{
"package" : "hl7.terminology.r4@6.3.0",
"definition" : "Security observation values used to indicate security alteration integrity metadata.\\r\\n\\r\\n**Examples:** Codes conveying the provenance of an IT resource such as the entity responsible for a report or assertion relayed \\\"second-hand\\\" about an IT resource.\\r\\n\\r\\n*Usage Note:* SecurityIntegrityProvenanceObservationValue codes are members of a security label \\\"tag set\\\" used to populate or \\\"tag\\\" a security label field named by the associated SecurityIntegrityProvenanceObservationType code. \\\\[FIPS 188\\\\]",
"system" : "http://terminology.hl7.org/CodeSystem/conceptdomains",
"property" : [ {
"code" : "source",
"valueCode" : "v3"
}, {
"code" : "contextBindingR1-valueSet",
"valueString" : "2.16.840.1.113883.1.11.20485"
}, {
"code" : "contextBindingR1-strength",
"valueCode" : "CWE"
}, {
"code" : "contextBindingR1-effectiveDate",
"valueDateTime" : "2020-01-01"
}, {
"_uri" : "http://hl7.org/fhir/concept-properties#parent",
"code" : "parent",
"_implicit" : true,
"valueCode" : "SecurityIntegrityObservationValue"
}, {
"_uri" : "http://hl7.org/fhir/concept-properties#child",
"code" : "child",
"_implicit" : true,
"valueCode" : "SecurityIntegrityProvenanceAssertedByObservationValue"
}, {
"_uri" : "http://hl7.org/fhir/concept-properties#child",
"code" : "child",
"_implicit" : true,
"valueCode" : "SecurityIntegrityProvenanceReportedByObservationValue"
} ],
"codesystem" : "33eb862a-4e29-55df-b067-9b9d45b786af",
"concept_id" : "83c522c6-7899-5d3f-bc53-354edaa65e44",
"ancestors" : {
"ObservationValue" : 3,
"SecurityObservationValue" : 2,
"SecurityIntegrityObservationValue" : 1,
"SecurityIntegrityProvenanceObservationValue" : 0
},
"id" : "bc504a93-f5d1-4ee6-9390-07ecd3411d07",
"code" : "SecurityIntegrityProvenanceObservationValue",
"display" : "SecurityIntegrityProvenanceObservationValue",
"version" : "3.0.0"
}