any elements on Resource or DomainResource (including cannot change the meaning of modifierExtension itself).
Cardinality0...*
TypeExtension
ModifierTrue
SummaryTrue
Aliasextensions, user content, modifiers
Requirements

Modifier extensions allow for extensions that cannot be safely ignored to be clearly distinguished from the vast majority of extensions which can be safely ignored. This promotes interoperability by eliminating the need for implementers to prohibit the presence of extensions. For further information, see the definition of modifier extensions.

Comments

There can be no stigma associated with the use of extensions by any application, project, or standard - regardless of the institution or jurisdiction that uses or defines the extensions. The use of extensions is what allows the FHIR specification to retain a core level of simplicity for everyone.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
  • ext-1:Must have either extensions or value[x], not both
    extension.exists() != value.exists()
Mappings
  • rim:n/a
  • rim:N/A
AuditEvent.entity.detail.type
DefinitionThe type of extra detail provided in the value.
Cardinality1...1
Typestring
Comments

Note that FHIR strings SHALL NOT exceed 1MB in size

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.context
  • rim:.code
  • dicom:ParticipantObjectDetail.type
AuditEvent.entity.detail.value[x]
DefinitionThe value of the extra detail.
Cardinality1...1
Typestring
Requirements

Should not duplicate the entity value unless absolutely necessary.

Comments

The value can be string when known to be a string, else base64 encoding should be used to protect binary or undefined content. The meaning and secondary-encoding of the content of base64 encoded blob is specific to the AuditEvent.type, AuditEvent.subtype, AuditEvent.entity.type, and AuditEvent.entity.role. The base64 is a general-use and safe container for event specific data blobs regardless of the encoding used by the transaction being recorded. An AuditEvent consuming application must understand the event it is consuming and the formats used by the event. For example if auditing an Oracle network database access, the Oracle formats must be understood as they will be simply encoded in the base64binary blob.

Invariants
  • ele-1:All FHIR elements must have a @value or children
    hasValue() or (children().count() > id.count())
Mappings
  • rim:n/a
  • w5:FiveWs.context
  • rim:.value
  • dicom:ParticipantObjectDetail.value

Table View

AuditEvent..
AuditEvent.agent..


XML View

<StructureDefinition xmlns="http://hl7.org/fhir">
    <id value="UKCore-AuditEvent" />
    <url value="https://fhir.hl7.org.uk/StructureDefinition/UKCore-AuditEvent" />
    <version value="1.2.0" />
    <name value="UKCoreAuditEvent" />
    <title value="UK Core AuditEvent" />
    <status value="draft" />
    <date value="2023-12-16" />
    <publisher value="HL7 UK" />
    <contact>
        <name value="HL7 UK" />
        <telecom>
            <system value="email" />
            <value value="ukcore@hl7.org.uk" />
            <use value="work" />
            <rank value="1" />
        </telecom>
    </contact>
    <description value="This profile defines the UK constraints and extensions on the International FHIR resource [AuditEvent](https://hl7.org/fhir/R4/AuditEvent.html)." />
    <purpose value="The purpose of this profile is to hold information about an event made to maintain a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage." />
    <copyright value="Copyright &#169; 2021+ HL7 UK Licensed under the Apache License, Version 2.0 (the &quot;License&quot;); you may not use this file except in compliance with the License. You may obtain a copy of the License at  http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an &quot;AS IS&quot; BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. HL7&#174; FHIR&#174; standard Copyright &#169; 2011+ HL7 The HL7&#174; FHIR&#174; standard is used under the FHIR license. You may obtain a copy of the FHIR license at  https://www.hl7.org/fhir/license.html." />
    <fhirVersion value="4.0.1" />
    <mapping>
        <identity value="workflow" />
        <uri value="http://hl7.org/fhir/workflow" />
        <name value="Workflow Pattern" />
    </mapping>
    <mapping>
        <identity value="rim" />
        <uri value="http://hl7.org/v3" />
        <name value="RIM Mapping" />
    </mapping>
    <mapping>
        <identity value="dicom" />
        <uri value="http://nema.org/dicom" />
        <name value="DICOM Tag Mapping" />
    </mapping>
    <mapping>
        <identity value="w5" />
        <uri value="http://hl7.org/fhir/fivews" />
        <name value="FiveWs Pattern Mapping" />
    </mapping>
    <mapping>
        <identity value="w3c.prov" />
        <uri value="http://www.w3.org/ns/prov" />
        <name value="W3C PROV" />
    </mapping>
    <mapping>
        <identity value="fhirprovenance" />
        <uri value="http://hl7.org/fhir/provenance" />
        <name value="FHIR Provenance Mapping" />
    </mapping>
    <kind value="resource" />
    <abstract value="false" />
    <type value="AuditEvent" />
    <baseDefinition value="http://hl7.org/fhir/StructureDefinition/AuditEvent" />
    <derivation value="constraint" />
    <differential>
        <element id="AuditEvent.agent">
            <path value="AuditEvent.agent" />
            <mustSupport value="true" />
        </element>
    </differential>
</StructureDefinition>

