001package org.hl7.fhir.r4.model.codesystems;
002
003/*
004  Copyright (c) 2011+, HL7, Inc.
005  All rights reserved.
006  
007  Redistribution and use in source and binary forms, with or without modification, 
008  are permitted provided that the following conditions are met:
009  
010   * Redistributions of source code must retain the above copyright notice, this 
011     list of conditions and the following disclaimer.
012   * Redistributions in binary form must reproduce the above copyright notice, 
013     this list of conditions and the following disclaimer in the documentation 
014     and/or other materials provided with the distribution.
015   * Neither the name of HL7 nor the names of its contributors may be used to 
016     endorse or promote products derived from this software without specific 
017     prior written permission.
018  
019  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND 
020  ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 
021  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 
022  IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, 
023  INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 
024  NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 
025  PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 
026  WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 
027  ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 
028  POSSIBILITY OF SUCH DAMAGE.
029  
030*/
031
032// Generated on Thu, Sep 13, 2018 09:04-0400 for FHIR v3.5.0
033
034
035import org.hl7.fhir.exceptions.FHIRException;
036
037public enum V3ObservationValue {
038
039        /**
040         * Codes specify the category of observation, evidence, or document used to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. The type of evidence is coded as observation values.
041         */
042        _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE, 
043        /**
044         * Code specifying financial indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay stub; tax or income document; asset document; living expenses.
045         */
046        _ACTFINANCIALSTATUSOBSERVATIONVALUE, 
047        /**
048         * Codes specifying asset indicators used to assess or establish eligibility for coverage under a policy or program.
049         */
050        ASSET, 
051        /**
052         * Indicator of annuity ownership or status as beneficiary.
053         */
054        ANNUITY, 
055        /**
056         * Indicator of real property ownership, e.g., deed or real estate contract.
057         */
058        PROP, 
059        /**
060         * Indicator of retirement investment account ownership.
061         */
062        RETACCT, 
063        /**
064         * Indicator of status as trust beneficiary.
065         */
066        TRUST, 
067        /**
068         * Code specifying income indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay or pension check, child support payments received or provided, and taxes paid.
069         */
070        INCOME, 
071        /**
072         * Indicator of child support payments received or provided.
073         */
074        CHILD, 
075        /**
076         * Indicator of disability income replacement payment.
077         */
078        DISABL, 
079        /**
080         * Indicator of investment income, e.g., dividend check, annuity payment; real estate rent, investment divestiture proceeds; trust or endowment check.
081         */
082        INVEST, 
083        /**
084         * Indicator of paid employment, e.g., letter of hire, contract, employer letter; copy of pay check or pay stub.
085         */
086        PAY, 
087        /**
088         * Indicator of retirement payment, e.g., pension check.
089         */
090        RETIRE, 
091        /**
092         * Indicator of spousal or partner support payments received or provided; e.g., alimony payment; support stipulations in a divorce settlement.
093         */
094        SPOUSAL, 
095        /**
096         * Indicator of income supplement, e.g., gifting, parental income support; stipend, or grant.
097         */
098        SUPPLE, 
099        /**
100         * Indicator of tax obligation or payment, e.g., statement of taxable income.
101         */
102        TAX, 
103        /**
104         * Codes specifying living expense indicators used to assess or establish eligibility for coverage under a policy or program.
105         */
106        LIVEXP, 
107        /**
108         * Indicator of clothing expenses.
109         */
110        CLOTH, 
111        /**
112         * Indicator of transportation expenses.
113         */
114        FOOD, 
115        /**
116         * Indicator of health expenses; including medication costs, health service costs, financial participations, and health coverage premiums.
117         */
118        HEALTH, 
119        /**
120         * Indicator of housing expense, e.g., household appliances, fixtures, furnishings, and maintenance and repairs.
121         */
122        HOUSE, 
123        /**
124         * Indicator of legal expenses.
125         */
126        LEGAL, 
127        /**
128         * Indicator of mortgage amount, interest, and payments.
129         */
130        MORTG, 
131        /**
132         * Indicator of rental or lease payments.
133         */
134        RENT, 
135        /**
136         * Indicator of transportation expenses.
137         */
138        SUNDRY, 
139        /**
140         * Indicator of transportation expenses, e.g., vehicle payments, vehicle insurance, vehicle fuel, and vehicle maintenance and repairs.
141         */
142        TRANS, 
143        /**
144         * Indicator of transportation expenses.
145         */
146        UTIL, 
147        /**
148         * Code specifying eligibility indicators used to assess or establish eligibility for coverage under a policy or program eligibility status, e.g., certificates of creditable coverage; student enrollment; adoption, marriage or birth certificate.
149         */
150        ELSTAT, 
151        /**
152         * Indicator of adoption.
153         */
154        ADOPT, 
155        /**
156         * Indicator of birth.
157         */
158        BTHCERT, 
159        /**
160         * Indicator of creditable coverage.
161         */
162        CCOC, 
163        /**
164         * Indicator of driving status.
165         */
166        DRLIC, 
167        /**
168         * Indicator of foster child status.
169         */
170        FOSTER, 
171        /**
172         * Indicator of status as covered member under a policy or program, e.g., member id card or coverage document.
173         */
174        MEMBER, 
175        /**
176         * Indicator of military status.
177         */
178        MIL, 
179        /**
180         * Indicator of marriage status.
181         */
182        MRGCERT, 
183        /**
184         * Indicator of citizenship.
185         */
186        PASSPORT, 
187        /**
188         * Indicator of student status.
189         */
190        STUDENRL, 
191        /**
192         * Code specifying non-clinical indicators related to health status used to assess or establish eligibility for coverage under a policy or program, e.g., pregnancy, disability, drug use, mental health issues.
193         */
194        HLSTAT, 
195        /**
196         * Indication of disability.
197         */
198        DISABLE, 
199        /**
200         * Indication of drug use.
201         */
202        DRUG, 
203        /**
204         * Indication of IV drug use .
205         */
206        IVDRG, 
207        /**
208         * Non-clinical report of pregnancy.
209         */
210        PGNT, 
211        /**
212         * Code specifying observations related to living dependency, such as dependent upon spouse for activities of daily living.
213         */
214        LIVDEP, 
215        /**
216         * Continued living in private residence requires functional and health care assistance from one or more relatives.
217         */
218        RELDEP, 
219        /**
220         * Continued living in private residence requires functional and health care assistance from spouse or life partner.
221         */
222        SPSDEP, 
223        /**
224         * Continued living in private residence requires functional and health care assistance from one or more unrelated persons.
225         */
226        URELDEP, 
227        /**
228         * Code specifying observations related to living situation for a person in a private residence.
229         */
230        LIVSIT, 
231        /**
232         * Living alone.  Maps to PD1-2   Living arrangement   (IS)   00742 [A]
233         */
234        ALONE, 
235        /**
236         * Living with one or more dependent children requiring moderate supervision.
237         */
238        DEPCHD, 
239        /**
240         * Living with disabled spouse requiring functional and health care assistance
241         */
242        DEPSPS, 
243        /**
244         * Living with one or more dependent children requiring intensive supervision
245         */
246        DEPYGCHD, 
247        /**
248         * Living with family. Maps to PD1-2   Living arrangement   (IS)   00742 [F]
249         */
250        FAM, 
251        /**
252         * Living with one or more relatives. Maps to PD1-2   Living arrangement   (IS)   00742 [R]
253         */
254        RELAT, 
255        /**
256         * Living only with spouse or life partner. Maps to PD1-2   Living arrangement   (IS)   00742 [S]
257         */
258        SPS, 
259        /**
260         * Living with one or more unrelated persons.
261         */
262        UNREL, 
263        /**
264         * Code specifying observations or indicators related to socio-economic status used to assess to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program.
265         */
266        SOECSTAT, 
267        /**
268         * Indication of abuse victim.
269         */
270        ABUSE, 
271        /**
272         * Indication of status as homeless.
273         */
274        HMLESS, 
275        /**
276         * Indication of status as illegal immigrant.
277         */
278        ILGIM, 
279        /**
280         * Indication of status as incarcerated.
281         */
282        INCAR, 
283        /**
284         * Indication of probation status.
285         */
286        PROB, 
287        /**
288         * Indication of refugee status.
289         */
290        REFUG, 
291        /**
292         * Indication of unemployed status.
293         */
294        UNEMPL, 
295        /**
296         * Indicates the result of a particular allergy test.  E.g. Negative, Mild, Moderate, Severe
297         */
298        _ALLERGYTESTVALUE, 
299        /**
300         * Description:Patient exhibits no reaction to the challenge agent.
301         */
302        A0, 
303        /**
304         * Description:Patient exhibits a minimal reaction to the challenge agent.
305         */
306        A1, 
307        /**
308         * Description:Patient exhibits a mild reaction to the challenge agent.
309         */
310        A2, 
311        /**
312         * Description:Patient exhibits moderate reaction to the challenge agent.
313         */
314        A3, 
315        /**
316         * Description:Patient exhibits a severe reaction to the challenge agent.
317         */
318        A4, 
319        /**
320         * Observation values that communicate the method used in a quality measure to combine the component measure results included in an composite measure.
321         */
322        _COMPOSITEMEASURESCORING, 
323        /**
324         * Code specifying that the measure uses all-or-nothing scoring. All-or-nothing scoring places an individual in the numerator of the composite measure if and only if they are in the numerator of all component measures in which they are in the denominator.
325         */
326        ALLORNONESCR, 
327        /**
328         * Code specifying that the measure uses linear scoring. Linear scoring computes the fraction of component measures in which the individual appears in the numerator, giving equal weight to each component measure.
329         */
330        LINEARSCR, 
331        /**
332         * Code specifying that the measure uses opportunity-based scoring. In opportunity-based scoring the measure score is determined by combining the denominator and numerator of each component measure to determine an overall composite score.
333         */
334        OPPORSCR, 
335        /**
336         * Code specifying that the measure uses weighted scoring. Weighted scoring assigns a factor to each component measure to weight that measure's contribution to the overall score.
337         */
338        WEIGHTSCR, 
339        /**
340         * Description:Coded observation values for coverage limitations, for e.g., types of claims or types of parties covered under a policy or program.
341         */
342        _COVERAGELIMITOBSERVATIONVALUE, 
343        /**
344         * Description:Coded observation values for types of covered parties under a policy or program based on their personal relationships or employment status.
345         */
346        _COVERAGELEVELOBSERVATIONVALUE, 
347        /**
348         * Description:Child over an age as specified by coverage policy or program, e.g., student, differently abled, and income dependent.
349         */
350        ADC, 
351        /**
352         * Description:Dependent biological, adopted, foster child as specified by coverage policy or program.
353         */
354        CHD, 
355        /**
356         * Description:Person requiring functional and/or financial assistance from another person as specified by coverage policy or program.
357         */
358        DEP, 
359        /**
360         * Description:Persons registered as a family unit in a domestic partner registry as specified by law and by coverage policy or program.
361         */
362        DP, 
363        /**
364         * Description:An individual employed by an employer who receive remuneration in wages, salary, commission, tips, piece-rates, or pay-in-kind through the employeraTMs payment system (i.e., not a contractor) as specified by coverage policy or program.
365         */
366        ECH, 
367        /**
368         * Description:As specified by coverage policy or program.
369         */
370        FLY, 
371        /**
372         * Description:Person as specified by coverage policy or program.
373         */
374        IND, 
375        /**
376         * Description:A pair of people of the same gender who live together as a family as specified by coverage policy or program, e.g., Naomi and Ruth from the Book of Ruth; Socrates and Alcibiades
377         */
378        SSP, 
379        /**
380         * A clinical judgment as to the worst case result of a future exposure (including substance administration). When the worst case result is assessed to have a life-threatening or organ system threatening potential, it is considered to be of high criticality.
381         */
382        _CRITICALITYOBSERVATIONVALUE, 
383        /**
384         * Worst case result of a future exposure is assessed to be life-threatening or having high potential for organ system failure.
385         */
386        CRITH, 
387        /**
388         * Worst case result of a future exposure is not assessed to be life-threatening or having high potential for organ system failure.
389         */
390        CRITL, 
391        /**
392         * Unable to assess the worst case result of a future exposure.
393         */
394        CRITU, 
395        /**
396         * Concepts representing whether a person does or does not currently have a job or is not currently in the labor pool seeking employment.
397         */
398        _EMPLOYMENTSTATUS, 
399        /**
400         * Individuals who, during the last week: a) did any work for at least 1 hour as paid or unpaid employees of a business or government organization; worked in their own businesses, professions, or on their own farms; or b) were not working, but who have a job or business from which the individual was temporarily absent because of vacation, illness, bad weather, childcare problems, maternity or paternity leave, labor-management dispute, job training, or other family or personal reasons, regardless of whether or not they were paid for the time off or were seeking other jobs.
401         */
402        EMPLOYED, 
403        /**
404         * Persons not classified as employed or unemployed, meaning those who have no job and are not looking for one.
405         */
406        NOTINLABORFORCE, 
407        /**
408         * Persons who currently have no employment, but are available for work and have made specific efforts to find employment.
409         */
410        UNEMPLOYED, 
411        /**
412         * Description: The domain contains genetic analysis specific observation values, e.g. Homozygote, Heterozygote, etc.
413         */
414        _GENETICOBSERVATIONVALUE, 
415        /**
416         * Description: An individual having different alleles at one or more loci regarding a specific character
417         */
418        HOMOZYGOTE, 
419        /**
420         * Observation values used to indicate the type of scoring (e.g. proportion, ratio) used by a health quality measure.
421         */
422        _OBSERVATIONMEASURESCORING, 
423        /**
424         * A measure in which either short-term cross-section or long-term longitudinal analysis is performed over a group of subjects defined by a set of common properties or defining characteristics (e.g., Male smokers between the ages of 40 and 50 years, exposure to treatment, exposure duration).
425         */
426        COHORT, 
427        /**
428         * A measure score in which each individual value for the measure can fall anywhere along a continuous scale (e.g., mean time to thrombolytics which aggregates the time in minutes from a case presenting with chest pain to the time of administration of thrombolytics).
429         */
430        CONTVAR, 
431        /**
432         * A score derived by dividing the number of cases that meet a criterion for quality (the numerator) by the number of eligible cases within a given time frame (the denominator) where the numerator cases are a subset of the denominator cases (e.g., percentage of eligible women with a mammogram performed in the last year).
433         */
434        PROPOR, 
435        /**
436         * A score that may have a value of zero or greater that is derived by dividing a count of one type of data by a count of another type of data (e.g., the number of patients with central lines who develop infection divided by the number of central line days).
437         */
438        RATIO, 
439        /**
440         * Observation values used to indicate what kind of health quality measure is used.
441         */
442        _OBSERVATIONMEASURETYPE, 
443        /**
444         * A measure that is composed from one or more other measures and indicates an overall summary of those measures.
445         */
446        COMPOSITE, 
447        /**
448         * A measure related to the efficiency of medical treatment.
449         */
450        EFFICIENCY, 
451        /**
452         * A measure related to the level of patient engagement or patient experience of care.
453         */
454        EXPERIENCE, 
455        /**
456         * A measure that indicates the result of the performance (or non-performance) of a function or process.
457         */
458        OUTCOME, 
459        /**
460         * A measure that evaluates the change over time of a physiologic state observable that is associated with a specific long-term health outcome.
461         */
462        INTERMOM, 
463        /**
464         * A measure that is a comparison of patient reported outcomes for a single or multiple patients collected via an instrument specifically designed to obtain input directly from patients.
