001package org.hl7.fhir.dstu2016may.model.codesystems; 002 003 004 005 006/* 007 Copyright (c) 2011+, HL7, Inc. 008 All rights reserved. 009 010 Redistribution and use in source and binary forms, with or without modification, 011 are permitted provided that the following conditions are met: 012 013 * Redistributions of source code must retain the above copyright notice, this 014 list of conditions and the following disclaimer. 015 * Redistributions in binary form must reproduce the above copyright notice, 016 this list of conditions and the following disclaimer in the documentation 017 and/or other materials provided with the distribution. 018 * Neither the name of HL7 nor the names of its contributors may be used to 019 endorse or promote products derived from this software without specific 020 prior written permission. 021 022 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND 023 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 024 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 025 IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, 026 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 027 NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 028 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 029 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 030 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 031 POSSIBILITY OF SUCH DAMAGE. 032 033*/ 034 035// Generated on Sun, May 8, 2016 03:05+1000 for FHIR v1.4.0 036 037 038import org.hl7.fhir.exceptions.FHIRException; 039 040public enum V3ObservationValue { 041 042 /** 043 * Codes specify the category of observation, evidence, or document used to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. The type of evidence is coded as observation values. 044 */ 045 _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE, 046 /** 047 * Code specifying financial indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay stub; tax or income document; asset document; living expenses. 048 */ 049 _ACTFINANCIALSTATUSOBSERVATIONVALUE, 050 /** 051 * Codes specifying asset indicators used to assess or establish eligibility for coverage under a policy or program. 052 */ 053 ASSET, 054 /** 055 * Indicator of annuity ownership or status as beneficiary. 056 */ 057 ANNUITY, 058 /** 059 * Indicator of real property ownership, e.g., deed or real estate contract. 060 */ 061 PROP, 062 /** 063 * Indicator of retirement investment account ownership. 064 */ 065 RETACCT, 066 /** 067 * Indicator of status as trust beneficiary. 068 */ 069 TRUST, 070 /** 071 * Code specifying income indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay or pension check, child support payments received or provided, and taxes paid. 072 */ 073 INCOME, 074 /** 075 * Indicator of child support payments received or provided. 076 */ 077 CHILD, 078 /** 079 * Indicator of disability income replacement payment. 080 */ 081 DISABL, 082 /** 083 * Indicator of investment income, e.g., dividend check, annuity payment; real estate rent, investment divestiture proceeds; trust or endowment check. 084 */ 085 INVEST, 086 /** 087 * Indicator of paid employment, e.g., letter of hire, contract, employer letter; copy of pay check or pay stub. 088 */ 089 PAY, 090 /** 091 * Indicator of retirement payment, e.g., pension check. 092 */ 093 RETIRE, 094 /** 095 * Indicator of spousal or partner support payments received or provided; e.g., alimony payment; support stipulations in a divorce settlement. 096 */ 097 SPOUSAL, 098 /** 099 * Indicator of income supplement, e.g., gifting, parental income support; stipend, or grant. 100 */ 101 SUPPLE, 102 /** 103 * Indicator of tax obligation or payment, e.g., statement of taxable income. 104 */ 105 TAX, 106 /** 107 * Codes specifying living expense indicators used to assess or establish eligibility for coverage under a policy or program. 108 */ 109 LIVEXP, 110 /** 111 * Indicator of clothing expenses. 112 */ 113 CLOTH, 114 /** 115 * Indicator of transportation expenses. 116 */ 117 FOOD, 118 /** 119 * Indicator of health expenses; including medication costs, health service costs, financial participations, and health coverage premiums. 120 */ 121 HEALTH, 122 /** 123 * Indicator of housing expense, e.g., household appliances, fixtures, furnishings, and maintenance and repairs. 124 */ 125 HOUSE, 126 /** 127 * Indicator of legal expenses. 128 */ 129 LEGAL, 130 /** 131 * Indicator of mortgage amount, interest, and payments. 132 */ 133 MORTG, 134 /** 135 * Indicator of rental or lease payments. 136 */ 137 RENT, 138 /** 139 * Indicator of transportation expenses. 140 */ 141 SUNDRY, 142 /** 143 * Indicator of transportation expenses, e.g., vehicle payments, vehicle insurance, vehicle fuel, and vehicle maintenance and repairs. 144 */ 145 TRANS, 146 /** 147 * Indicator of transportation expenses. 148 */ 149 UTIL, 150 /** 151 * Code specifying eligibility indicators used to assess or establish eligibility for coverage under a policy or program eligibility status, e.g., certificates of creditable coverage; student enrollment; adoption, marriage or birth certificate. 152 */ 153 ELSTAT, 154 /** 155 * Indicator of adoption. 156 */ 157 ADOPT, 158 /** 159 * Indicator of birth. 160 */ 161 BTHCERT, 162 /** 163 * Indicator of creditable coverage. 164 */ 165 CCOC, 166 /** 167 * Indicator of driving status. 168 */ 169 DRLIC, 170 /** 171 * Indicator of foster child status. 172 */ 173 FOSTER, 174 /** 175 * Indicator of status as covered member under a policy or program, e.g., member id card or coverage document. 176 */ 177 MEMBER, 178 /** 179 * Indicator of military status. 180 */ 181 MIL, 182 /** 183 * Indicator of marriage status. 184 */ 185 MRGCERT, 186 /** 187 * Indicator of citizenship. 188 */ 189 PASSPORT, 190 /** 191 * Indicator of student status. 192 */ 193 STUDENRL, 194 /** 195 * Code specifying non-clinical indicators related to health status used to assess or establish eligibility for coverage under a policy or program, e.g., pregnancy, disability, drug use, mental health issues. 196 */ 197 HLSTAT, 198 /** 199 * Indication of disability. 200 */ 201 DISABLE, 202 /** 203 * Indication of drug use. 204 */ 205 DRUG, 206 /** 207 * Indication of IV drug use . 208 */ 209 IVDRG, 210 /** 211 * Non-clinical report of pregnancy. 212 */ 213 PGNT, 214 /** 215 * Code specifying observations related to living dependency, such as dependent upon spouse for activities of daily living. 216 */ 217 LIVDEP, 218 /** 219 * Continued living in private residence requires functional and health care assistance from one or more relatives. 220 */ 221 RELDEP, 222 /** 223 * Continued living in private residence requires functional and health care assistance from spouse or life partner. 224 */ 225 SPSDEP, 226 /** 227 * Continued living in private residence requires functional and health care assistance from one or more unrelated persons. 228 */ 229 URELDEP, 230 /** 231 * Code specifying observations related to living situation for a person in a private residence. 232 */ 233 LIVSIT, 234 /** 235 * Living alone. Maps to PD1-2 Living arrangement (IS) 00742 [A] 236 */ 237 ALONE, 238 /** 239 * Living with one or more dependent children requiring moderate supervision. 240 */ 241 DEPCHD, 242 /** 243 * Living with disabled spouse requiring functional and health care assistance 244 */ 245 DEPSPS, 246 /** 247 * Living with one or more dependent children requiring intensive supervision 248 */ 249 DEPYGCHD, 250 /** 251 * Living with family. Maps to PD1-2 Living arrangement (IS) 00742 [F] 252 */ 253 FAM, 254 /** 255 * Living with one or more relatives. Maps to PD1-2 Living arrangement (IS) 00742 [R] 256 */ 257 RELAT, 258 /** 259 * Living only with spouse or life partner. Maps to PD1-2 Living arrangement (IS) 00742 [S] 260 */ 261 SPS, 262 /** 263 * Living with one or more unrelated persons. 264 */ 265 UNREL, 266 /** 267 * Code specifying observations or indicators related to socio-economic status used to assess to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. 268 */ 269 SOECSTAT, 270 /** 271 * Indication of abuse victim. 272 */ 273 ABUSE, 274 /** 275 * Indication of status as homeless. 276 */ 277 HMLESS, 278 /** 279 * Indication of status as illegal immigrant. 280 */ 281 ILGIM, 282 /** 283 * Indication of status as incarcerated. 284 */ 285 INCAR, 286 /** 287 * Indication of probation status. 288 */ 289 PROB, 290 /** 291 * Indication of refugee status. 292 */ 293 REFUG, 294 /** 295 * Indication of unemployed status. 296 */ 297 UNEMPL, 298 /** 299 * Indicates the result of a particular allergy test. E.g. Negative, Mild, Moderate, Severe 300 */ 301 _ALLERGYTESTVALUE, 302 /** 303 * Description:Patient exhibits no reaction to the challenge agent. 304 */ 305 A0, 306 /** 307 * Description:Patient exhibits a minimal reaction to the challenge agent. 308 */ 309 A1, 310 /** 311 * Description:Patient exhibits a mild reaction to the challenge agent. 312 */ 313 A2, 314 /** 315 * Description:Patient exhibits moderate reaction to the challenge agent. 316 */ 317 A3, 318 /** 319 * Description:Patient exhibits a severe reaction to the challenge agent. 320 */ 321 A4, 322 /** 323 * Description:Coded observation values for coverage limitations, for e.g., types of claims or types of parties covered under a policy or program. 324 */ 325 _COVERAGELIMITOBSERVATIONVALUE, 326 /** 327 * Description:Coded observation values for types of covered parties under a policy or program based on their personal relationships or employment status. 328 */ 329 _COVERAGELEVELOBSERVATIONVALUE, 330 /** 331 * Description:Child over an age as specified by coverage policy or program, e.g., student, differently abled, and income dependent. 332 */ 333 ADC, 334 /** 335 * Description:Dependent biological, adopted, foster child as specified by coverage policy or program. 336 */ 337 CHD, 338 /** 339 * Description:Person requiring functional and/or financial assistance from another person as specified by coverage policy or program. 340 */ 341 DEP, 342 /** 343 * Description:Persons registered as a family unit in a domestic partner registry as specified by law and by coverage policy or program. 344 */ 345 DP, 346 /** 347 * Description:An individual employed by an employer who receive remuneration in wages, salary, commission, tips, piece-rates, or pay-in-kind through the employeraTMs payment system (i.e., not a contractor) as specified by coverage policy or program. 348 */ 349 ECH, 350 /** 351 * Description:As specified by coverage policy or program. 352 */ 353 FLY, 354 /** 355 * Description:Person as specified by coverage policy or program. 356 */ 357 IND, 358 /** 359 * Description:A pair of people of the same gender who live together as a family as specified by coverage policy or program, e.g., Naomi and Ruth from the Book of Ruth; Socrates and Alcibiades 360 */ 361 SSP, 362 /** 363 * A clinical judgment as to the worst case result of a future exposure (including substance administration). When the worst case result is assessed to have a life-threatening or organ system threatening potential, it is considered to be of high criticality. 364 */ 365 _CRITICALITYOBSERVATIONVALUE, 366 /** 367 * Worst case result of a future exposure is assessed to be life-threatening or having high potential for organ system failure. 368 */ 369 CRITH, 370 /** 371 * Worst case result of a future exposure is not assessed to be life-threatening or having high potential for organ system failure. 372 */ 373 CRITL, 374 /** 375 * Unable to assess the worst case result of a future exposure. 376 */ 377 CRITU, 378 /** 379 * Description: The domain contains genetic analysis specific observation values, e.g. Homozygote, Heterozygote, etc. 380 */ 381 _GENETICOBSERVATIONVALUE, 382 /** 383 * Description: An individual having different alleles at one or more loci regarding a specific character 384 */ 385 HOMOZYGOTE, 386 /** 387 * Observation values used to indicate the type of scoring (e.g. proportion, ratio) used by a health quality measure. 388 */ 389 _OBSERVATIONMEASURESCORING, 390 /** 391 * A measure in which either short-term cross-section or long-term longitudinal analysis is performed over a group of subjects defined by a set of common properties or defining characteristics (e.g., Male smokers between the ages of 40 and 50 years, exposure to treatment, exposure duration). 392 */ 393 COHORT, 394 /** 395 * A measure score in which each individual value for the measure can fall anywhere along a continuous scale (e.g., mean time to thrombolytics which aggregates the time in minutes from a case presenting with chest pain to the time of administration of thrombolytics). 396 */ 397 CONTVAR, 398 /** 399 * A score derived by dividing the number of cases that meet a criterion for quality (the numerator) by the number of eligible cases within a given time frame (the denominator) where the numerator cases are a subset of the denominator cases (e.g., percentage of eligible women with a mammogram performed in the last year). 400 */ 401 PROPOR, 402 /** 403 * A score that may have a value of zero or greater that is derived by dividing a count of one type of data by a count of another type of data (e.g., the number of patients with central lines who develop infection divided by the number of central line days). 404 */ 405 RATIO, 406 /** 407 * Observation values used to indicate what kind of health quality measure is used. 408 */ 409 _OBSERVATIONMEASURETYPE, 410 /** 411 * A measure that is composed from one or more other measures and indicates an overall summary of those measures. 412 */ 413 COMPOSITE, 414 /** 415 * A measure related to the efficiency of medical treatment. 416 */ 417 EFFICIENCY, 418 /** 419 * A measure related to the level of patient engagement or patient experience of care. 420 */ 421 EXPERIENCE, 422 /** 423 * A measure that indicates the result of the performance (or non-performance) of a function or process. 424 */ 425 OUTCOME, 426 /** 427 * A measure which focuses on a process which leads to a certain outcome, meaning that a scientific basis exists for believing that the process, when executed well, will increase the probability of achieving a desired outcome. 428 */ 429 PROCESS, 430 /** 431 * A measure related to the extent of use of clinical resources or cost of care. 432 */ 433 RESOURCE, 434 /** 435 * A measure related to the structure of patient care. 436 */ 437 STRUCTURE, 438 /** 439 * Observation values used to assert various populations that a subject falls into. 440 */ 441 _OBSERVATIONPOPULATIONINCLUSION, 442 /** 443 * Patients who should be removed from the eMeasure population and denominator before determining if numerator criteria are met. Denominator exclusions are used in proportion and ratio measures to help narrow the denominator. 444 */ 445 DENEX, 446 /** 447 * Denominator exceptions are those conditions that should remove a patient, procedure or unit of measurement from the denominator only if the numerator criteria are not met. Denominator exceptions allow for adjustment of the calculated score for those providers with higher risk populations. Denominator exceptions are used only in proportion eMeasures. They are not appropriate for ratio or continuous variable eMeasures. Denominator exceptions allow for the exercise of clinical judgment and should be specifically defined where capturing the information in a structured manner fits the clinical workflow. Generic denominator exception reasons used in proportion eMeasures fall into three general categories: 448 449 450 Medical reasons 451 Patient reasons 452 System reasons 453 */ 454 DENEXCEP, 455 /** 456 * It can be the same as the initial patient population or a subset of the initial patient population to further constrain the population for the purpose of the eMeasure. Different measures within an eMeasure set may have different Denominators. Continuous Variable eMeasures do not have a Denominator, but instead define a Measure Population. 457 */ 458 DENOM, 459 /** 460 * The initial population refers to all entities to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. 461 */ 462 IP, 463 /** 464 * The initial patient population refers to all patients to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. Details often include information based upon specific age groups, diagnoses, diagnostic and procedure codes, and enrollment periods. 465 */ 466 IPP, 467 /** 468 * Measure population is used only in continuous variable eMeasures. It is a narrative description of the eMeasure population. 469(e.g., all patients seen in the Emergency Department during the measurement period). 470 */ 471 MSRPOPL, 472 /** 473 * Numerators are used in proportion and ratio eMeasures. In proportion measures the numerator criteria are the processes or outcomes expected for each patient, procedure, or other unit of measurement defined in the denominator. In ratio measures the numerator is related, but not directly derived from the denominator (e.g., a numerator listing the number of central line blood stream infections and a denominator indicating the days per thousand of central line usage in a specific time period). 474 */ 475 NUMER, 476 /** 477 * Numerator Exclusions are used only in ratio eMeasures to define instances that should not be included in the numerator data. (e.g., if the number of central line blood stream infections per 1000 catheter days were to exclude infections with a specific bacterium, that bacterium would be listed as a numerator exclusion.) 478 */ 479 NUMEX, 480 /** 481 * PartialCompletionScale 482 */ 483 _PARTIALCOMPLETIONSCALE, 484 /** 485 * Value for Act.partialCompletionCode attribute that implies 81-99% completion 486 */ 487 G, 488 /** 489 * Value for Act.partialCompletionCode attribute that implies 61-80% completion 490 */ 491 LE, 492 /** 493 * Value for Act.partialCompletionCode attribute that implies 41-60% completion 494 */ 495 ME, 496 /** 497 * Value for Act.partialCompletionCode attribute that implies 1-20% completion 498 */ 499 MI, 500 /** 501 * Value for Act.partialCompletionCode attribute that implies 0% completion 502 */ 503 N, 504 /** 505 * Value for Act.partialCompletionCode attribute that implies 21-40% completion 506 */ 507 S, 508 /** 509 * Observation values used to indicate security observation metadata. 510 */ 511 _SECURITYOBSERVATIONVALUE, 512 /** 513 * Abstract security observation values used to indicate security integrity metadata. 514 515 516 Examples: Codes conveying integrity status, integrity confidence, and provenance. 517 */ 518 _SECINTOBV, 519 /** 520 * Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability) 521 */ 522 _SECALTINTOBV, 523 /** 524 * Security metadata observation values used to indicate the use of a more abstract version of the content, e.g., replacing exact value of an age or date field with a range, or remove the left digits of a credit card number or SSN. 525 */ 526 ABSTRED, 527 /** 528 * Security metadata observation values used to indicate the use of an algorithmic combination of actual values with the result of an aggregate function, e.g., average, sum, or count in order to limit disclosure of an IT resource (data, information object, service, or system capability) to the minimum necessary. 529 */ 530 AGGRED, 531 /** 532 * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by used to indicate the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject. No key to relink the data is retained. 533 */ 534 ANONYED, 535 /** 536 * Security metadata observation value used to indicate that the IT resource semantic content has been transformed from one encoding to another. 537 538 539 Usage Note: "MAP" code does not indicate the semantic fidelity of the transformed content. 540 541 To indicate semantic fidelity for maps of HL7 to other code systems, this security alteration integrity observation may be further specified using an Act valued with Value Set: MapRelationship (2.16.840.1.113883.1.11.11052). 542 543 Semantic fidelity of the mapped IT Resource may also be indicated using a SecurityIntegrityConfidenceObservation. 544 */ 545 MAPPED, 546 /** 547 * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by indicating the mechanism by which software systems can make data unintelligible (that is, as unreadable and unusable by algorithmically transforming plaintext into ciphertext) such that it can only be accessed or used by authorized users. An authorized user may be provided a key to decrypt per license or "shared secret". 548 549 550 Usage Note: "MASKED" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has been further encrypted, and may be accessed only by an authorized user or receiver to which a decryption key is provided. 551 */ 552 MASKED, 553 /** 554 * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability), by indicating the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject. Custodian may retain a key to relink data necessary to reidentify the information subject. 555 556 557 Rationale: Personal data which has been processed to make it impossible to know whose data it is. Used particularly for secondary use of health data. In some cases, it may be possible for authorized individuals to restore the identity of the individual, e.g.,for public health case management. Based on ISO/TS 25237:2008 Health informatics—Pseudonymization 558 */ 559 PSEUDED, 560 /** 561 * Security metadata observation value used to indicate the mechanism by which software systems can filter an IT resource (data, information object, service, or system capability) to remove any portion of the resource that is not authorized to be access, used, or disclosed. 562 563 564 Usage Note: "REDACTED" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has filtered and not included in the content accessed or received. 565 */ 566 REDACTED, 567 /** 568 * Metadata observation used to indicate that some information has been removed from the source object when the view this object contains was constructed because of configuration options when the view was created. The content may not be suitable for use as the basis of a record update 569 570 571 Usage Note: This is not suitable to be used when information is removed for security reasons - see the code REDACTED for this use. 572 */ 573 SUBSETTED, 574 /** 575 * Security metadata observation value used to indicate that the IT resource syntax has been transformed from one syntactical representation to another. 576 577 578 Usage Note: "SYNTAC" code does not indicate the syntactical correctness of the syntactically transformed IT resource. 579 */ 580 SYNTAC, 581 /** 582 * Security metadata observation value used to indicate that the IT resource has been translated from one human language to another. 583 584 585 Usage Note: "TRSLT" does not indicate the fidelity of the translation or the languages translated. 586 587 The fidelity of the IT Resource translation may be indicated using a SecurityIntegrityConfidenceObservation. 588 589 To indicate languages, use the Value Set:HumanLanguage (2.16.840.1.113883.1.11.11526) 590 */ 591 TRSLT, 592 /** 593 * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) which indicates that the resource only retains versions of an IT resource for access and use per applicable policy 594 595 596 Usage Note: When this code is used, expectation is that the system has removed historical versions of the data that falls outside the time period deemed to be the effective time of the applicable version. 597 */ 598 VERSIONED, 599 /** 600 * Abstract security observation values used to indicate data integrity metadata. 601 602 603 Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function. 604 */ 605 _SECDATINTOBV, 606 /** 607 * Security metadata observation value used to indicate the mechanism by which software systems can establish that data was not modified in transit. 608 609 610 Rationale: This definition is intended to align with the ISO 22600-2 3.3.19 definition of cryptographic checkvalue: Information which is derived by performing a cryptographic transformation (see cryptography) on the data unit. The derivation of the checkvalue may be performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit. 611 612 613 Examples: 614 615 616 617 SHA-1 618 SHA-2 (Secure Hash Algorithm) 619 */ 620 CRYTOHASH, 621 /** 622 * Security metadata observation value used to indicate the mechanism by which software systems use digital signature to establish that data has not been modified. 623 624 625 Rationale: This definition is intended to align with the ISO 22600-2 3.3.26 definition of digital signature: Data appended to, or a cryptographic transformation (see cryptography) of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g., by the recipient. 626 */ 627 DIGSIG, 628 /** 629 * Abstract security observation value used to indicate integrity confidence metadata. 630 631 632 Examples: Codes conveying the level of reliability and trustworthiness of an IT resource. 633 */ 634 _SECINTCONOBV, 635 /** 636 * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be very high. 637 */ 638 HRELIABLE, 639 /** 640 * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be adequate. 641 */ 642 RELIABLE, 643 /** 644 * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be uncertain. 645 */ 646 UNCERTREL, 647 /** 648 * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be inadequate. 649 */ 650 UNRELIABLE, 651 /** 652 * Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability). 653 654 655 Examples: Codes conveying the provenance metadata about the entity reporting an IT resource. 656 */ 657 _SECINTPRVOBV, 658 /** 659 * Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability). 660 661 662 Examples: Codes conveying the provenance metadata about the entity asserting the resource. 663 */ 664 _SECINTPRVABOBV, 665 /** 666 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a clinician. 667 */ 668 CLINAST, 669 /** 670 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a device. 671 */ 672 DEVAST, 673 /** 674 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a healthcare professional. 675 */ 676 HCPAST, 677 /** 678 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient acquaintance. 679 */ 680 PACQAST, 681 /** 682 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient. 683 */ 684 PATAST, 685 /** 686 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a payer. 687 */ 688 PAYAST, 689 /** 690 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a professional. 691 */ 692 PROAST, 693 /** 694 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a substitute decision maker. 