{
  "package" : "hl7.terminology.r4@6.3.0",
  "definition" : "Security observation values used to indicate security alteration integrity metadata.\\r\\n\\r\\n**Examples:** Codes conveying the provenance of an IT resource such as the entity responsible for a report or assertion relayed \\\"second-hand\\\" about an IT resource.\\r\\n\\r\\n*Usage Note:* SecurityIntegrityProvenanceObservationValue codes are members of a security label \\\"tag set\\\" used to populate or \\\"tag\\\" a security label field named by the associated SecurityIntegrityProvenanceObservationType code. \\\\[FIPS 188\\\\]",
  "system" : "http://terminology.hl7.org/CodeSystem/conceptdomains",
  "property" : [ {
    "code" : "source",
    "valueCode" : "v3"
  }, {
    "code" : "contextBindingR1-valueSet",
    "valueString" : "2.16.840.1.113883.1.11.20485"
  }, {
    "code" : "contextBindingR1-strength",
    "valueCode" : "CWE"
  }, {
    "code" : "contextBindingR1-effectiveDate",
    "valueDateTime" : "2020-01-01"
  }, {
    "_uri" : "http://hl7.org/fhir/concept-properties#parent",
    "code" : "parent",
    "_implicit" : true,
    "valueCode" : "SecurityIntegrityObservationValue"
  }, {
    "_uri" : "http://hl7.org/fhir/concept-properties#child",
    "code" : "child",
    "_implicit" : true,
    "valueCode" : "SecurityIntegrityProvenanceAssertedByObservationValue"
  }, {
    "_uri" : "http://hl7.org/fhir/concept-properties#child",
    "code" : "child",
    "_implicit" : true,
    "valueCode" : "SecurityIntegrityProvenanceReportedByObservationValue"
  } ],
  "codesystem" : "33eb862a-4e29-55df-b067-9b9d45b786af",
  "concept_id" : "83c522c6-7899-5d3f-bc53-354edaa65e44",
  "ancestors" : {
    "ObservationValue" : 3,
    "SecurityObservationValue" : 2,
    "SecurityIntegrityObservationValue" : 1,
    "SecurityIntegrityProvenanceObservationValue" : 0
  },
  "id" : "bc504a93-f5d1-4ee6-9390-07ecd3411d07",
  "code" : "SecurityIntegrityProvenanceObservationValue",
  "display" : "SecurityIntegrityProvenanceObservationValue",
  "version" : "3.0.0"
}