JSON View

{
    "resourceType": "StructureDefinition",
    "id": "UKCore-AuditEvent",
    "url": "https://fhir.hl7.org.uk/StructureDefinition/UKCore-AuditEvent",
    "version": "1.2.0",
    "name": "UKCoreAuditEvent",
    "title": "UK Core AuditEvent",
    "status": "draft",
    "date": "2023-12-16",
    "publisher": "HL7 UK",
    "contact":  [
        {
            "name": "HL7 UK",
            "telecom":  [
                {
                    "system": "email",
                    "value": "ukcore@hl7.org.uk",
                    "use": "work",
                    "rank": 1
                }
            ]
        }
    ],
    "description": "This profile defines the UK constraints and extensions on the International FHIR resource [AuditEvent](https://hl7.org/fhir/R4/AuditEvent.html).",
    "purpose": "The purpose of this profile is to hold information about an event made to maintain a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.",
    "copyright": "Copyright © 2021+ HL7 UK Licensed under the Apache License, Version 2.0 (the \"License\"); you may not use this file except in compliance with the License. You may obtain a copy of the License at  http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. HL7® FHIR® standard Copyright © 2011+ HL7 The HL7® FHIR® standard is used under the FHIR license. You may obtain a copy of the FHIR license at  https://www.hl7.org/fhir/license.html.",
    "fhirVersion": "4.0.1",
    "mapping":  [
        {
            "identity": "workflow",
            "uri": "http://hl7.org/fhir/workflow",
            "name": "Workflow Pattern"
        },
        {
            "identity": "rim",
            "uri": "http://hl7.org/v3",
            "name": "RIM Mapping"
        },
        {
            "identity": "dicom",
            "uri": "http://nema.org/dicom",
            "name": "DICOM Tag Mapping"
        },
        {
            "identity": "w5",
            "uri": "http://hl7.org/fhir/fivews",
            "name": "FiveWs Pattern Mapping"
        },
        {
            "identity": "w3c.prov",
            "uri": "http://www.w3.org/ns/prov",
            "name": "W3C PROV"
        },
        {
            "identity": "fhirprovenance",
            "uri": "http://hl7.org/fhir/provenance",
            "name": "FHIR Provenance Mapping"
        }
    ],
    "kind": "resource",
    "abstract": false,
    "type": "AuditEvent",
    "baseDefinition": "http://hl7.org/fhir/StructureDefinition/AuditEvent",
    "derivation": "constraint",
    "differential": {
        "element":  [
            {
                "id": "AuditEvent.agent",
                "path": "AuditEvent.agent",
                "mustSupport": true
            }
        ]
    }
}

Usage

This Profile has the following derived profiles:


This Profile is referenced in the following Extensions:


This Profile is referenced in the following Profiles:

Feedback

Click here to:

Report issue for UKCore-AuditEvent

Examples

Query - An example to illustrate a...
Example UKCore-AuditEvent-Query

Usage

This Profile has the following derived profiles:


This Profile is referenced in the following Extensions:


This Profile is referenced in the following Profiles:

Example Usage Scenarios

The following are example usage scenarios for the UK Core Audit Event profile:

  • Query for a...
  • Record or update a...

Profile Specific Implementation Guidance: