001package org.hl7.fhir.r4.model.codesystems; 002 003/* 004 Copyright (c) 2011+, HL7, Inc. 005 All rights reserved. 006 007 Redistribution and use in source and binary forms, with or without modification, 008 are permitted provided that the following conditions are met: 009 010 * Redistributions of source code must retain the above copyright notice, this 011 list of conditions and the following disclaimer. 012 * Redistributions in binary form must reproduce the above copyright notice, 013 this list of conditions and the following disclaimer in the documentation 014 and/or other materials provided with the distribution. 015 * Neither the name of HL7 nor the names of its contributors may be used to 016 endorse or promote products derived from this software without specific 017 prior written permission. 018 019 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND 020 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 021 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 022 IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, 023 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 024 NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 025 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 026 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 027 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 028 POSSIBILITY OF SUCH DAMAGE. 029 030*/ 031 032// Generated on Thu, Sep 13, 2018 09:04-0400 for FHIR v3.5.0 033 034 035import org.hl7.fhir.exceptions.FHIRException; 036 037public enum V3ObservationValue { 038 039 /** 040 * Codes specify the category of observation, evidence, or document used to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. The type of evidence is coded as observation values. 041 */ 042 _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE, 043 /** 044 * Code specifying financial indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay stub; tax or income document; asset document; living expenses. 045 */ 046 _ACTFINANCIALSTATUSOBSERVATIONVALUE, 047 /** 048 * Codes specifying asset indicators used to assess or establish eligibility for coverage under a policy or program. 049 */ 050 ASSET, 051 /** 052 * Indicator of annuity ownership or status as beneficiary. 053 */ 054 ANNUITY, 055 /** 056 * Indicator of real property ownership, e.g., deed or real estate contract. 057 */ 058 PROP, 059 /** 060 * Indicator of retirement investment account ownership. 061 */ 062 RETACCT, 063 /** 064 * Indicator of status as trust beneficiary. 065 */ 066 TRUST, 067 /** 068 * Code specifying income indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay or pension check, child support payments received or provided, and taxes paid. 069 */ 070 INCOME, 071 /** 072 * Indicator of child support payments received or provided. 073 */ 074 CHILD, 075 /** 076 * Indicator of disability income replacement payment. 077 */ 078 DISABL, 079 /** 080 * Indicator of investment income, e.g., dividend check, annuity payment; real estate rent, investment divestiture proceeds; trust or endowment check. 081 */ 082 INVEST, 083 /** 084 * Indicator of paid employment, e.g., letter of hire, contract, employer letter; copy of pay check or pay stub. 085 */ 086 PAY, 087 /** 088 * Indicator of retirement payment, e.g., pension check. 089 */ 090 RETIRE, 091 /** 092 * Indicator of spousal or partner support payments received or provided; e.g., alimony payment; support stipulations in a divorce settlement. 093 */ 094 SPOUSAL, 095 /** 096 * Indicator of income supplement, e.g., gifting, parental income support; stipend, or grant. 097 */ 098 SUPPLE, 099 /** 100 * Indicator of tax obligation or payment, e.g., statement of taxable income. 101 */ 102 TAX, 103 /** 104 * Codes specifying living expense indicators used to assess or establish eligibility for coverage under a policy or program. 105 */ 106 LIVEXP, 107 /** 108 * Indicator of clothing expenses. 109 */ 110 CLOTH, 111 /** 112 * Indicator of transportation expenses. 113 */ 114 FOOD, 115 /** 116 * Indicator of health expenses; including medication costs, health service costs, financial participations, and health coverage premiums. 117 */ 118 HEALTH, 119 /** 120 * Indicator of housing expense, e.g., household appliances, fixtures, furnishings, and maintenance and repairs. 121 */ 122 HOUSE, 123 /** 124 * Indicator of legal expenses. 125 */ 126 LEGAL, 127 /** 128 * Indicator of mortgage amount, interest, and payments. 129 */ 130 MORTG, 131 /** 132 * Indicator of rental or lease payments. 133 */ 134 RENT, 135 /** 136 * Indicator of transportation expenses. 137 */ 138 SUNDRY, 139 /** 140 * Indicator of transportation expenses, e.g., vehicle payments, vehicle insurance, vehicle fuel, and vehicle maintenance and repairs. 141 */ 142 TRANS, 143 /** 144 * Indicator of transportation expenses. 145 */ 146 UTIL, 147 /** 148 * Code specifying eligibility indicators used to assess or establish eligibility for coverage under a policy or program eligibility status, e.g., certificates of creditable coverage; student enrollment; adoption, marriage or birth certificate. 149 */ 150 ELSTAT, 151 /** 152 * Indicator of adoption. 153 */ 154 ADOPT, 155 /** 156 * Indicator of birth. 157 */ 158 BTHCERT, 159 /** 160 * Indicator of creditable coverage. 161 */ 162 CCOC, 163 /** 164 * Indicator of driving status. 165 */ 166 DRLIC, 167 /** 168 * Indicator of foster child status. 169 */ 170 FOSTER, 171 /** 172 * Indicator of status as covered member under a policy or program, e.g., member id card or coverage document. 173 */ 174 MEMBER, 175 /** 176 * Indicator of military status. 177 */ 178 MIL, 179 /** 180 * Indicator of marriage status. 181 */ 182 MRGCERT, 183 /** 184 * Indicator of citizenship. 185 */ 186 PASSPORT, 187 /** 188 * Indicator of student status. 189 */ 190 STUDENRL, 191 /** 192 * Code specifying non-clinical indicators related to health status used to assess or establish eligibility for coverage under a policy or program, e.g., pregnancy, disability, drug use, mental health issues. 193 */ 194 HLSTAT, 195 /** 196 * Indication of disability. 197 */ 198 DISABLE, 199 /** 200 * Indication of drug use. 201 */ 202 DRUG, 203 /** 204 * Indication of IV drug use . 205 */ 206 IVDRG, 207 /** 208 * Non-clinical report of pregnancy. 209 */ 210 PGNT, 211 /** 212 * Code specifying observations related to living dependency, such as dependent upon spouse for activities of daily living. 213 */ 214 LIVDEP, 215 /** 216 * Continued living in private residence requires functional and health care assistance from one or more relatives. 217 */ 218 RELDEP, 219 /** 220 * Continued living in private residence requires functional and health care assistance from spouse or life partner. 221 */ 222 SPSDEP, 223 /** 224 * Continued living in private residence requires functional and health care assistance from one or more unrelated persons. 225 */ 226 URELDEP, 227 /** 228 * Code specifying observations related to living situation for a person in a private residence. 229 */ 230 LIVSIT, 231 /** 232 * Living alone. Maps to PD1-2 Living arrangement (IS) 00742 [A] 233 */ 234 ALONE, 235 /** 236 * Living with one or more dependent children requiring moderate supervision. 237 */ 238 DEPCHD, 239 /** 240 * Living with disabled spouse requiring functional and health care assistance 241 */ 242 DEPSPS, 243 /** 244 * Living with one or more dependent children requiring intensive supervision 245 */ 246 DEPYGCHD, 247 /** 248 * Living with family. Maps to PD1-2 Living arrangement (IS) 00742 [F] 249 */ 250 FAM, 251 /** 252 * Living with one or more relatives. Maps to PD1-2 Living arrangement (IS) 00742 [R] 253 */ 254 RELAT, 255 /** 256 * Living only with spouse or life partner. Maps to PD1-2 Living arrangement (IS) 00742 [S] 257 */ 258 SPS, 259 /** 260 * Living with one or more unrelated persons. 261 */ 262 UNREL, 263 /** 264 * Code specifying observations or indicators related to socio-economic status used to assess to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. 265 */ 266 SOECSTAT, 267 /** 268 * Indication of abuse victim. 269 */ 270 ABUSE, 271 /** 272 * Indication of status as homeless. 273 */ 274 HMLESS, 275 /** 276 * Indication of status as illegal immigrant. 277 */ 278 ILGIM, 279 /** 280 * Indication of status as incarcerated. 281 */ 282 INCAR, 283 /** 284 * Indication of probation status. 285 */ 286 PROB, 287 /** 288 * Indication of refugee status. 289 */ 290 REFUG, 291 /** 292 * Indication of unemployed status. 293 */ 294 UNEMPL, 295 /** 296 * Indicates the result of a particular allergy test. E.g. Negative, Mild, Moderate, Severe 297 */ 298 _ALLERGYTESTVALUE, 299 /** 300 * Description:Patient exhibits no reaction to the challenge agent. 301 */ 302 A0, 303 /** 304 * Description:Patient exhibits a minimal reaction to the challenge agent. 305 */ 306 A1, 307 /** 308 * Description:Patient exhibits a mild reaction to the challenge agent. 309 */ 310 A2, 311 /** 312 * Description:Patient exhibits moderate reaction to the challenge agent. 313 */ 314 A3, 315 /** 316 * Description:Patient exhibits a severe reaction to the challenge agent. 317 */ 318 A4, 319 /** 320 * Observation values that communicate the method used in a quality measure to combine the component measure results included in an composite measure. 321 */ 322 _COMPOSITEMEASURESCORING, 323 /** 324 * Code specifying that the measure uses all-or-nothing scoring. All-or-nothing scoring places an individual in the numerator of the composite measure if and only if they are in the numerator of all component measures in which they are in the denominator. 325 */ 326 ALLORNONESCR, 327 /** 328 * Code specifying that the measure uses linear scoring. Linear scoring computes the fraction of component measures in which the individual appears in the numerator, giving equal weight to each component measure. 329 */ 330 LINEARSCR, 331 /** 332 * Code specifying that the measure uses opportunity-based scoring. In opportunity-based scoring the measure score is determined by combining the denominator and numerator of each component measure to determine an overall composite score. 333 */ 334 OPPORSCR, 335 /** 336 * Code specifying that the measure uses weighted scoring. Weighted scoring assigns a factor to each component measure to weight that measure's contribution to the overall score. 337 */ 338 WEIGHTSCR, 339 /** 340 * Description:Coded observation values for coverage limitations, for e.g., types of claims or types of parties covered under a policy or program. 341 */ 342 _COVERAGELIMITOBSERVATIONVALUE, 343 /** 344 * Description:Coded observation values for types of covered parties under a policy or program based on their personal relationships or employment status. 345 */ 346 _COVERAGELEVELOBSERVATIONVALUE, 347 /** 348 * Description:Child over an age as specified by coverage policy or program, e.g., student, differently abled, and income dependent. 349 */ 350 ADC, 351 /** 352 * Description:Dependent biological, adopted, foster child as specified by coverage policy or program. 353 */ 354 CHD, 355 /** 356 * Description:Person requiring functional and/or financial assistance from another person as specified by coverage policy or program. 357 */ 358 DEP, 359 /** 360 * Description:Persons registered as a family unit in a domestic partner registry as specified by law and by coverage policy or program. 361 */ 362 DP, 363 /** 364 * Description:An individual employed by an employer who receive remuneration in wages, salary, commission, tips, piece-rates, or pay-in-kind through the employeraTMs payment system (i.e., not a contractor) as specified by coverage policy or program. 365 */ 366 ECH, 367 /** 368 * Description:As specified by coverage policy or program. 369 */ 370 FLY, 371 /** 372 * Description:Person as specified by coverage policy or program. 373 */ 374 IND, 375 /** 376 * Description:A pair of people of the same gender who live together as a family as specified by coverage policy or program, e.g., Naomi and Ruth from the Book of Ruth; Socrates and Alcibiades 377 */ 378 SSP, 379 /** 380 * A clinical judgment as to the worst case result of a future exposure (including substance administration). When the worst case result is assessed to have a life-threatening or organ system threatening potential, it is considered to be of high criticality. 381 */ 382 _CRITICALITYOBSERVATIONVALUE, 383 /** 384 * Worst case result of a future exposure is assessed to be life-threatening or having high potential for organ system failure. 385 */ 386 CRITH, 387 /** 388 * Worst case result of a future exposure is not assessed to be life-threatening or having high potential for organ system failure. 389 */ 390 CRITL, 391 /** 392 * Unable to assess the worst case result of a future exposure. 393 */ 394 CRITU, 395 /** 396 * Concepts representing whether a person does or does not currently have a job or is not currently in the labor pool seeking employment. 397 */ 398 _EMPLOYMENTSTATUS, 399 /** 400 * Individuals who, during the last week: a) did any work for at least 1 hour as paid or unpaid employees of a business or government organization; worked in their own businesses, professions, or on their own farms; or b) were not working, but who have a job or business from which the individual was temporarily absent because of vacation, illness, bad weather, childcare problems, maternity or paternity leave, labor-management dispute, job training, or other family or personal reasons, regardless of whether or not they were paid for the time off or were seeking other jobs. 401 */ 402 EMPLOYED, 403 /** 404 * Persons not classified as employed or unemployed, meaning those who have no job and are not looking for one. 405 */ 406 NOTINLABORFORCE, 407 /** 408 * Persons who currently have no employment, but are available for work and have made specific efforts to find employment. 409 */ 410 UNEMPLOYED, 411 /** 412 * Description: The domain contains genetic analysis specific observation values, e.g. Homozygote, Heterozygote, etc. 413 */ 414 _GENETICOBSERVATIONVALUE, 415 /** 416 * Description: An individual having different alleles at one or more loci regarding a specific character 417 */ 418 HOMOZYGOTE, 419 /** 420 * Observation values used to indicate the type of scoring (e.g. proportion, ratio) used by a health quality measure. 421 */ 422 _OBSERVATIONMEASURESCORING, 423 /** 424 * A measure in which either short-term cross-section or long-term longitudinal analysis is performed over a group of subjects defined by a set of common properties or defining characteristics (e.g., Male smokers between the ages of 40 and 50 years, exposure to treatment, exposure duration). 425 */ 426 COHORT, 427 /** 428 * A measure score in which each individual value for the measure can fall anywhere along a continuous scale (e.g., mean time to thrombolytics which aggregates the time in minutes from a case presenting with chest pain to the time of administration of thrombolytics). 429 */ 430 CONTVAR, 431 /** 432 * A score derived by dividing the number of cases that meet a criterion for quality (the numerator) by the number of eligible cases within a given time frame (the denominator) where the numerator cases are a subset of the denominator cases (e.g., percentage of eligible women with a mammogram performed in the last year). 433 */ 434 PROPOR, 435 /** 436 * A score that may have a value of zero or greater that is derived by dividing a count of one type of data by a count of another type of data (e.g., the number of patients with central lines who develop infection divided by the number of central line days). 437 */ 438 RATIO, 439 /** 440 * Observation values used to indicate what kind of health quality measure is used. 441 */ 442 _OBSERVATIONMEASURETYPE, 443 /** 444 * A measure that is composed from one or more other measures and indicates an overall summary of those measures. 445 */ 446 COMPOSITE, 447 /** 448 * A measure related to the efficiency of medical treatment. 449 */ 450 EFFICIENCY, 451 /** 452 * A measure related to the level of patient engagement or patient experience of care. 453 */ 454 EXPERIENCE, 455 /** 456 * A measure that indicates the result of the performance (or non-performance) of a function or process. 457 */ 458 OUTCOME, 459 /** 460 * A measure that evaluates the change over time of a physiologic state observable that is associated with a specific long-term health outcome. 461 */ 462 INTERMOM, 463 /** 464 * A measure that is a comparison of patient reported outcomes for a single or multiple patients collected via an instrument specifically designed to obtain input directly from patients. 465 */ 466 PROPM, 467 /** 468 * A measure which focuses on a process which leads to a certain outcome, meaning that a scientific basis exists for believing that the process, when executed well, will increase the probability of achieving a desired outcome. 469 */ 470 PROCESS, 471 /** 472 * A measure that assesses the use of one or more processes where the expected health benefit exceeds the expected negative consequences. 473 */ 474 APPROPRIATE, 475 /** 476 * A measure related to the extent of use of clinical resources or cost of care. 477 */ 478 RESOURCE, 479 /** 480 * A measure related to the structure of patient care. 481 */ 482 STRUCTURE, 483 /** 484 * Observation values used to assert various populations that a subject falls into. 485 */ 486 _OBSERVATIONPOPULATIONINCLUSION, 487 /** 488 * Patients who should be removed from the eMeasure population and denominator before determining if numerator criteria are met. Denominator exclusions are used in proportion and ratio measures to help narrow the denominator. 489 */ 490 DENEX, 491 /** 492 * Denominator exceptions are those conditions that should remove a patient, procedure or unit of measurement from the denominator only if the numerator criteria are not met. Denominator exceptions allow for adjustment of the calculated score for those providers with higher risk populations. Denominator exceptions are used only in proportion eMeasures. They are not appropriate for ratio or continuous variable eMeasures. Denominator exceptions allow for the exercise of clinical judgment and should be specifically defined where capturing the information in a structured manner fits the clinical workflow. Generic denominator exception reasons used in proportion eMeasures fall into three general categories: 493 494 495 Medical reasons 496 Patient reasons 497 System reasons 498 */ 499 DENEXCEP, 500 /** 501 * It can be the same as the initial patient population or a subset of the initial patient population to further constrain the population for the purpose of the eMeasure. Different measures within an eMeasure set may have different Denominators. Continuous Variable eMeasures do not have a Denominator, but instead define a Measure Population. 502 */ 503 DENOM, 504 /** 505 * The initial population refers to all entities to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. 506 */ 507 IP, 508 /** 509 * The initial patient population refers to all patients to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. Details often include information based upon specific age groups, diagnoses, diagnostic and procedure codes, and enrollment periods. 510 */ 511 IPP, 512 /** 513 * Measure population is used only in continuous variable eMeasures. It is a narrative description of the eMeasure population. 514(e.g., all patients seen in the Emergency Department during the measurement period). 515 */ 516 MSRPOPL, 517 /** 518 * Numerators are used in proportion and ratio eMeasures. In proportion measures the numerator criteria are the processes or outcomes expected for each patient, procedure, or other unit of measurement defined in the denominator. In ratio measures the numerator is related, but not directly derived from the denominator (e.g., a numerator listing the number of central line blood stream infections and a denominator indicating the days per thousand of central line usage in a specific time period). 519 */ 520 NUMER, 521 /** 522 * Numerator Exclusions are used only in ratio eMeasures to define instances that should not be included in the numerator data. (e.g., if the number of central line blood stream infections per 1000 catheter days were to exclude infections with a specific bacterium, that bacterium would be listed as a numerator exclusion.) 523 */ 524 NUMEX, 525 /** 526 * PartialCompletionScale 527 */ 528 _PARTIALCOMPLETIONSCALE, 529 /** 530 * Value for Act.partialCompletionCode attribute that implies 81-99% completion 531 */ 532 G, 533 /** 534 * Value for Act.partialCompletionCode attribute that implies 61-80% completion 535 */ 536 LE, 537 /** 538 * Value for Act.partialCompletionCode attribute that implies 41-60% completion 539 */ 540 ME, 541 /** 542 * Value for Act.partialCompletionCode attribute that implies 1-20% completion 543 */ 544 MI, 545 /** 546 * Value for Act.partialCompletionCode attribute that implies 0% completion 547 */ 548 N, 549 /** 550 * Value for Act.partialCompletionCode attribute that implies 21-40% completion 551 */ 552 S, 553 /** 554 * Observation values used to indicate security observation metadata. 555 */ 556 _SECURITYOBSERVATIONVALUE, 557 /** 558 * Abstract security observation values used to indicate security integrity metadata. 559 560 561 Examples: Codes conveying integrity status, integrity confidence, and provenance. 562 */ 563 _SECINTOBV, 564 /** 565 * Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability) 566 */ 567 _SECALTINTOBV, 568 /** 569 * Security metadata observation values used to indicate the use of a more abstract version of the content, e.g., replacing exact value of an age or date field with a range, or remove the left digits of a credit card number or SSN. 570 */ 571 ABSTRED, 572 /** 573 * Security metadata observation values used to indicate the use of an algorithmic combination of actual values with the result of an aggregate function, e.g., average, sum, or count in order to limit disclosure of an IT resource (data, information object, service, or system capability) to the minimum necessary. 574 */ 575 AGGRED, 576 /** 577 * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by used to indicate the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject. No key to relink the data is retained. 578 */ 579 ANONYED, 580 /** 581 * Security metadata observation value used to indicate that the IT resource semantic content has been transformed from one encoding to another. 582 583 584 Usage Note: "MAP" code does not indicate the semantic fidelity of the transformed content. 585 586 To indicate semantic fidelity for maps of HL7 to other code systems, this security alteration integrity observation may be further specified using an Act valued with Value Set: MapRelationship (2.16.840.1.113883.1.11.11052). 587 588 Semantic fidelity of the mapped IT Resource may also be indicated using a SecurityIntegrityConfidenceObservation. 589 */ 590 MAPPED, 591 /** 592 * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by indicating the mechanism by which software systems can make data unintelligible (that is, as unreadable and unusable by algorithmically transforming plaintext into ciphertext) such that it can only be accessed or used by authorized users. An authorized user may be provided a key to decrypt per license or "shared secret". 593 594 595 Usage Note: "MASKED" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has been further encrypted, and may be accessed only by an authorized user or receiver to which a decryption key is provided. 596 */ 597 MASKED, 598 /** 599 * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability), by indicating the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject. Custodian may retain a key to relink data necessary to reidentify the information subject. 600 601 602 Rationale: Personal data which has been processed to make it impossible to know whose data it is. Used particularly for secondary use of health data. In some cases, it may be possible for authorized individuals to restore the identity of the individual, e.g.,for public health case management. Based on ISO/TS 25237:2008 Health informatics—Pseudonymization 603 */ 604 PSEUDED, 605 /** 606 * Security metadata observation value used to indicate the mechanism by which software systems can filter an IT resource (data, information object, service, or system capability) to remove any portion of the resource that is not authorized to be access, used, or disclosed. 607 608 609 Usage Note: "REDACTED" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has filtered and not included in the content accessed or received. 610 */ 611 REDACTED, 612 /** 613 * Metadata observation used to indicate that some information has been removed from the source object when the view this object contains was constructed because of configuration options when the view was created. The content may not be suitable for use as the basis of a record update 614 615 616 Usage Note: This is not suitable to be used when information is removed for security reasons - see the code REDACTED for this use. 617 */ 618 SUBSETTED, 619 /** 620 * Security metadata observation value used to indicate that the IT resource syntax has been transformed from one syntactical representation to another. 621 622 623 Usage Note: "SYNTAC" code does not indicate the syntactical correctness of the syntactically transformed IT resource. 624 */ 625 SYNTAC, 626 /** 627 * Security metadata observation value used to indicate that the IT resource has been translated from one human language to another. 628 629 630 Usage Note: "TRSLT" does not indicate the fidelity of the translation or the languages translated. 631 632 The fidelity of the IT Resource translation may be indicated using a SecurityIntegrityConfidenceObservation. 633 634 To indicate languages, use the Value Set:HumanLanguage (2.16.840.1.113883.1.11.11526) 635 */ 636 TRSLT, 637 /** 638 * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) which indicates that the resource only retains versions of an IT resource for access and use per applicable policy 639 640 641 Usage Note: When this code is used, expectation is that the system has removed historical versions of the data that falls outside the time period deemed to be the effective time of the applicable version. 642 */ 643 VERSIONED, 644 /** 645 * Abstract security observation values used to indicate data integrity metadata. 646 647 648 Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function. 649 */ 650 _SECDATINTOBV, 651 /** 652 * Security metadata observation value used to indicate the mechanism by which software systems can establish that data was not modified in transit. 653 654 655 Rationale: This definition is intended to align with the ISO 22600-2 3.3.19 definition of cryptographic checkvalue: Information which is derived by performing a cryptographic transformation (see cryptography) on the data unit. The derivation of the checkvalue may be performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit. 656 657 658 Examples: 659 660 661 662 SHA-1 663 SHA-2 (Secure Hash Algorithm) 664 */ 665 CRYTOHASH, 666 /** 667 * Security metadata observation value used to indicate the mechanism by which software systems use digital signature to establish that data has not been modified. 668 669 670 Rationale: This definition is intended to align with the ISO 22600-2 3.3.26 definition of digital signature: Data appended to, or a cryptographic transformation (see cryptography) of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g., by the recipient. 671 */ 672 DIGSIG, 673 /** 674 * Abstract security observation value used to indicate integrity confidence metadata. 675 676 677 Examples: Codes conveying the level of reliability and trustworthiness of an IT resource. 678 */ 679 _SECINTCONOBV, 680 /** 681 * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be very high. 682 */ 683 HRELIABLE, 684 /** 685 * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be adequate. 686 */ 687 RELIABLE, 688 /** 689 * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be uncertain. 690 */ 691 UNCERTREL, 692 /** 693 * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be inadequate. 694 */ 695 UNRELIABLE, 696 /** 697 * Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability). 698 699 700 Examples: Codes conveying the provenance metadata about the entity reporting an IT resource. 701 */ 702 _SECINTPRVOBV, 703 /** 704 * Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability). 705 706 707 Examples: Codes conveying the provenance metadata about the entity asserting the resource. 708 */ 709 _SECINTPRVABOBV, 710 /** 711 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a clinician. 712 */ 713 CLINAST, 714 /** 715 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a device. 716 */ 717 DEVAST, 718 /** 719 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a healthcare professional. 720 */ 721 HCPAST, 722 /** 723 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient acquaintance. 724 */ 725 PACQAST, 726 /** 727 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient. 728 */ 729 PATAST, 730 /** 731 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a payer. 732 */ 733 PAYAST, 734 /** 735 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a professional. 736 */ 737 PROAST, 738 /** 739 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a substitute decision maker. 740 */ 741 SDMAST, 742 /** 743 * Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability). 744 745 746 Examples: Codes conveying the provenance metadata about the entity reporting an IT resource. 747 */ 748 _SECINTPRVRBOBV, 749 /** 750 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a clinician. 751 */ 752 CLINRPT, 753 /** 754 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a device. 755 */ 756 DEVRPT, 757 /** 758 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a healthcare professional. 759 */ 760 HCPRPT, 761 /** 762 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient acquaintance. 763 */ 764 PACQRPT, 765 /** 766 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient. 767 */ 768 PATRPT, 769 /** 770 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a payer. 771 */ 772 PAYRPT, 773 /** 774 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a professional. 775 */ 776 PRORPT, 777 /** 778 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a substitute decision maker. 779 */ 780 SDMRPT, 781 /** 782 * Observation value used to indicate aspects of trust applicable to an IT resource (data, information object, service, or system capability). 783 */ 784 SECTRSTOBV, 785 /** 786 * Values for security trust accreditation metadata observation made about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework. 787 */ 788 TRSTACCRDOBV, 789 /** 790 * Values for security trust agreement metadata observation made about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1] 791[ISO IEC 10181-1] 792 */ 793 TRSTAGREOBV, 794 /** 795 * Values for security trust certificate metadata observation made about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1] 796 797 For example, a Certificate Policy (CP), which is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. A particular Certificate Policy might indicate the applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range. Another example is Cross Certification with Federal Bridge. 798 */ 799 TRSTCERTOBV, 800 /** 801 * Values for security trust assurance metadata observation made about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol. 802 */ 803 TRSTLOAOBV, 804 /** 805 * The value assigned as the indicator of the digital quality or reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 806 807 For example, the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 808 */ 809 LOAAN, 810 /** 811 * Indicator of low digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 812 813 The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 814 815 Low authentication level of assurance indicates that the relying party may have little or no confidence in the asserted identity's validity. Level 1 requires little or no confidence in the asserted identity. No identity proofing is required at this level, but the authentication mechanism should provide some assurance that the same claimant is accessing the protected transaction or data. A wide range of available authentication technologies can be employed and any of the token methods of Levels 2, 3, or 4, including Personal Identification Numbers (PINs), may be used. To be authenticated, the claimant must prove control of the token through a secure authentication protocol. At Level 1, long-term shared authentication secrets may be revealed to verifiers. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 816 */ 817 LOAAN1, 818 /** 819 * Indicator of basic digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 820 821 The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 822 823 Basic authentication level of assurance indicates that the relying party may have some confidence in the asserted identity's validity. Level 2 requires confidence that the asserted identity is accurate. Level 2 provides for single-factor remote network authentication, including identity-proofing requirements for presentation of identifying materials or information. A wide range of available authentication technologies can be employed, including any of the token methods of Levels 3 or 4, as well as passwords. Successful authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, and online guessing attacks are prevented. 824Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are required. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 825 */ 826 LOAAN2, 827 /** 828 * Indicator of medium digital quality or reliability of the digital reliability of verification and validation of the process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 829 830 The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 831 832 Medium authentication level of assurance indicates that the relying party may have high confidence in the asserted identity's validity. Level 3 is appropriate for transactions that need high confidence in the accuracy of the asserted identity. Level 3 provides multifactor remote network authentication. At this level, identity-proofing procedures require verification of identifying materials and information. Authentication is based on proof of possession of a key or password through a cryptographic protocol. Cryptographic strength mechanisms should protect the primary authentication token (a cryptographic key) against compromise by the protocol threats, including eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks. A minimum of two authentication factors is required. Three kinds of tokens may be used: 833 834 835 "soft" cryptographic token, which has the key stored on a general-purpose computer, 836 "hard" cryptographic token, which has the key stored on a special hardware device, and 837 "one-time password" device token, which has symmetric key stored on a personal hardware device that is a cryptographic module validated at FIPS 140-2 Level 1 or higher. Validation testing of cryptographic modules and algorithms for conformance to Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, is managed by NIST. 838 839 Authentication requires that the claimant prove control of the token through a secure authentication protocol. The token must be unlocked with a password or biometric representation, or a password must be used in a secure authentication protocol, to establish two-factor authentication. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are used for all operations. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 840 */ 841 LOAAN3, 842 /** 843 * Indicator of high digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 844 845 The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 846 847 High authentication level of assurance indicates that the relying party may have very high confidence in the asserted identity's validity. Level 4 is for transactions that need very high confidence in the accuracy of the asserted identity. Level 4 provides the highest practical assurance of remote network authentication. Authentication is based on proof of possession of a key through a cryptographic protocol. This level is similar to Level 3 except that only “hard� cryptographic tokens are allowed, cryptographic module validation requirements are strengthened, and subsequent critical data transfers must be authenticated via a key that is bound to the authentication process. The token should be a hardware cryptographic module validated at FIPS 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. This level requires a physical token, which cannot readily be copied, and operator authentication at Level 2 and higher, and ensures good, two-factor remote authentication. 848 849 Level 4 requires strong cryptographic authentication of all parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks are prevented. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Strong approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 850 */ 851 LOAAN4, 852 /** 853 * The value assigned as the indicator of the digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 854 */ 855 LOAAP, 856 /** 857 * Indicator of the low digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 858 859 Low authentication process level of assurance indicates that (1) long-term shared authentication secrets may be revealed to verifiers; and (2) assertions and assertion references require protection from manufacture/modification and reuse attacks. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 860 */ 861 LOAAP1, 862 /** 863 * Indicator of the basic digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 864 865 Basic authentication process level of assurance indicates that long-term shared authentication secrets are never revealed to any other party except Credential Service Provider (CSP). Sessions (temporary) shared secrets may be provided to independent verifiers by CSP. Long-term shared authentication secrets, if used, are never revealed to any other party except Verifiers operated by the Credential Service Provider (CSP); however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 1 requirements, assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 866 */ 867 LOAAP2, 868 /** 869 * Indicator of the medium digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 870 871 Medium authentication process level of assurance indicates that the token can be unlocked with password, biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication. Long-term shared authentication secrets are never revealed to any party except the Claimant and Credential Service Provider (CSP). 872 873 Authentication requires that the Claimant prove, through a secure authentication protocol, that he or she controls the token. The Claimant unlocks the token with a password or biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication (through proof of possession of a physical or software token in combination with some memorized secret knowledge). Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 2 requirements, assertions are protected against repudiation by the Verifier. 874 */ 875 LOAAP3, 876 /** 877 * Indicator of the high digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 878 879 High authentication process level of assurance indicates all sensitive data transfer are cryptographically authenticated using keys bound to the authentication process. Level 4 requires strong cryptographic authentication of all communicating parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the Claimant prove through a secure authentication protocol that he or she controls the token. All protocol threats at Level 3 are required to be prevented at Level 4. Protocols shall also be strongly resistant to man-in-the-middle attacks. Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. Approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 880 */ 881 LOAAP4, 882 /** 883 * The value assigned as the indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 884 */ 885 LOAAS, 886 /** 887 * Indicator of the low quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 888 889 Assertions and assertion references require protection from modification and reuse attacks. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 890 */ 891 LOAAS1, 892 /** 893 * Indicator of the basic quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 894 895 Assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required for all assertion protocols. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 896 */ 897 LOAAS2, 898 /** 899 * Indicator of the medium quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 900 901 Assertions are protected against repudiation by the verifier. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 902 */ 903 LOAAS3, 904 /** 905 * Indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 906 907 Strongly resistant to man-in-the-middle attacks. "Bearer" assertions are not used. "Holder-of-key" assertions may be used. RP maintains records of the assertions. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 908 */ 909 LOAAS4, 910 /** 911 * Indicator of the digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 912 */ 913 LOACM, 914 /** 915 * Indicator of the low digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Little or no confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include weak identity binding to tokens and plaintext passwords or secrets not transmitted across a network. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 916 */ 917 LOACM1, 918 /** 919 * Indicator of the basic digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Some confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verification must prove claimant controls the token; token resists online guessing, replay, session hijacking, and eavesdropping attacks; and token is at least weakly resistant to man-in-the middle attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 920 */ 921 LOACM2, 922 /** 923 * Indicator of the medium digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity. High confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Ownership of token verifiable through security authentication protocol and credential management protects against verifier impersonation attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 924 */ 925 LOACM3, 926 /** 927 * Indicator of the high digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity. Very high confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verifier can prove control of token through a secure protocol; credential management supports strong cryptographic authentication of all communication parties. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 928 */ 929 LOACM4, 930 /** 931 * Indicator of the quality or reliability in the process of ascertaining that an individual is who he or she claims to be. 932 */ 933 LOAID, 934 /** 935 * Indicator of low digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires that a continuity of identity be maintained but does not require identity proofing. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 936 */ 937 LOAID1, 938 /** 939 * Indicator of some digital quality or reliability in the process of ascertaining that that an individual is who he or she claims to be. Requires identity proofing via presentation of identifying material or information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 940 */ 941 LOAID2, 942 /** 943 * Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 944 */ 945 LOAID3, 946 /** 947 * Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 948 */ 949 LOAID4, 950 /** 951 * Indicator of the digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 952 */ 953 LOANR, 954 /** 955 * Indicator of low digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 956 */ 957 LOANR1, 958 /** 959 * Indicator of basic digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 960 */ 961 LOANR2, 962 /** 963 * Indicator of medium digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 964 */ 965 LOANR3, 966 /** 967 * Indicator of high digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 968 */ 969 LOANR4, 970 /** 971 * Indicator of the digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2] 972 */ 973 LOARA, 974 /** 975 * Indicator of low digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2] 976 */ 977 LOARA1, 978 /** 979 * Indicator of basic digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2] 980 */ 981 LOARA2, 982 /** 983 * Indicator of medium digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2] 984 */ 985 LOARA3, 986 /** 987 * Indicator of high digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization's security controls. [Based on NIST SP 800-63-2] 988 */ 989 LOARA4, 990 /** 991 * Indicator of the digital quality or reliability of single and multi-token authentication. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 992 */ 993 LOATK, 994 /** 995 * Indicator of the low digital quality or reliability of single and multi-token authentication. Permits the use of any of the token methods of Levels 2, 3, or 4. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 996 */ 997 LOATK1, 998 /** 999 * Indicator of the basic digital quality or reliability of single and multi-token authentication. Requires single factor authentication using memorized secret tokens, pre-registered knowledge tokens, look-up secret tokens, out of band tokens, or single factor one-time password devices. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 1000 */ 1001 LOATK2, 1002 /** 1003 * Indicator of the medium digital quality or reliability of single and multi-token authentication. Requires two authentication factors. Provides multi-factor remote network authentication. Permits multi-factor software cryptographic token. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 1004 */ 1005 LOATK3, 1006 /** 1007 * Indicator of the high digital quality or reliability of single and multi-token authentication. Requires token that is a hardware cryptographic module validated at validated at Federal Information Processing Standard (FIPS) 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. Level 4 token requirements can be met by using the PIV authentication key of a FIPS 201 compliant Personal Identity Verification (PIV) Card. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 1008 */ 1009 LOATK4, 1010 /** 1011 * Values for security trust mechanism metadata observation made about a security architecture system component that supports enforcement of security policies. 1012 */ 1013 TRSTMECOBV, 1014 /** 1015 * Potential values for observations of severity. 1016 */ 1017 _SEVERITYOBSERVATION, 1018 /** 1019 * Indicates the condition may be life-threatening or has the potential to cause permanent injury. 1020 */ 1021 H, 1022 /** 1023 * Indicates the condition may result in some adverse consequences but is unlikely to substantially affect the situation of the subject. 1024 */ 1025 L, 1026 /** 1027 * Indicates the condition may result in noticable adverse adverse consequences but is unlikely to be life-threatening or cause permanent injury. 1028 */ 1029 M, 1030 /** 1031 * Contains codes for defining the observed, physical position of a subject, such as during an observation, assessment, collection of a specimen, etc. ECG waveforms and vital signs, such as blood pressure, are two examples where a general, observed position typically needs to be noted. 1032 */ 1033 _SUBJECTBODYPOSITION, 1034 /** 1035 * Lying on the left side. 1036 */ 1037 LLD, 1038 /** 1039 * Lying with the front or ventral surface downward; lying face down. 1040 */ 1041 PRN, 1042 /** 1043 * Lying on the right side. 1044 */ 1045 RLD, 1046 /** 1047 * A semi-sitting position in bed with the head of the bed elevated approximately 45 degrees. 1048 */ 1049 SFWL, 1050 /** 1051 * Resting the body on the buttocks, typically with upper torso erect or semi erect. 1052 */ 1053 SIT, 1054 /** 1055 * To be stationary, upright, vertical, on one's legs. 1056 */ 1057 STN, 1058 /** 1059 * supine 1060 */ 1061 SUP, 1062 /** 1063 * Lying on the back, on an inclined plane, typically about 30-45 degrees with head raised and feet lowered. 1064 */ 1065 RTRD, 1066 /** 1067 * Lying on the back, on an inclined plane, typically about 30-45 degrees, with head lowered and feet raised. 1068 */ 1069 TRD, 1070 /** 1071 * Values for observations of verification act results 1072 1073 1074 Examples: Verified, not verified, verified with warning. 1075 */ 1076 _VERIFICATIONOUTCOMEVALUE, 1077 /** 1078 * Definition: Coverage is in effect for healthcare service(s) and/or product(s). 1079 */ 1080 ACT, 1081 /** 1082 * Definition: Coverage is in effect for healthcare service(s) and/or product(s) - Pending Investigation 1083 */ 1084 ACTPEND, 1085 /** 1086 * Definition: Coverage is in effect for healthcare service(s) and/or product(s). 1087 */ 1088 ELG, 1089 /** 1090 * Definition: Coverage is not in effect for healthcare service(s) and/or product(s). 1091 */ 1092 INACT, 1093 /** 1094 * Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Investigation. 1095 */ 1096 INPNDINV, 1097 /** 1098 * Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Eligibility Update. 1099 */ 1100 INPNDUPD, 1101 /** 1102 * Definition: Coverage is not in effect for healthcare service(s) and/or product(s). May optionally include reasons for the ineligibility. 1103 */ 1104 NELG, 1105 /** 1106 * Concepts that describe an individual's typical arrangement of working hours for an occupation. 1107 */ 1108 _WORKSCHEDULE, 1109 /** 1110 * A person who is scheduled for work during daytime hours (for example between 6am and 6pm) on a regular basis. 1111 */ 1112 DS, 1113 /** 1114 * Consistent Early morning schedule of 13 hours or less per shift (between 2 am and 2 pm) 1115 */ 1116 EMS, 1117 /** 1118 * A person who is scheduled for work during evening hours (for example between 2pm and midnight) on a regular basis. 1119 */ 1120 ES, 1121 /** 1122 * Scheduled for work during nighttime hours (for example between 9pm and 8am) on a regular basis. 1123 */ 1124 NS, 1125 /** 1126 * Scheduled for work times that change periodically between days, and/or evenings, and includes some night shifts. 1127 */ 1128 RSWN, 1129 /** 1130 * Scheduled for work days/times that change periodically between days, but does not include night or evening work. 1131 */ 1132 RSWON, 1133 /** 1134 * Shift consisting of two distinct work periods each day that are separated by a break of a few hours (for example 2 to 4 hours) 1135 */ 1136 SS, 1137 /** 1138 * Shifts of 17 or more hours. 1139 */ 1140 VLS, 1141 /** 1142 * Irregular, unpredictable hours scheduled on a short notice (for example, less than 2 day notice): inconsistent schedule, on-call, as needed, as available. 1143 */ 1144 VS, 1145 /** 1146 * AnnotationValue 1147 */ 1148 _ANNOTATIONVALUE, 1149 /** 1150 * Description:Used in a patient care message to value simple clinical (non-lab) observations. 1151 */ 1152 _COMMONCLINICALOBSERVATIONVALUE, 1153 /** 1154 * This domain is established as a parent to a variety of value domains being defined to support the communication of Individual Case Safety Reports to regulatory bodies. Arguably, this aggregation is not taxonomically pure, but the grouping will facilitate the management of these domains. 