465         */
466        PROPM, 
467        /**
468         * A measure which focuses on a process which leads to a certain outcome, meaning that a scientific basis exists for believing that the process, when executed well, will increase the probability of achieving a desired outcome.
469         */
470        PROCESS, 
471        /**
472         * A measure that assesses the use of one or more processes where the expected health benefit exceeds the expected negative consequences.
473         */
474        APPROPRIATE, 
475        /**
476         * A measure related to the extent of use of clinical resources or cost of care.
477         */
478        RESOURCE, 
479        /**
480         * A measure related to the structure of patient care.
481         */
482        STRUCTURE, 
483        /**
484         * Observation values used to assert various populations that a subject falls into.
485         */
486        _OBSERVATIONPOPULATIONINCLUSION, 
487        /**
488         * Patients who should be removed from the eMeasure population and denominator before determining if numerator criteria are met. Denominator exclusions are used in proportion and ratio measures to help narrow the denominator.
489         */
490        DENEX, 
491        /**
492         * Denominator exceptions are those conditions that should remove a patient, procedure or unit of measurement from the denominator only if the numerator criteria are not met. Denominator exceptions allow for adjustment of the calculated score for those providers with higher risk populations. Denominator exceptions are used only in proportion eMeasures. They are not appropriate for ratio or continuous variable eMeasures.  Denominator exceptions allow for the exercise of clinical judgment and should be specifically defined where capturing the information in a structured manner fits the clinical workflow. Generic denominator exception reasons used in proportion eMeasures fall into three general categories:
493
494                        
495                           Medical reasons
496                           Patient reasons
497                           System reasons
498         */
499        DENEXCEP, 
500        /**
501         * It can be the same as the initial patient population or a subset of the initial patient population to further constrain the population for the purpose of the eMeasure. Different measures within an eMeasure set may have different Denominators. Continuous Variable eMeasures do not have a Denominator, but instead define a Measure Population.
502         */
503        DENOM, 
504        /**
505         * The initial population refers to all entities to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs.
506         */
507        IP, 
508        /**
509         * The initial patient population refers to all patients to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. Details often include information based upon specific age groups, diagnoses, diagnostic and procedure codes, and enrollment periods.
510         */
511        IPP, 
512        /**
513         * Measure population is used only in continuous variable eMeasures. It is a narrative description of the eMeasure population. 
514(e.g., all patients seen in the Emergency Department during the measurement period).
515         */
516        MSRPOPL, 
517        /**
518         * Numerators are used in proportion and ratio eMeasures. In proportion measures the numerator criteria are the processes or outcomes expected for each patient, procedure, or other unit of measurement defined in the denominator. In ratio measures the numerator is related, but not directly derived from the denominator (e.g., a numerator listing the number of central line blood stream infections and a denominator indicating the days per thousand of central line usage in a specific time period).
519         */
520        NUMER, 
521        /**
522         * Numerator Exclusions are used only in ratio eMeasures to define instances that should not be included in the numerator data. (e.g., if the number of central line blood stream infections per 1000 catheter days were to exclude infections with a specific bacterium, that bacterium would be listed as a numerator exclusion.)
523         */
524        NUMEX, 
525        /**
526         * PartialCompletionScale
527         */
528        _PARTIALCOMPLETIONSCALE, 
529        /**
530         * Value for Act.partialCompletionCode attribute that implies 81-99% completion
531         */
532        G, 
533        /**
534         * Value for Act.partialCompletionCode attribute that implies 61-80% completion
535         */
536        LE, 
537        /**
538         * Value for Act.partialCompletionCode attribute that implies 41-60% completion
539         */
540        ME, 
541        /**
542         * Value for Act.partialCompletionCode attribute that implies 1-20% completion
543         */
544        MI, 
545        /**
546         * Value for Act.partialCompletionCode attribute that implies 0% completion
547         */
548        N, 
549        /**
550         * Value for Act.partialCompletionCode attribute that implies 21-40% completion
551         */
552        S, 
553        /**
554         * Observation values used to indicate security observation metadata.
555         */
556        _SECURITYOBSERVATIONVALUE, 
557        /**
558         * Abstract security observation values used to indicate security integrity metadata.
559
560                        
561                           Examples: Codes conveying integrity status, integrity confidence, and provenance.
562         */
563        _SECINTOBV, 
564        /**
565         * Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability)
566         */
567        _SECALTINTOBV, 
568        /**
569         * Security metadata observation values used to indicate the use of a more abstract version of the content, e.g., replacing exact value of an age or date field with a range, or remove the left digits of a credit card number or SSN.
570         */
571        ABSTRED, 
572        /**
573         * Security metadata observation values used to indicate the use of an algorithmic combination of actual values with the result of an aggregate function, e.g., average, sum, or count in order to limit disclosure of an IT resource (data, information object, service, or system capability) to the minimum necessary.
574         */
575        AGGRED, 
576        /**
577         * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by used to indicate the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject.  No key to relink the data is retained.
578         */
579        ANONYED, 
580        /**
581         * Security metadata observation value used to indicate that the IT resource semantic content has been transformed from one encoding to another.
582
583                        
584                           Usage Note: "MAP" code does not indicate the semantic fidelity of the transformed content.
585
586                        To indicate semantic fidelity for maps of HL7 to other code systems, this security alteration integrity observation may be further specified using an Act valued with Value Set: MapRelationship (2.16.840.1.113883.1.11.11052).
587
588                        Semantic fidelity of the mapped IT Resource may also be indicated using a SecurityIntegrityConfidenceObservation.
589         */
590        MAPPED, 
591        /**
592         * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by indicating the mechanism by which software systems can make data unintelligible (that is, as unreadable and unusable by algorithmically transforming plaintext into ciphertext) such that it can only be accessed or used by authorized users.  An authorized user may be provided a key to decrypt per license or "shared secret".
593
594                        
595                           Usage Note: "MASKED" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has been further encrypted, and may be accessed only by an authorized user or receiver to which a decryption key is provided.
596         */
597        MASKED, 
598        /**
599         * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability), by indicating the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject.  Custodian may retain a key to relink data necessary to reidentify the information subject.
600
601                        
602                           Rationale: Personal data which has been processed to make it impossible to know whose data it is. Used particularly for secondary use of health data. In some cases, it may be possible for authorized individuals to restore the identity of the individual, e.g.,for public health case management.  Based on ISO/TS 25237:2008 Health informatics—Pseudonymization
603         */
604        PSEUDED, 
605        /**
606         * Security metadata observation value used to indicate the mechanism by which software systems can filter an IT resource (data, information object, service, or system capability) to remove any portion of the resource that is not authorized to be access, used, or disclosed.
607
608                        
609                           Usage Note: "REDACTED" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has filtered and not included in the content accessed or received.
610         */
611        REDACTED, 
612        /**
613         * Metadata observation used to indicate that some information has been removed from the source object when the view this object contains was constructed because of configuration options when the view was created. The content may not be suitable for use as the basis of a record update
614
615                        
616                           Usage Note: This is not suitable to be used when information is removed for security reasons - see the code REDACTED for this use.
617         */
618        SUBSETTED, 
619        /**
620         * Security metadata observation value used to indicate that the IT resource syntax has been transformed from one syntactical representation to another.  
621
622                        
623                           Usage Note: "SYNTAC" code does not indicate the syntactical correctness of the syntactically transformed IT resource.
624         */
625        SYNTAC, 
626        /**
627         * Security metadata observation value used to indicate that the IT resource has been translated from one human language to another.  
628
629                        
630                           Usage Note: "TRSLT" does not indicate the fidelity of the translation or the languages translated.
631
632                        The fidelity of the IT Resource translation may be indicated using a SecurityIntegrityConfidenceObservation.
633
634                        To indicate languages, use the Value Set:HumanLanguage (2.16.840.1.113883.1.11.11526)
635         */
636        TRSLT, 
637        /**
638         * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability)  which indicates that the resource only retains versions of an IT resource  for access and use per applicable policy
639
640                        
641                           Usage Note: When this code is used, expectation is that the system has removed historical versions of the data that falls outside the time period deemed to be the effective time of the applicable version.
642         */
643        VERSIONED, 
644        /**
645         * Abstract security observation values used to indicate data integrity metadata.
646
647                        
648                           Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function.
649         */
650        _SECDATINTOBV, 
651        /**
652         * Security metadata observation value used to indicate the mechanism by which software systems can establish that data was not modified in transit.
653
654                        
655                           Rationale: This definition is intended to align with the ISO 22600-2 3.3.19 definition of cryptographic checkvalue: Information which is derived by performing a cryptographic transformation (see cryptography) on the data unit.  The derivation of the checkvalue may be performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit.
656
657                        
658                           Examples: 
659                        
660
661                        
662                           SHA-1
663                           SHA-2 (Secure Hash Algorithm)
664         */
665        CRYTOHASH, 
666        /**
667         * Security metadata observation value used to indicate the mechanism by which software systems use digital signature to establish that data has not been modified.  
668
669                        
670                           Rationale: This definition is intended to align with the ISO 22600-2 3.3.26 definition of digital signature:  Data appended to, or a cryptographic transformation (see cryptography) of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g., by the recipient.
671         */
672        DIGSIG, 
673        /**
674         * Abstract security observation value used to indicate integrity confidence metadata.
675
676                        
677                           Examples: Codes conveying the level of reliability and trustworthiness of an IT resource.
678         */
679        _SECINTCONOBV, 
680        /**
681         * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be very high.
682         */
683        HRELIABLE, 
684        /**
685         * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be adequate.
686         */
687        RELIABLE, 
688        /**
689         * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be uncertain.
690         */
691        UNCERTREL, 
692        /**
693         * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be inadequate.
694         */
695        UNRELIABLE, 
696        /**
697         * Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability).
698
699                        
700                           Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.
701         */
702        _SECINTPRVOBV, 
703        /**
704         * Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability).
705
706                        
707                           Examples: Codes conveying the provenance metadata about the entity asserting the resource.
708         */
709        _SECINTPRVABOBV, 
710        /**
711         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a clinician.
712         */
713        CLINAST, 
714        /**
715         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a device.
716         */
717        DEVAST, 
718        /**
719         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a healthcare professional.
720         */
721        HCPAST, 
722        /**
723         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient acquaintance.
724         */
725        PACQAST, 
726        /**
727         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient.
728         */
729        PATAST, 
730        /**
731         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a payer.
732         */
733        PAYAST, 
734        /**
735         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a professional.
736         */
737        PROAST, 
738        /**
739         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a substitute decision maker.
740         */
741        SDMAST, 
742        /**
743         * Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability).
744
745                        
746                           Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.
747         */
748        _SECINTPRVRBOBV, 
749        /**
750         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a clinician.
751         */
752        CLINRPT, 
753        /**
754         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a device.
755         */
756        DEVRPT, 
757        /**
758         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a healthcare professional.
759         */
760        HCPRPT, 
761        /**
762         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient acquaintance.
763         */
764        PACQRPT, 
765        /**
766         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient.
767         */
768        PATRPT, 
769        /**
770         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a payer.
771         */
772        PAYRPT, 
773        /**
774         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a professional.
775         */
776        PRORPT, 
777        /**
778         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a substitute decision maker.
779         */
780        SDMRPT, 
781        /**
782         * Observation value used to indicate aspects of trust applicable to an IT resource (data, information object, service, or system capability).
783         */
784        SECTRSTOBV, 
785        /**
786         * Values for security trust accreditation metadata observation made about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework.
787         */
788        TRSTACCRDOBV, 
789        /**
790         * Values for security trust agreement metadata observation made about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1]
791[ISO IEC 10181-1]
792         */
793        TRSTAGREOBV, 
794        /**
795         * Values for security trust certificate metadata observation made about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1]
796
797                        For example, a Certificate Policy (CP), which is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements.  A particular Certificate Policy might indicate the applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range.  Another example is Cross Certification with Federal Bridge.
798         */
799        TRSTCERTOBV, 
800        /**
801         * Values for security trust assurance metadata observation made about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol.
802         */
803        TRSTLOAOBV, 
804        /**
805         * The value assigned as the indicator of the digital quality or reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2]
806
807                        For example, the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]
808         */
809        LOAAN, 
810        /**
811         * Indicator of low digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 
812
813                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 
814
815                        Low authentication level of assurance indicates that the relying party may have little or no confidence in the asserted identity's validity. Level 1 requires little or no confidence in the asserted identity. No identity proofing is required at this level, but the authentication mechanism should provide some assurance that the same claimant is accessing the protected transaction or data. A wide range of available authentication technologies can be employed and any of the token methods of Levels 2, 3, or 4, including Personal Identification Numbers (PINs), may be used. To be authenticated, the claimant must prove control of the token through a secure authentication protocol. At Level 1, long-term shared authentication secrets may be revealed to verifiers.  Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
816         */
817        LOAAN1, 
818        /**
819         * Indicator of basic digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 
820
821                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]
822
823                        Basic authentication level of assurance indicates that the relying party may have some confidence in the asserted identity's validity. Level 2 requires confidence that the asserted identity is accurate. Level 2 provides for single-factor remote network authentication, including identity-proofing requirements for presentation of identifying materials or information. A wide range of available authentication technologies can be employed, including any of the token methods of Levels 3 or 4, as well as passwords. Successful authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token.  Eavesdropper, replay, and online guessing attacks are prevented.  
824Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are required. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
825         */
826        LOAAN2, 
827        /**
828         * Indicator of medium digital quality or reliability of the digital reliability of verification and validation of the process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 
829
830                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 
831
832                        Medium authentication level of assurance indicates that the relying party may have high confidence in the asserted identity's validity.  Level 3 is appropriate for transactions that need high confidence in the accuracy of the asserted identity. Level 3 provides multifactor remote network authentication. At this level, identity-proofing procedures require verification of identifying materials and information. Authentication is based on proof of possession of a key or password through a cryptographic protocol. Cryptographic strength mechanisms should protect the primary authentication token (a cryptographic key) against compromise by the protocol threats, including eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks. A minimum of two authentication factors is required. Three kinds of tokens may be used:
833
834                        
835                           "soft" cryptographic token, which has the key stored on a general-purpose computer, 
836                           "hard" cryptographic token, which has the key stored on a special hardware device, and 
837                           "one-time password" device token, which has symmetric key stored on a personal hardware device that is a cryptographic module validated at FIPS 140-2 Level 1 or higher. Validation testing of cryptographic modules and algorithms for conformance to Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, is managed by NIST.
838                        
839                        Authentication requires that the claimant prove control of the token through a secure authentication protocol. The token must be unlocked with a password or biometric representation, or a password must be used in a secure authentication protocol, to establish two-factor authentication. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are used for all operations.  Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.    [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
840         */
841        LOAAN3, 
842        /**
843         * Indicator of high digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 
844
845                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]
846
847                        High authentication level of assurance indicates that the relying party may have very high confidence in the asserted identity's validity. Level 4 is for transactions that need very high confidence in the accuracy of the asserted identity. Level 4 provides the highest practical assurance of remote network authentication. Authentication is based on proof of possession of a key through a cryptographic protocol. This level is similar to Level 3 except that only “hard� cryptographic tokens are allowed, cryptographic module validation requirements are strengthened, and subsequent critical data transfers must be authenticated via a key that is bound to the authentication process. The token should be a hardware cryptographic module validated at FIPS 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. This level requires a physical token, which cannot readily be copied, and operator authentication at Level 2 and higher, and ensures good, two-factor remote authentication.
848
849                        Level 4 requires strong cryptographic authentication of all parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks are prevented. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Strong approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
850         */
851        LOAAN4, 
852        /**
853         * The value assigned as the indicator of the digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
854         */
855        LOAAP, 
856        /**
857         * Indicator of the low digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
858
859                        Low authentication process level of assurance indicates that (1) long-term shared authentication secrets may be revealed to verifiers; and (2) assertions and assertion references require protection from manufacture/modification and reuse attacks.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
860         */
861        LOAAP1, 
862        /**
863         * Indicator of the basic digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
864
865                        Basic authentication process level of assurance indicates that long-term shared authentication secrets are never revealed to any other party except Credential Service Provider (CSP).  Sessions (temporary) shared secrets may be provided to independent verifiers by CSP. Long-term shared authentication secrets, if used, are never revealed to any other party except Verifiers operated by the Credential Service Provider (CSP); however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 1 requirements, assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
866         */
867        LOAAP2, 
868        /**
869         * Indicator of the medium digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
870
871                        Medium authentication process level of assurance indicates that the token can be unlocked with password, biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication.  Long-term shared authentication secrets are never revealed to any party except the Claimant and Credential Service Provider (CSP).
872
873                        Authentication requires that the Claimant prove, through a secure authentication protocol, that he or she controls the token. The Claimant unlocks the token with a password or biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication (through proof of possession of a physical or software token in combination with some memorized secret knowledge). Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 2 requirements, assertions are protected against repudiation by the Verifier.
874         */
875        LOAAP3, 
876        /**
877         * Indicator of the high digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
878
879                        High authentication process level of assurance indicates all sensitive data transfer are cryptographically authenticated using keys bound to the authentication process.  Level 4 requires strong cryptographic authentication of all communicating parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the Claimant prove through a secure authentication protocol that he or she controls the token. All protocol threats at Level 3 are required to be prevented at Level 4. Protocols shall also be strongly resistant to man-in-the-middle attacks. Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. Approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
880         */
881        LOAAP4, 
882        /**
883         * The value assigned as the indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
884         */
885        LOAAS, 
886        /**
887         * Indicator of the low quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
888
889                        Assertions and assertion references require protection from modification and reuse attacks.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
890         */
891        LOAAS1, 
892        /**
893         * Indicator of the basic quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
894
895                        Assertions are resistant to disclosure, redirection, capture and substitution attacks.  Approved cryptographic techniques are required for all assertion protocols.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
896         */
897        LOAAS2, 
898        /**
899         * Indicator of the medium quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
900
901                        Assertions are protected against repudiation by the verifier.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
902         */
903        LOAAS3, 
904        /**
905         * Indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
906
907                        Strongly resistant to man-in-the-middle attacks. "Bearer" assertions are not used.  "Holder-of-key" assertions may be used. RP maintains records of the assertions.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
908         */
909        LOAAS4, 
910        /**
911         * Indicator of the digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
912         */
913        LOACM, 
914        /**
915         * Indicator of the low digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Little or no confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include weak identity binding to tokens and plaintext passwords or secrets not transmitted across a network. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
916         */
917        LOACM1, 
918        /**
919         * Indicator of the basic digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity.  Some confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include:  Verification must prove claimant controls the token; token resists online guessing, replay, session hijacking, and eavesdropping attacks; and  token is at least weakly resistant to man-in-the middle attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
920         */
921        LOACM2, 
922        /**
923         * Indicator of the medium digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity.  High confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics  include: Ownership of token verifiable through security authentication protocol and credential management protects against verifier impersonation attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
924         */
925        LOACM3, 
926        /**
927         * Indicator of the high digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity.  Very high confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verifier can prove control of token through a secure protocol; credential management supports strong cryptographic authentication of all communication parties. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
928         */
929        LOACM4, 
930        /**
931         * Indicator of the quality or reliability in the process of ascertaining that an individual is who he or she claims to be.
932         */
933        LOAID, 
934        /**
935         * Indicator of low digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires that a continuity of identity be maintained but does not require identity proofing. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
936         */
937        LOAID1, 
938        /**
939         * Indicator of some digital quality or reliability in the process of ascertaining that that an individual is who he or she claims to be. Requires identity proofing via presentation of identifying material or information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
940         */
941        LOAID2, 
942        /**
943         * Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
944         */
945        LOAID3, 
946        /**
947         * Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
948         */
949        LOAID4, 
950        /**
951         * Indicator of the digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
952         */
953        LOANR, 
954        /**
955         * Indicator of low digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
956         */
957        LOANR1, 
958        /**
959         * Indicator of basic digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
960         */
961        LOANR2, 
962        /**
963         * Indicator of medium digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
964         */
965        LOANR3, 
966        /**
967         * Indicator of high digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
968         */
969        LOANR4, 
970        /**
971         * Indicator of the digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]
972         */
973        LOARA, 
974        /**
975         * Indicator of low digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]
976         */
977        LOARA1, 
978        /**
979         * Indicator of basic digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]
980         */
981        LOARA2, 
982        /**
983         * Indicator of medium digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]
984         */
985        LOARA3, 
986        /**
987         * Indicator of high digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization's security controls. [Based on NIST SP 800-63-2]
988         */
989        LOARA4, 
990        /**
991         * Indicator of the digital quality or reliability of single and multi-token authentication. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
992         */
993        LOATK, 
994        /**
995         * Indicator of the low digital quality or reliability of single and multi-token authentication. Permits the use of any of the token methods of Levels 2, 3, or 4. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
996         */
997        LOATK1, 
998        /**
999         * Indicator of the basic digital quality or reliability of single and multi-token authentication. Requires single factor authentication using memorized secret tokens, pre-registered knowledge tokens, look-up secret tokens, out of band tokens, or single factor one-time password devices. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
1000         */
1001        LOATK2, 
1002        /**
1003         * Indicator of the medium digital quality or reliability of single and multi-token authentication. Requires two authentication factors. Provides multi-factor remote network authentication. Permits multi-factor software cryptographic token. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
1004         */
1005        LOATK3, 
1006        /**
1007         * Indicator of the high digital quality or reliability of single and multi-token authentication. Requires token that is a hardware cryptographic module validated at validated at Federal Information Processing Standard (FIPS) 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. Level 4 token requirements can be met by using the PIV authentication key of a FIPS 201 compliant Personal Identity Verification (PIV) Card.  [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
1008         */
1009        LOATK4, 
1010        /**
1011         * Values for security trust mechanism metadata observation made about a security architecture system component that supports enforcement of security policies.
1012         */
1013        TRSTMECOBV, 
1014        /**
1015         * Potential values for observations of severity.
1016         */
1017        _SEVERITYOBSERVATION, 
1018        /**
1019         * Indicates the condition may be life-threatening or has the potential to cause permanent injury.
1020         */
1021        H, 
1022        /**
1023         * Indicates the condition may result in some adverse consequences but is unlikely to substantially affect the situation of the subject.
1024         */
1025        L, 
1026        /**
1027         * Indicates the condition may result in noticable adverse adverse consequences but is unlikely to be life-threatening or cause permanent injury.
1028         */
1029        M, 
1030        /**
1031         * Contains codes for defining the observed, physical position of a subject, such as during an observation, assessment, collection of a specimen, etc.  ECG waveforms and vital signs, such as blood pressure, are two examples where a general, observed position typically needs to be noted.
1032         */
1033        _SUBJECTBODYPOSITION, 
1034        /**
1035         * Lying on the left side.
1036         */
1037        LLD, 
1038        /**
1039         * Lying with the front or ventral surface downward; lying face down.
1040         */
1041        PRN, 
1042        /**
1043         * Lying on the right side.
1044         */
1045        RLD, 
1046        /**
1047         * A semi-sitting position in bed with the head of the bed elevated approximately 45 degrees.
1048         */
1049        SFWL, 
1050        /**
1051         * Resting the body on the buttocks, typically with upper torso erect or semi erect.
1052         */
1053        SIT, 
1054        /**
1055         * To be stationary, upright, vertical, on one's legs.
1056         */
1057        STN, 
1058        /**
1059         * supine
1060         */
1061        SUP, 
1062        /**
1063         * Lying on the back, on an inclined plane, typically about 30-45 degrees with head raised and feet lowered.
1064         */
1065        RTRD, 
1066        /**
1067         * Lying on the back, on an inclined plane, typically about 30-45 degrees, with  head lowered and feet raised.
1068         */
1069        TRD, 
1070        /**
1071         * Values for observations of verification act results
1072
1073                        
1074                           Examples: Verified, not verified, verified with warning.
1075         */
1076        _VERIFICATIONOUTCOMEVALUE, 
1077        /**
1078         * Definition: Coverage is in effect for healthcare service(s) and/or product(s).
1079         */
1080        ACT, 
1081        /**
1082         * Definition: Coverage is in effect for healthcare service(s) and/or product(s) - Pending Investigation
1083         */
1084        ACTPEND, 
1085        /**
1086         * Definition: Coverage is in effect for healthcare service(s) and/or product(s).
1087         */
1088        ELG, 
1089        /**
1090         * Definition: Coverage is not in effect for healthcare service(s) and/or product(s).
1091         */
1092        INACT, 
1093        /**
1094         * Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Investigation.
1095         */
1096        INPNDINV, 
1097        /**
1098         * Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Eligibility Update.
1099         */
1100        INPNDUPD, 
1101        /**
1102         * Definition: Coverage is not in effect for healthcare service(s) and/or product(s). May optionally include reasons for the ineligibility.
1103         */
1104        NELG, 
1105        /**
1106         * Concepts that describe an individual's typical arrangement of working hours for an occupation.
1107         */
1108        _WORKSCHEDULE, 
1109        /**
1110         * A person who is scheduled for work during daytime hours (for example between 6am and 6pm) on a regular basis.
1111         */
1112        DS, 
1113        /**
1114         * Consistent Early morning schedule of 13 hours or less per shift (between 2 am and 2 pm)
1115         */
1116        EMS, 
1117        /**
1118         * A person who is scheduled for work during evening hours (for example between 2pm and midnight) on a regular basis.
1119         */
1120        ES, 
1121        /**
1122         * Scheduled for work during nighttime hours (for example between 9pm and 8am) on a regular basis.
1123         */
1124        NS, 
1125        /**
1126         * Scheduled for work times that change periodically between days, and/or evenings, and includes some night shifts.
1127         */
1128        RSWN, 
1129        /**
1130         * Scheduled for work days/times that change periodically between days, but does not include night or evening work.
1131         */
1132        RSWON, 
1133        /**
1134         * Shift consisting of two distinct work periods each day that are separated by a break of a few hours (for example 2 to 4 hours)
1135         */
1136        SS, 
1137        /**
1138         * Shifts of 17 or more hours.
1139         */
1140        VLS, 
1141        /**
1142         * Irregular, unpredictable hours scheduled on a short notice (for example, less than 2 day notice): inconsistent schedule, on-call, as needed, as available.
1143         */
1144        VS, 
1145        /**
1146         * AnnotationValue
1147         */
1148        _ANNOTATIONVALUE, 
1149        /**
1150         * Description:Used in a patient care message to value simple clinical (non-lab) observations.
1151         */
1152        _COMMONCLINICALOBSERVATIONVALUE, 
1153        /**
1154         * This domain is established as a parent to a variety of value domains being defined to support the communication of Individual Case Safety Reports to regulatory bodies. Arguably, this aggregation is not taxonomically pure, but the grouping will facilitate the management of these domains.
1155         */
1156        _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS, 
1157        /**
1158         * Indicates the specific observation result which is the reason for the action (prescription, lab test, etc.). E.g. Headache, Ear infection, planned diagnostic image (requiring contrast agent), etc.
