A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage. A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage. If the element is present, it must have either a @value, an @id, or extensions Identifier for a family of the event. For example, a menu item, program, rule, policy, function code, application name or URL. It identifies the performed function. Identifier for the category of event. Indicator for type of action performed during the event that generated the audit. The time when the event occurred on the source. Indicates whether the event succeeded or failed. A free text description of the outcome of the event. The purposeOfUse (reason) that was used during the event being recorded. An actor taking an active role in the event or activity that is logged. The system that is reporting the event. Specific instances of data or objects that have been accessed. A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage. The security role that the user was acting under, that come from local codes defined by the access control security system (e.g. RBAC, ABAC) used in the local context. Direct reference to a resource that identifies the agent. Unique identifier for the user actively participating in the event. Alternative agent Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g. single sign-on), if available. Human-meaningful name for the agent. Indicator that the user is or is not the requestor, or initiator, for the event being audited. Where the event occurred. The policy or plan that authorized the activity being recorded. Typically, a single activity may have multiple applicable policies, such as patient consent, guarantor funding, etc. The policy would also indicate the security token used. Type of media involved. Used when the event is about exporting/importing onto media. Logical network location for application activity, if the activity has a network location. The reason (purpose of use), specific to this agent, that was used during the event being recorded. A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage. An identifier for the network access point of the user device for the audit event. An identifier for the type of network access point that originated the audit event. A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage. Logical source location within the healthcare enterprise network. For example, a hospital or other provider location within a multi-entity provider group. Identifier of the source where the event was detected. Code specifying the type of source where event originated. A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage. Identifies a specific instance of the entity. The reference should always be version specific. Identifies a specific instance of the entity. The reference should be version specific. The type of the object that was involved in this audit event. Code representing the role the entity played in the event being audited. Identifier for the data life-cycle stage for the entity. Security labels for the identified entity. A name of the entity in the audit event. Text that describes the entity in more detail. The query parameters for a query-type entities. Tagged value pairs for conveying additional information about the entity. A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage. The type of extra detail provided in the value. The details, base64 encoded. Used to carry bulk information. Success Minor failure Serious failure Major failure Indicates whether the event succeeded or failed If the element is present, it must have either a @value, an @id, or extensions Create Read/View/Print Update Delete Execute Indicator for type of action performed during the event that generated the event If the element is present, it must have either a @value, an @id, or extensions Machine Name IP Address Telephone Number Email address URI The type of network access point of this agent in the audit event If the element is present, it must have either a @value, an @id, or extensions