1155 */ 1156 _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS, 1157 /** 1158 * Indicates the specific observation result which is the reason for the action (prescription, lab test, etc.). E.g. Headache, Ear infection, planned diagnostic image (requiring contrast agent), etc. 1159 */ 1160 _INDICATIONVALUE, 1161 /** 1162 * added to help the parsers 1163 */ 1164 NULL; 1165 public static V3ObservationValue fromCode(String codeString) throws FHIRException { 1166 if (codeString == null || "".equals(codeString)) 1167 return null; 1168 if ("_ActCoverageAssessmentObservationValue".equals(codeString)) 1169 return _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE; 1170 if ("_ActFinancialStatusObservationValue".equals(codeString)) 1171 return _ACTFINANCIALSTATUSOBSERVATIONVALUE; 1172 if ("ASSET".equals(codeString)) 1173 return ASSET; 1174 if ("ANNUITY".equals(codeString)) 1175 return ANNUITY; 1176 if ("PROP".equals(codeString)) 1177 return PROP; 1178 if ("RETACCT".equals(codeString)) 1179 return RETACCT; 1180 if ("TRUST".equals(codeString)) 1181 return TRUST; 1182 if ("INCOME".equals(codeString)) 1183 return INCOME; 1184 if ("CHILD".equals(codeString)) 1185 return CHILD; 1186 if ("DISABL".equals(codeString)) 1187 return DISABL; 1188 if ("INVEST".equals(codeString)) 1189 return INVEST; 1190 if ("PAY".equals(codeString)) 1191 return PAY; 1192 if ("RETIRE".equals(codeString)) 1193 return RETIRE; 1194 if ("SPOUSAL".equals(codeString)) 1195 return SPOUSAL; 1196 if ("SUPPLE".equals(codeString)) 1197 return SUPPLE; 1198 if ("TAX".equals(codeString)) 1199 return TAX; 1200 if ("LIVEXP".equals(codeString)) 1201 return LIVEXP; 1202 if ("CLOTH".equals(codeString)) 1203 return CLOTH; 1204 if ("FOOD".equals(codeString)) 1205 return FOOD; 1206 if ("HEALTH".equals(codeString)) 1207 return HEALTH; 1208 if ("HOUSE".equals(codeString)) 1209 return HOUSE; 1210 if ("LEGAL".equals(codeString)) 1211 return LEGAL; 1212 if ("MORTG".equals(codeString)) 1213 return MORTG; 1214 if ("RENT".equals(codeString)) 1215 return RENT; 1216 if ("SUNDRY".equals(codeString)) 1217 return SUNDRY; 1218 if ("TRANS".equals(codeString)) 1219 return TRANS; 1220 if ("UTIL".equals(codeString)) 1221 return UTIL; 1222 if ("ELSTAT".equals(codeString)) 1223 return ELSTAT; 1224 if ("ADOPT".equals(codeString)) 1225 return ADOPT; 1226 if ("BTHCERT".equals(codeString)) 1227 return BTHCERT; 1228 if ("CCOC".equals(codeString)) 1229 return CCOC; 1230 if ("DRLIC".equals(codeString)) 1231 return DRLIC; 1232 if ("FOSTER".equals(codeString)) 1233 return FOSTER; 1234 if ("MEMBER".equals(codeString)) 1235 return MEMBER; 1236 if ("MIL".equals(codeString)) 1237 return MIL; 1238 if ("MRGCERT".equals(codeString)) 1239 return MRGCERT; 1240 if ("PASSPORT".equals(codeString)) 1241 return PASSPORT; 1242 if ("STUDENRL".equals(codeString)) 1243 return STUDENRL; 1244 if ("HLSTAT".equals(codeString)) 1245 return HLSTAT; 1246 if ("DISABLE".equals(codeString)) 1247 return DISABLE; 1248 if ("DRUG".equals(codeString)) 1249 return DRUG; 1250 if ("IVDRG".equals(codeString)) 1251 return IVDRG; 1252 if ("PGNT".equals(codeString)) 1253 return PGNT; 1254 if ("LIVDEP".equals(codeString)) 1255 return LIVDEP; 1256 if ("RELDEP".equals(codeString)) 1257 return RELDEP; 1258 if ("SPSDEP".equals(codeString)) 1259 return SPSDEP; 1260 if ("URELDEP".equals(codeString)) 1261 return URELDEP; 1262 if ("LIVSIT".equals(codeString)) 1263 return LIVSIT; 1264 if ("ALONE".equals(codeString)) 1265 return ALONE; 1266 if ("DEPCHD".equals(codeString)) 1267 return DEPCHD; 1268 if ("DEPSPS".equals(codeString)) 1269 return DEPSPS; 1270 if ("DEPYGCHD".equals(codeString)) 1271 return DEPYGCHD; 1272 if ("FAM".equals(codeString)) 1273 return FAM; 1274 if ("RELAT".equals(codeString)) 1275 return RELAT; 1276 if ("SPS".equals(codeString)) 1277 return SPS; 1278 if ("UNREL".equals(codeString)) 1279 return UNREL; 1280 if ("SOECSTAT".equals(codeString)) 1281 return SOECSTAT; 1282 if ("ABUSE".equals(codeString)) 1283 return ABUSE; 1284 if ("HMLESS".equals(codeString)) 1285 return HMLESS; 1286 if ("ILGIM".equals(codeString)) 1287 return ILGIM; 1288 if ("INCAR".equals(codeString)) 1289 return INCAR; 1290 if ("PROB".equals(codeString)) 1291 return PROB; 1292 if ("REFUG".equals(codeString)) 1293 return REFUG; 1294 if ("UNEMPL".equals(codeString)) 1295 return UNEMPL; 1296 if ("_AllergyTestValue".equals(codeString)) 1297 return _ALLERGYTESTVALUE; 1298 if ("A0".equals(codeString)) 1299 return A0; 1300 if ("A1".equals(codeString)) 1301 return A1; 1302 if ("A2".equals(codeString)) 1303 return A2; 1304 if ("A3".equals(codeString)) 1305 return A3; 1306 if ("A4".equals(codeString)) 1307 return A4; 1308 if ("_CompositeMeasureScoring".equals(codeString)) 1309 return _COMPOSITEMEASURESCORING; 1310 if ("ALLORNONESCR".equals(codeString)) 1311 return ALLORNONESCR; 1312 if ("LINEARSCR".equals(codeString)) 1313 return LINEARSCR; 1314 if ("OPPORSCR".equals(codeString)) 1315 return OPPORSCR; 1316 if ("WEIGHTSCR".equals(codeString)) 1317 return WEIGHTSCR; 1318 if ("_CoverageLimitObservationValue".equals(codeString)) 1319 return _COVERAGELIMITOBSERVATIONVALUE; 1320 if ("_CoverageLevelObservationValue".equals(codeString)) 1321 return _COVERAGELEVELOBSERVATIONVALUE; 1322 if ("ADC".equals(codeString)) 1323 return ADC; 1324 if ("CHD".equals(codeString)) 1325 return CHD; 1326 if ("DEP".equals(codeString)) 1327 return DEP; 1328 if ("DP".equals(codeString)) 1329 return DP; 1330 if ("ECH".equals(codeString)) 1331 return ECH; 1332 if ("FLY".equals(codeString)) 1333 return FLY; 1334 if ("IND".equals(codeString)) 1335 return IND; 1336 if ("SSP".equals(codeString)) 1337 return SSP; 1338 if ("_CriticalityObservationValue".equals(codeString)) 1339 return _CRITICALITYOBSERVATIONVALUE; 1340 if ("CRITH".equals(codeString)) 1341 return CRITH; 1342 if ("CRITL".equals(codeString)) 1343 return CRITL; 1344 if ("CRITU".equals(codeString)) 1345 return CRITU; 1346 if ("_EmploymentStatus".equals(codeString)) 1347 return _EMPLOYMENTSTATUS; 1348 if ("Employed".equals(codeString)) 1349 return EMPLOYED; 1350 if ("NotInLaborForce".equals(codeString)) 1351 return NOTINLABORFORCE; 1352 if ("Unemployed".equals(codeString)) 1353 return UNEMPLOYED; 1354 if ("_GeneticObservationValue".equals(codeString)) 1355 return _GENETICOBSERVATIONVALUE; 1356 if ("Homozygote".equals(codeString)) 1357 return HOMOZYGOTE; 1358 if ("_ObservationMeasureScoring".equals(codeString)) 1359 return _OBSERVATIONMEASURESCORING; 1360 if ("COHORT".equals(codeString)) 1361 return COHORT; 1362 if ("CONTVAR".equals(codeString)) 1363 return CONTVAR; 1364 if ("PROPOR".equals(codeString)) 1365 return PROPOR; 1366 if ("RATIO".equals(codeString)) 1367 return RATIO; 1368 if ("_ObservationMeasureType".equals(codeString)) 1369 return _OBSERVATIONMEASURETYPE; 1370 if ("COMPOSITE".equals(codeString)) 1371 return COMPOSITE; 1372 if ("EFFICIENCY".equals(codeString)) 1373 return EFFICIENCY; 1374 if ("EXPERIENCE".equals(codeString)) 1375 return EXPERIENCE; 1376 if ("OUTCOME".equals(codeString)) 1377 return OUTCOME; 1378 if ("INTERM-OM".equals(codeString)) 1379 return INTERMOM; 1380 if ("PRO-PM".equals(codeString)) 1381 return PROPM; 1382 if ("PROCESS".equals(codeString)) 1383 return PROCESS; 1384 if ("APPROPRIATE".equals(codeString)) 1385 return APPROPRIATE; 1386 if ("RESOURCE".equals(codeString)) 1387 return RESOURCE; 1388 if ("STRUCTURE".equals(codeString)) 1389 return STRUCTURE; 1390 if ("_ObservationPopulationInclusion".equals(codeString)) 1391 return _OBSERVATIONPOPULATIONINCLUSION; 1392 if ("DENEX".equals(codeString)) 1393 return DENEX; 1394 if ("DENEXCEP".equals(codeString)) 1395 return DENEXCEP; 1396 if ("DENOM".equals(codeString)) 1397 return DENOM; 1398 if ("IP".equals(codeString)) 1399 return IP; 1400 if ("IPP".equals(codeString)) 1401 return IPP; 1402 if ("MSRPOPL".equals(codeString)) 1403 return MSRPOPL; 1404 if ("NUMER".equals(codeString)) 1405 return NUMER; 1406 if ("NUMEX".equals(codeString)) 1407 return NUMEX; 1408 if ("_PartialCompletionScale".equals(codeString)) 1409 return _PARTIALCOMPLETIONSCALE; 1410 if ("G".equals(codeString)) 1411 return G; 1412 if ("LE".equals(codeString)) 1413 return LE; 1414 if ("ME".equals(codeString)) 1415 return ME; 1416 if ("MI".equals(codeString)) 1417 return MI; 1418 if ("N".equals(codeString)) 1419 return N; 1420 if ("S".equals(codeString)) 1421 return S; 1422 if ("_SecurityObservationValue".equals(codeString)) 1423 return _SECURITYOBSERVATIONVALUE; 1424 if ("_SECINTOBV".equals(codeString)) 1425 return _SECINTOBV; 1426 if ("_SECALTINTOBV".equals(codeString)) 1427 return _SECALTINTOBV; 1428 if ("ABSTRED".equals(codeString)) 1429 return ABSTRED; 1430 if ("AGGRED".equals(codeString)) 1431 return AGGRED; 1432 if ("ANONYED".equals(codeString)) 1433 return ANONYED; 1434 if ("MAPPED".equals(codeString)) 1435 return MAPPED; 1436 if ("MASKED".equals(codeString)) 1437 return MASKED; 1438 if ("PSEUDED".equals(codeString)) 1439 return PSEUDED; 1440 if ("REDACTED".equals(codeString)) 1441 return REDACTED; 1442 if ("SUBSETTED".equals(codeString)) 1443 return SUBSETTED; 1444 if ("SYNTAC".equals(codeString)) 1445 return SYNTAC; 1446 if ("TRSLT".equals(codeString)) 1447 return TRSLT; 1448 if ("VERSIONED".equals(codeString)) 1449 return VERSIONED; 1450 if ("_SECDATINTOBV".equals(codeString)) 1451 return _SECDATINTOBV; 1452 if ("CRYTOHASH".equals(codeString)) 1453 return CRYTOHASH; 1454 if ("DIGSIG".equals(codeString)) 1455 return DIGSIG; 1456 if ("_SECINTCONOBV".equals(codeString)) 1457 return _SECINTCONOBV; 1458 if ("HRELIABLE".equals(codeString)) 1459 return HRELIABLE; 1460 if ("RELIABLE".equals(codeString)) 1461 return RELIABLE; 1462 if ("UNCERTREL".equals(codeString)) 1463 return UNCERTREL; 1464 if ("UNRELIABLE".equals(codeString)) 1465 return UNRELIABLE; 1466 if ("_SECINTPRVOBV".equals(codeString)) 1467 return _SECINTPRVOBV; 1468 if ("_SECINTPRVABOBV".equals(codeString)) 1469 return _SECINTPRVABOBV; 1470 if ("CLINAST".equals(codeString)) 1471 return CLINAST; 1472 if ("DEVAST".equals(codeString)) 1473 return DEVAST; 1474 if ("HCPAST".equals(codeString)) 1475 return HCPAST; 1476 if ("PACQAST".equals(codeString)) 1477 return PACQAST; 1478 if ("PATAST".equals(codeString)) 1479 return PATAST; 1480 if ("PAYAST".equals(codeString)) 1481 return PAYAST; 1482 if ("PROAST".equals(codeString)) 1483 return PROAST; 1484 if ("SDMAST".equals(codeString)) 1485 return SDMAST; 1486 if ("_SECINTPRVRBOBV".equals(codeString)) 1487 return _SECINTPRVRBOBV; 1488 if ("CLINRPT".equals(codeString)) 1489 return CLINRPT; 1490 if ("DEVRPT".equals(codeString)) 1491 return DEVRPT; 1492 if ("HCPRPT".equals(codeString)) 1493 return HCPRPT; 1494 if ("PACQRPT".equals(codeString)) 1495 return PACQRPT; 1496 if ("PATRPT".equals(codeString)) 1497 return PATRPT; 1498 if ("PAYRPT".equals(codeString)) 1499 return PAYRPT; 1500 if ("PRORPT".equals(codeString)) 1501 return PRORPT; 1502 if ("SDMRPT".equals(codeString)) 1503 return SDMRPT; 1504 if ("SECTRSTOBV".equals(codeString)) 1505 return SECTRSTOBV; 1506 if ("TRSTACCRDOBV".equals(codeString)) 1507 return TRSTACCRDOBV; 1508 if ("TRSTAGREOBV".equals(codeString)) 1509 return TRSTAGREOBV; 1510 if ("TRSTCERTOBV".equals(codeString)) 1511 return TRSTCERTOBV; 1512 if ("TRSTLOAOBV".equals(codeString)) 1513 return TRSTLOAOBV; 1514 if ("LOAAN".equals(codeString)) 1515 return LOAAN; 1516 if ("LOAAN1".equals(codeString)) 1517 return LOAAN1; 1518 if ("LOAAN2".equals(codeString)) 1519 return LOAAN2; 1520 if ("LOAAN3".equals(codeString)) 1521 return LOAAN3; 1522 if ("LOAAN4".equals(codeString)) 1523 return LOAAN4; 1524 if ("LOAAP".equals(codeString)) 1525 return LOAAP; 1526 if ("LOAAP1".equals(codeString)) 1527 return LOAAP1; 1528 if ("LOAAP2".equals(codeString)) 1529 return LOAAP2; 1530 if ("LOAAP3".equals(codeString)) 1531 return LOAAP3; 1532 if ("LOAAP4".equals(codeString)) 1533 return LOAAP4; 1534 if ("LOAAS".equals(codeString)) 1535 return LOAAS; 1536 if ("LOAAS1".equals(codeString)) 1537 return LOAAS1; 1538 if ("LOAAS2".equals(codeString)) 1539 return LOAAS2; 1540 if ("LOAAS3".equals(codeString)) 1541 return LOAAS3; 1542 if ("LOAAS4".equals(codeString)) 1543 return LOAAS4; 1544 if ("LOACM".equals(codeString)) 1545 return LOACM; 1546 if ("LOACM1".equals(codeString)) 1547 return LOACM1; 1548 if ("LOACM2".equals(codeString)) 1549 return LOACM2; 1550 if ("LOACM3".equals(codeString)) 1551 return LOACM3; 1552 if ("LOACM4".equals(codeString)) 1553 return LOACM4; 1554 if ("LOAID".equals(codeString)) 1555 return LOAID; 1556 if ("LOAID1".equals(codeString)) 1557 return LOAID1; 1558 if ("LOAID2".equals(codeString)) 1559 return LOAID2; 1560 if ("LOAID3".equals(codeString)) 1561 return LOAID3; 1562 if ("LOAID4".equals(codeString)) 1563 return LOAID4; 1564 if ("LOANR".equals(codeString)) 1565 return LOANR; 1566 if ("LOANR1".equals(codeString)) 1567 return LOANR1; 1568 if ("LOANR2".equals(codeString)) 1569 return LOANR2; 1570 if ("LOANR3".equals(codeString)) 1571 return LOANR3; 1572 if ("LOANR4".equals(codeString)) 1573 return LOANR4; 1574 if ("LOARA".equals(codeString)) 1575 return LOARA; 1576 if ("LOARA1".equals(codeString)) 1577 return LOARA1; 1578 if ("LOARA2".equals(codeString)) 1579 return LOARA2; 1580 if ("LOARA3".equals(codeString)) 1581 return LOARA3; 1582 if ("LOARA4".equals(codeString)) 1583 return LOARA4; 1584 if ("LOATK".equals(codeString)) 1585 return LOATK; 1586 if ("LOATK1".equals(codeString)) 1587 return LOATK1; 1588 if ("LOATK2".equals(codeString)) 1589 return LOATK2; 1590 if ("LOATK3".equals(codeString)) 1591 return LOATK3; 1592 if ("LOATK4".equals(codeString)) 1593 return LOATK4; 1594 if ("TRSTMECOBV".equals(codeString)) 1595 return TRSTMECOBV; 1596 if ("_SeverityObservation".equals(codeString)) 1597 return _SEVERITYOBSERVATION; 1598 if ("H".equals(codeString)) 1599 return H; 1600 if ("L".equals(codeString)) 1601 return L; 1602 if ("M".equals(codeString)) 1603 return M; 1604 if ("_SubjectBodyPosition".equals(codeString)) 1605 return _SUBJECTBODYPOSITION; 1606 if ("LLD".equals(codeString)) 1607 return LLD; 1608 if ("PRN".equals(codeString)) 1609 return PRN; 1610 if ("RLD".equals(codeString)) 1611 return RLD; 1612 if ("SFWL".equals(codeString)) 1613 return SFWL; 1614 if ("SIT".equals(codeString)) 1615 return SIT; 1616 if ("STN".equals(codeString)) 1617 return STN; 1618 if ("SUP".equals(codeString)) 1619 return SUP; 1620 if ("RTRD".equals(codeString)) 1621 return RTRD; 1622 if ("TRD".equals(codeString)) 1623 return TRD; 1624 if ("_VerificationOutcomeValue".equals(codeString)) 1625 return _VERIFICATIONOUTCOMEVALUE; 1626 if ("ACT".equals(codeString)) 1627 return ACT; 1628 if ("ACTPEND".equals(codeString)) 1629 return ACTPEND; 1630 if ("ELG".equals(codeString)) 1631 return ELG; 1632 if ("INACT".equals(codeString)) 1633 return INACT; 1634 if ("INPNDINV".equals(codeString)) 1635 return INPNDINV; 1636 if ("INPNDUPD".equals(codeString)) 1637 return INPNDUPD; 1638 if ("NELG".equals(codeString)) 1639 return NELG; 1640 if ("_WorkSchedule".equals(codeString)) 1641 return _WORKSCHEDULE; 1642 if ("DS".equals(codeString)) 1643 return DS; 1644 if ("EMS".equals(codeString)) 1645 return EMS; 1646 if ("ES".equals(codeString)) 1647 return ES; 1648 if ("NS".equals(codeString)) 1649 return NS; 1650 if ("RSWN".equals(codeString)) 1651 return RSWN; 1652 if ("RSWON".equals(codeString)) 1653 return RSWON; 1654 if ("SS".equals(codeString)) 1655 return SS; 1656 if ("VLS".equals(codeString)) 1657 return VLS; 1658 if ("VS".equals(codeString)) 1659 return VS; 1660 if ("_AnnotationValue".equals(codeString)) 1661 return _ANNOTATIONVALUE; 1662 if ("_CommonClinicalObservationValue".equals(codeString)) 1663 return _COMMONCLINICALOBSERVATIONVALUE; 1664 if ("_IndividualCaseSafetyReportValueDomains".equals(codeString)) 1665 return _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS; 1666 if ("_IndicationValue".equals(codeString)) 1667 return _INDICATIONVALUE; 1668 throw new FHIRException("Unknown V3ObservationValue code '"+codeString+"'"); 1669 } 1670 public String toCode() { 1671 switch (this) { 1672 case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "_ActCoverageAssessmentObservationValue"; 1673 case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "_ActFinancialStatusObservationValue"; 1674 case ASSET: return "ASSET"; 1675 case ANNUITY: return "ANNUITY"; 1676 case PROP: return "PROP"; 1677 case RETACCT: return "RETACCT"; 1678 case TRUST: return "TRUST"; 1679 case INCOME: return "INCOME"; 1680 case CHILD: return "CHILD"; 1681 case DISABL: return "DISABL"; 1682 case INVEST: return "INVEST"; 1683 case PAY: return "PAY"; 1684 case RETIRE: return "RETIRE"; 1685 case SPOUSAL: return "SPOUSAL"; 1686 case SUPPLE: return "SUPPLE"; 1687 case TAX: return "TAX"; 1688 case LIVEXP: return "LIVEXP"; 1689 case CLOTH: return "CLOTH"; 1690 case FOOD: return "FOOD"; 1691 case HEALTH: return "HEALTH"; 1692 case HOUSE: return "HOUSE"; 1693 case LEGAL: return "LEGAL"; 1694 case MORTG: return "MORTG"; 1695 case RENT: return "RENT"; 1696 case SUNDRY: return "SUNDRY"; 1697 case TRANS: return "TRANS"; 1698 case UTIL: return "UTIL"; 1699 case ELSTAT: return "ELSTAT"; 1700 case ADOPT: return "ADOPT"; 1701 case BTHCERT: return "BTHCERT"; 1702 case CCOC: return "CCOC"; 1703 case DRLIC: return "DRLIC"; 1704 case FOSTER: return "FOSTER"; 1705 case MEMBER: return "MEMBER"; 1706 case MIL: return "MIL"; 1707 case MRGCERT: return "MRGCERT"; 1708 case PASSPORT: return "PASSPORT"; 1709 case STUDENRL: return "STUDENRL"; 1710 case HLSTAT: return "HLSTAT"; 1711 case DISABLE: return "DISABLE"; 1712 case DRUG: return "DRUG"; 1713 case IVDRG: return "IVDRG"; 1714 case PGNT: return "PGNT"; 1715 case LIVDEP: return "LIVDEP"; 1716 case RELDEP: return "RELDEP"; 1717 case SPSDEP: return "SPSDEP"; 1718 case URELDEP: return "URELDEP"; 1719 case LIVSIT: return "LIVSIT"; 1720 case ALONE: return "ALONE"; 1721 case DEPCHD: return "DEPCHD"; 1722 case DEPSPS: return "DEPSPS"; 1723 case DEPYGCHD: return "DEPYGCHD"; 1724 case FAM: return "FAM"; 1725 case RELAT: return "RELAT"; 1726 case SPS: return "SPS"; 1727 case UNREL: return "UNREL"; 1728 case SOECSTAT: return "SOECSTAT"; 1729 case ABUSE: return "ABUSE"; 1730 case HMLESS: return "HMLESS"; 1731 case ILGIM: return "ILGIM"; 1732 case INCAR: return "INCAR"; 1733 case PROB: return "PROB"; 1734 case REFUG: return "REFUG"; 1735 case UNEMPL: return "UNEMPL"; 1736 case _ALLERGYTESTVALUE: return "_AllergyTestValue"; 1737 case A0: return "A0"; 1738 case A1: return "A1"; 1739 case A2: return "A2"; 1740 case A3: return "A3"; 1741 case A4: return "A4"; 1742 case _COMPOSITEMEASURESCORING: return "_CompositeMeasureScoring"; 1743 case ALLORNONESCR: return "ALLORNONESCR"; 1744 case LINEARSCR: return "LINEARSCR"; 1745 case OPPORSCR: return "OPPORSCR"; 1746 case WEIGHTSCR: return "WEIGHTSCR"; 1747 case _COVERAGELIMITOBSERVATIONVALUE: return "_CoverageLimitObservationValue"; 1748 case _COVERAGELEVELOBSERVATIONVALUE: return "_CoverageLevelObservationValue"; 1749 case ADC: return "ADC"; 1750 case CHD: return "CHD"; 1751 case DEP: return "DEP"; 1752 case DP: return "DP"; 1753 case ECH: return "ECH"; 1754 case FLY: return "FLY"; 1755 case IND: return "IND"; 1756 case SSP: return "SSP"; 1757 case _CRITICALITYOBSERVATIONVALUE: return "_CriticalityObservationValue"; 1758 case CRITH: return "CRITH"; 1759 case CRITL: return "CRITL"; 1760 case CRITU: return "CRITU"; 1761 case _EMPLOYMENTSTATUS: return "_EmploymentStatus"; 1762 case EMPLOYED: return "Employed"; 1763 case NOTINLABORFORCE: return "NotInLaborForce"; 1764 case UNEMPLOYED: return "Unemployed"; 1765 case _GENETICOBSERVATIONVALUE: return "_GeneticObservationValue"; 1766 case HOMOZYGOTE: return "Homozygote"; 1767 case _OBSERVATIONMEASURESCORING: return "_ObservationMeasureScoring"; 1768 case COHORT: return "COHORT"; 1769 case CONTVAR: return "CONTVAR"; 1770 case PROPOR: return "PROPOR"; 1771 case RATIO: return "RATIO"; 1772 case _OBSERVATIONMEASURETYPE: return "_ObservationMeasureType"; 1773 case COMPOSITE: return "COMPOSITE"; 1774 case EFFICIENCY: return "EFFICIENCY"; 1775 case EXPERIENCE: return "EXPERIENCE"; 1776 case OUTCOME: return "OUTCOME"; 1777 case INTERMOM: return "INTERM-OM"; 1778 case PROPM: return "PRO-PM"; 1779 case PROCESS: return "PROCESS"; 1780 case APPROPRIATE: return "APPROPRIATE"; 1781 case RESOURCE: return "RESOURCE"; 1782 case STRUCTURE: return "STRUCTURE"; 1783 case _OBSERVATIONPOPULATIONINCLUSION: return "_ObservationPopulationInclusion"; 1784 case DENEX: return "DENEX"; 1785 case DENEXCEP: return "DENEXCEP"; 1786 case DENOM: return "DENOM"; 1787 case IP: return "IP"; 1788 case IPP: return "IPP"; 1789 case MSRPOPL: return "MSRPOPL"; 1790 case NUMER: return "NUMER"; 1791 case NUMEX: return "NUMEX"; 1792 case _PARTIALCOMPLETIONSCALE: return "_PartialCompletionScale"; 1793 case G: return "G"; 1794 case LE: return "LE"; 1795 case ME: return "ME"; 1796 case MI: return "MI"; 1797 case N: return "N"; 1798 case S: return "S"; 1799 case _SECURITYOBSERVATIONVALUE: return "_SecurityObservationValue"; 1800 case _SECINTOBV: return "_SECINTOBV"; 1801 case _SECALTINTOBV: return "_SECALTINTOBV"; 1802 case ABSTRED: return "ABSTRED"; 1803 case AGGRED: return "AGGRED"; 1804 case ANONYED: return "ANONYED"; 1805 case MAPPED: return "MAPPED"; 1806 case MASKED: return "MASKED"; 1807 case PSEUDED: return "PSEUDED"; 1808 case REDACTED: return "REDACTED"; 1809 case SUBSETTED: return "SUBSETTED"; 1810 case SYNTAC: return "SYNTAC"; 1811 case TRSLT: return "TRSLT"; 1812 case VERSIONED: return "VERSIONED"; 1813 case _SECDATINTOBV: return "_SECDATINTOBV"; 1814 case CRYTOHASH: return "CRYTOHASH"; 1815 case DIGSIG: return "DIGSIG"; 1816 case _SECINTCONOBV: return "_SECINTCONOBV"; 1817 case HRELIABLE: return "HRELIABLE"; 1818 case RELIABLE: return "RELIABLE"; 1819 case UNCERTREL: return "UNCERTREL"; 1820 case UNRELIABLE: return "UNRELIABLE"; 1821 case _SECINTPRVOBV: return "_SECINTPRVOBV"; 1822 case _SECINTPRVABOBV: return "_SECINTPRVABOBV"; 1823 case CLINAST: return "CLINAST"; 1824 case DEVAST: return "DEVAST"; 1825 case HCPAST: return "HCPAST"; 1826 case PACQAST: return "PACQAST"; 1827 case PATAST: return "PATAST"; 1828 case PAYAST: return "PAYAST"; 1829 case PROAST: return "PROAST"; 1830 case SDMAST: return "SDMAST"; 1831 case _SECINTPRVRBOBV: return "_SECINTPRVRBOBV"; 1832 case CLINRPT: return "CLINRPT"; 1833 case DEVRPT: return "DEVRPT"; 1834 case HCPRPT: return "HCPRPT"; 1835 case PACQRPT: return "PACQRPT"; 1836 case PATRPT: return "PATRPT"; 1837 case PAYRPT: return "PAYRPT"; 1838 case PRORPT: return "PRORPT"; 1839 case SDMRPT: return "SDMRPT"; 1840 case SECTRSTOBV: return "SECTRSTOBV"; 1841 case TRSTACCRDOBV: return "TRSTACCRDOBV"; 1842 case TRSTAGREOBV: return "TRSTAGREOBV"; 1843 case TRSTCERTOBV: return "TRSTCERTOBV"; 1844 case TRSTLOAOBV: return "TRSTLOAOBV"; 1845 case LOAAN: return "LOAAN"; 1846 case LOAAN1: return "LOAAN1"; 1847 case LOAAN2: return "LOAAN2"; 1848 case LOAAN3: return "LOAAN3"; 1849 case LOAAN4: return "LOAAN4"; 1850 case LOAAP: return "LOAAP"; 1851 case LOAAP1: return "LOAAP1"; 1852 case LOAAP2: return "LOAAP2"; 1853 case LOAAP3: return "LOAAP3"; 1854 case LOAAP4: return "LOAAP4"; 1855 case LOAAS: return "LOAAS"; 1856 case LOAAS1: return "LOAAS1"; 1857 case LOAAS2: return "LOAAS2"; 1858 case LOAAS3: return "LOAAS3"; 1859 case LOAAS4: return "LOAAS4"; 1860 case LOACM: return "LOACM"; 1861 case LOACM1: return "LOACM1"; 1862 case LOACM2: return "LOACM2"; 1863 case LOACM3: return "LOACM3"; 1864 case LOACM4: return "LOACM4"; 1865 case LOAID: return "LOAID"; 1866 case LOAID1: return "LOAID1"; 1867 case LOAID2: return "LOAID2"; 1868 case LOAID3: return "LOAID3"; 1869 case LOAID4: return "LOAID4"; 1870 case LOANR: return "LOANR"; 1871 case LOANR1: return "LOANR1"; 1872 case LOANR2: return "LOANR2"; 1873 case LOANR3: return "LOANR3"; 1874 case LOANR4: return "LOANR4"; 1875 case LOARA: return "LOARA"; 1876 case LOARA1: return "LOARA1"; 1877 case LOARA2: return "LOARA2"; 1878 case LOARA3: return "LOARA3"; 1879 case LOARA4: return "LOARA4"; 1880 case LOATK: return "LOATK"; 1881 case LOATK1: return "LOATK1"; 1882 case LOATK2: return "LOATK2"; 1883 case LOATK3: return "LOATK3"; 1884 case LOATK4: return "LOATK4"; 1885 case TRSTMECOBV: return "TRSTMECOBV"; 1886 case _SEVERITYOBSERVATION: return "_SeverityObservation"; 1887 case H: return "H"; 1888 case L: return "L"; 1889 case M: return "M"; 1890 case _SUBJECTBODYPOSITION: return "_SubjectBodyPosition"; 1891 case LLD: return "LLD"; 1892 case PRN: return "PRN"; 1893 case RLD: return "RLD"; 1894 case SFWL: return "SFWL"; 1895 case SIT: return "SIT"; 1896 case STN: return "STN"; 1897 case SUP: return "SUP"; 1898 case RTRD: return "RTRD"; 1899 case TRD: return "TRD"; 1900 case _VERIFICATIONOUTCOMEVALUE: return "_VerificationOutcomeValue"; 1901 case ACT: return "ACT"; 1902 case ACTPEND: return "ACTPEND"; 1903 case ELG: return "ELG"; 1904 case INACT: return "INACT"; 1905 case INPNDINV: return "INPNDINV"; 1906 case INPNDUPD: return "INPNDUPD"; 1907 case NELG: return "NELG"; 1908 case _WORKSCHEDULE: return "_WorkSchedule"; 1909 case DS: return "DS"; 1910 case EMS: return "EMS"; 1911 case ES: return "ES"; 1912 case NS: return "NS"; 1913 case RSWN: return "RSWN"; 1914 case RSWON: return "RSWON"; 1915 case SS: return "SS"; 1916 case VLS: return "VLS"; 1917 case VS: return "VS"; 1918 case _ANNOTATIONVALUE: return "_AnnotationValue"; 1919 case _COMMONCLINICALOBSERVATIONVALUE: return "_CommonClinicalObservationValue"; 1920 case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "_IndividualCaseSafetyReportValueDomains"; 1921 case _INDICATIONVALUE: return "_IndicationValue"; 1922 default: return "?"; 1923 } 1924 } 1925 public String getSystem() { 1926 return "http://terminology.hl7.org/CodeSystem/v3-ObservationValue"; 1927 } 1928 public String getDefinition() { 1929 switch (this) { 1930 case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "Codes specify the category of observation, evidence, or document used to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. The type of evidence is coded as observation values."; 1931 case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "Code specifying financial indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay stub; tax or income document; asset document; living expenses."; 1932 case ASSET: return "Codes specifying asset indicators used to assess or establish eligibility for coverage under a policy or program."; 1933 case ANNUITY: return "Indicator of annuity ownership or status as beneficiary."; 1934 case PROP: return "Indicator of real property ownership, e.g., deed or real estate contract."; 1935 case RETACCT: return "Indicator of retirement investment account ownership."; 1936 case TRUST: return "Indicator of status as trust beneficiary."; 1937 case INCOME: return "Code specifying income indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay or pension check, child support payments received or provided, and taxes paid."; 1938 case CHILD: return "Indicator of child support payments received or provided."; 1939 case DISABL: return "Indicator of disability income replacement payment."; 1940 case INVEST: return "Indicator of investment income, e.g., dividend check, annuity payment; real estate rent, investment divestiture proceeds; trust or endowment check."; 1941 case PAY: return "Indicator of paid employment, e.g., letter of hire, contract, employer letter; copy of pay check or pay stub."; 1942 case RETIRE: return "Indicator of retirement payment, e.g., pension check."; 1943 case SPOUSAL: return "Indicator of spousal or partner support payments received or provided; e.g., alimony payment; support stipulations in a divorce settlement."; 1944 case SUPPLE: return "Indicator of income supplement, e.g., gifting, parental income support; stipend, or grant."; 1945 case TAX: return "Indicator of tax obligation or payment, e.g., statement of taxable income."; 1946 case LIVEXP: return "Codes specifying living expense indicators used to assess or establish eligibility for coverage under a policy or program."; 1947 case CLOTH: return "Indicator of clothing expenses."; 1948 case FOOD: return "Indicator of transportation expenses."; 1949 case HEALTH: return "Indicator of health expenses; including medication costs, health service costs, financial participations, and health coverage premiums."; 1950 case HOUSE: return "Indicator of housing expense, e.g., household appliances, fixtures, furnishings, and maintenance and repairs."; 1951 case LEGAL: return "Indicator of legal expenses."; 1952 case MORTG: return "Indicator of mortgage amount, interest, and payments."; 1953 case RENT: return "Indicator of rental or lease payments."; 1954 case SUNDRY: return "Indicator of transportation expenses."; 1955 case TRANS: return "Indicator of transportation expenses, e.g., vehicle payments, vehicle insurance, vehicle fuel, and vehicle maintenance and repairs."; 1956 case UTIL: return "Indicator of transportation expenses."; 1957 case ELSTAT: return "Code specifying eligibility indicators used to assess or establish eligibility for coverage under a policy or program eligibility status, e.g., certificates of creditable coverage; student enrollment; adoption, marriage or birth certificate."; 1958 case ADOPT: return "Indicator of adoption."; 1959 case BTHCERT: return "Indicator of birth."; 1960 case CCOC: return "Indicator of creditable coverage."; 1961 case DRLIC: return "Indicator of driving status."; 1962 case FOSTER: return "Indicator of foster child status."; 1963 case MEMBER: return "Indicator of status as covered member under a policy or program, e.g., member id card or coverage document."; 1964 case MIL: return "Indicator of military status."; 1965 case MRGCERT: return "Indicator of marriage status."; 1966 case PASSPORT: return "Indicator of citizenship."; 1967 case STUDENRL: return "Indicator of student status."; 1968 case HLSTAT: return "Code specifying non-clinical indicators related to health status used to assess or establish eligibility for coverage under a policy or program, e.g., pregnancy, disability, drug use, mental health issues."; 1969 case DISABLE: return "Indication of disability."; 1970 case DRUG: return "Indication of drug use."; 1971 case IVDRG: return "Indication of IV drug use ."; 1972 case PGNT: return "Non-clinical report of pregnancy."; 1973 case LIVDEP: return "Code specifying observations related to living dependency, such as dependent upon spouse for activities of daily living."; 1974 case RELDEP: return "Continued living in private residence requires functional and health care assistance from one or more relatives."; 1975 case SPSDEP: return "Continued living in private residence requires functional and health care assistance from spouse or life partner."; 1976 case URELDEP: return "Continued living in private residence requires functional and health care assistance from one or more unrelated persons."; 1977 case LIVSIT: return "Code specifying observations related to living situation for a person in a private residence."; 1978 case ALONE: return "Living alone. Maps to PD1-2 Living arrangement (IS) 00742 [A]"; 1979 case DEPCHD: return "Living with one or more dependent children requiring moderate supervision."; 1980 case DEPSPS: return "Living with disabled spouse requiring functional and health care assistance"; 1981 case DEPYGCHD: return "Living with one or more dependent children requiring intensive supervision"; 1982 case FAM: return "Living with family. Maps to PD1-2 Living arrangement (IS) 00742 [F]"; 1983 case RELAT: return "Living with one or more relatives. Maps to PD1-2 Living arrangement (IS) 00742 [R]"; 1984 case SPS: return "Living only with spouse or life partner. Maps to PD1-2 Living arrangement (IS) 00742 [S]"; 1985 case UNREL: return "Living with one or more unrelated persons."; 1986 case SOECSTAT: return "Code specifying observations or indicators related to socio-economic status used to assess to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program."; 1987 case ABUSE: return "Indication of abuse victim."; 1988 case HMLESS: return "Indication of status as homeless."; 1989 case ILGIM: return "Indication of status as illegal immigrant."; 1990 case INCAR: return "Indication of status as incarcerated."; 1991 case PROB: return "Indication of probation status."; 1992 case REFUG: return "Indication of refugee status."; 1993 case UNEMPL: return "Indication of unemployed status."; 1994 case _ALLERGYTESTVALUE: return "Indicates the result of a particular allergy test. E.g. Negative, Mild, Moderate, Severe"; 1995 case A0: return "Description:Patient exhibits no reaction to the challenge agent."; 1996 case A1: return "Description:Patient exhibits a minimal reaction to the challenge agent."; 1997 case A2: return "Description:Patient exhibits a mild reaction to the challenge agent."; 1998 case A3: return "Description:Patient exhibits moderate reaction to the challenge agent."; 1999 case A4: return "Description:Patient exhibits a severe reaction to the challenge agent."; 2000 case _COMPOSITEMEASURESCORING: return "Observation values that communicate the method used in a quality measure to combine the component measure results included in an composite measure."; 2001 case ALLORNONESCR: return "Code specifying that the measure uses all-or-nothing scoring. All-or-nothing scoring places an individual in the numerator of the composite measure if and only if they are in the numerator of all component measures in which they are in the denominator."; 2002 case LINEARSCR: return "Code specifying that the measure uses linear scoring. Linear scoring computes the fraction of component measures in which the individual appears in the numerator, giving equal weight to each component measure."; 2003 case OPPORSCR: return "Code specifying that the measure uses opportunity-based scoring. In opportunity-based scoring the measure score is determined by combining the denominator and numerator of each component measure to determine an overall composite score."; 2004 case WEIGHTSCR: return "Code specifying that the measure uses weighted scoring. Weighted scoring assigns a factor to each component measure to weight that measure's contribution to the overall score."; 2005 case _COVERAGELIMITOBSERVATIONVALUE: return "Description:Coded observation values for coverage limitations, for e.g., types of claims or types of parties covered under a policy or program."; 2006 case _COVERAGELEVELOBSERVATIONVALUE: return "Description:Coded observation values for types of covered parties under a policy or program based on their personal relationships or employment status."; 2007 case ADC: return "Description:Child over an age as specified by coverage policy or program, e.g., student, differently abled, and income dependent."; 2008 case CHD: return "Description:Dependent biological, adopted, foster child as specified by coverage policy or program."; 2009 case DEP: return "Description:Person requiring functional and/or financial assistance