1159         */
1160        _INDICATIONVALUE, 
1161        /**
1162         * added to help the parsers
1163         */
1164        NULL;
1165        public static V3ObservationValue fromCode(String codeString) throws FHIRException {
1166            if (codeString == null || "".equals(codeString))
1167                return null;
1168        if ("_ActCoverageAssessmentObservationValue".equals(codeString))
1169          return _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE;
1170        if ("_ActFinancialStatusObservationValue".equals(codeString))
1171          return _ACTFINANCIALSTATUSOBSERVATIONVALUE;
1172        if ("ASSET".equals(codeString))
1173          return ASSET;
1174        if ("ANNUITY".equals(codeString))
1175          return ANNUITY;
1176        if ("PROP".equals(codeString))
1177          return PROP;
1178        if ("RETACCT".equals(codeString))
1179          return RETACCT;
1180        if ("TRUST".equals(codeString))
1181          return TRUST;
1182        if ("INCOME".equals(codeString))
1183          return INCOME;
1184        if ("CHILD".equals(codeString))
1185          return CHILD;
1186        if ("DISABL".equals(codeString))
1187          return DISABL;
1188        if ("INVEST".equals(codeString))
1189          return INVEST;
1190        if ("PAY".equals(codeString))
1191          return PAY;
1192        if ("RETIRE".equals(codeString))
1193          return RETIRE;
1194        if ("SPOUSAL".equals(codeString))
1195          return SPOUSAL;
1196        if ("SUPPLE".equals(codeString))
1197          return SUPPLE;
1198        if ("TAX".equals(codeString))
1199          return TAX;
1200        if ("LIVEXP".equals(codeString))
1201          return LIVEXP;
1202        if ("CLOTH".equals(codeString))
1203          return CLOTH;
1204        if ("FOOD".equals(codeString))
1205          return FOOD;
1206        if ("HEALTH".equals(codeString))
1207          return HEALTH;
1208        if ("HOUSE".equals(codeString))
1209          return HOUSE;
1210        if ("LEGAL".equals(codeString))
1211          return LEGAL;
1212        if ("MORTG".equals(codeString))
1213          return MORTG;
1214        if ("RENT".equals(codeString))
1215          return RENT;
1216        if ("SUNDRY".equals(codeString))
1217          return SUNDRY;
1218        if ("TRANS".equals(codeString))
1219          return TRANS;
1220        if ("UTIL".equals(codeString))
1221          return UTIL;
1222        if ("ELSTAT".equals(codeString))
1223          return ELSTAT;
1224        if ("ADOPT".equals(codeString))
1225          return ADOPT;
1226        if ("BTHCERT".equals(codeString))
1227          return BTHCERT;
1228        if ("CCOC".equals(codeString))
1229          return CCOC;
1230        if ("DRLIC".equals(codeString))
1231          return DRLIC;
1232        if ("FOSTER".equals(codeString))
1233          return FOSTER;
1234        if ("MEMBER".equals(codeString))
1235          return MEMBER;
1236        if ("MIL".equals(codeString))
1237          return MIL;
1238        if ("MRGCERT".equals(codeString))
1239          return MRGCERT;
1240        if ("PASSPORT".equals(codeString))
1241          return PASSPORT;
1242        if ("STUDENRL".equals(codeString))
1243          return STUDENRL;
1244        if ("HLSTAT".equals(codeString))
1245          return HLSTAT;
1246        if ("DISABLE".equals(codeString))
1247          return DISABLE;
1248        if ("DRUG".equals(codeString))
1249          return DRUG;
1250        if ("IVDRG".equals(codeString))
1251          return IVDRG;
1252        if ("PGNT".equals(codeString))
1253          return PGNT;
1254        if ("LIVDEP".equals(codeString))
1255          return LIVDEP;
1256        if ("RELDEP".equals(codeString))
1257          return RELDEP;
1258        if ("SPSDEP".equals(codeString))
1259          return SPSDEP;
1260        if ("URELDEP".equals(codeString))
1261          return URELDEP;
1262        if ("LIVSIT".equals(codeString))
1263          return LIVSIT;
1264        if ("ALONE".equals(codeString))
1265          return ALONE;
1266        if ("DEPCHD".equals(codeString))
1267          return DEPCHD;
1268        if ("DEPSPS".equals(codeString))
1269          return DEPSPS;
1270        if ("DEPYGCHD".equals(codeString))
1271          return DEPYGCHD;
1272        if ("FAM".equals(codeString))
1273          return FAM;
1274        if ("RELAT".equals(codeString))
1275          return RELAT;
1276        if ("SPS".equals(codeString))
1277          return SPS;
1278        if ("UNREL".equals(codeString))
1279          return UNREL;
1280        if ("SOECSTAT".equals(codeString))
1281          return SOECSTAT;
1282        if ("ABUSE".equals(codeString))
1283          return ABUSE;
1284        if ("HMLESS".equals(codeString))
1285          return HMLESS;
1286        if ("ILGIM".equals(codeString))
1287          return ILGIM;
1288        if ("INCAR".equals(codeString))
1289          return INCAR;
1290        if ("PROB".equals(codeString))
1291          return PROB;
1292        if ("REFUG".equals(codeString))
1293          return REFUG;
1294        if ("UNEMPL".equals(codeString))
1295          return UNEMPL;
1296        if ("_AllergyTestValue".equals(codeString))
1297          return _ALLERGYTESTVALUE;
1298        if ("A0".equals(codeString))
1299          return A0;
1300        if ("A1".equals(codeString))
1301          return A1;
1302        if ("A2".equals(codeString))
1303          return A2;
1304        if ("A3".equals(codeString))
1305          return A3;
1306        if ("A4".equals(codeString))
1307          return A4;
1308        if ("_CompositeMeasureScoring".equals(codeString))
1309          return _COMPOSITEMEASURESCORING;
1310        if ("ALLORNONESCR".equals(codeString))
1311          return ALLORNONESCR;
1312        if ("LINEARSCR".equals(codeString))
1313          return LINEARSCR;
1314        if ("OPPORSCR".equals(codeString))
1315          return OPPORSCR;
1316        if ("WEIGHTSCR".equals(codeString))
1317          return WEIGHTSCR;
1318        if ("_CoverageLimitObservationValue".equals(codeString))
1319          return _COVERAGELIMITOBSERVATIONVALUE;
1320        if ("_CoverageLevelObservationValue".equals(codeString))
1321          return _COVERAGELEVELOBSERVATIONVALUE;
1322        if ("ADC".equals(codeString))
1323          return ADC;
1324        if ("CHD".equals(codeString))
1325          return CHD;
1326        if ("DEP".equals(codeString))
1327          return DEP;
1328        if ("DP".equals(codeString))
1329          return DP;
1330        if ("ECH".equals(codeString))
1331          return ECH;
1332        if ("FLY".equals(codeString))
1333          return FLY;
1334        if ("IND".equals(codeString))
1335          return IND;
1336        if ("SSP".equals(codeString))
1337          return SSP;
1338        if ("_CriticalityObservationValue".equals(codeString))
1339          return _CRITICALITYOBSERVATIONVALUE;
1340        if ("CRITH".equals(codeString))
1341          return CRITH;
1342        if ("CRITL".equals(codeString))
1343          return CRITL;
1344        if ("CRITU".equals(codeString))
1345          return CRITU;
1346        if ("_EmploymentStatus".equals(codeString))
1347          return _EMPLOYMENTSTATUS;
1348        if ("Employed".equals(codeString))
1349          return EMPLOYED;
1350        if ("NotInLaborForce".equals(codeString))
1351          return NOTINLABORFORCE;
1352        if ("Unemployed".equals(codeString))
1353          return UNEMPLOYED;
1354        if ("_GeneticObservationValue".equals(codeString))
1355          return _GENETICOBSERVATIONVALUE;
1356        if ("Homozygote".equals(codeString))
1357          return HOMOZYGOTE;
1358        if ("_ObservationMeasureScoring".equals(codeString))
1359          return _OBSERVATIONMEASURESCORING;
1360        if ("COHORT".equals(codeString))
1361          return COHORT;
1362        if ("CONTVAR".equals(codeString))
1363          return CONTVAR;
1364        if ("PROPOR".equals(codeString))
1365          return PROPOR;
1366        if ("RATIO".equals(codeString))
1367          return RATIO;
1368        if ("_ObservationMeasureType".equals(codeString))
1369          return _OBSERVATIONMEASURETYPE;
1370        if ("COMPOSITE".equals(codeString))
1371          return COMPOSITE;
1372        if ("EFFICIENCY".equals(codeString))
1373          return EFFICIENCY;
1374        if ("EXPERIENCE".equals(codeString))
1375          return EXPERIENCE;
1376        if ("OUTCOME".equals(codeString))
1377          return OUTCOME;
1378        if ("INTERM-OM".equals(codeString))
1379          return INTERMOM;
1380        if ("PRO-PM".equals(codeString))
1381          return PROPM;
1382        if ("PROCESS".equals(codeString))
1383          return PROCESS;
1384        if ("APPROPRIATE".equals(codeString))
1385          return APPROPRIATE;
1386        if ("RESOURCE".equals(codeString))
1387          return RESOURCE;
1388        if ("STRUCTURE".equals(codeString))
1389          return STRUCTURE;
1390        if ("_ObservationPopulationInclusion".equals(codeString))
1391          return _OBSERVATIONPOPULATIONINCLUSION;
1392        if ("DENEX".equals(codeString))
1393          return DENEX;
1394        if ("DENEXCEP".equals(codeString))
1395          return DENEXCEP;
1396        if ("DENOM".equals(codeString))
1397          return DENOM;
1398        if ("IP".equals(codeString))
1399          return IP;
1400        if ("IPP".equals(codeString))
1401          return IPP;
1402        if ("MSRPOPL".equals(codeString))
1403          return MSRPOPL;
1404        if ("NUMER".equals(codeString))
1405          return NUMER;
1406        if ("NUMEX".equals(codeString))
1407          return NUMEX;
1408        if ("_PartialCompletionScale".equals(codeString))
1409          return _PARTIALCOMPLETIONSCALE;
1410        if ("G".equals(codeString))
1411          return G;
1412        if ("LE".equals(codeString))
1413          return LE;
1414        if ("ME".equals(codeString))
1415          return ME;
1416        if ("MI".equals(codeString))
1417          return MI;
1418        if ("N".equals(codeString))
1419          return N;
1420        if ("S".equals(codeString))
1421          return S;
1422        if ("_SecurityObservationValue".equals(codeString))
1423          return _SECURITYOBSERVATIONVALUE;
1424        if ("_SECINTOBV".equals(codeString))
1425          return _SECINTOBV;
1426        if ("_SECALTINTOBV".equals(codeString))
1427          return _SECALTINTOBV;
1428        if ("ABSTRED".equals(codeString))
1429          return ABSTRED;
1430        if ("AGGRED".equals(codeString))
1431          return AGGRED;
1432        if ("ANONYED".equals(codeString))
1433          return ANONYED;
1434        if ("MAPPED".equals(codeString))
1435          return MAPPED;
1436        if ("MASKED".equals(codeString))
1437          return MASKED;
1438        if ("PSEUDED".equals(codeString))
1439          return PSEUDED;
1440        if ("REDACTED".equals(codeString))
1441          return REDACTED;
1442        if ("SUBSETTED".equals(codeString))
1443          return SUBSETTED;
1444        if ("SYNTAC".equals(codeString))
1445          return SYNTAC;
1446        if ("TRSLT".equals(codeString))
1447          return TRSLT;
1448        if ("VERSIONED".equals(codeString))
1449          return VERSIONED;
1450        if ("_SECDATINTOBV".equals(codeString))
1451          return _SECDATINTOBV;
1452        if ("CRYTOHASH".equals(codeString))
1453          return CRYTOHASH;
1454        if ("DIGSIG".equals(codeString))
1455          return DIGSIG;
1456        if ("_SECINTCONOBV".equals(codeString))
1457          return _SECINTCONOBV;
1458        if ("HRELIABLE".equals(codeString))
1459          return HRELIABLE;
1460        if ("RELIABLE".equals(codeString))
1461          return RELIABLE;
1462        if ("UNCERTREL".equals(codeString))
1463          return UNCERTREL;
1464        if ("UNRELIABLE".equals(codeString))
1465          return UNRELIABLE;
1466        if ("_SECINTPRVOBV".equals(codeString))
1467          return _SECINTPRVOBV;
1468        if ("_SECINTPRVABOBV".equals(codeString))
1469          return _SECINTPRVABOBV;
1470        if ("CLINAST".equals(codeString))
1471          return CLINAST;
1472        if ("DEVAST".equals(codeString))
1473          return DEVAST;
1474        if ("HCPAST".equals(codeString))
1475          return HCPAST;
1476        if ("PACQAST".equals(codeString))
1477          return PACQAST;
1478        if ("PATAST".equals(codeString))
1479          return PATAST;
1480        if ("PAYAST".equals(codeString))
1481          return PAYAST;
1482        if ("PROAST".equals(codeString))
1483          return PROAST;
1484        if ("SDMAST".equals(codeString))
1485          return SDMAST;
1486        if ("_SECINTPRVRBOBV".equals(codeString))
1487          return _SECINTPRVRBOBV;
1488        if ("CLINRPT".equals(codeString))
1489          return CLINRPT;
1490        if ("DEVRPT".equals(codeString))
1491          return DEVRPT;
1492        if ("HCPRPT".equals(codeString))
1493          return HCPRPT;
1494        if ("PACQRPT".equals(codeString))
1495          return PACQRPT;
1496        if ("PATRPT".equals(codeString))
1497          return PATRPT;
1498        if ("PAYRPT".equals(codeString))
1499          return PAYRPT;
1500        if ("PRORPT".equals(codeString))
1501          return PRORPT;
1502        if ("SDMRPT".equals(codeString))
1503          return SDMRPT;
1504        if ("SECTRSTOBV".equals(codeString))
1505          return SECTRSTOBV;
1506        if ("TRSTACCRDOBV".equals(codeString))
1507          return TRSTACCRDOBV;
1508        if ("TRSTAGREOBV".equals(codeString))
1509          return TRSTAGREOBV;
1510        if ("TRSTCERTOBV".equals(codeString))
1511          return TRSTCERTOBV;
1512        if ("TRSTLOAOBV".equals(codeString))
1513          return TRSTLOAOBV;
1514        if ("LOAAN".equals(codeString))
1515          return LOAAN;
1516        if ("LOAAN1".equals(codeString))
1517          return LOAAN1;
1518        if ("LOAAN2".equals(codeString))
1519          return LOAAN2;
1520        if ("LOAAN3".equals(codeString))
1521          return LOAAN3;
1522        if ("LOAAN4".equals(codeString))
1523          return LOAAN4;
1524        if ("LOAAP".equals(codeString))
1525          return LOAAP;
1526        if ("LOAAP1".equals(codeString))
1527          return LOAAP1;
1528        if ("LOAAP2".equals(codeString))
1529          return LOAAP2;
1530        if ("LOAAP3".equals(codeString))
1531          return LOAAP3;
1532        if ("LOAAP4".equals(codeString))
1533          return LOAAP4;
1534        if ("LOAAS".equals(codeString))
1535          return LOAAS;
1536        if ("LOAAS1".equals(codeString))
1537          return LOAAS1;
1538        if ("LOAAS2".equals(codeString))
1539          return LOAAS2;
1540        if ("LOAAS3".equals(codeString))
1541          return LOAAS3;
1542        if ("LOAAS4".equals(codeString))
1543          return LOAAS4;
1544        if ("LOACM".equals(codeString))
1545          return LOACM;
1546        if ("LOACM1".equals(codeString))
1547          return LOACM1;
1548        if ("LOACM2".equals(codeString))
1549          return LOACM2;
1550        if ("LOACM3".equals(codeString))
1551          return LOACM3;
1552        if ("LOACM4".equals(codeString))
1553          return LOACM4;
1554        if ("LOAID".equals(codeString))
1555          return LOAID;
1556        if ("LOAID1".equals(codeString))
1557          return LOAID1;
1558        if ("LOAID2".equals(codeString))
1559          return LOAID2;
1560        if ("LOAID3".equals(codeString))
1561          return LOAID3;
1562        if ("LOAID4".equals(codeString))
1563          return LOAID4;
1564        if ("LOANR".equals(codeString))
1565          return LOANR;
1566        if ("LOANR1".equals(codeString))
1567          return LOANR1;
1568        if ("LOANR2".equals(codeString))
1569          return LOANR2;
1570        if ("LOANR3".equals(codeString))
1571          return LOANR3;
1572        if ("LOANR4".equals(codeString))
1573          return LOANR4;
1574        if ("LOARA".equals(codeString))
1575          return LOARA;
1576        if ("LOARA1".equals(codeString))
1577          return LOARA1;
1578        if ("LOARA2".equals(codeString))
1579          return LOARA2;
1580        if ("LOARA3".equals(codeString))
1581          return LOARA3;
1582        if ("LOARA4".equals(codeString))
1583          return LOARA4;
1584        if ("LOATK".equals(codeString))
1585          return LOATK;
1586        if ("LOATK1".equals(codeString))
1587          return LOATK1;
1588        if ("LOATK2".equals(codeString))
1589          return LOATK2;
1590        if ("LOATK3".equals(codeString))
1591          return LOATK3;
1592        if ("LOATK4".equals(codeString))
1593          return LOATK4;
1594        if ("TRSTMECOBV".equals(codeString))
1595          return TRSTMECOBV;
1596        if ("_SeverityObservation".equals(codeString))
1597          return _SEVERITYOBSERVATION;
1598        if ("H".equals(codeString))
1599          return H;
1600        if ("L".equals(codeString))
1601          return L;
1602        if ("M".equals(codeString))
1603          return M;
1604        if ("_SubjectBodyPosition".equals(codeString))
1605          return _SUBJECTBODYPOSITION;
1606        if ("LLD".equals(codeString))
1607          return LLD;
1608        if ("PRN".equals(codeString))
1609          return PRN;
1610        if ("RLD".equals(codeString))
1611          return RLD;
1612        if ("SFWL".equals(codeString))
1613          return SFWL;
1614        if ("SIT".equals(codeString))
1615          return SIT;
1616        if ("STN".equals(codeString))
1617          return STN;
1618        if ("SUP".equals(codeString))
1619          return SUP;
1620        if ("RTRD".equals(codeString))
1621          return RTRD;
1622        if ("TRD".equals(codeString))
1623          return TRD;
1624        if ("_VerificationOutcomeValue".equals(codeString))
1625          return _VERIFICATIONOUTCOMEVALUE;
1626        if ("ACT".equals(codeString))
1627          return ACT;
1628        if ("ACTPEND".equals(codeString))
1629          return ACTPEND;
1630        if ("ELG".equals(codeString))
1631          return ELG;
1632        if ("INACT".equals(codeString))
1633          return INACT;
1634        if ("INPNDINV".equals(codeString))
1635          return INPNDINV;
1636        if ("INPNDUPD".equals(codeString))
1637          return INPNDUPD;
1638        if ("NELG".equals(codeString))
1639          return NELG;
1640        if ("_WorkSchedule".equals(codeString))
1641          return _WORKSCHEDULE;
1642        if ("DS".equals(codeString))
1643          return DS;
1644        if ("EMS".equals(codeString))
1645          return EMS;
1646        if ("ES".equals(codeString))
1647          return ES;
1648        if ("NS".equals(codeString))
1649          return NS;
1650        if ("RSWN".equals(codeString))
1651          return RSWN;
1652        if ("RSWON".equals(codeString))
1653          return RSWON;
1654        if ("SS".equals(codeString))
1655          return SS;
1656        if ("VLS".equals(codeString))
1657          return VLS;
1658        if ("VS".equals(codeString))
1659          return VS;
1660        if ("_AnnotationValue".equals(codeString))
1661          return _ANNOTATIONVALUE;
1662        if ("_CommonClinicalObservationValue".equals(codeString))
1663          return _COMMONCLINICALOBSERVATIONVALUE;
1664        if ("_IndividualCaseSafetyReportValueDomains".equals(codeString))
1665          return _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS;
1666        if ("_IndicationValue".equals(codeString))
1667          return _INDICATIONVALUE;
1668        throw new FHIRException("Unknown V3ObservationValue code '"+codeString+"'");
1669        }
1670        public String toCode() {
1671          switch (this) {
1672            case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "_ActCoverageAssessmentObservationValue";
1673            case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "_ActFinancialStatusObservationValue";
1674            case ASSET: return "ASSET";
1675            case ANNUITY: return "ANNUITY";
1676            case PROP: return "PROP";
1677            case RETACCT: return "RETACCT";
1678            case TRUST: return "TRUST";
1679            case INCOME: return "INCOME";
1680            case CHILD: return "CHILD";
1681            case DISABL: return "DISABL";
1682            case INVEST: return "INVEST";
1683            case PAY: return "PAY";
1684            case RETIRE: return "RETIRE";
1685            case SPOUSAL: return "SPOUSAL";
1686            case SUPPLE: return "SUPPLE";
1687            case TAX: return "TAX";
1688            case LIVEXP: return "LIVEXP";
1689            case CLOTH: return "CLOTH";
1690            case FOOD: return "FOOD";
1691            case HEALTH: return "HEALTH";
1692            case HOUSE: return "HOUSE";
1693            case LEGAL: return "LEGAL";
1694            case MORTG: return "MORTG";
1695            case RENT: return "RENT";
1696            case SUNDRY: return "SUNDRY";
1697            case TRANS: return "TRANS";
1698            case UTIL: return "UTIL";
1699            case ELSTAT: return "ELSTAT";
1700            case ADOPT: return "ADOPT";
1701            case BTHCERT: return "BTHCERT";
1702            case CCOC: return "CCOC";
1703            case DRLIC: return "DRLIC";
1704            case FOSTER: return "FOSTER";
1705            case MEMBER: return "MEMBER";
1706            case MIL: return "MIL";
1707            case MRGCERT: return "MRGCERT";
1708            case PASSPORT: return "PASSPORT";
1709            case STUDENRL: return "STUDENRL";
1710            case HLSTAT: return "HLSTAT";
1711            case DISABLE: return "DISABLE";
1712            case DRUG: return "DRUG";
1713            case IVDRG: return "IVDRG";
1714            case PGNT: return "PGNT";
1715            case LIVDEP: return "LIVDEP";
1716            case RELDEP: return "RELDEP";
1717            case SPSDEP: return "SPSDEP";
1718            case URELDEP: return "URELDEP";
1719            case LIVSIT: return "LIVSIT";
1720            case ALONE: return "ALONE";
1721            case DEPCHD: return "DEPCHD";
1722            case DEPSPS: return "DEPSPS";
1723            case DEPYGCHD: return "DEPYGCHD";
1724            case FAM: return "FAM";
1725            case RELAT: return "RELAT";
1726            case SPS: return "SPS";
1727            case UNREL: return "UNREL";
1728            case SOECSTAT: return "SOECSTAT";
1729            case ABUSE: return "ABUSE";
1730            case HMLESS: return "HMLESS";
1731            case ILGIM: return "ILGIM";
1732            case INCAR: return "INCAR";
1733            case PROB: return "PROB";
1734            case REFUG: return "REFUG";
1735            case UNEMPL: return "UNEMPL";
1736            case _ALLERGYTESTVALUE: return "_AllergyTestValue";
1737            case A0: return "A0";
1738            case A1: return "A1";
1739            case A2: return "A2";
1740            case A3: return "A3";
1741            case A4: return "A4";
1742            case _COMPOSITEMEASURESCORING: return "_CompositeMeasureScoring";
1743            case ALLORNONESCR: return "ALLORNONESCR";
1744            case LINEARSCR: return "LINEARSCR";
1745            case OPPORSCR: return "OPPORSCR";
1746            case WEIGHTSCR: return "WEIGHTSCR";
1747            case _COVERAGELIMITOBSERVATIONVALUE: return "_CoverageLimitObservationValue";
1748            case _COVERAGELEVELOBSERVATIONVALUE: return "_CoverageLevelObservationValue";
1749            case ADC: return "ADC";
1750            case CHD: return "CHD";
1751            case DEP: return "DEP";
1752            case DP: return "DP";
1753            case ECH: return "ECH";
1754            case FLY: return "FLY";
1755            case IND: return "IND";
1756            case SSP: return "SSP";
1757            case _CRITICALITYOBSERVATIONVALUE: return "_CriticalityObservationValue";
1758            case CRITH: return "CRITH";
1759            case CRITL: return "CRITL";
1760            case CRITU: return "CRITU";
1761            case _EMPLOYMENTSTATUS: return "_EmploymentStatus";
1762            case EMPLOYED: return "Employed";
1763            case NOTINLABORFORCE: return "NotInLaborForce";
1764            case UNEMPLOYED: return "Unemployed";
1765            case _GENETICOBSERVATIONVALUE: return "_GeneticObservationValue";
1766            case HOMOZYGOTE: return "Homozygote";
1767            case _OBSERVATIONMEASURESCORING: return "_ObservationMeasureScoring";
1768            case COHORT: return "COHORT";
1769            case CONTVAR: return "CONTVAR";
1770            case PROPOR: return "PROPOR";
1771            case RATIO: return "RATIO";
1772            case _OBSERVATIONMEASURETYPE: return "_ObservationMeasureType";
1773            case COMPOSITE: return "COMPOSITE";
1774            case EFFICIENCY: return "EFFICIENCY";
1775            case EXPERIENCE: return "EXPERIENCE";
1776            case OUTCOME: return "OUTCOME";
1777            case INTERMOM: return "INTERM-OM";
1778            case PROPM: return "PRO-PM";
1779            case PROCESS: return "PROCESS";
1780            case APPROPRIATE: return "APPROPRIATE";
1781            case RESOURCE: return "RESOURCE";
1782            case STRUCTURE: return "STRUCTURE";
1783            case _OBSERVATIONPOPULATIONINCLUSION: return "_ObservationPopulationInclusion";
1784            case DENEX: return "DENEX";
1785            case DENEXCEP: return "DENEXCEP";
1786            case DENOM: return "DENOM";
1787            case IP: return "IP";
1788            case IPP: return "IPP";
1789            case MSRPOPL: return "MSRPOPL";
1790            case NUMER: return "NUMER";
1791            case NUMEX: return "NUMEX";
1792            case _PARTIALCOMPLETIONSCALE: return "_PartialCompletionScale";
1793            case G: return "G";
1794            case LE: return "LE";
1795            case ME: return "ME";
1796            case MI: return "MI";
1797            case N: return "N";
1798            case S: return "S";
1799            case _SECURITYOBSERVATIONVALUE: return "_SecurityObservationValue";
1800            case _SECINTOBV: return "_SECINTOBV";
1801            case _SECALTINTOBV: return "_SECALTINTOBV";
1802            case ABSTRED: return "ABSTRED";
1803            case AGGRED: return "AGGRED";
1804            case ANONYED: return "ANONYED";
1805            case MAPPED: return "MAPPED";
1806            case MASKED: return "MASKED";
1807            case PSEUDED: return "PSEUDED";
1808            case REDACTED: return "REDACTED";
1809            case SUBSETTED: return "SUBSETTED";
1810            case SYNTAC: return "SYNTAC";
1811            case TRSLT: return "TRSLT";
1812            case VERSIONED: return "VERSIONED";
1813            case _SECDATINTOBV: return "_SECDATINTOBV";
1814            case CRYTOHASH: return "CRYTOHASH";
1815            case DIGSIG: return "DIGSIG";
1816            case _SECINTCONOBV: return "_SECINTCONOBV";
1817            case HRELIABLE: return "HRELIABLE";
1818            case RELIABLE: return "RELIABLE";
1819            case UNCERTREL: return "UNCERTREL";
1820            case UNRELIABLE: return "UNRELIABLE";
1821            case _SECINTPRVOBV: return "_SECINTPRVOBV";
1822            case _SECINTPRVABOBV: return "_SECINTPRVABOBV";
1823            case CLINAST: return "CLINAST";
1824            case DEVAST: return "DEVAST";
1825            case HCPAST: return "HCPAST";
1826            case PACQAST: return "PACQAST";
1827            case PATAST: return "PATAST";
1828            case PAYAST: return "PAYAST";
1829            case PROAST: return "PROAST";
1830            case SDMAST: return "SDMAST";
1831            case _SECINTPRVRBOBV: return "_SECINTPRVRBOBV";
1832            case CLINRPT: return "CLINRPT";
1833            case DEVRPT: return "DEVRPT";
1834            case HCPRPT: return "HCPRPT";
1835            case PACQRPT: return "PACQRPT";
1836            case PATRPT: return "PATRPT";
1837            case PAYRPT: return "PAYRPT";
1838            case PRORPT: return "PRORPT";
1839            case SDMRPT: return "SDMRPT";
1840            case SECTRSTOBV: return "SECTRSTOBV";
1841            case TRSTACCRDOBV: return "TRSTACCRDOBV";
1842            case TRSTAGREOBV: return "TRSTAGREOBV";
1843            case TRSTCERTOBV: return "TRSTCERTOBV";
1844            case TRSTLOAOBV: return "TRSTLOAOBV";
1845            case LOAAN: return "LOAAN";
1846            case LOAAN1: return "LOAAN1";
1847            case LOAAN2: return "LOAAN2";
1848            case LOAAN3: return "LOAAN3";
1849            case LOAAN4: return "LOAAN4";
1850            case LOAAP: return "LOAAP";
1851            case LOAAP1: return "LOAAP1";
1852            case LOAAP2: return "LOAAP2";
1853            case LOAAP3: return "LOAAP3";
1854            case LOAAP4: return "LOAAP4";
1855            case LOAAS: return "LOAAS";
1856            case LOAAS1: return "LOAAS1";
1857            case LOAAS2: return "LOAAS2";
1858            case LOAAS3: return "LOAAS3";
1859            case LOAAS4: return "LOAAS4";
1860            case LOACM: return "LOACM";
1861            case LOACM1: return "LOACM1";
1862            case LOACM2: return "LOACM2";
1863            case LOACM3: return "LOACM3";
1864            case LOACM4: return "LOACM4";
1865            case LOAID: return "LOAID";
1866            case LOAID1: return "LOAID1";
1867            case LOAID2: return "LOAID2";
1868            case LOAID3: return "LOAID3";
1869            case LOAID4: return "LOAID4";
1870            case LOANR: return "LOANR";
1871            case LOANR1: return "LOANR1";
1872            case LOANR2: return "LOANR2";
1873            case LOANR3: return "LOANR3";
1874            case LOANR4: return "LOANR4";
1875            case LOARA: return "LOARA";
1876            case LOARA1: return "LOARA1";
1877            case LOARA2: return "LOARA2";
1878            case LOARA3: return "LOARA3";
1879            case LOARA4: return "LOARA4";
1880            case LOATK: return "LOATK";
1881            case LOATK1: return "LOATK1";
1882            case LOATK2: return "LOATK2";
1883            case LOATK3: return "LOATK3";
1884            case LOATK4: return "LOATK4";
1885            case TRSTMECOBV: return "TRSTMECOBV";
1886            case _SEVERITYOBSERVATION: return "_SeverityObservation";
1887            case H: return "H";
1888            case L: return "L";
1889            case M: return "M";
1890            case _SUBJECTBODYPOSITION: return "_SubjectBodyPosition";
1891            case LLD: return "LLD";
1892            case PRN: return "PRN";
1893            case RLD: return "RLD";
1894            case SFWL: return "SFWL";
1895            case SIT: return "SIT";
1896            case STN: return "STN";
1897            case SUP: return "SUP";
1898            case RTRD: return "RTRD";
1899            case TRD: return "TRD";
1900            case _VERIFICATIONOUTCOMEVALUE: return "_VerificationOutcomeValue";
1901            case ACT: return "ACT";
1902            case ACTPEND: return "ACTPEND";
1903            case ELG: return "ELG";
1904            case INACT: return "INACT";
1905            case INPNDINV: return "INPNDINV";
1906            case INPNDUPD: return "INPNDUPD";
1907            case NELG: return "NELG";
1908            case _WORKSCHEDULE: return "_WorkSchedule";
1909            case DS: return "DS";
1910            case EMS: return "EMS";
1911            case ES: return "ES";
1912            case NS: return "NS";
1913            case RSWN: return "RSWN";
1914            case RSWON: return "RSWON";
1915            case SS: return "SS";
1916            case VLS: return "VLS";
1917            case VS: return "VS";
1918            case _ANNOTATIONVALUE: return "_AnnotationValue";
1919            case _COMMONCLINICALOBSERVATIONVALUE: return "_CommonClinicalObservationValue";
1920            case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "_IndividualCaseSafetyReportValueDomains";
1921            case _INDICATIONVALUE: return "_IndicationValue";
1922            default: return "?";
1923          }
1924        }
1925        public String getSystem() {
1926          return "http://terminology.hl7.org/CodeSystem/v3-ObservationValue";
1927        }
1928        public String getDefinition() {
1929          switch (this) {
1930            case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "Codes specify the category of observation, evidence, or document used to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. The type of evidence is coded as observation values.";
1931            case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "Code specifying financial indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay stub; tax or income document; asset document; living expenses.";
1932            case ASSET: return "Codes specifying asset indicators used to assess or establish eligibility for coverage under a policy or program.";
1933            case ANNUITY: return "Indicator of annuity ownership or status as beneficiary.";
1934            case PROP: return "Indicator of real property ownership, e.g., deed or real estate contract.";
1935            case RETACCT: return "Indicator of retirement investment account ownership.";
1936            case TRUST: return "Indicator of status as trust beneficiary.";
1937            case INCOME: return "Code specifying income indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay or pension check, child support payments received or provided, and taxes paid.";
1938            case CHILD: return "Indicator of child support payments received or provided.";
1939            case DISABL: return "Indicator of disability income replacement payment.";
1940            case INVEST: return "Indicator of investment income, e.g., dividend check, annuity payment; real estate rent, investment divestiture proceeds; trust or endowment check.";
1941            case PAY: return "Indicator of paid employment, e.g., letter of hire, contract, employer letter; copy of pay check or pay stub.";
1942            case RETIRE: return "Indicator of retirement payment, e.g., pension check.";
1943            case SPOUSAL: return "Indicator of spousal or partner support payments received or provided; e.g., alimony payment; support stipulations in a divorce settlement.";
1944            case SUPPLE: return "Indicator of income supplement, e.g., gifting, parental income support; stipend, or grant.";
1945            case TAX: return "Indicator of tax obligation or payment, e.g., statement of taxable income.";
1946            case LIVEXP: return "Codes specifying living expense indicators used to assess or establish eligibility for coverage under a policy or program.";
1947            case CLOTH: return "Indicator of clothing expenses.";
1948            case FOOD: return "Indicator of transportation expenses.";
1949            case HEALTH: return "Indicator of health expenses; including medication costs, health service costs, financial participations, and health coverage premiums.";
1950            case HOUSE: return "Indicator of housing expense, e.g., household appliances, fixtures, furnishings, and maintenance and repairs.";
1951            case LEGAL: return "Indicator of legal expenses.";
1952            case MORTG: return "Indicator of mortgage amount, interest, and payments.";
1953            case RENT: return "Indicator of rental or lease payments.";
1954            case SUNDRY: return "Indicator of transportation expenses.";
1955            case TRANS: return "Indicator of transportation expenses, e.g., vehicle payments, vehicle insurance, vehicle fuel, and vehicle maintenance and repairs.";
1956            case UTIL: return "Indicator of transportation expenses.";
1957            case ELSTAT: return "Code specifying eligibility indicators used to assess or establish eligibility for coverage under a policy or program eligibility status, e.g., certificates of creditable coverage; student enrollment; adoption, marriage or birth certificate.";
1958            case ADOPT: return "Indicator of adoption.";
1959            case BTHCERT: return "Indicator of birth.";
1960            case CCOC: return "Indicator of creditable coverage.";
1961            case DRLIC: return "Indicator of driving status.";
1962            case FOSTER: return "Indicator of foster child status.";
1963            case MEMBER: return "Indicator of status as covered member under a policy or program, e.g., member id card or coverage document.";
1964            case MIL: return "Indicator of military status.";
1965            case MRGCERT: return "Indicator of marriage status.";
1966            case PASSPORT: return "Indicator of citizenship.";
1967            case STUDENRL: return "Indicator of student status.";
1968            case HLSTAT: return "Code specifying non-clinical indicators related to health status used to assess or establish eligibility for coverage under a policy or program, e.g., pregnancy, disability, drug use, mental health issues.";
1969            case DISABLE: return "Indication of disability.";
1970            case DRUG: return "Indication of drug use.";
1971            case IVDRG: return "Indication of IV drug use .";
1972            case PGNT: return "Non-clinical report of pregnancy.";
1973            case LIVDEP: return "Code specifying observations related to living dependency, such as dependent upon spouse for activities of daily living.";
1974            case RELDEP: return "Continued living in private residence requires functional and health care assistance from one or more relatives.";
1975            case SPSDEP: return "Continued living in private residence requires functional and health care assistance from spouse or life partner.";
1976            case URELDEP: return "Continued living in private residence requires functional and health care assistance from one or more unrelated persons.";
1977            case LIVSIT: return "Code specifying observations related to living situation for a person in a private residence.";
1978            case ALONE: return "Living alone.  Maps to PD1-2   Living arrangement   (IS)   00742 [A]";
1979            case DEPCHD: return "Living with one or more dependent children requiring moderate supervision.";
1980            case DEPSPS: return "Living with disabled spouse requiring functional and health care assistance";
1981            case DEPYGCHD: return "Living with one or more dependent children requiring intensive supervision";
1982            case FAM: return "Living with family. Maps to PD1-2   Living arrangement   (IS)   00742 [F]";
1983            case RELAT: return "Living with one or more relatives. Maps to PD1-2   Living arrangement   (IS)   00742 [R]";
1984            case SPS: return "Living only with spouse or life partner. Maps to PD1-2   Living arrangement   (IS)   00742 [S]";
1985            case UNREL: return "Living with one or more unrelated persons.";
1986            case SOECSTAT: return "Code specifying observations or indicators related to socio-economic status used to assess to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program.";
1987            case ABUSE: return "Indication of abuse victim.";
1988            case HMLESS: return "Indication of status as homeless.";
1989            case ILGIM: return "Indication of status as illegal immigrant.";
1990            case INCAR: return "Indication of status as incarcerated.";
1991            case PROB: return "Indication of probation status.";
1992            case REFUG: return "Indication of refugee status.";
1993            case UNEMPL: return "Indication of unemployed status.";
1994            case _ALLERGYTESTVALUE: return "Indicates the result of a particular allergy test.  E.g. Negative, Mild, Moderate, Severe";
1995            case A0: return "Description:Patient exhibits no reaction to the challenge agent.";
1996            case A1: return "Description:Patient exhibits a minimal reaction to the challenge agent.";
1997            case A2: return "Description:Patient exhibits a mild reaction to the challenge agent.";
1998            case A3: return "Description:Patient exhibits moderate reaction to the challenge agent.";
1999            case A4: return "Description:Patient exhibits a severe reaction to the challenge agent.";
2000            case _COMPOSITEMEASURESCORING: return "Observation values that communicate the method used in a quality measure to combine the component measure results included in an composite measure.";
2001            case ALLORNONESCR: return "Code specifying that the measure uses all-or-nothing scoring. All-or-nothing scoring places an individual in the numerator of the composite measure if and only if they are in the numerator of all component measures in which they are in the denominator.";
2002            case LINEARSCR: return "Code specifying that the measure uses linear scoring. Linear scoring computes the fraction of component measures in which the individual appears in the numerator, giving equal weight to each component measure.";
2003            case OPPORSCR: return "Code specifying that the measure uses opportunity-based scoring. In opportunity-based scoring the measure score is determined by combining the denominator and numerator of each component measure to determine an overall composite score.";
2004            case WEIGHTSCR: return "Code specifying that the measure uses weighted scoring. Weighted scoring assigns a factor to each component measure to weight that measure's contribution to the overall score.";
2005            case _COVERAGELIMITOBSERVATIONVALUE: return "Description:Coded observation values for coverage limitations, for e.g., types of claims or types of parties covered under a policy or program.";
2006            case _COVERAGELEVELOBSERVATIONVALUE: return "Description:Coded observation values for types of covered parties under a policy or program based on their personal relationships or employment status.";
2007            case ADC: return "Description:Child over an age as specified by coverage policy or program, e.g., student, differently abled, and income dependent.";
2008            case CHD: return "Description:Dependent biological, adopted, foster child as specified by coverage policy or program.";
2009            case DEP: return "Description:Person requiring functional and/or financial assistance from another person as specified by coverage policy or program.";
2010            case DP: return "Description:Persons registered as a family unit in a domestic partner registry as specified by law and by coverage policy or program.";
2011            case ECH: return "Description:An individual employed by an employer who receive remuneration in wages, salary, commission, tips, piece-rates, or pay-in-kind through the employeraTMs payment system (i.e., not a contractor) as specified by coverage policy or program.";
2012            case FLY: return "Description:As specified by coverage policy or program.";
2013            case IND: return "Description:Person as specified by coverage policy or program.";
2014            case SSP: return "Description:A pair of people of the same gender who live together as a family as specified by coverage policy or program, e.g., Naomi and Ruth from the Book of Ruth; Socrates and Alcibiades";
2015            case _CRITICALITYOBSERVATIONVALUE: return "A clinical judgment as to the worst case result of a future exposure (including substance administration). When the worst case result is assessed to have a life-threatening or organ system threatening potential, it is considered to be of high criticality.";
2016            case CRITH: return "Worst case result of a future exposure is assessed to be life-threatening or having high potential for organ system failure.";
2017            case CRITL: return "Worst case result of a future exposure is not assessed to be life-threatening or having high potential for organ system failure.";
2018            case CRITU: return "Unable to assess the worst case result of a future exposure.";
2019            case _EMPLOYMENTSTATUS: return "Concepts representing whether a person does or does not currently have a job or is not currently in the labor pool seeking employment.";
2020            case EMPLOYED: return "Individuals who, during the last week: a) did any work for at least 1 hour as paid or unpaid employees of a business or government organization; worked in their own businesses, professions, or on their own farms; or b) were not working, but who have a job or business from which the individual was temporarily absent because of vacation, illness, bad weather, childcare problems, maternity or paternity leave, labor-management dispute, job training, or other family or personal reasons, regardless of whether or not they were paid for the time off or were seeking other jobs.";
2021            case NOTINLABORFORCE: return "Persons not classified as employed or unemployed, meaning those who have no job and are not looking for one.";
2022            case UNEMPLOYED: return "Persons who currently have no employment, but are available for work and have made specific efforts to find employment.";
2023            case _GENETICOBSERVATIONVALUE: return "Description: The domain contains genetic analysis specific observation values, e.g. Homozygote, Heterozygote, etc.";
2024            case HOMOZYGOTE: return "Description: An individual having different alleles at one or more loci regarding a specific character";
2025            case _OBSERVATIONMEASURESCORING: return "Observation values used to indicate the type of scoring (e.g. proportion, ratio) used by a health quality measure.";
2026            case COHORT: return "A measure in which either short-term cross-section or long-term longitudinal analysis is performed over a group of subjects defined by a set of common properties or defining characteristics (e.g., Male smokers between the ages of 40 and 50 years, exposure to treatment, exposure duration).";
2027            case CONTVAR: return "A measure score in which each individual value for the measure can fall anywhere along a continuous scale (e.g., mean time to thrombolytics which aggregates the time in minutes from a case presenting with chest pain to the time of administration of thrombolytics).";
2028            case PROPOR: return "A score derived by dividing the number of cases that meet a criterion for quality (the numerator) by the number of eligible cases within a given time frame (the denominator) where the numerator cases are a subset of the denominator cases (e.g., percentage of eligible women with a mammogram performed in the last year).";
2029            case RATIO: return "A score that may have a value of zero or greater that is derived by dividing a count of one type of data by a count of another type of data (e.g., the number of patients with central lines who develop infection divided by the number of central line days).";
2030            case _OBSERVATIONMEASURETYPE: return "Observation values used to indicate what kind of health quality measure is used.";
2031            case COMPOSITE: return "A measure that is composed from one or more other measures and indicates an overall summary of those measures.";
2032            case EFFICIENCY: return "A measure related to the efficiency of medical treatment.";
2033            case EXPERIENCE: return "A measure related to the level of patient engagement or patient experience of care.";
2034            case OUTCOME: return "A measure that indicates the result of the performance (or non-performance) of a function or process.";
2035            case INTERMOM: return "A measure that evaluates the change over time of a physiologic state observable that is associated with a specific long-term health outcome.";
2036            case PROPM: return "A measure that is a comparison of patient reported outcomes for a single or multiple patients collected via an instrument specifically designed to obtain input directly from patients.";
2037            case PROCESS: return "A measure which focuses on a process which leads to a certain outcome, meaning that a scientific basis exists for believing that the process, when executed well, will increase the probability of achieving a desired outcome.";
2038            case APPROPRIATE: return "A measure that assesses the use of one or more processes where the expected health benefit exceeds the expected negative consequences.";
2039            case RESOURCE: return "A measure related to the extent of use of clinical resources or cost of care.";
2040            case STRUCTURE: return "A measure related to the structure of patient care.";
2041            case _OBSERVATIONPOPULATIONINCLUSION: return "Observation values used to assert various populations that a subject falls into.";
2042            case DENEX: return "Patients who should be removed from the eMeasure population and denominator before determining if numerator criteria are met. Denominator exclusions are used in proportion and ratio measures to help narrow the denominator.";
2043            case DENEXCEP: return "Denominator exceptions are those conditions that should remove a patient, procedure or unit of measurement from the denominator only if the numerator criteria are not met. Denominator exceptions allow for adjustment of the calculated score for those providers with higher risk populations. Denominator exceptions are used only in proportion eMeasures. They are not appropriate for ratio or continuous variable eMeasures.  Denominator exceptions allow for the exercise of clinical judgment and should be specifically defined where capturing the information in a structured manner fits the clinical workflow. Generic denominator exception reasons used in proportion eMeasures fall into three general categories:\r\n\n                        \n                           Medical reasons\n                           Patient reasons\n                           System reasons";
2044            case DENOM: return "It can be the same as the initial patient population or a subset of the initial patient population to further constrain the population for the purpose of the eMeasure. Different measures within an eMeasure set may have different Denominators. Continuous Variable eMeasures do not have a Denominator, but instead define a Measure Population.";
2045            case IP: return "The initial population refers to all entities to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs.";
2046            case IPP: return "The initial patient population refers to all patients to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. Details often include information based upon specific age groups, diagnoses, diagnostic and procedure codes, and enrollment periods.";
2047            case MSRPOPL: return "Measure population is used only in continuous variable eMeasures. It is a narrative description of the eMeasure population. \n(e.g., all patients seen in the Emergency Department during the measurement period).";
2048            case NUMER: return "Numerators are used in proportion and ratio eMeasures. In proportion measures the numerator criteria are the processes or outcomes expected for each patient, procedure, or other unit of measurement defined in the denominator. In ratio measures the numerator is related, but not directly derived from the denominator (e.g., a numerator listing the number of central line blood stream infections and a denominator indicating the days per thousand of central line usage in a specific time period).";
2049            case NUMEX: return "Numerator Exclusions are used only in ratio eMeasures to define instances that should not be included in the numerator data. (e.g., if the number of central line blood stream infections per 1000 catheter days were to exclude infections with a specific bacterium, that bacterium would be listed as a numerator exclusion.)";
2050            case _PARTIALCOMPLETIONSCALE: return "PartialCompletionScale";
2051            case G: return "Value for Act.partialCompletionCode attribute that implies 81-99% completion";
2052            case LE: return "Value for Act.partialCompletionCode attribute that implies 61-80% completion";
2053            case ME: return "Value for Act.partialCompletionCode attribute that implies 41-60% completion";
2054            case MI: return "Value for Act.partialCompletionCode attribute that implies 1-20% completion";
2055            case N: return "Value for Act.partialCompletionCode attribute that implies 0% completion";
2056            case S: return "Value for Act.partialCompletionCode attribute that implies 21-40% completion";
2057            case _SECURITYOBSERVATIONVALUE: return "Observation values used to indicate security observation metadata.";
2058            case _SECINTOBV: return "Abstract security observation values used to indicate security integrity metadata.\r\n\n                        \n                           Examples: Codes conveying integrity status, integrity confidence, and provenance.";
2059            case _SECALTINTOBV: return "Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability)";
2060            case ABSTRED: return "Security metadata observation values used to indicate the use of a more abstract version of the content, e.g., replacing exact value of an age or date field with a range, or remove the left digits of a credit card number or SSN.";
2061            case AGGRED: return "Security metadata observation values used to indicate the use of an algorithmic combination of actual values with the result of an aggregate function, e.g., average, sum, or count in order to limit disclosure of an IT resource (data, information object, service, or system capability) to the minimum necessary.";
2062            case ANONYED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by used to indicate the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject.  No key to relink the data is retained.";
2063            case MAPPED: return "Security metadata observation value used to indicate that the IT resource semantic content has been transformed from one encoding to another.\r\n\n                        \n                           Usage Note: \"MAP\" code does not indicate the semantic fidelity of the transformed content.\r\n\n                        To indicate semantic fidelity for maps of HL7 to other code systems, this security alteration integrity observation may be further specified using an Act valued with Value Set: MapRelationship (2.16.840.1.113883.1.11.11052).\r\n\n                        Semantic fidelity of the mapped IT Resource may also be indicated using a SecurityIntegrityConfidenceObservation.";
2064            case MASKED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by indicating the mechanism by which software systems can make data unintelligible (that is, as unreadable and unusable by algorithmically transforming plaintext into ciphertext) such that it can only be accessed or used by authorized users.  An authorized user may be provided a key to decrypt per license or \"shared secret\".\r\n\n                        \n                           Usage Note: \"MASKED\" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has been further encrypted, and may be accessed only by an authorized user or receiver to which a decryption key is provided.";
2065            case PSEUDED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability), by indicating the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject.  Custodian may retain a key to relink data necessary to reidentify the information subject.\r\n\n                        \n                           Rationale: Personal data which has been processed to make it impossible to know whose data it is. Used particularly for secondary use of health data. In some cases, it may be possible for authorized individuals to restore the identity of the individual, e.g.,for public health case management.  Based on ISO/TS 25237:2008 Health informatics—Pseudonymization";
2066            case REDACTED: return "Security metadata observation value used to indicate the mechanism by which software systems can filter an IT resource (data, information object, service, or system capability) to remove any portion of the resource that is not authorized to be access, used, or disclosed.\r\n\n                        \n                           Usage Note: \"REDACTED\" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has filtered and not included in the content accessed or received.";
2067            case SUBSETTED: return "Metadata observation used to indicate that some information has been removed from the source object when the view this object contains was constructed because of configuration options when the view was created. The content may not be suitable for use as the basis of a record update\r\n\n                        \n                           Usage Note: This is not suitable to be used when information is removed for security reasons - see the code REDACTED for this use.";
2068            case SYNTAC: return "Security metadata observation value used to indicate that the IT resource syntax has been transformed from one syntactical representation to another.  \r\n\n                        \n                           Usage Note: \"SYNTAC\" code does not indicate the syntactical correctness of the syntactically transformed IT resource.";
2069            case TRSLT: return "Security metadata observation value used to indicate that the IT resource has been translated from one human language to another.  \r\n\n                        \n                           Usage Note: \"TRSLT\" does not indicate the fidelity of the translation or the languages translated.\r\n\n                        The fidelity of the IT Resource translation may be indicated using a SecurityIntegrityConfidenceObservation.\r\n\n                        To indicate languages, use the Value Set:HumanLanguage (2.16.840.1.113883.1.11.11526)";
2070            case VERSIONED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability)  which indicates that the resource only retains versions of an IT resource  for access and use per applicable policy\r\n\n                        \n                           Usage Note: When this code is used, expectation is that the system has removed historical versions of the data that falls outside the time period deemed to be the effective time of the applicable version.";
2071            case _SECDATINTOBV: return "Abstract security observation values used to indicate data integrity metadata.\r\n\n                        \n                           Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function.";
2072            case CRYTOHASH: return "Security metadata observation value used to indicate the mechanism by which software systems can establish that data was not modified in transit.\r\n\n                        \n                           Rationale: This definition is intended to align with the ISO 22600-2 3.3.19 definition of cryptographic checkvalue: Information which is derived by performing a cryptographic transformation (see cryptography) on the data unit.  The derivation of the checkvalue may be performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit.\r\n\n                        \n                           Examples: \n                        \r\n\n                        \n                           SHA-1\n                           SHA-2 (Secure Hash Algorithm)";
2073            case DIGSIG: return "Security metadata observation value used to indicate the mechanism by which software systems use digital signature to establish that data has not been modified.  \r\n\n                        \n                           Rationale: This definition is intended to align with the ISO 22600-2 3.3.26 definition of digital signature:  Data appended to, or a cryptographic transformation (see cryptography) of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g., by the recipient.";
2074            case _SECINTCONOBV: return "Abstract security observation value used to indicate integrity confidence metadata.\r\n\n                        \n                           Examples: Codes conveying the level of reliability and trustworthiness of an IT resource.";
2075            case HRELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be very high.";