695 */ 696 SDMAST, 697 /** 698 * Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability). 699 700 701 Examples: Codes conveying the provenance metadata about the entity reporting an IT resource. 702 */ 703 _SECINTPRVRBOBV, 704 /** 705 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a clinician. 706 */ 707 CLINRPT, 708 /** 709 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a device. 710 */ 711 DEVRPT, 712 /** 713 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a healthcare professional. 714 */ 715 HCPRPT, 716 /** 717 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient acquaintance. 718 */ 719 PACQRPT, 720 /** 721 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient. 722 */ 723 PATRPT, 724 /** 725 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a payer. 726 */ 727 PAYRPT, 728 /** 729 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a professional. 730 */ 731 PRORPT, 732 /** 733 * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a substitute decision maker. 734 */ 735 SDMRPT, 736 /** 737 * Observation value used to indicate aspects of trust applicable to an IT resource (data, information object, service, or system capability). 738 */ 739 SECTRSTOBV, 740 /** 741 * Values for security trust accreditation metadata observation made about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework. 742 */ 743 TRSTACCRDOBV, 744 /** 745 * Values for security trust agreement metadata observation made about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1] 746[ISO IEC 10181-1] 747 */ 748 TRSTAGREOBV, 749 /** 750 * Values for security trust certificate metadata observation made about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1] 751 752 For example, a Certificate Policy (CP), which is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. A particular Certificate Policy might indicate the applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range. Another example is Cross Certification with Federal Bridge. 753 */ 754 TRSTCERTOBV, 755 /** 756 * Values for security trust assurance metadata observation made about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol. 757 */ 758 TRSTLOAOBV, 759 /** 760 * The value assigned as the indicator of the digital quality or reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 761 762 For example, the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 763 */ 764 LOAAN, 765 /** 766 * Indicator of low digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 767 768 The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 769 770 Low authentication level of assurance indicates that the relying party may have little or no confidence in the asserted identity's validity. Level 1 requires little or no confidence in the asserted identity. No identity proofing is required at this level, but the authentication mechanism should provide some assurance that the same claimant is accessing the protected transaction or data. A wide range of available authentication technologies can be employed and any of the token methods of Levels 2, 3, or 4, including Personal Identification Numbers (PINs), may be used. To be authenticated, the claimant must prove control of the token through a secure authentication protocol. At Level 1, long-term shared authentication secrets may be revealed to verifiers. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 771 */ 772 LOAAN1, 773 /** 774 * Indicator of basic digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 775 776 The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 777 778 Basic authentication level of assurance indicates that the relying party may have some confidence in the asserted identity's validity. Level 2 requires confidence that the asserted identity is accurate. Level 2 provides for single-factor remote network authentication, including identity-proofing requirements for presentation of identifying materials or information. A wide range of available authentication technologies can be employed, including any of the token methods of Levels 3 or 4, as well as passwords. Successful authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, and online guessing attacks are prevented. 779Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are required. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 780 */ 781 LOAAN2, 782 /** 783 * Indicator of medium digital quality or reliability of the digital reliability of verification and validation of the process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 784 785 The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 786 787 Medium authentication level of assurance indicates that the relying party may have high confidence in the asserted identity's validity. Level 3 is appropriate for transactions that need high confidence in the accuracy of the asserted identity. Level 3 provides multifactor remote network authentication. At this level, identity-proofing procedures require verification of identifying materials and information. Authentication is based on proof of possession of a key or password through a cryptographic protocol. Cryptographic strength mechanisms should protect the primary authentication token (a cryptographic key) against compromise by the protocol threats, including eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks. A minimum of two authentication factors is required. Three kinds of tokens may be used: 788 789 790 "soft" cryptographic token, which has the key stored on a general-purpose computer, 791 "hard" cryptographic token, which has the key stored on a special hardware device, and 792 "one-time password" device token, which has symmetric key stored on a personal hardware device that is a cryptographic module validated at FIPS 140-2 Level 1 or higher. Validation testing of cryptographic modules and algorithms for conformance to Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, is managed by NIST. 793 794 Authentication requires that the claimant prove control of the token through a secure authentication protocol. The token must be unlocked with a password or biometric representation, or a password must be used in a secure authentication protocol, to establish two-factor authentication. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are used for all operations. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 795 */ 796 LOAAN3, 797 /** 798 * Indicator of high digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 799 800 The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 801 802 High authentication level of assurance indicates that the relying party may have very high confidence in the asserted identity's validity. Level 4 is for transactions that need very high confidence in the accuracy of the asserted identity. Level 4 provides the highest practical assurance of remote network authentication. Authentication is based on proof of possession of a key through a cryptographic protocol. This level is similar to Level 3 except that only “hard� cryptographic tokens are allowed, cryptographic module validation requirements are strengthened, and subsequent critical data transfers must be authenticated via a key that is bound to the authentication process. The token should be a hardware cryptographic module validated at FIPS 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. This level requires a physical token, which cannot readily be copied, and operator authentication at Level 2 and higher, and ensures good, two-factor remote authentication. 803 804 Level 4 requires strong cryptographic authentication of all parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks are prevented. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Strong approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 805 */ 806 LOAAN4, 807 /** 808 * The value assigned as the indicator of the digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 809 */ 810 LOAAP, 811 /** 812 * Indicator of the low digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 813 814 Low authentication process level of assurance indicates that (1) long-term shared authentication secrets may be revealed to verifiers; and (2) assertions and assertion references require protection from manufacture/modification and reuse attacks. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 815 */ 816 LOAAP1, 817 /** 818 * Indicator of the basic digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 819 820 Basic authentication process level of assurance indicates that long-term shared authentication secrets are never revealed to any other party except Credential Service Provider (CSP). Sessions (temporary) shared secrets may be provided to independent verifiers by CSP. Long-term shared authentication secrets, if used, are never revealed to any other party except Verifiers operated by the Credential Service Provider (CSP); however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 1 requirements, assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 821 */ 822 LOAAP2, 823 /** 824 * Indicator of the medium digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 825 826 Medium authentication process level of assurance indicates that the token can be unlocked with password, biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication. Long-term shared authentication secrets are never revealed to any party except the Claimant and Credential Service Provider (CSP). 827 828 Authentication requires that the Claimant prove, through a secure authentication protocol, that he or she controls the token. The Claimant unlocks the token with a password or biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication (through proof of possession of a physical or software token in combination with some memorized secret knowledge). Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 2 requirements, assertions are protected against repudiation by the Verifier. 829 */ 830 LOAAP3, 831 /** 832 * Indicator of the high digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2] 833 834 High authentication process level of assurance indicates all sensitive data transfer are cryptographically authenticated using keys bound to the authentication process. Level 4 requires strong cryptographic authentication of all communicating parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the Claimant prove through a secure authentication protocol that he or she controls the token. All protocol threats at Level 3 are required to be prevented at Level 4. Protocols shall also be strongly resistant to man-in-the-middle attacks. Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. Approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 835 */ 836 LOAAP4, 837 /** 838 * The value assigned as the indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 839 */ 840 LOAAS, 841 /** 842 * Indicator of the low quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 843 844 Assertions and assertion references require protection from modification and reuse attacks. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 845 */ 846 LOAAS1, 847 /** 848 * Indicator of the basic quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 849 850 Assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required for all assertion protocols. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 851 */ 852 LOAAS2, 853 /** 854 * Indicator of the medium quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 855 856 Assertions are protected against repudiation by the verifier. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 857 */ 858 LOAAS3, 859 /** 860 * Indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes. 861 862 Strongly resistant to man-in-the-middle attacks. "Bearer" assertions are not used. "Holder-of-key" assertions may be used. RP maintains records of the assertions. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.] 863 */ 864 LOAAS4, 865 /** 866 * Indicator of the digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 867 */ 868 LOACM, 869 /** 870 * Indicator of the low digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Little or no confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include weak identity binding to tokens and plaintext passwords or secrets not transmitted across a network. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 871 */ 872 LOACM1, 873 /** 874 * Indicator of the basic digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Some confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verification must prove claimant controls the token; token resists online guessing, replay, session hijacking, and eavesdropping attacks; and token is at least weakly resistant to man-in-the middle attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 875 */ 876 LOACM2, 877 /** 878 * Indicator of the medium digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity. High confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Ownership of token verifiable through security authentication protocol and credential management protects against verifier impersonation attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 879 */ 880 LOACM3, 881 /** 882 * Indicator of the high digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity. Very high confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verifier can prove control of token through a secure protocol; credential management supports strong cryptographic authentication of all communication parties. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 883 */ 884 LOACM4, 885 /** 886 * Indicator of the quality or reliability in the process of ascertaining that an individual is who he or she claims to be. 887 */ 888 LOAID, 889 /** 890 * Indicator of low digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires that a continuity of identity be maintained but does not require identity proofing. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 891 */ 892 LOAID1, 893 /** 894 * Indicator of some digital quality or reliability in the process of ascertaining that that an individual is who he or she claims to be. Requires identity proofing via presentation of identifying material or information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 895 */ 896 LOAID2, 897 /** 898 * Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 899 */ 900 LOAID3, 901 /** 902 * Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 903 */ 904 LOAID4, 905 /** 906 * Indicator of the digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 907 */ 908 LOANR, 909 /** 910 * Indicator of low digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 911 */ 912 LOANR1, 913 /** 914 * Indicator of basic digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 915 */ 916 LOANR2, 917 /** 918 * Indicator of medium digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 919 */ 920 LOANR3, 921 /** 922 * Indicator of high digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2] 923 */ 924 LOANR4, 925 /** 926 * Indicator of the digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2] 927 */ 928 LOARA, 929 /** 930 * Indicator of low digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2] 931 */ 932 LOARA1, 933 /** 934 * Indicator of basic digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2] 935 */ 936 LOARA2, 937 /** 938 * Indicator of medium digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2] 939 */ 940 LOARA3, 941 /** 942 * Indicator of high digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization's security controls. [Based on NIST SP 800-63-2] 943 */ 944 LOARA4, 945 /** 946 * Indicator of the digital quality or reliability of single and multi-token authentication. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 947 */ 948 LOATK, 949 /** 950 * Indicator of the low digital quality or reliability of single and multi-token authentication. Permits the use of any of the token methods of Levels 2, 3, or 4. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 951 */ 952 LOATK1, 953 /** 954 * Indicator of the basic digital quality or reliability of single and multi-token authentication. Requires single factor authentication using memorized secret tokens, pre-registered knowledge tokens, look-up secret tokens, out of band tokens, or single factor one-time password devices. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 955 */ 956 LOATK2, 957 /** 958 * Indicator of the medium digital quality or reliability of single and multi-token authentication. Requires two authentication factors. Provides multi-factor remote network authentication. Permits multi-factor software cryptographic token. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 959 */ 960 LOATK3, 961 /** 962 * Indicator of the high digital quality or reliability of single and multi-token authentication. Requires token that is a hardware cryptographic module validated at validated at Federal Information Processing Standard (FIPS) 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. Level 4 token requirements can be met by using the PIV authentication key of a FIPS 201 compliant Personal Identity Verification (PIV) Card. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011] 963 */ 964 LOATK4, 965 /** 966 * Values for security trust mechanism metadata observation made about a security architecture system component that supports enforcement of security policies. 967 */ 968 TRSTMECOBV, 969 /** 970 * Potential values for observations of severity. 971 */ 972 _SEVERITYOBSERVATION, 973 /** 974 * Indicates the condition may be life-threatening or has the potential to cause permanent injury. 975 */ 976 H, 977 /** 978 * Indicates the condition may result in some adverse consequences but is unlikely to substantially affect the situation of the subject. 979 */ 980 L, 981 /** 982 * Indicates the condition may result in noticable adverse adverse consequences but is unlikely to be life-threatening or cause permanent injury. 983 */ 984 M, 985 /** 986 * Contains codes for defining the observed, physical position of a subject, such as during an observation, assessment, collection of a specimen, etc. ECG waveforms and vital signs, such as blood pressure, are two examples where a general, observed position typically needs to be noted. 987 */ 988 _SUBJECTBODYPOSITION, 989 /** 990 * Lying on the left side. 991 */ 992 LLD, 993 /** 994 * Lying with the front or ventral surface downward; lying face down. 995 */ 996 PRN, 997 /** 998 * Lying on the right side. 999 */ 1000 RLD, 1001 /** 1002 * A semi-sitting position in bed with the head of the bed elevated approximately 45 degrees. 1003 */ 1004 SFWL, 1005 /** 1006 * Resting the body on the buttocks, typically with upper torso erect or semi erect. 1007 */ 1008 SIT, 1009 /** 1010 * To be stationary, upright, vertical, on one's legs. 1011 */ 1012 STN, 1013 /** 1014 * supine 1015 */ 1016 SUP, 1017 /** 1018 * Lying on the back, on an inclined plane, typically about 30-45 degrees with head raised and feet lowered. 1019 */ 1020 RTRD, 1021 /** 1022 * Lying on the back, on an inclined plane, typically about 30-45 degrees, with head lowered and feet raised. 1023 */ 1024 TRD, 1025 /** 1026 * Values for observations of verification act results 1027 1028 1029 Examples: Verified, not verified, verified with warning. 1030 */ 1031 _VERIFICATIONOUTCOMEVALUE, 1032 /** 1033 * Definition: Coverage is in effect for healthcare service(s) and/or product(s). 1034 */ 1035 ACT, 1036 /** 1037 * Definition: Coverage is in effect for healthcare service(s) and/or product(s) - Pending Investigation 1038 */ 1039 ACTPEND, 1040 /** 1041 * Definition: Coverage is in effect for healthcare service(s) and/or product(s). 1042 */ 1043 ELG, 1044 /** 1045 * Definition: Coverage is not in effect for healthcare service(s) and/or product(s). 1046 */ 1047 INACT, 1048 /** 1049 * Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Investigation. 1050 */ 1051 INPNDINV, 1052 /** 1053 * Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Eligibility Update. 1054 */ 1055 INPNDUPD, 1056 /** 1057 * Definition: Coverage is not in effect for healthcare service(s) and/or product(s). May optionally include reasons for the ineligibility. 1058 */ 1059 NELG, 1060 /** 1061 * AnnotationValue 1062 */ 1063 _ANNOTATIONVALUE, 1064 /** 1065 * Description:Used in a patient care message to value simple clinical (non-lab) observations. 1066 */ 1067 _COMMONCLINICALOBSERVATIONVALUE, 1068 /** 1069 * This domain is established as a parent to a variety of value domains being defined to support the communication of Individual Case Safety Reports to regulatory bodies. Arguably, this aggregation is not taxonomically pure, but the grouping will facilitate the management of these domains. 1070 */ 1071 _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS, 1072 /** 1073 * Indicates the specific observation result which is the reason for the action (prescription, lab test, etc.). E.g. Headache, Ear infection, planned diagnostic image (requiring contrast agent), etc. 1074 */ 1075 _INDICATIONVALUE, 1076 /** 1077 * added to help the parsers 1078 */ 1079 NULL; 1080 public static V3ObservationValue fromCode(String codeString) throws FHIRException { 1081 if (codeString == null || "".equals(codeString)) 1082 return null; 1083 if ("_ActCoverageAssessmentObservationValue".equals(codeString)) 1084 return _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE; 1085 if ("_ActFinancialStatusObservationValue".equals(codeString)) 1086 return _ACTFINANCIALSTATUSOBSERVATIONVALUE; 1087 if ("ASSET".equals(codeString)) 1088 return ASSET; 1089 if ("ANNUITY".equals(codeString)) 1090 return ANNUITY; 1091 if ("PROP".equals(codeString)) 1092 return PROP; 1093 if ("RETACCT".equals(codeString)) 1094 return RETACCT; 1095 if ("TRUST".equals(codeString)) 1096 return TRUST; 1097 if ("INCOME".equals(codeString)) 1098 return INCOME; 1099 if ("CHILD".equals(codeString)) 1100 return CHILD; 1101 if ("DISABL".equals(codeString)) 1102 return DISABL; 1103 if ("INVEST".equals(codeString)) 1104 return INVEST; 1105 if ("PAY".equals(codeString)) 1106 return PAY; 1107 if ("RETIRE".equals(codeString)) 1108 return RETIRE; 1109 if ("SPOUSAL".equals(codeString)) 1110 return SPOUSAL; 1111 if ("SUPPLE".equals(codeString)) 1112 return SUPPLE; 1113 if ("TAX".equals(codeString)) 1114 return TAX; 1115 if ("LIVEXP".equals(codeString)) 1116 return LIVEXP; 1117 if ("CLOTH".equals(codeString)) 1118 return CLOTH; 1119 if ("FOOD".equals(codeString)) 1120 return FOOD; 1121 if ("HEALTH".equals(codeString)) 1122 return HEALTH; 1123 if ("HOUSE".equals(codeString)) 1124 return HOUSE; 1125 if ("LEGAL".equals(codeString)) 1126 return LEGAL; 1127 if ("MORTG".equals(codeString)) 1128 return MORTG; 1129 if ("RENT".equals(codeString)) 1130 return RENT; 1131 if ("SUNDRY".equals(codeString)) 1132 return SUNDRY; 1133 if ("TRANS".equals(codeString)) 1134 return TRANS; 1135 if ("UTIL".equals(codeString)) 1136 return UTIL; 1137 if ("ELSTAT".equals(codeString)) 1138 return ELSTAT; 1139 if ("ADOPT".equals(codeString)) 1140 return ADOPT; 1141 if ("BTHCERT".equals(codeString)) 1142 return BTHCERT; 1143 if ("CCOC".equals(codeString)) 1144 return CCOC; 1145 if ("DRLIC".equals(codeString)) 1146 return DRLIC; 1147 if ("FOSTER".equals(codeString)) 1148 return FOSTER; 1149 if ("MEMBER".equals(codeString)) 1150 return MEMBER; 1151 if ("MIL".equals(codeString)) 1152 return MIL; 1153 if ("MRGCERT".equals(codeString)) 1154 return MRGCERT; 1155 if ("PASSPORT".equals(codeString)) 1156 return PASSPORT; 1157 if ("STUDENRL".equals(codeString)) 1158 return STUDENRL; 1159 if ("HLSTAT".equals(codeString)) 1160 return HLSTAT; 1161 if ("DISABLE".equals(codeString)) 1162 return DISABLE; 1163 if ("DRUG".equals(codeString)) 1164 return DRUG; 1165 if ("IVDRG".equals(codeString)) 1166 return IVDRG; 1167 if ("PGNT".equals(codeString)) 1168 return PGNT; 1169 if ("LIVDEP".equals(codeString)) 1170 return LIVDEP; 1171 if ("RELDEP".equals(codeString)) 1172 return RELDEP; 1173 if ("SPSDEP".equals(codeString)) 1174 return SPSDEP; 1175 if ("URELDEP".equals(codeString)) 1176 return URELDEP; 1177 if ("LIVSIT".equals(codeString)) 1178 return LIVSIT; 1179 if ("ALONE".equals(codeString)) 1180 return ALONE; 1181 if ("DEPCHD".equals(codeString)) 1182 return DEPCHD; 1183 if ("DEPSPS".equals(codeString)) 1184 return DEPSPS; 1185 if ("DEPYGCHD".equals(codeString)) 1186 return DEPYGCHD; 1187 if ("FAM".equals(codeString)) 1188 return FAM; 1189 if ("RELAT".equals(codeString)) 1190 return RELAT; 1191 if ("SPS".equals(codeString)) 1192 return SPS; 1193 if ("UNREL".equals(codeString)) 1194 return UNREL; 1195 if ("SOECSTAT".equals(codeString)) 1196 return SOECSTAT; 1197 if ("ABUSE".equals(codeString)) 1198 return ABUSE; 1199 if ("HMLESS".equals(codeString)) 1200 return HMLESS; 1201 if ("ILGIM".equals(codeString)) 1202 return ILGIM; 1203 if ("INCAR".equals(codeString)) 1204 return INCAR; 1205 if ("PROB".equals(codeString)) 1206 return PROB; 1207 if ("REFUG".equals(codeString)) 1208 return REFUG; 1209 if ("UNEMPL".equals(codeString)) 1210 return UNEMPL; 1211 if ("_AllergyTestValue".equals(codeString)) 1212 return _ALLERGYTESTVALUE; 1213 if ("A0".equals(codeString)) 1214 return A0; 1215 if ("A1".equals(codeString)) 1216 return A1; 1217 if ("A2".equals(codeString)) 1218 return A2; 1219 if ("A3".equals(codeString)) 1220 return A3; 1221 if ("A4".equals(codeString)) 1222 return A4; 1223 if ("_CoverageLimitObservationValue".equals(codeString)) 1224 return _COVERAGELIMITOBSERVATIONVALUE; 1225 if ("_CoverageLevelObservationValue".equals(codeString)) 1226 return _COVERAGELEVELOBSERVATIONVALUE; 1227 if ("ADC".equals(codeString)) 1228 return ADC; 1229 if ("CHD".equals(codeString)) 1230 return CHD; 1231 if ("DEP".equals(codeString)) 1232 return DEP; 1233 if ("DP".equals(codeString)) 1234 return DP; 1235 if ("ECH".equals(codeString)) 1236 return ECH; 1237 if ("FLY".equals(codeString)) 1238 return FLY; 1239 if ("IND".equals(codeString)) 1240 return IND; 1241 if ("SSP".equals(codeString)) 1242 return SSP; 1243 if ("_CriticalityObservationValue".equals(codeString)) 1244 return _CRITICALITYOBSERVATIONVALUE; 1245 if ("CRITH".equals(codeString)) 1246 return CRITH; 1247 if ("CRITL".equals(codeString)) 1248 return CRITL; 1249 if ("CRITU".equals(codeString)) 1250 return CRITU; 1251 if ("_GeneticObservationValue".equals(codeString)) 1252 return _GENETICOBSERVATIONVALUE; 1253 if ("Homozygote".equals(codeString)) 1254 return HOMOZYGOTE; 1255 if ("_ObservationMeasureScoring".equals(codeString)) 1256 return _OBSERVATIONMEASURESCORING; 1257 if ("COHORT".equals(codeString)) 1258 return COHORT; 1259 if ("CONTVAR".equals(codeString)) 1260 return CONTVAR; 1261 if ("PROPOR".equals(codeString)) 1262 return PROPOR; 1263 if ("RATIO".equals(codeString)) 1264 return RATIO; 1265 if ("_ObservationMeasureType".equals(codeString)) 1266 return _OBSERVATIONMEASURETYPE; 1267 if ("COMPOSITE".equals(codeString)) 1268 return COMPOSITE; 1269 if ("EFFICIENCY".equals(codeString)) 1270 return EFFICIENCY; 1271 if ("EXPERIENCE".equals(codeString)) 1272 return EXPERIENCE; 1273 if ("OUTCOME".equals(codeString)) 1274 return OUTCOME; 1275 if ("PROCESS".equals(codeString)) 1276 return PROCESS; 1277 if ("RESOURCE".equals(codeString)) 1278 return RESOURCE; 1279 if ("STRUCTURE".equals(codeString)) 1280 return STRUCTURE; 1281 if ("_ObservationPopulationInclusion".equals(codeString)) 1282 return _OBSERVATIONPOPULATIONINCLUSION; 1283 if ("DENEX".equals(codeString)) 1284 return DENEX; 1285 if ("DENEXCEP".equals(codeString)) 1286 return DENEXCEP; 1287 if ("DENOM".equals(codeString)) 1288 return DENOM; 1289 if ("IP".equals(codeString)) 1290 return IP; 1291 if ("IPP".equals(codeString)) 1292 return IPP; 1293 if ("MSRPOPL".equals(codeString)) 1294 return MSRPOPL; 1295 if ("NUMER".equals(codeString)) 1296 return NUMER; 1297 if ("NUMEX".equals(codeString)) 1298 return NUMEX; 1299 if ("_PartialCompletionScale".equals(codeString)) 1300 return _PARTIALCOMPLETIONSCALE; 1301 if ("G".equals(codeString)) 1302 return G; 1303 if ("LE".equals(codeString)) 1304 return LE; 1305 if ("ME".equals(codeString)) 1306 return ME; 1307 if ("MI".equals(codeString)) 1308 return MI; 1309 if ("N".equals(codeString)) 1310 return N; 1311 if ("S".equals(codeString)) 1312 return S; 1313 if ("_SecurityObservationValue".equals(codeString)) 1314 return _SECURITYOBSERVATIONVALUE; 1315 if ("_SECINTOBV".equals(codeString)) 1316 return _SECINTOBV; 1317 if ("_SECALTINTOBV".equals(codeString)) 1318 return _SECALTINTOBV; 1319 if ("ABSTRED".equals(codeString)) 1320 return ABSTRED; 1321 if ("AGGRED".equals(codeString)) 1322 return AGGRED; 1323 if ("ANONYED".equals(codeString)) 1324 return ANONYED; 1325 if ("MAPPED".equals(codeString)) 1326 return MAPPED; 1327 if ("MASKED".equals(codeString)) 1328 return MASKED; 1329 if ("PSEUDED".equals(codeString)) 1330 return PSEUDED; 1331 if ("REDACTED".equals(codeString)) 1332 return REDACTED; 1333 if ("SUBSETTED".equals(codeString)) 1334 return SUBSETTED; 1335 if ("SYNTAC".equals(codeString)) 1336 return SYNTAC; 1337 if ("TRSLT".equals(codeString)) 1338 return TRSLT; 1339 if ("VERSIONED".equals(codeString)) 1340 return VERSIONED; 1341 if ("_SECDATINTOBV".equals(codeString)) 1342 return _SECDATINTOBV; 1343 if ("CRYTOHASH".equals(codeString)) 1344 return CRYTOHASH; 1345 if ("DIGSIG".equals(codeString)) 1346 return DIGSIG; 1347 if ("_SECINTCONOBV".equals(codeString)) 1348 return _SECINTCONOBV; 1349 if ("HRELIABLE".equals(codeString)) 1350 return HRELIABLE; 1351 if ("RELIABLE".equals(codeString)) 1352 return RELIABLE; 1353 if ("UNCERTREL".equals(codeString)) 1354 return UNCERTREL; 1355 if ("UNRELIABLE".equals(codeString)) 1356 return UNRELIABLE; 1357 if ("_SECINTPRVOBV".equals(codeString)) 1358 return _SECINTPRVOBV; 1359 if ("_SECINTPRVABOBV".equals(codeString)) 1360 return _SECINTPRVABOBV; 1361 if ("CLINAST".equals(codeString)) 1362 return CLINAST; 1363 if ("DEVAST".equals(codeString)) 1364 return DEVAST; 1365 if ("HCPAST".equals(codeString)) 1366 return HCPAST; 1367 if ("PACQAST".equals(codeString)) 1368 return PACQAST; 1369 if ("PATAST".equals(codeString)) 1370 return PATAST; 1371 if ("PAYAST".equals(codeString)) 1372 return PAYAST; 1373 if ("PROAST".equals(codeString)) 1374 return PROAST; 1375 if ("SDMAST".equals(codeString)) 1376 return SDMAST; 1377 if ("_SECINTPRVRBOBV".equals(codeString)) 1378 return _SECINTPRVRBOBV; 1379 if ("CLINRPT".equals(codeString)) 1380 return CLINRPT; 1381 if ("DEVRPT".equals(codeString)) 1382 return DEVRPT; 1383 if ("HCPRPT".equals(codeString)) 1384 return HCPRPT; 1385 if ("PACQRPT".equals(codeString)) 1386 return PACQRPT; 1387 if ("PATRPT".equals(codeString)) 1388 return PATRPT; 1389 if ("PAYRPT".equals(codeString)) 1390 return PAYRPT; 1391 if ("PRORPT".equals(codeString)) 1392 return PRORPT; 1393 if ("SDMRPT".equals(codeString)) 1394 return SDMRPT; 1395 if ("SECTRSTOBV".equals(codeString)) 1396 return SECTRSTOBV; 1397 if ("TRSTACCRDOBV".equals(codeString)) 1398 return TRSTACCRDOBV; 1399 if ("TRSTAGREOBV".equals(codeString)) 1400 return TRSTAGREOBV; 1401 if ("TRSTCERTOBV".equals(codeString)) 1402 return TRSTCERTOBV; 1403 if ("TRSTLOAOBV".equals(codeString)) 1404 return TRSTLOAOBV; 1405 if ("LOAAN".equals(codeString)) 1406 return LOAAN; 1407 if ("LOAAN1".equals(codeString)) 1408 return LOAAN1; 1409 if ("LOAAN2".equals(codeString)) 1410 return LOAAN2; 1411 if ("LOAAN3".equals(codeString)) 1412 return LOAAN3; 1413 if ("LOAAN4".equals(codeString)) 1414 return LOAAN4; 1415 if ("LOAAP".equals(codeString)) 1416 return LOAAP; 1417 if ("LOAAP1".equals(codeString)) 1418 return LOAAP1; 1419 if ("LOAAP2".equals(codeString)) 1420 return LOAAP2; 1421 if ("LOAAP3".equals(codeString)) 1422 return LOAAP3; 1423 if ("LOAAP4".equals(codeString)) 1424 return LOAAP4; 1425 if ("LOAAS".equals(codeString)) 1426 return LOAAS; 1427 if ("LOAAS1".equals(codeString)) 1428 return LOAAS1; 1429 if ("LOAAS2".equals(codeString)) 1430 return LOAAS2; 1431 if ("LOAAS3".equals(codeString)) 1432 return LOAAS3; 1433 if ("LOAAS4".equals(codeString)) 1434 return LOAAS4; 1435 if ("LOACM".equals(codeString)) 1436 return LOACM; 1437 if ("LOACM1".equals(codeString)) 1438 return LOACM1; 1439 if ("LOACM2".equals(codeString)) 1440 return LOACM2; 1441 if ("LOACM3".equals(codeString)) 1442 return LOACM3; 1443 if ("LOACM4".equals(codeString)) 1444 return LOACM4; 1445 if ("LOAID".equals(codeString)) 1446 return LOAID; 1447 if ("LOAID1".equals(codeString)) 1448 return LOAID1; 1449 if ("LOAID2".equals(codeString)) 1450 return LOAID2; 1451 if ("LOAID3".equals(codeString)) 1452 return LOAID3; 1453 if ("LOAID4".equals(codeString)) 1454 return LOAID4; 1455 if ("LOANR".equals(codeString)) 1456 return LOANR; 1457 if ("LOANR1".equals(codeString)) 1458 return LOANR1; 1459 if ("LOANR2".equals(codeString)) 1460 return LOANR2; 1461 if ("LOANR3".equals(codeString)) 1462 return LOANR3; 1463 if ("LOANR4".equals(codeString)) 1464 return LOANR4; 1465 if ("LOARA".equals(codeString)) 1466 return LOARA; 1467 if ("LOARA1".equals(codeString)) 1468 return LOARA1; 1469 if ("LOARA2".equals(codeString)) 1470 return LOARA2; 1471 if ("LOARA3".equals(codeString)) 1472 return LOARA3; 1473 if ("LOARA4".equals(codeString)) 1474 return LOARA4; 1475 if ("LOATK".equals(codeString)) 1476 return LOATK; 1477 if ("LOATK1".equals(codeString)) 1478 return LOATK1; 1479 if ("LOATK2".equals(codeString)) 1480 return LOATK2; 1481 if ("LOATK3".equals(codeString)) 1482 return LOATK3; 1483 if ("LOATK4".equals(codeString)) 1484 return LOATK4; 1485 if ("TRSTMECOBV".equals(codeString)) 1486 return TRSTMECOBV; 1487 if ("_SeverityObservation".equals(codeString)) 1488 return _SEVERITYOBSERVATION; 1489 if ("H".equals(codeString)) 1490 return H; 1491 if ("L".equals(codeString)) 1492 return L; 1493 if ("M".equals(codeString)) 1494 return M; 1495 if ("_SubjectBodyPosition".equals(codeString)) 1496 return _SUBJECTBODYPOSITION; 1497 if ("LLD".equals(codeString)) 1498 return LLD; 1499 if ("PRN".equals(codeString)) 1500 return PRN; 1501 if ("RLD".equals(codeString)) 1502 return RLD; 1503 if ("SFWL".equals(codeString)) 1504 return SFWL; 1505 if ("SIT".equals(codeString)) 1506 return SIT; 1507 if ("STN".equals(codeString)) 1508 return STN; 1509 if ("SUP".equals(codeString)) 1510 return SUP; 1511 if ("RTRD".equals(codeString)) 1512 return RTRD; 1513 if ("TRD".equals(codeString)) 1514 return TRD; 1515 if ("_VerificationOutcomeValue".equals(codeString)) 1516 return _VERIFICATIONOUTCOMEVALUE; 1517 if ("ACT".equals(codeString)) 1518 return ACT; 1519 if ("ACTPEND".equals(codeString)) 1520 return ACTPEND; 1521 if ("ELG".equals(codeString)) 1522 return ELG; 1523 if ("INACT".equals(codeString)) 1524 return INACT; 1525 if ("INPNDINV".equals(codeString)) 1526 return INPNDINV; 1527 if ("INPNDUPD".equals(codeString)) 1528 return INPNDUPD; 1529 if ("NELG".equals(codeString)) 1530 return NELG; 1531 if ("_AnnotationValue".equals(codeString)) 1532 return _ANNOTATIONVALUE; 1533 if ("_CommonClinicalObservationValue".equals(codeString)) 1534 return _COMMONCLINICALOBSERVATIONVALUE; 1535 if ("_IndividualCaseSafetyReportValueDomains".equals(codeString)) 1536 return _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS; 1537 if ("_IndicationValue".equals(codeString)) 1538 return _INDICATIONVALUE; 1539 throw new FHIRException("Unknown V3ObservationValue code '"+codeString+"'"); 1540 } 1541 public String toCode() { 1542 switch (this) { 1543 case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "_ActCoverageAssessmentObservationValue"; 1544 