from another person as specified by coverage policy or program."; 2010 case DP: return "Description:Persons registered as a family unit in a domestic partner registry as specified by law and by coverage policy or program."; 2011 case ECH: return "Description:An individual employed by an employer who receive remuneration in wages, salary, commission, tips, piece-rates, or pay-in-kind through the employeraTMs payment system (i.e., not a contractor) as specified by coverage policy or program."; 2012 case FLY: return "Description:As specified by coverage policy or program."; 2013 case IND: return "Description:Person as specified by coverage policy or program."; 2014 case SSP: return "Description:A pair of people of the same gender who live together as a family as specified by coverage policy or program, e.g., Naomi and Ruth from the Book of Ruth; Socrates and Alcibiades"; 2015 case _CRITICALITYOBSERVATIONVALUE: return "A clinical judgment as to the worst case result of a future exposure (including substance administration). When the worst case result is assessed to have a life-threatening or organ system threatening potential, it is considered to be of high criticality."; 2016 case CRITH: return "Worst case result of a future exposure is assessed to be life-threatening or having high potential for organ system failure."; 2017 case CRITL: return "Worst case result of a future exposure is not assessed to be life-threatening or having high potential for organ system failure."; 2018 case CRITU: return "Unable to assess the worst case result of a future exposure."; 2019 case _EMPLOYMENTSTATUS: return "Concepts representing whether a person does or does not currently have a job or is not currently in the labor pool seeking employment."; 2020 case EMPLOYED: return "Individuals who, during the last week: a) did any work for at least 1 hour as paid or unpaid employees of a business or government organization; worked in their own businesses, professions, or on their own farms; or b) were not working, but who have a job or business from which the individual was temporarily absent because of vacation, illness, bad weather, childcare problems, maternity or paternity leave, labor-management dispute, job training, or other family or personal reasons, regardless of whether or not they were paid for the time off or were seeking other jobs."; 2021 case NOTINLABORFORCE: return "Persons not classified as employed or unemployed, meaning those who have no job and are not looking for one."; 2022 case UNEMPLOYED: return "Persons who currently have no employment, but are available for work and have made specific efforts to find employment."; 2023 case _GENETICOBSERVATIONVALUE: return "Description: The domain contains genetic analysis specific observation values, e.g. Homozygote, Heterozygote, etc."; 2024 case HOMOZYGOTE: return "Description: An individual having different alleles at one or more loci regarding a specific character"; 2025 case _OBSERVATIONMEASURESCORING: return "Observation values used to indicate the type of scoring (e.g. proportion, ratio) used by a health quality measure."; 2026 case COHORT: return "A measure in which either short-term cross-section or long-term longitudinal analysis is performed over a group of subjects defined by a set of common properties or defining characteristics (e.g., Male smokers between the ages of 40 and 50 years, exposure to treatment, exposure duration)."; 2027 case CONTVAR: return "A measure score in which each individual value for the measure can fall anywhere along a continuous scale (e.g., mean time to thrombolytics which aggregates the time in minutes from a case presenting with chest pain to the time of administration of thrombolytics)."; 2028 case PROPOR: return "A score derived by dividing the number of cases that meet a criterion for quality (the numerator) by the number of eligible cases within a given time frame (the denominator) where the numerator cases are a subset of the denominator cases (e.g., percentage of eligible women with a mammogram performed in the last year)."; 2029 case RATIO: return "A score that may have a value of zero or greater that is derived by dividing a count of one type of data by a count of another type of data (e.g., the number of patients with central lines who develop infection divided by the number of central line days)."; 2030 case _OBSERVATIONMEASURETYPE: return "Observation values used to indicate what kind of health quality measure is used."; 2031 case COMPOSITE: return "A measure that is composed from one or more other measures and indicates an overall summary of those measures."; 2032 case EFFICIENCY: return "A measure related to the efficiency of medical treatment."; 2033 case EXPERIENCE: return "A measure related to the level of patient engagement or patient experience of care."; 2034 case OUTCOME: return "A measure that indicates the result of the performance (or non-performance) of a function or process."; 2035 case INTERMOM: return "A measure that evaluates the change over time of a physiologic state observable that is associated with a specific long-term health outcome."; 2036 case PROPM: return "A measure that is a comparison of patient reported outcomes for a single or multiple patients collected via an instrument specifically designed to obtain input directly from patients."; 2037 case PROCESS: return "A measure which focuses on a process which leads to a certain outcome, meaning that a scientific basis exists for believing that the process, when executed well, will increase the probability of achieving a desired outcome."; 2038 case APPROPRIATE: return "A measure that assesses the use of one or more processes where the expected health benefit exceeds the expected negative consequences."; 2039 case RESOURCE: return "A measure related to the extent of use of clinical resources or cost of care."; 2040 case STRUCTURE: return "A measure related to the structure of patient care."; 2041 case _OBSERVATIONPOPULATIONINCLUSION: return "Observation values used to assert various populations that a subject falls into."; 2042 case DENEX: return "Patients who should be removed from the eMeasure population and denominator before determining if numerator criteria are met. Denominator exclusions are used in proportion and ratio measures to help narrow the denominator."; 2043 case DENEXCEP: return "Denominator exceptions are those conditions that should remove a patient, procedure or unit of measurement from the denominator only if the numerator criteria are not met. Denominator exceptions allow for adjustment of the calculated score for those providers with higher risk populations. Denominator exceptions are used only in proportion eMeasures. They are not appropriate for ratio or continuous variable eMeasures. Denominator exceptions allow for the exercise of clinical judgment and should be specifically defined where capturing the information in a structured manner fits the clinical workflow. Generic denominator exception reasons used in proportion eMeasures fall into three general categories:\r\n\n \n Medical reasons\n Patient reasons\n System reasons"; 2044 case DENOM: return "It can be the same as the initial patient population or a subset of the initial patient population to further constrain the population for the purpose of the eMeasure. Different measures within an eMeasure set may have different Denominators. Continuous Variable eMeasures do not have a Denominator, but instead define a Measure Population."; 2045 case IP: return "The initial population refers to all entities to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs."; 2046 case IPP: return "The initial patient population refers to all patients to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. Details often include information based upon specific age groups, diagnoses, diagnostic and procedure codes, and enrollment periods."; 2047 case MSRPOPL: return "Measure population is used only in continuous variable eMeasures. It is a narrative description of the eMeasure population. \n(e.g., all patients seen in the Emergency Department during the measurement period)."; 2048 case NUMER: return "Numerators are used in proportion and ratio eMeasures. In proportion measures the numerator criteria are the processes or outcomes expected for each patient, procedure, or other unit of measurement defined in the denominator. In ratio measures the numerator is related, but not directly derived from the denominator (e.g., a numerator listing the number of central line blood stream infections and a denominator indicating the days per thousand of central line usage in a specific time period)."; 2049 case NUMEX: return "Numerator Exclusions are used only in ratio eMeasures to define instances that should not be included in the numerator data. (e.g., if the number of central line blood stream infections per 1000 catheter days were to exclude infections with a specific bacterium, that bacterium would be listed as a numerator exclusion.)"; 2050 case _PARTIALCOMPLETIONSCALE: return "PartialCompletionScale"; 2051 case G: return "Value for Act.partialCompletionCode attribute that implies 81-99% completion"; 2052 case LE: return "Value for Act.partialCompletionCode attribute that implies 61-80% completion"; 2053 case ME: return "Value for Act.partialCompletionCode attribute that implies 41-60% completion"; 2054 case MI: return "Value for Act.partialCompletionCode attribute that implies 1-20% completion"; 2055 case N: return "Value for Act.partialCompletionCode attribute that implies 0% completion"; 2056 case S: return "Value for Act.partialCompletionCode attribute that implies 21-40% completion"; 2057 case _SECURITYOBSERVATIONVALUE: return "Observation values used to indicate security observation metadata."; 2058 case _SECINTOBV: return "Abstract security observation values used to indicate security integrity metadata.\r\n\n \n Examples: Codes conveying integrity status, integrity confidence, and provenance."; 2059 case _SECALTINTOBV: return "Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability)"; 2060 case ABSTRED: return "Security metadata observation values used to indicate the use of a more abstract version of the content, e.g., replacing exact value of an age or date field with a range, or remove the left digits of a credit card number or SSN."; 2061 case AGGRED: return "Security metadata observation values used to indicate the use of an algorithmic combination of actual values with the result of an aggregate function, e.g., average, sum, or count in order to limit disclosure of an IT resource (data, information object, service, or system capability) to the minimum necessary."; 2062 case ANONYED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by used to indicate the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject. No key to relink the data is retained."; 2063 case MAPPED: return "Security metadata observation value used to indicate that the IT resource semantic content has been transformed from one encoding to another.\r\n\n \n Usage Note: \"MAP\" code does not indicate the semantic fidelity of the transformed content.\r\n\n To indicate semantic fidelity for maps of HL7 to other code systems, this security alteration integrity observation may be further specified using an Act valued with Value Set: MapRelationship (2.16.840.1.113883.1.11.11052).\r\n\n Semantic fidelity of the mapped IT Resource may also be indicated using a SecurityIntegrityConfidenceObservation."; 2064 case MASKED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by indicating the mechanism by which software systems can make data unintelligible (that is, as unreadable and unusable by algorithmically transforming plaintext into ciphertext) such that it can only be accessed or used by authorized users. An authorized user may be provided a key to decrypt per license or \"shared secret\".\r\n\n \n Usage Note: \"MASKED\" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has been further encrypted, and may be accessed only by an authorized user or receiver to which a decryption key is provided."; 2065 case PSEUDED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability), by indicating the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject. Custodian may retain a key to relink data necessary to reidentify the information subject.\r\n\n \n Rationale: Personal data which has been processed to make it impossible to know whose data it is. Used particularly for secondary use of health data. In some cases, it may be possible for authorized individuals to restore the identity of the individual, e.g.,for public health case management. Based on ISO/TS 25237:2008 Health informatics—Pseudonymization"; 2066 case REDACTED: return "Security metadata observation value used to indicate the mechanism by which software systems can filter an IT resource (data, information object, service, or system capability) to remove any portion of the resource that is not authorized to be access, used, or disclosed.\r\n\n \n Usage Note: \"REDACTED\" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has filtered and not included in the content accessed or received."; 2067 case SUBSETTED: return "Metadata observation used to indicate that some information has been removed from the source object when the view this object contains was constructed because of configuration options when the view was created. The content may not be suitable for use as the basis of a record update\r\n\n \n Usage Note: This is not suitable to be used when information is removed for security reasons - see the code REDACTED for this use."; 2068 case SYNTAC: return "Security metadata observation value used to indicate that the IT resource syntax has been transformed from one syntactical representation to another. \r\n\n \n Usage Note: \"SYNTAC\" code does not indicate the syntactical correctness of the syntactically transformed IT resource."; 2069 case TRSLT: return "Security metadata observation value used to indicate that the IT resource has been translated from one human language to another. \r\n\n \n Usage Note: \"TRSLT\" does not indicate the fidelity of the translation or the languages translated.\r\n\n The fidelity of the IT Resource translation may be indicated using a SecurityIntegrityConfidenceObservation.\r\n\n To indicate languages, use the Value Set:HumanLanguage (2.16.840.1.113883.1.11.11526)"; 2070 case VERSIONED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) which indicates that the resource only retains versions of an IT resource for access and use per applicable policy\r\n\n \n Usage Note: When this code is used, expectation is that the system has removed historical versions of the data that falls outside the time period deemed to be the effective time of the applicable version."; 2071 case _SECDATINTOBV: return "Abstract security observation values used to indicate data integrity metadata.\r\n\n \n Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function."; 2072 case CRYTOHASH: return "Security metadata observation value used to indicate the mechanism by which software systems can establish that data was not modified in transit.\r\n\n \n Rationale: This definition is intended to align with the ISO 22600-2 3.3.19 definition of cryptographic checkvalue: Information which is derived by performing a cryptographic transformation (see cryptography) on the data unit. The derivation of the checkvalue may be performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit.\r\n\n \n Examples: \n \r\n\n \n SHA-1\n SHA-2 (Secure Hash Algorithm)"; 2073 case DIGSIG: return "Security metadata observation value used to indicate the mechanism by which software systems use digital signature to establish that data has not been modified. \r\n\n \n Rationale: This definition is intended to align with the ISO 22600-2 3.3.26 definition of digital signature: Data appended to, or a cryptographic transformation (see cryptography) of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g., by the recipient."; 2074 case _SECINTCONOBV: return "Abstract security observation value used to indicate integrity confidence metadata.\r\n\n \n Examples: Codes conveying the level of reliability and trustworthiness of an IT resource."; 2075 case HRELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be very high."; 2076 case RELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be adequate."; 2077 case UNCERTREL: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be uncertain."; 2078 case UNRELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be inadequate."; 2079 case _SECINTPRVOBV: return "Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability).\r\n\n \n Examples: Codes conveying the provenance metadata about the entity reporting an IT resource."; 2080 case _SECINTPRVABOBV: return "Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability).\r\n\n \n Examples: Codes conveying the provenance metadata about the entity asserting the resource."; 2081 case CLINAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a clinician."; 2082 case DEVAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a device."; 2083 case HCPAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a healthcare professional."; 2084 case PACQAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient acquaintance."; 2085 case PATAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient."; 2086 case PAYAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a payer."; 2087 case PROAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a professional."; 2088 case SDMAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a substitute decision maker."; 2089 case _SECINTPRVRBOBV: return "Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability).\r\n\n \n Examples: Codes conveying the provenance metadata about the entity reporting an IT resource."; 2090 case CLINRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a clinician."; 2091 case DEVRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a device."; 2092 case HCPRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a healthcare professional."; 2093 case PACQRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient acquaintance."; 2094 case PATRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient."; 2095 case PAYRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a payer."; 2096 case PRORPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a professional."; 2097 case SDMRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a substitute decision maker."; 2098 case SECTRSTOBV: return "Observation value used to indicate aspects of trust applicable to an IT resource (data, information object, service, or system capability)."; 2099 case TRSTACCRDOBV: return "Values for security trust accreditation metadata observation made about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework."; 2100 case TRSTAGREOBV: return "Values for security trust agreement metadata observation made about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1]\n[ISO IEC 10181-1]"; 2101 case TRSTCERTOBV: return "Values for security trust certificate metadata observation made about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1]\r\n\n For example, a Certificate Policy (CP), which is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. A particular Certificate Policy might indicate the applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range. Another example is Cross Certification with Federal Bridge."; 2102 case TRSTLOAOBV: return "Values for security trust assurance metadata observation made about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol."; 2103 case LOAAN: return "The value assigned as the indicator of the digital quality or reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2]\r\n\n For example, the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]"; 2104 case LOAAN1: return "Indicator of low digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] \r\n\n Low authentication level of assurance indicates that the relying party may have little or no confidence in the asserted identity's validity. Level 1 requires little or no confidence in the asserted identity. No identity proofing is required at this level, but the authentication mechanism should provide some assurance that the same claimant is accessing the protected transaction or data. A wide range of available authentication technologies can be employed and any of the token methods of Levels 2, 3, or 4, including Personal Identification Numbers (PINs), may be used. To be authenticated, the claimant must prove control of the token through a secure authentication protocol. At Level 1, long-term shared authentication secrets may be revealed to verifiers. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2105 case LOAAN2: return "Indicator of basic digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]\r\n\n Basic authentication level of assurance indicates that the relying party may have some confidence in the asserted identity's validity. Level 2 requires confidence that the asserted identity is accurate. Level 2 provides for single-factor remote network authentication, including identity-proofing requirements for presentation of identifying materials or information. A wide range of available authentication technologies can be employed, including any of the token methods of Levels 3 or 4, as well as passwords. Successful authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, and online guessing attacks are prevented. \nLong-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are required. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2106 case LOAAN3: return "Indicator of medium digital quality or reliability of the digital reliability of verification and validation of the process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] \r\n\n Medium authentication level of assurance indicates that the relying party may have high confidence in the asserted identity's validity. Level 3 is appropriate for transactions that need high confidence in the accuracy of the asserted identity. Level 3 provides multifactor remote network authentication. At this level, identity-proofing procedures require verification of identifying materials and information. Authentication is based on proof of possession of a key or password through a cryptographic protocol. Cryptographic strength mechanisms should protect the primary authentication token (a cryptographic key) against compromise by the protocol threats, including eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks. A minimum of two authentication factors is required. Three kinds of tokens may be used:\r\n\n \n \"soft\" cryptographic token, which has the key stored on a general-purpose computer, \n \"hard\" cryptographic token, which has the key stored on a special hardware device, and \n \"one-time password\" device token, which has symmetric key stored on a personal hardware device that is a cryptographic module validated at FIPS 140-2 Level 1 or higher. Validation testing of cryptographic modules and algorithms for conformance to Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, is managed by NIST.\n \n Authentication requires that the claimant prove control of the token through a secure authentication protocol. The token must be unlocked with a password or biometric representation, or a password must be used in a secure authentication protocol, to establish two-factor authentication. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are used for all operations. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2107 case LOAAN4: return "Indicator of high digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]\r\n\n High authentication level of assurance indicates that the relying party may have very high confidence in the asserted identity's validity. Level 4 is for transactions that need very high confidence in the accuracy of the asserted identity. Level 4 provides the highest practical assurance of remote network authentication. Authentication is based on proof of possession of a key through a cryptographic protocol. This level is similar to Level 3 except that only “hard� cryptographic tokens are allowed, cryptographic module validation requirements are strengthened, and subsequent critical data transfers must be authenticated via a key that is bound to the authentication process. The token should be a hardware cryptographic module validated at FIPS 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. This level requires a physical token, which cannot readily be copied, and operator authentication at Level 2 and higher, and ensures good, two-factor remote authentication.\r\n\n Level 4 requires strong cryptographic authentication of all parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks are prevented. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Strong approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2108 case LOAAP: return "The value assigned as the indicator of the digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]"; 2109 case LOAAP1: return "Indicator of the low digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n Low authentication process level of assurance indicates that (1) long-term shared authentication secrets may be revealed to verifiers; and (2) assertions and assertion references require protection from manufacture/modification and reuse attacks. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2110 case LOAAP2: return "Indicator of the basic digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n Basic authentication process level of assurance indicates that long-term shared authentication secrets are never revealed to any other party except Credential Service Provider (CSP). Sessions (temporary) shared secrets may be provided to independent verifiers by CSP. Long-term shared authentication secrets, if used, are never revealed to any other party except Verifiers operated by the Credential Service Provider (CSP); however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 1 requirements, assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2111 case LOAAP3: return "Indicator of the medium digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n Medium authentication process level of assurance indicates that the token can be unlocked with password, biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication. Long-term shared authentication secrets are never revealed to any party except the Claimant and Credential Service Provider (CSP).\r\n\n Authentication requires that the Claimant prove, through a secure authentication protocol, that he or she controls the token. The Claimant unlocks the token with a password or biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication (through proof of possession of a physical or software token in combination with some memorized secret knowledge). Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 2 requirements, assertions are protected against repudiation by the Verifier."; 2112 case LOAAP4: return "Indicator of the high digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n High authentication process level of assurance indicates all sensitive data transfer are cryptographically authenticated using keys bound to the authentication process. Level 4 requires strong cryptographic authentication of all communicating parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the Claimant prove through a secure authentication protocol that he or she controls the token. All protocol threats at Level 3 are required to be prevented at Level 4. Protocols shall also be strongly resistant to man-in-the-middle attacks. Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. Approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2113 case LOAAS: return "The value assigned as the indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes."; 2114 case LOAAS1: return "Indicator of the low quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n Assertions and assertion references require protection from modification and reuse attacks. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2115 case LOAAS2: return "Indicator of the basic quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n Assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required for all assertion protocols. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2116 case LOAAS3: return "Indicator of the medium quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n Assertions are protected against repudiation by the verifier. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2117 case LOAAS4: return "Indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n Strongly resistant to man-in-the-middle attacks. \"Bearer\" assertions are not used. \"Holder-of-key\" assertions may be used. RP maintains records of the assertions. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 2118 case LOACM: return "Indicator of the digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2119 case LOACM1: return "Indicator of the low digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Little or no confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include weak identity binding to tokens and plaintext passwords or secrets not transmitted across a network. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2120 case LOACM2: return "Indicator of the basic digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Some confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verification must prove claimant controls the token; token resists online guessing, replay, session hijacking, and eavesdropping attacks; and token is at least weakly resistant to man-in-the middle attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2121 case LOACM3: return "Indicator of the medium digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity. High confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Ownership of token verifiable through security authentication protocol and credential management protects against verifier impersonation attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2122 case LOACM4: return "Indicator of the high digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity. Very high confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verifier can prove control of token through a secure protocol; credential management supports strong cryptographic authentication of all communication parties. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2123 case LOAID: return "Indicator of the quality or reliability in the process of ascertaining that an individual is who he or she claims to be."; 2124 case LOAID1: return "Indicator of low digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires that a continuity of identity be maintained but does not require identity proofing. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2125 case LOAID2: return "Indicator of some digital quality or reliability in the process of ascertaining that that an individual is who he or she claims to be. Requires identity proofing via presentation of identifying material or information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2126 case LOAID3: return "Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2127 case LOAID4: return "Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2128 case LOANR: return "Indicator of the digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 2129 case LOANR1: return "Indicator of low digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 2130 case LOANR2: return "Indicator of basic digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 2131 case LOANR3: return "Indicator of medium digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 2132 case LOANR4: return "Indicator of high digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 2133 case LOARA: return "Indicator of the digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]"; 2134 case LOARA1: return "Indicator of low digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]"; 2135 case LOARA2: return "Indicator of basic digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]"; 2136 case LOARA3: return "Indicator of medium digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]"; 2137 case LOARA4: return "Indicator of high digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization's security controls. [Based on NIST SP 800-63-2]"; 2138 case LOATK: return "Indicator of the digital quality or reliability of single and multi-token authentication. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2139 case LOATK1: return "Indicator of the low digital quality or reliability of single and multi-token authentication. Permits the use of any of the token methods of Levels 2, 3, or 4. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2140 case LOATK2: return "Indicator of the basic digital quality or reliability of single and multi-token authentication. Requires single factor authentication using memorized secret tokens, pre-registered knowledge tokens, look-up secret tokens, out of band tokens, or single factor one-time password devices. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2141 case LOATK3: return "Indicator of the medium digital quality or reliability of single and multi-token authentication. Requires two authentication factors. Provides multi-factor remote network authentication. Permits multi-factor software cryptographic token. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2142 case LOATK4: return "Indicator of the high digital quality or reliability of single and multi-token authentication. Requires token that is a hardware cryptographic module validated at validated at Federal Information Processing Standard (FIPS) 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. Level 4 token requirements can be met by using the PIV authentication key of a FIPS 201 compliant Personal Identity Verification (PIV) Card. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 2143 case TRSTMECOBV: return "Values for security trust mechanism metadata observation made about a security architecture system component that supports enforcement of security policies."; 2144 case _SEVERITYOBSERVATION: return "Potential values for observations of severity."; 2145 case H: return "Indicates the condition may be life-threatening or has the potential to cause permanent injury."; 2146 case L: return "Indicates the condition may result in some adverse consequences but is unlikely to substantially affect the situation of the subject."; 2147 case M: return "Indicates the condition may result in noticable adverse adverse consequences but is unlikely to be life-threatening or cause permanent injury."; 2148 case _SUBJECTBODYPOSITION: return "Contains codes for defining the observed, physical position of a subject, such as during an observation, assessment, collection of a specimen, etc. ECG waveforms and vital signs, such as blood pressure, are two examples where a general, observed position typically needs to be noted."; 2149 case LLD: return "Lying on the left side."; 2150 case PRN: return "Lying with the front or ventral surface downward; lying face down."; 2151 case RLD: return "Lying on the right side."; 2152 case SFWL: return "A semi-sitting position in bed with the head of the bed elevated approximately 45 degrees."; 2153 case SIT: return "Resting the body on the buttocks, typically with upper torso erect or semi erect."; 2154 case STN: return "To be stationary, upright, vertical, on one's legs."; 2155 case SUP: return "supine"; 2156 case RTRD: return "Lying on the back, on an inclined plane, typically about 30-45 degrees with head raised and feet lowered."; 2157 case TRD: return "Lying on the back, on an inclined plane, typically about 30-45 degrees, with head lowered and feet raised."; 2158 case _VERIFICATIONOUTCOMEVALUE: return "Values for observations of verification act results\r\n\n \n Examples: Verified, not verified, verified with warning."; 2159 case ACT: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s)."; 2160 case ACTPEND: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s) - Pending Investigation"; 2161 case ELG: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s)."; 2162 case INACT: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s)."; 2163 case INPNDINV: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Investigation."; 2164 case INPNDUPD: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Eligibility Update."; 2165 case NELG: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s). May optionally include reasons for the ineligibility."; 2166 case _WORKSCHEDULE: return "Concepts that describe an individual's typical arrangement of working hours for an occupation."; 2167 case DS: return "A person who is scheduled for work during daytime hours (for example between 6am and 6pm) on a regular basis."; 2168 case EMS: return "Consistent Early morning schedule of 13 hours or less per shift (between 2 am and 2 pm)"; 2169 case ES: return "A person who is scheduled for work during evening hours (for example between 2pm and midnight) on a regular basis."; 2170 case NS: return "Scheduled for work during nighttime hours (for example between 9pm and 8am) on a regular basis."; 2171 case RSWN: return "Scheduled for work times that change periodically between days, and/or evenings, and includes some night shifts."; 2172 case RSWON: return "Scheduled for work days/times that change periodically between days, but does not include night or evening work."; 2173 case SS: return "Shift consisting of two distinct work periods each day that are separated by a break of a few hours (for example 2 to 4 hours)"; 2174 case VLS: return "Shifts of 17 or more hours."; 2175 case VS: return "Irregular, unpredictable hours scheduled on a short notice (for example, less than 2 day notice): inconsistent schedule, on-call, as needed, as available."; 2176 case _ANNOTATIONVALUE: return "AnnotationValue"; 2177 case _COMMONCLINICALOBSERVATIONVALUE: return "Description:Used in a patient care message to value simple clinical (non-lab) observations."; 2178 case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "This domain is established as a parent to a variety of value domains being defined to support the communication of Individual Case Safety Reports to regulatory bodies. Arguably, this aggregation is not taxonomically pure, but the grouping will facilitate the management of these domains."; 2179 case _INDICATIONVALUE: return "Indicates the specific observation result which is the reason for the action (prescription, lab test, etc.). E.g. Headache, Ear infection, planned diagnostic image (requiring contrast agent), etc."; 2180 default: return "?"; 2181 } 2182 } 2183 public String getDisplay() { 2184 switch (this) { 2185 case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "ActCoverageAssessmentObservationValue"; 2186 case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "ActFinancialStatusObservationValue"; 2187 case ASSET: return "asset"; 2188 case ANNUITY: return "annuity"; 2189 case PROP: return "real property"; 2190 case RETACCT: return "retirement investment account"; 2191 case TRUST: return "trust"; 2192 case INCOME: return "income"; 2193 case CHILD: return "child support"; 2194 case DISABL: return "disability pay"; 2195 case INVEST: return "investment income"; 2196 case PAY: return "paid employment"; 2197 case RETIRE: return "retirement pay"; 2198 case SPOUSAL: return "spousal or partner support"; 2199 case SUPPLE: return "income supplement"; 2200 case TAX: return "tax obligation"; 2201 case LIVEXP: return "living expense"; 2202 case CLOTH: return "clothing expense"; 2203 case FOOD: return "food expense"; 2204 case HEALTH: return "health expense"; 2205 case HOUSE: return "household expense"; 2206 case LEGAL: return "legal expense"; 2207 case MORTG: return "mortgage"; 2208 case RENT: return "rent"; 2209 case SUNDRY: return "sundry expense"; 2210 case TRANS: return "transportation expense"; 2211 case UTIL: return "utility expense"; 2212 case ELSTAT: return "eligibility indicator"; 2213 case ADOPT: return "adoption document"; 2214 case BTHCERT: return "birth certificate"; 2215 case CCOC: return "creditable coverage document"; 2216 case DRLIC: return "driver license"; 2217 case FOSTER: return "foster child document"; 2218 case MEMBER: return "program or policy member"; 2219 case MIL: return "military identification"; 2220 case MRGCERT: return "marriage certificate"; 2221 case PASSPORT: return "passport"; 2222 case STUDENRL: return "student enrollment"; 2223 case HLSTAT: return "health status"; 2224 case DISABLE: return "disabled"; 2225 case DRUG: return "drug use"; 2226 case IVDRG: return "IV drug use"; 2227 case PGNT: return "pregnant"; 2228 case LIVDEP: return "living dependency"; 2229 case RELDEP: return "relative dependent"; 2230 case SPSDEP: return "spouse dependent"; 2231 case URELDEP: return "unrelated person dependent"; 2232 case LIVSIT: return "living situation"; 2233 case ALONE: return "alone"; 2234 case DEPCHD: return "dependent children"; 2235 case DEPSPS: return "dependent spouse"; 2236 case DEPYGCHD: return "dependent young children"; 2237 case FAM: return "live with family"; 2238 case RELAT: return "relative"; 2239 case SPS: return "spouse only"; 2240 case UNREL: return "unrelated person"; 2241 case SOECSTAT: return "socio economic status"; 2242 case ABUSE: return "abuse victim"; 2243 case HMLESS: return "homeless"; 2244 case ILGIM: return "illegal immigrant"; 2245 case INCAR: return "incarcerated"; 2246 case PROB: return "probation"; 2247 case REFUG: return "refugee"; 2248 case UNEMPL: return "unemployed"; 2249 case _ALLERGYTESTVALUE: return "AllergyTestValue"; 2250 case A0: return "no reaction"; 2251 case A1: return "minimal reaction"; 2252 case A2: return "mild reaction"; 2253 case A3: return "moderate reaction"; 2254 case A4: return "severe reaction"; 2255 case _COMPOSITEMEASURESCORING: return "CompositeMeasureScoring"; 2256 case ALLORNONESCR: return "All-or-nothing Scoring"; 2257 case LINEARSCR: return "Linear Scoring"; 2258 case OPPORSCR: return "Opportunity Scoring"; 2259 case WEIGHTSCR: return "Weighted Scoring"; 2260 case _COVERAGELIMITOBSERVATIONVALUE: return "CoverageLimitObservationValue"; 2261 case _COVERAGELEVELOBSERVATIONVALUE: return "CoverageLevelObservationValue"; 2262 case ADC: return "adult child"; 2263 case CHD: return "child"; 2264 case DEP: return "dependent"; 2265 case DP: return "domestic partner"; 2266 case ECH: return "employee"; 2267 case FLY: return "family coverage"; 2268 case IND: return "individual"; 2269 case SSP: return "same sex partner"; 2270 case _CRITICALITYOBSERVATIONVALUE: return "CriticalityObservationValue"; 2271 case CRITH: return "high criticality"; 2272 case CRITL: return "low criticality"; 2273 case CRITU: return "unable to assess criticality"; 2274 case _EMPLOYMENTSTATUS: return "_EmploymentStatus"; 2275 case EMPLOYED: return "Employed"; 2276 case NOTINLABORFORCE: return "Not In Labor Force"; 2277 case UNEMPLOYED: return "Unemployed"; 2278 case _GENETICOBSERVATIONVALUE: return "GeneticObservationValue"; 2279 case HOMOZYGOTE: return "HOMO"; 2280 case _OBSERVATIONMEASURESCORING: return "ObservationMeasureScoring"; 2281 case COHORT: return "cohort measure scoring"; 2282 case CONTVAR: return "continuous variable measure scoring"; 2283 case PROPOR: return "proportion measure scoring"; 2284 case RATIO: return "ratio measure scoring"; 2285 case _OBSERVATIONMEASURETYPE: return "ObservationMeasureType"; 2286 case COMPOSITE: return "composite measure type"; 2287 case EFFICIENCY: return "efficiency measure type"; 2288 case EXPERIENCE: return "experience measure type"; 2289 case OUTCOME: return "outcome measure type"; 2290 case INTERMOM: return "intermediate clinical outcome measure"; 2291 case PROPM: return "intermediate clinical outcome measure"; 2292 case PROCESS: return "process measure type"; 2293 case APPROPRIATE: return "appropriate use process measure"; 2294 case RESOURCE: return "resource use measure type"; 2295 case STRUCTURE: return "structure measure type"; 2296 case _OBSERVATIONPOPULATIONINCLUSION: return "ObservationPopulationInclusion"; 2297 case DENEX: return "denominator exclusions"; 2298 case DENEXCEP: return "denominator exceptions"; 2299 case DENOM: return "denominator"; 2300 case IP: return "initial population"; 2301 case IPP: return "initial patient population"; 2302 case MSRPOPL: return "measure population"; 2303 case NUMER: return "numerator"; 2304 case NUMEX: return "numerator exclusions"; 2305 case _PARTIALCOMPLETIONSCALE: return "PartialCompletionScale"; 2306 case G: return "Great extent"; 2307 case LE: return "Large extent"; 2308 case ME: return "Medium extent"; 2309 case MI: return "Minimal extent"; 2310 case N: return "None"; 2311 case S: return "Some extent"; 2312 case _SECURITYOBSERVATIONVALUE: return "SecurityObservationValue"; 2313 case _SECINTOBV: return "security integrity"; 2314 case _SECALTINTOBV: return "alteration integrity"; 2315 case ABSTRED: return "abstracted"; 2316 case AGGRED: return "aggregated"; 2317 case ANONYED: return "anonymized"; 2318 case MAPPED: return "mapped"; 2319 case MASKED: return "masked"; 2320 case PSEUDED: return "pseudonymized"; 2321 case REDACTED: return "redacted"; 2322 case SUBSETTED: return "subsetted"; 2323 case SYNTAC: return "syntactic transform"; 2324 case TRSLT: return "translated"; 2325 case VERSIONED: return "versioned"; 2326 case _SECDATINTOBV: return "data integrity"; 2327 case CRYTOHASH: return "cryptographic hash function"; 2328 case DIGSIG: return "digital signature"; 2329 case _SECINTCONOBV: return "integrity confidence"; 2330 case HRELIABLE: return "highly reliable"; 2331 case RELIABLE: return "reliable"; 2332 case UNCERTREL: return "uncertain reliability"; 2333 case UNRELIABLE: return "unreliable"; 2334 case _SECINTPRVOBV: return "provenance"; 2335 case _SECINTPRVABOBV: return "provenance asserted by"; 2336 case CLINAST: return "clinician asserted"; 2337 case DEVAST: return "device asserted"; 2338 case HCPAST: return "healthcare professional asserted"; 2339 case PACQAST: return "patient acquaintance asserted"; 2340 case PATAST: return "patient asserted"; 2341 case PAYAST: return "payer asserted"; 2342 case PROAST: return "professional asserted"; 2343 case SDMAST: return "substitute decision maker asserted"; 2344 case _SECINTPRVRBOBV: return "provenance reported by"; 2345 case CLINRPT: return "clinician reported"; 2346 case DEVRPT: return "device reported"; 2347 case HCPRPT: return "healthcare professional reported"; 2348 case PACQRPT: return "patient acquaintance reported"; 2349 case PATRPT: return "patient reported"; 2350 case PAYRPT: return "payer reported"; 2351 case PRORPT: return "professional reported"; 2352 case SDMRPT: return "substitute decision maker reported"; 2353 case SECTRSTOBV: return "security trust observation"; 2354 case TRSTACCRDOBV: return "trust accreditation observation"; 2355 case TRSTAGREOBV: return "trust agreement observation"; 2356 case TRSTCERTOBV: return "trust certificate observation"; 2357 case TRSTLOAOBV: return "trust assurance observation"; 2358 case LOAAN: return "authentication level of assurance value"; 2359 case LOAAN1: return "low authentication level of assurance"; 2360 case LOAAN2: return "basic authentication level of assurance"; 2361 case LOAAN3: return "medium authentication level of assurance"; 2362 case LOAAN4: return "high authentication level of assurance"; 2363 case LOAAP: return "authentication process level of assurance value"; 2364 case LOAAP1: return "low authentication process level of assurance"; 2365 case LOAAP2: return "basic authentication process level of assurance"; 2366 case LOAAP3: return "medium authentication process level of assurance"; 2367 case LOAAP4: return "high authentication process level of assurance"; 2368 case LOAAS: return "assertion level of assurance value"; 2369 case LOAAS1: return "low assertion level of assurance"; 2370 case LOAAS2: return "basic assertion level of assurance"; 2371 case LOAAS3: return "medium assertion level of assurance"; 2372 case LOAAS4: return "high assertion level of assurance"; 2373 case LOACM: return "token and credential management level of assurance value)"; 2374 case LOACM1: return "low token and credential management level of assurance"; 2375 case LOACM2: return "basic token and credential management level of assurance"; 2376 case LOACM3: return "medium token and credential management level of assurance"; 2377 case LOACM4: return "high token and credential management level of assurance"; 2378 case LOAID: return "identity proofing level of assurance"; 2379 case LOAID1: return "low identity proofing level of assurance"; 2380 case LOAID2: return "basic identity proofing level of assurance"; 2381 case LOAID3: return "medium identity proofing level of assurance"; 2382 case LOAID4: return "high identity proofing level of assurance"; 2383 case LOANR: return "non-repudiation level of assurance value"; 2384 case LOANR1: return "low non-repudiation level of assurance"; 2385 case LOANR2: return "basic non-repudiation level of assurance"; 2386 case LOANR3: return "medium non-repudiation level of assurance"; 2387 case LOANR4: return "high non-repudiation level of assurance"; 2388 case LOARA: return "remote access level of assurance value"; 2389 case LOARA1: return "low remote access level of assurance"; 2390 case LOARA2: return "basic remote access level of assurance"; 2391 case LOARA3: return "medium remote access level of assurance"; 2392 case LOARA4: return "high remote access level of assurance"; 2393 case LOATK: return "token level of assurance value"; 2394 case LOATK1: return "low token level of assurance"; 2395 case LOATK2: return "basic token level of assurance"; 2396 case LOATK3: return "medium token level of assurance"; 2397 case LOATK4: return "high token level of assurance"; 2398 case TRSTMECOBV: return "none supplied 6"; 2399 case _SEVERITYOBSERVATION: return "SeverityObservation"; 2400 case H: return "High"; 2401 case L: return "Low"; 2402 case M: return "Moderate"; 2403 case _SUBJECTBODYPOSITION: return "_SubjectBodyPosition"; 2404 case LLD: return "left lateral decubitus"; 2405 case PRN: return "prone"; 2406 case RLD: return "right lateral decubitus"; 2407 case SFWL: return "Semi-Fowler's"; 2408 case SIT: return "sitting"; 2409 case STN: return "standing"; 2410 case SUP: return "supine"; 2411 case RTRD: return "reverse trendelenburg"; 2412 case TRD: return "trendelenburg"; 2413 case _VERIFICATIONOUTCOMEVALUE: return "verification outcome"; 2414 case ACT: return "active coverage"; 2415 case ACTPEND: return "active - pending investigation"; 2416 case ELG: return "eligible"; 2417 case INACT: return "inactive"; 2418 case INPNDINV: return "inactive - pending investigation"; 2419 case INPNDUPD: return "inactive - pending eligibility update"; 2420 case NELG: return "not eligible"; 2421 case _WORKSCHEDULE: return "_WorkSchedule"; 2422 case DS: return "daytime shift"; 2423 case EMS: return "early morning shift"; 2424 case ES: return "evening shift"; 2425 case NS: return "night shift"; 2426 case RSWN: return "rotating shift with nights"; 2427 case RSWON: return "rotating shift without nights"; 2428 case SS: return "split shift"; 2429 case VLS: return "very long shift"; 2430 case VS: return "variable shift"; 2431 case _ANNOTATIONVALUE: return "AnnotationValue"; 2432 case _COMMONCLINICALOBSERVATIONVALUE: return "common clinical observation"; 2433 case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "Individual Case Safety Report Value Domains"; 2434 case _INDICATIONVALUE: return "IndicationValue"; 2435 default: return "?"; 2436 } 2437 } 2438 2439 2440} 2441