2076            case RELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be adequate.";
2077            case UNCERTREL: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be uncertain.";
2078            case UNRELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be inadequate.";
2079            case _SECINTPRVOBV: return "Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability).\r\n\n                        \n                           Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.";
2080            case _SECINTPRVABOBV: return "Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability).\r\n\n                        \n                           Examples: Codes conveying the provenance metadata about the entity asserting the resource.";
2081            case CLINAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a clinician.";
2082            case DEVAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a device.";
2083            case HCPAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a healthcare professional.";
2084            case PACQAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient acquaintance.";
2085            case PATAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient.";
2086            case PAYAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a payer.";
2087            case PROAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a professional.";
2088            case SDMAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a substitute decision maker.";
2089            case _SECINTPRVRBOBV: return "Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability).\r\n\n                        \n                           Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.";
2090            case CLINRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a clinician.";
2091            case DEVRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a device.";
2092            case HCPRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a healthcare professional.";
2093            case PACQRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient acquaintance.";
2094            case PATRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient.";
2095            case PAYRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a payer.";
2096            case PRORPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a professional.";
2097            case SDMRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a substitute decision maker.";
2098            case SECTRSTOBV: return "Observation value used to indicate aspects of trust applicable to an IT resource (data, information object, service, or system capability).";
2099            case TRSTACCRDOBV: return "Values for security trust accreditation metadata observation made about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework.";
2100            case TRSTAGREOBV: return "Values for security trust agreement metadata observation made about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1]\n[ISO IEC 10181-1]";
2101            case TRSTCERTOBV: return "Values for security trust certificate metadata observation made about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1]\r\n\n                        For example, a Certificate Policy (CP), which is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements.  A particular Certificate Policy might indicate the applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range.  Another example is Cross Certification with Federal Bridge.";
2102            case TRSTLOAOBV: return "Values for security trust assurance metadata observation made about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol.";
2103            case LOAAN: return "The value assigned as the indicator of the digital quality or reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2]\r\n\n                        For example, the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]";
2104            case LOAAN1: return "Indicator of low digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] \r\n\n                        Low authentication level of assurance indicates that the relying party may have little or no confidence in the asserted identity's validity. Level 1 requires little or no confidence in the asserted identity. No identity proofing is required at this level, but the authentication mechanism should provide some assurance that the same claimant is accessing the protected transaction or data. A wide range of available authentication technologies can be employed and any of the token methods of Levels 2, 3, or 4, including Personal Identification Numbers (PINs), may be used. To be authenticated, the claimant must prove control of the token through a secure authentication protocol. At Level 1, long-term shared authentication secrets may be revealed to verifiers.  Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2105            case LOAAN2: return "Indicator of basic digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]\r\n\n                        Basic authentication level of assurance indicates that the relying party may have some confidence in the asserted identity's validity. Level 2 requires confidence that the asserted identity is accurate. Level 2 provides for single-factor remote network authentication, including identity-proofing requirements for presentation of identifying materials or information. A wide range of available authentication technologies can be employed, including any of the token methods of Levels 3 or 4, as well as passwords. Successful authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token.  Eavesdropper, replay, and online guessing attacks are prevented.  \nLong-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are required. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2106            case LOAAN3: return "Indicator of medium digital quality or reliability of the digital reliability of verification and validation of the process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] \r\n\n                        Medium authentication level of assurance indicates that the relying party may have high confidence in the asserted identity's validity.  Level 3 is appropriate for transactions that need high confidence in the accuracy of the asserted identity. Level 3 provides multifactor remote network authentication. At this level, identity-proofing procedures require verification of identifying materials and information. Authentication is based on proof of possession of a key or password through a cryptographic protocol. Cryptographic strength mechanisms should protect the primary authentication token (a cryptographic key) against compromise by the protocol threats, including eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks. A minimum of two authentication factors is required. Three kinds of tokens may be used:\r\n\n                        \n                           \"soft\" cryptographic token, which has the key stored on a general-purpose computer, \n                           \"hard\" cryptographic token, which has the key stored on a special hardware device, and \n                           \"one-time password\" device token, which has symmetric key stored on a personal hardware device that is a cryptographic module validated at FIPS 140-2 Level 1 or higher. Validation testing of cryptographic modules and algorithms for conformance to Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, is managed by NIST.\n                        \n                        Authentication requires that the claimant prove control of the token through a secure authentication protocol. The token must be unlocked with a password or biometric representation, or a password must be used in a secure authentication protocol, to establish two-factor authentication. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are used for all operations.  Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.    [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2107            case LOAAN4: return "Indicator of high digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]\r\n\n                        High authentication level of assurance indicates that the relying party may have very high confidence in the asserted identity's validity. Level 4 is for transactions that need very high confidence in the accuracy of the asserted identity. Level 4 provides the highest practical assurance of remote network authentication. Authentication is based on proof of possession of a key through a cryptographic protocol. This level is similar to Level 3 except that only “hard� cryptographic tokens are allowed, cryptographic module validation requirements are strengthened, and subsequent critical data transfers must be authenticated via a key that is bound to the authentication process. The token should be a hardware cryptographic module validated at FIPS 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. This level requires a physical token, which cannot readily be copied, and operator authentication at Level 2 and higher, and ensures good, two-factor remote authentication.\r\n\n                        Level 4 requires strong cryptographic authentication of all parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks are prevented. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Strong approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2108            case LOAAP: return "The value assigned as the indicator of the digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]";
2109            case LOAAP1: return "Indicator of the low digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n                        Low authentication process level of assurance indicates that (1) long-term shared authentication secrets may be revealed to verifiers; and (2) assertions and assertion references require protection from manufacture/modification and reuse attacks.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2110            case LOAAP2: return "Indicator of the basic digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n                        Basic authentication process level of assurance indicates that long-term shared authentication secrets are never revealed to any other party except Credential Service Provider (CSP).  Sessions (temporary) shared secrets may be provided to independent verifiers by CSP. Long-term shared authentication secrets, if used, are never revealed to any other party except Verifiers operated by the Credential Service Provider (CSP); however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 1 requirements, assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2111            case LOAAP3: return "Indicator of the medium digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n                        Medium authentication process level of assurance indicates that the token can be unlocked with password, biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication.  Long-term shared authentication secrets are never revealed to any party except the Claimant and Credential Service Provider (CSP).\r\n\n                        Authentication requires that the Claimant prove, through a secure authentication protocol, that he or she controls the token. The Claimant unlocks the token with a password or biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication (through proof of possession of a physical or software token in combination with some memorized secret knowledge). Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 2 requirements, assertions are protected against repudiation by the Verifier.";
2112            case LOAAP4: return "Indicator of the high digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n                        High authentication process level of assurance indicates all sensitive data transfer are cryptographically authenticated using keys bound to the authentication process.  Level 4 requires strong cryptographic authentication of all communicating parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the Claimant prove through a secure authentication protocol that he or she controls the token. All protocol threats at Level 3 are required to be prevented at Level 4. Protocols shall also be strongly resistant to man-in-the-middle attacks. Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. Approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2113            case LOAAS: return "The value assigned as the indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.";
2114            case LOAAS1: return "Indicator of the low quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n                        Assertions and assertion references require protection from modification and reuse attacks.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2115            case LOAAS2: return "Indicator of the basic quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n                        Assertions are resistant to disclosure, redirection, capture and substitution attacks.  Approved cryptographic techniques are required for all assertion protocols.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2116            case LOAAS3: return "Indicator of the medium quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n                        Assertions are protected against repudiation by the verifier.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2117            case LOAAS4: return "Indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n                        Strongly resistant to man-in-the-middle attacks. \"Bearer\" assertions are not used.  \"Holder-of-key\" assertions may be used. RP maintains records of the assertions.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
2118            case LOACM: return "Indicator of the digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2119            case LOACM1: return "Indicator of the low digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Little or no confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include weak identity binding to tokens and plaintext passwords or secrets not transmitted across a network. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2120            case LOACM2: return "Indicator of the basic digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity.  Some confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include:  Verification must prove claimant controls the token; token resists online guessing, replay, session hijacking, and eavesdropping attacks; and  token is at least weakly resistant to man-in-the middle attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2121            case LOACM3: return "Indicator of the medium digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity.  High confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics  include: Ownership of token verifiable through security authentication protocol and credential management protects against verifier impersonation attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2122            case LOACM4: return "Indicator of the high digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity.  Very high confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verifier can prove control of token through a secure protocol; credential management supports strong cryptographic authentication of all communication parties. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2123            case LOAID: return "Indicator of the quality or reliability in the process of ascertaining that an individual is who he or she claims to be.";
2124            case LOAID1: return "Indicator of low digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires that a continuity of identity be maintained but does not require identity proofing. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2125            case LOAID2: return "Indicator of some digital quality or reliability in the process of ascertaining that that an individual is who he or she claims to be. Requires identity proofing via presentation of identifying material or information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2126            case LOAID3: return "Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2127            case LOAID4: return "Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2128            case LOANR: return "Indicator of the digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
2129            case LOANR1: return "Indicator of low digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
2130            case LOANR2: return "Indicator of basic digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
2131            case LOANR3: return "Indicator of medium digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
2132            case LOANR4: return "Indicator of high digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
2133            case LOARA: return "Indicator of the digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]";
2134            case LOARA1: return "Indicator of low digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]";
2135            case LOARA2: return "Indicator of basic digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]";
2136            case LOARA3: return "Indicator of medium digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]";
2137            case LOARA4: return "Indicator of high digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization's security controls. [Based on NIST SP 800-63-2]";
2138            case LOATK: return "Indicator of the digital quality or reliability of single and multi-token authentication. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2139            case LOATK1: return "Indicator of the low digital quality or reliability of single and multi-token authentication. Permits the use of any of the token methods of Levels 2, 3, or 4. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2140            case LOATK2: return "Indicator of the basic digital quality or reliability of single and multi-token authentication. Requires single factor authentication using memorized secret tokens, pre-registered knowledge tokens, look-up secret tokens, out of band tokens, or single factor one-time password devices. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2141            case LOATK3: return "Indicator of the medium digital quality or reliability of single and multi-token authentication. Requires two authentication factors. Provides multi-factor remote network authentication. Permits multi-factor software cryptographic token. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2142            case LOATK4: return "Indicator of the high digital quality or reliability of single and multi-token authentication. Requires token that is a hardware cryptographic module validated at validated at Federal Information Processing Standard (FIPS) 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. Level 4 token requirements can be met by using the PIV authentication key of a FIPS 201 compliant Personal Identity Verification (PIV) Card.  [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
2143            case TRSTMECOBV: return "Values for security trust mechanism metadata observation made about a security architecture system component that supports enforcement of security policies.";
2144            case _SEVERITYOBSERVATION: return "Potential values for observations of severity.";
2145            case H: return "Indicates the condition may be life-threatening or has the potential to cause permanent injury.";
2146            case L: return "Indicates the condition may result in some adverse consequences but is unlikely to substantially affect the situation of the subject.";
2147            case M: return "Indicates the condition may result in noticable adverse adverse consequences but is unlikely to be life-threatening or cause permanent injury.";
