eHealth Platform Federal infsec Profiles
1.2.0 - STU1
This page is part of the eHealth FHIR Infrastructure and Security Profiles for Belgium (v1.2.0: Release) based on FHIR (HL7® FHIR® Standard) R4. This is the current published version. For a full list of available versions, see the Directory of published versions
Official URL: https://www.ehealth.fgov.be/standards/fhir/infsec/ValueSet/be-vs-pseudonymization-type | Version: 1.2.0 | |||
Active as of 2024-11-12 | Computable Name: BeVSPseudonymizationType |
The technique used for pseudonymization
References
Generated Narrative: ValueSet be-vs-pseudonymization-type
https://www.ehealth.fgov.be/standards/fhir/infsec/CodeSystem/be-cs-pseudonymization-type
Generated Narrative: ValueSet
Expansion based on codesystem Types of pseudonymization v1.2.0 (CodeSystem)
This value set contains 2 concepts
Code | System | Display |
direct | https://www.ehealth.fgov.be/standards/fhir/infsec/CodeSystem/be-cs-pseudonymization-type | Direct pseudonym, for text shorter than 32 bytes |
encrypted | https://www.ehealth.fgov.be/standards/fhir/infsec/CodeSystem/be-cs-pseudonymization-type | Encrypted pseudonym, for text longer than 32 bytes |
Explanation of the columns that may appear on this page:
Level | A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies |
System | The source of the definition of the code (when the value set draws in codes defined elsewhere) |
Code | The code (used as the code in the resource instance) |
Display | The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application |
Definition | An explanation of the meaning of the concept |
Comments | Additional notes about how to use the code |