2148            case _SUBJECTBODYPOSITION: return "Contains codes for defining the observed, physical position of a subject, such as during an observation, assessment, collection of a specimen, etc.  ECG waveforms and vital signs, such as blood pressure, are two examples where a general, observed position typically needs to be noted.";
2149            case LLD: return "Lying on the left side.";
2150            case PRN: return "Lying with the front or ventral surface downward; lying face down.";
2151            case RLD: return "Lying on the right side.";
2152            case SFWL: return "A semi-sitting position in bed with the head of the bed elevated approximately 45 degrees.";
2153            case SIT: return "Resting the body on the buttocks, typically with upper torso erect or semi erect.";
2154            case STN: return "To be stationary, upright, vertical, on one's legs.";
2155            case SUP: return "supine";
2156            case RTRD: return "Lying on the back, on an inclined plane, typically about 30-45 degrees with head raised and feet lowered.";
2157            case TRD: return "Lying on the back, on an inclined plane, typically about 30-45 degrees, with  head lowered and feet raised.";
2158            case _VERIFICATIONOUTCOMEVALUE: return "Values for observations of verification act results\r\n\n                        \n                           Examples: Verified, not verified, verified with warning.";
2159            case ACT: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s).";
2160            case ACTPEND: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s) - Pending Investigation";
2161            case ELG: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s).";
2162            case INACT: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s).";
2163            case INPNDINV: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Investigation.";
2164            case INPNDUPD: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Eligibility Update.";
2165            case NELG: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s). May optionally include reasons for the ineligibility.";
2166            case _WORKSCHEDULE: return "Concepts that describe an individual's typical arrangement of working hours for an occupation.";
2167            case DS: return "A person who is scheduled for work during daytime hours (for example between 6am and 6pm) on a regular basis.";
2168            case EMS: return "Consistent Early morning schedule of 13 hours or less per shift (between 2 am and 2 pm)";
2169            case ES: return "A person who is scheduled for work during evening hours (for example between 2pm and midnight) on a regular basis.";
2170            case NS: return "Scheduled for work during nighttime hours (for example between 9pm and 8am) on a regular basis.";
2171            case RSWN: return "Scheduled for work times that change periodically between days, and/or evenings, and includes some night shifts.";
2172            case RSWON: return "Scheduled for work days/times that change periodically between days, but does not include night or evening work.";
2173            case SS: return "Shift consisting of two distinct work periods each day that are separated by a break of a few hours (for example 2 to 4 hours)";
2174            case VLS: return "Shifts of 17 or more hours.";
2175            case VS: return "Irregular, unpredictable hours scheduled on a short notice (for example, less than 2 day notice): inconsistent schedule, on-call, as needed, as available.";
2176            case _ANNOTATIONVALUE: return "AnnotationValue";
2177            case _COMMONCLINICALOBSERVATIONVALUE: return "Description:Used in a patient care message to value simple clinical (non-lab) observations.";
2178            case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "This domain is established as a parent to a variety of value domains being defined to support the communication of Individual Case Safety Reports to regulatory bodies. Arguably, this aggregation is not taxonomically pure, but the grouping will facilitate the management of these domains.";
2179            case _INDICATIONVALUE: return "Indicates the specific observation result which is the reason for the action (prescription, lab test, etc.). E.g. Headache, Ear infection, planned diagnostic image (requiring contrast agent), etc.";
2180            default: return "?";
2181          }
2182        }
2183        public String getDisplay() {
2184          switch (this) {
2185            case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "ActCoverageAssessmentObservationValue";
2186            case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "ActFinancialStatusObservationValue";
2187            case ASSET: return "asset";
2188            case ANNUITY: return "annuity";
2189            case PROP: return "real property";
2190            case RETACCT: return "retirement investment account";
2191            case TRUST: return "trust";
2192            case INCOME: return "income";
2193            case CHILD: return "child support";
2194            case DISABL: return "disability pay";
2195            case INVEST: return "investment income";
2196            case PAY: return "paid employment";
2197            case RETIRE: return "retirement pay";
2198            case SPOUSAL: return "spousal or partner support";
2199            case SUPPLE: return "income supplement";
2200            case TAX: return "tax obligation";
2201            case LIVEXP: return "living expense";
2202            case CLOTH: return "clothing expense";
2203            case FOOD: return "food expense";
2204            case HEALTH: return "health expense";
2205            case HOUSE: return "household expense";
2206            case LEGAL: return "legal expense";
2207            case MORTG: return "mortgage";
2208            case RENT: return "rent";
2209            case SUNDRY: return "sundry expense";
2210            case TRANS: return "transportation expense";
2211            case UTIL: return "utility expense";
2212            case ELSTAT: return "eligibility indicator";
2213            case ADOPT: return "adoption document";
2214            case BTHCERT: return "birth certificate";
2215            case CCOC: return "creditable coverage document";
2216            case DRLIC: return "driver license";
2217            case FOSTER: return "foster child document";
2218            case MEMBER: return "program or policy member";
2219            case MIL: return "military identification";
2220            case MRGCERT: return "marriage certificate";
2221            case PASSPORT: return "passport";
2222            case STUDENRL: return "student enrollment";
2223            case HLSTAT: return "health status";
2224            case DISABLE: return "disabled";
2225            case DRUG: return "drug use";
2226            case IVDRG: return "IV drug use";
2227            case PGNT: return "pregnant";
2228            case LIVDEP: return "living dependency";
2229            case RELDEP: return "relative dependent";
2230            case SPSDEP: return "spouse dependent";
2231            case URELDEP: return "unrelated person dependent";
2232            case LIVSIT: return "living situation";
2233            case ALONE: return "alone";
2234            case DEPCHD: return "dependent children";
2235            case DEPSPS: return "dependent spouse";
2236            case DEPYGCHD: return "dependent young children";
2237            case FAM: return "live with family";
2238            case RELAT: return "relative";
2239            case SPS: return "spouse only";
2240            case UNREL: return "unrelated person";
2241            case SOECSTAT: return "socio economic status";
2242            case ABUSE: return "abuse victim";
2243            case HMLESS: return "homeless";
2244            case ILGIM: return "illegal immigrant";
2245            case INCAR: return "incarcerated";
2246            case PROB: return "probation";
2247            case REFUG: return "refugee";
2248            case UNEMPL: return "unemployed";
2249            case _ALLERGYTESTVALUE: return "AllergyTestValue";
2250            case A0: return "no reaction";
2251            case A1: return "minimal reaction";
2252            case A2: return "mild reaction";
2253            case A3: return "moderate reaction";
2254            case A4: return "severe reaction";
2255            case _COMPOSITEMEASURESCORING: return "CompositeMeasureScoring";
2256            case ALLORNONESCR: return "All-or-nothing Scoring";
2257            case LINEARSCR: return "Linear Scoring";
2258            case OPPORSCR: return "Opportunity Scoring";
2259            case WEIGHTSCR: return "Weighted Scoring";
2260            case _COVERAGELIMITOBSERVATIONVALUE: return "CoverageLimitObservationValue";
2261            case _COVERAGELEVELOBSERVATIONVALUE: return "CoverageLevelObservationValue";
2262            case ADC: return "adult child";
2263            case CHD: return "child";
2264            case DEP: return "dependent";
2265            case DP: return "domestic partner";
2266            case ECH: return "employee";
2267            case FLY: return "family coverage";
2268            case IND: return "individual";
2269            case SSP: return "same sex partner";
2270            case _CRITICALITYOBSERVATIONVALUE: return "CriticalityObservationValue";
2271            case CRITH: return "high criticality";
2272            case CRITL: return "low criticality";
2273            case CRITU: return "unable to assess criticality";
2274            case _EMPLOYMENTSTATUS: return "_EmploymentStatus";
2275            case EMPLOYED: return "Employed";
2276            case NOTINLABORFORCE: return "Not In Labor Force";
2277            case UNEMPLOYED: return "Unemployed";
2278            case _GENETICOBSERVATIONVALUE: return "GeneticObservationValue";
2279            case HOMOZYGOTE: return "HOMO";
2280            case _OBSERVATIONMEASURESCORING: return "ObservationMeasureScoring";
2281            case COHORT: return "cohort measure scoring";
2282            case CONTVAR: return "continuous variable measure scoring";
2283            case PROPOR: return "proportion measure scoring";
2284            case RATIO: return "ratio measure scoring";
2285            case _OBSERVATIONMEASURETYPE: return "ObservationMeasureType";
2286            case COMPOSITE: return "composite measure type";
2287            case EFFICIENCY: return "efficiency measure type";
2288            case EXPERIENCE: return "experience measure type";
2289            case OUTCOME: return "outcome measure type";
2290            case INTERMOM: return "intermediate clinical outcome measure";
2291            case PROPM: return "intermediate clinical outcome measure";
2292            case PROCESS: return "process measure type";
2293            case APPROPRIATE: return "appropriate use process measure";
2294            case RESOURCE: return "resource use measure type";
2295            case STRUCTURE: return "structure measure type";
2296            case _OBSERVATIONPOPULATIONINCLUSION: return "ObservationPopulationInclusion";
2297            case DENEX: return "denominator exclusions";
2298            case DENEXCEP: return "denominator exceptions";
2299            case DENOM: return "denominator";
2300            case IP: return "initial population";
2301            case IPP: return "initial patient population";
2302            case MSRPOPL: return "measure population";
2303            case NUMER: return "numerator";
2304            case NUMEX: return "numerator exclusions";
2305            case _PARTIALCOMPLETIONSCALE: return "PartialCompletionScale";
2306            case G: return "Great extent";
2307            case LE: return "Large extent";
2308            case ME: return "Medium extent";
2309            case MI: return "Minimal extent";
2310            case N: return "None";
2311            case S: return "Some extent";
2312            case _SECURITYOBSERVATIONVALUE: return "SecurityObservationValue";
2313            case _SECINTOBV: return "security integrity";
2314            case _SECALTINTOBV: return "alteration integrity";
2315            case ABSTRED: return "abstracted";
2316            case AGGRED: return "aggregated";
2317            case ANONYED: return "anonymized";
2318            case MAPPED: return "mapped";
2319            case MASKED: return "masked";
2320            case PSEUDED: return "pseudonymized";
2321            case REDACTED: return "redacted";
2322            case SUBSETTED: return "subsetted";
2323            case SYNTAC: return "syntactic transform";
2324            case TRSLT: return "translated";
2325            case VERSIONED: return "versioned";
2326            case _SECDATINTOBV: return "data integrity";
2327            case CRYTOHASH: return "cryptographic hash function";
2328            case DIGSIG: return "digital signature";
2329            case _SECINTCONOBV: return "integrity confidence";
2330            case HRELIABLE: return "highly reliable";
2331            case RELIABLE: return "reliable";
2332            case UNCERTREL: return "uncertain reliability";
2333            case UNRELIABLE: return "unreliable";
2334            case _SECINTPRVOBV: return "provenance";
2335            case _SECINTPRVABOBV: return "provenance asserted by";
2336            case CLINAST: return "clinician asserted";
2337            case DEVAST: return "device asserted";
2338            case HCPAST: return "healthcare professional asserted";
2339            case PACQAST: return "patient acquaintance asserted";
2340            case PATAST: return "patient asserted";
2341            case PAYAST: return "payer asserted";
2342            case PROAST: return "professional asserted";
2343            case SDMAST: return "substitute decision maker asserted";
2344            case _SECINTPRVRBOBV: return "provenance reported by";
2345            case CLINRPT: return "clinician reported";
2346            case DEVRPT: return "device reported";
2347            case HCPRPT: return "healthcare professional reported";
2348            case PACQRPT: return "patient acquaintance reported";
2349            case PATRPT: return "patient reported";
2350            case PAYRPT: return "payer reported";
2351            case PRORPT: return "professional reported";
2352            case SDMRPT: return "substitute decision maker reported";
2353            case SECTRSTOBV: return "security trust observation";
2354            case TRSTACCRDOBV: return "trust accreditation observation";
2355            case TRSTAGREOBV: return "trust agreement observation";
2356            case TRSTCERTOBV: return "trust certificate observation";
2357            case TRSTLOAOBV: return "trust assurance observation";
2358            case LOAAN: return "authentication level of assurance value";
2359            case LOAAN1: return "low authentication level of assurance";
2360            case LOAAN2: return "basic authentication level of assurance";
2361            case LOAAN3: return "medium authentication level of assurance";
2362            case LOAAN4: return "high authentication level of assurance";
2363            case LOAAP: return "authentication process level of assurance value";
2364            case LOAAP1: return "low authentication process level of assurance";
2365            case LOAAP2: return "basic authentication process level of assurance";
2366            case LOAAP3: return "medium authentication process level of assurance";
2367            case LOAAP4: return "high authentication process level of assurance";
2368            case LOAAS: return "assertion level of assurance value";
2369            case LOAAS1: return "low assertion level of assurance";
2370            case LOAAS2: return "basic assertion level of assurance";
2371            case LOAAS3: return "medium assertion level of assurance";
2372            case LOAAS4: return "high assertion level of assurance";
2373            case LOACM: return "token and credential management level of assurance value)";
2374            case LOACM1: return "low token and credential management level of assurance";
2375            case LOACM2: return "basic token and credential management level of assurance";
2376            case LOACM3: return "medium token and credential management level of assurance";
2377            case LOACM4: return "high token and credential management level of assurance";
2378            case LOAID: return "identity proofing level of assurance";
2379            case LOAID1: return "low identity proofing level of assurance";
2380            case LOAID2: return "basic identity proofing level of assurance";
2381            case LOAID3: return "medium identity proofing level of assurance";
2382            case LOAID4: return "high identity proofing level of assurance";
2383            case LOANR: return "non-repudiation level of assurance value";
2384            case LOANR1: return "low non-repudiation level of assurance";
2385            case LOANR2: return "basic non-repudiation level of assurance";
2386            case LOANR3: return "medium non-repudiation level of assurance";
2387            case LOANR4: return "high non-repudiation level of assurance";
2388            case LOARA: return "remote access level of assurance value";
2389            case LOARA1: return "low remote access level of assurance";
2390            case LOARA2: return "basic remote access level of assurance";
2391            case LOARA3: return "medium remote access level of assurance";
2392            case LOARA4: return "high remote access level of assurance";
2393            case LOATK: return "token level of assurance value";
2394            case LOATK1: return "low token level of assurance";
2395            case LOATK2: return "basic token level of assurance";
2396            case LOATK3: return "medium token level of assurance";
2397            case LOATK4: return "high token level of assurance";
2398            case TRSTMECOBV: return "none supplied 6";
2399            case _SEVERITYOBSERVATION: return "SeverityObservation";
2400            case H: return "High";
2401            case L: return "Low";
2402            case M: return "Moderate";
2403            case _SUBJECTBODYPOSITION: return "_SubjectBodyPosition";
2404            case LLD: return "left lateral decubitus";
2405            case PRN: return "prone";
2406            case RLD: return "right lateral decubitus";
2407            case SFWL: return "Semi-Fowler's";
2408            case SIT: return "sitting";
2409            case STN: return "standing";
2410            case SUP: return "supine";
2411            case RTRD: return "reverse trendelenburg";
2412            case TRD: return "trendelenburg";
2413            case _VERIFICATIONOUTCOMEVALUE: return "verification outcome";
2414            case ACT: return "active coverage";
2415            case ACTPEND: return "active - pending investigation";
2416            case ELG: return "eligible";
2417            case INACT: return "inactive";
2418            case INPNDINV: return "inactive - pending investigation";
2419            case INPNDUPD: return "inactive - pending eligibility update";
2420            case NELG: return "not eligible";
2421            case _WORKSCHEDULE: return "_WorkSchedule";
2422            case DS: return "daytime shift";
2423            case EMS: return "early morning shift";
2424            case ES: return "evening shift";
2425            case NS: return "night shift";
2426            case RSWN: return "rotating shift with nights";
2427            case RSWON: return "rotating shift without nights";
2428            case SS: return "split shift";
2429            case VLS: return "very long shift";
2430            case VS: return "variable shift";
2431            case _ANNOTATIONVALUE: return "AnnotationValue";
2432            case _COMMONCLINICALOBSERVATIONVALUE: return "common clinical observation";
2433            case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "Individual Case Safety Report Value Domains";
2434            case _INDICATIONVALUE: return "IndicationValue";
2435            default: return "?";
2436          }
2437    }
2438
2439
2440}
2441