case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "_ActFinancialStatusObservationValue"; 1545 case ASSET: return "ASSET"; 1546 case ANNUITY: return "ANNUITY"; 1547 case PROP: return "PROP"; 1548 case RETACCT: return "RETACCT"; 1549 case TRUST: return "TRUST"; 1550 case INCOME: return "INCOME"; 1551 case CHILD: return "CHILD"; 1552 case DISABL: return "DISABL"; 1553 case INVEST: return "INVEST"; 1554 case PAY: return "PAY"; 1555 case RETIRE: return "RETIRE"; 1556 case SPOUSAL: return "SPOUSAL"; 1557 case SUPPLE: return "SUPPLE"; 1558 case TAX: return "TAX"; 1559 case LIVEXP: return "LIVEXP"; 1560 case CLOTH: return "CLOTH"; 1561 case FOOD: return "FOOD"; 1562 case HEALTH: return "HEALTH"; 1563 case HOUSE: return "HOUSE"; 1564 case LEGAL: return "LEGAL"; 1565 case MORTG: return "MORTG"; 1566 case RENT: return "RENT"; 1567 case SUNDRY: return "SUNDRY"; 1568 case TRANS: return "TRANS"; 1569 case UTIL: return "UTIL"; 1570 case ELSTAT: return "ELSTAT"; 1571 case ADOPT: return "ADOPT"; 1572 case BTHCERT: return "BTHCERT"; 1573 case CCOC: return "CCOC"; 1574 case DRLIC: return "DRLIC"; 1575 case FOSTER: return "FOSTER"; 1576 case MEMBER: return "MEMBER"; 1577 case MIL: return "MIL"; 1578 case MRGCERT: return "MRGCERT"; 1579 case PASSPORT: return "PASSPORT"; 1580 case STUDENRL: return "STUDENRL"; 1581 case HLSTAT: return "HLSTAT"; 1582 case DISABLE: return "DISABLE"; 1583 case DRUG: return "DRUG"; 1584 case IVDRG: return "IVDRG"; 1585 case PGNT: return "PGNT"; 1586 case LIVDEP: return "LIVDEP"; 1587 case RELDEP: return "RELDEP"; 1588 case SPSDEP: return "SPSDEP"; 1589 case URELDEP: return "URELDEP"; 1590 case LIVSIT: return "LIVSIT"; 1591 case ALONE: return "ALONE"; 1592 case DEPCHD: return "DEPCHD"; 1593 case DEPSPS: return "DEPSPS"; 1594 case DEPYGCHD: return "DEPYGCHD"; 1595 case FAM: return "FAM"; 1596 case RELAT: return "RELAT"; 1597 case SPS: return "SPS"; 1598 case UNREL: return "UNREL"; 1599 case SOECSTAT: return "SOECSTAT"; 1600 case ABUSE: return "ABUSE"; 1601 case HMLESS: return "HMLESS"; 1602 case ILGIM: return "ILGIM"; 1603 case INCAR: return "INCAR"; 1604 case PROB: return "PROB"; 1605 case REFUG: return "REFUG"; 1606 case UNEMPL: return "UNEMPL"; 1607 case _ALLERGYTESTVALUE: return "_AllergyTestValue"; 1608 case A0: return "A0"; 1609 case A1: return "A1"; 1610 case A2: return "A2"; 1611 case A3: return "A3"; 1612 case A4: return "A4"; 1613 case _COVERAGELIMITOBSERVATIONVALUE: return "_CoverageLimitObservationValue"; 1614 case _COVERAGELEVELOBSERVATIONVALUE: return "_CoverageLevelObservationValue"; 1615 case ADC: return "ADC"; 1616 case CHD: return "CHD"; 1617 case DEP: return "DEP"; 1618 case DP: return "DP"; 1619 case ECH: return "ECH"; 1620 case FLY: return "FLY"; 1621 case IND: return "IND"; 1622 case SSP: return "SSP"; 1623 case _CRITICALITYOBSERVATIONVALUE: return "_CriticalityObservationValue"; 1624 case CRITH: return "CRITH"; 1625 case CRITL: return "CRITL"; 1626 case CRITU: return "CRITU"; 1627 case _GENETICOBSERVATIONVALUE: return "_GeneticObservationValue"; 1628 case HOMOZYGOTE: return "Homozygote"; 1629 case _OBSERVATIONMEASURESCORING: return "_ObservationMeasureScoring"; 1630 case COHORT: return "COHORT"; 1631 case CONTVAR: return "CONTVAR"; 1632 case PROPOR: return "PROPOR"; 1633 case RATIO: return "RATIO"; 1634 case _OBSERVATIONMEASURETYPE: return "_ObservationMeasureType"; 1635 case COMPOSITE: return "COMPOSITE"; 1636 case EFFICIENCY: return "EFFICIENCY"; 1637 case EXPERIENCE: return "EXPERIENCE"; 1638 case OUTCOME: return "OUTCOME"; 1639 case PROCESS: return "PROCESS"; 1640 case RESOURCE: return "RESOURCE"; 1641 case STRUCTURE: return "STRUCTURE"; 1642 case _OBSERVATIONPOPULATIONINCLUSION: return "_ObservationPopulationInclusion"; 1643 case DENEX: return "DENEX"; 1644 case DENEXCEP: return "DENEXCEP"; 1645 case DENOM: return "DENOM"; 1646 case IP: return "IP"; 1647 case IPP: return "IPP"; 1648 case MSRPOPL: return "MSRPOPL"; 1649 case NUMER: return "NUMER"; 1650 case NUMEX: return "NUMEX"; 1651 case _PARTIALCOMPLETIONSCALE: return "_PartialCompletionScale"; 1652 case G: return "G"; 1653 case LE: return "LE"; 1654 case ME: return "ME"; 1655 case MI: return "MI"; 1656 case N: return "N"; 1657 case S: return "S"; 1658 case _SECURITYOBSERVATIONVALUE: return "_SecurityObservationValue"; 1659 case _SECINTOBV: return "_SECINTOBV"; 1660 case _SECALTINTOBV: return "_SECALTINTOBV"; 1661 case ABSTRED: return "ABSTRED"; 1662 case AGGRED: return "AGGRED"; 1663 case ANONYED: return "ANONYED"; 1664 case MAPPED: return "MAPPED"; 1665 case MASKED: return "MASKED"; 1666 case PSEUDED: return "PSEUDED"; 1667 case REDACTED: return "REDACTED"; 1668 case SUBSETTED: return "SUBSETTED"; 1669 case SYNTAC: return "SYNTAC"; 1670 case TRSLT: return "TRSLT"; 1671 case VERSIONED: return "VERSIONED"; 1672 case _SECDATINTOBV: return "_SECDATINTOBV"; 1673 case CRYTOHASH: return "CRYTOHASH"; 1674 case DIGSIG: return "DIGSIG"; 1675 case _SECINTCONOBV: return "_SECINTCONOBV"; 1676 case HRELIABLE: return "HRELIABLE"; 1677 case RELIABLE: return "RELIABLE"; 1678 case UNCERTREL: return "UNCERTREL"; 1679 case UNRELIABLE: return "UNRELIABLE"; 1680 case _SECINTPRVOBV: return "_SECINTPRVOBV"; 1681 case _SECINTPRVABOBV: return "_SECINTPRVABOBV"; 1682 case CLINAST: return "CLINAST"; 1683 case DEVAST: return "DEVAST"; 1684 case HCPAST: return "HCPAST"; 1685 case PACQAST: return "PACQAST"; 1686 case PATAST: return "PATAST"; 1687 case PAYAST: return "PAYAST"; 1688 case PROAST: return "PROAST"; 1689 case SDMAST: return "SDMAST"; 1690 case _SECINTPRVRBOBV: return "_SECINTPRVRBOBV"; 1691 case CLINRPT: return "CLINRPT"; 1692 case DEVRPT: return "DEVRPT"; 1693 case HCPRPT: return "HCPRPT"; 1694 case PACQRPT: return "PACQRPT"; 1695 case PATRPT: return "PATRPT"; 1696 case PAYRPT: return "PAYRPT"; 1697 case PRORPT: return "PRORPT"; 1698 case SDMRPT: return "SDMRPT"; 1699 case SECTRSTOBV: return "SECTRSTOBV"; 1700 case TRSTACCRDOBV: return "TRSTACCRDOBV"; 1701 case TRSTAGREOBV: return "TRSTAGREOBV"; 1702 case TRSTCERTOBV: return "TRSTCERTOBV"; 1703 case TRSTLOAOBV: return "TRSTLOAOBV"; 1704 case LOAAN: return "LOAAN"; 1705 case LOAAN1: return "LOAAN1"; 1706 case LOAAN2: return "LOAAN2"; 1707 case LOAAN3: return "LOAAN3"; 1708 case LOAAN4: return "LOAAN4"; 1709 case LOAAP: return "LOAAP"; 1710 case LOAAP1: return "LOAAP1"; 1711 case LOAAP2: return "LOAAP2"; 1712 case LOAAP3: return "LOAAP3"; 1713 case LOAAP4: return "LOAAP4"; 1714 case LOAAS: return "LOAAS"; 1715 case LOAAS1: return "LOAAS1"; 1716 case LOAAS2: return "LOAAS2"; 1717 case LOAAS3: return "LOAAS3"; 1718 case LOAAS4: return "LOAAS4"; 1719 case LOACM: return "LOACM"; 1720 case LOACM1: return "LOACM1"; 1721 case LOACM2: return "LOACM2"; 1722 case LOACM3: return "LOACM3"; 1723 case LOACM4: return "LOACM4"; 1724 case LOAID: return "LOAID"; 1725 case LOAID1: return "LOAID1"; 1726 case LOAID2: return "LOAID2"; 1727 case LOAID3: return "LOAID3"; 1728 case LOAID4: return "LOAID4"; 1729 case LOANR: return "LOANR"; 1730 case LOANR1: return "LOANR1"; 1731 case LOANR2: return "LOANR2"; 1732 case LOANR3: return "LOANR3"; 1733 case LOANR4: return "LOANR4"; 1734 case LOARA: return "LOARA"; 1735 case LOARA1: return "LOARA1"; 1736 case LOARA2: return "LOARA2"; 1737 case LOARA3: return "LOARA3"; 1738 case LOARA4: return "LOARA4"; 1739 case LOATK: return "LOATK"; 1740 case LOATK1: return "LOATK1"; 1741 case LOATK2: return "LOATK2"; 1742 case LOATK3: return "LOATK3"; 1743 case LOATK4: return "LOATK4"; 1744 case TRSTMECOBV: return "TRSTMECOBV"; 1745 case _SEVERITYOBSERVATION: return "_SeverityObservation"; 1746 case H: return "H"; 1747 case L: return "L"; 1748 case M: return "M"; 1749 case _SUBJECTBODYPOSITION: return "_SubjectBodyPosition"; 1750 case LLD: return "LLD"; 1751 case PRN: return "PRN"; 1752 case RLD: return "RLD"; 1753 case SFWL: return "SFWL"; 1754 case SIT: return "SIT"; 1755 case STN: return "STN"; 1756 case SUP: return "SUP"; 1757 case RTRD: return "RTRD"; 1758 case TRD: return "TRD"; 1759 case _VERIFICATIONOUTCOMEVALUE: return "_VerificationOutcomeValue"; 1760 case ACT: return "ACT"; 1761 case ACTPEND: return "ACTPEND"; 1762 case ELG: return "ELG"; 1763 case INACT: return "INACT"; 1764 case INPNDINV: return "INPNDINV"; 1765 case INPNDUPD: return "INPNDUPD"; 1766 case NELG: return "NELG"; 1767 case _ANNOTATIONVALUE: return "_AnnotationValue"; 1768 case _COMMONCLINICALOBSERVATIONVALUE: return "_CommonClinicalObservationValue"; 1769 case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "_IndividualCaseSafetyReportValueDomains"; 1770 case _INDICATIONVALUE: return "_IndicationValue"; 1771 case NULL: return null; 1772 default: return "?"; 1773 } 1774 } 1775 public String getSystem() { 1776 return "http://hl7.org/fhir/v3/ObservationValue"; 1777 } 1778 public String getDefinition() { 1779 switch (this) { 1780 case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "Codes specify the category of observation, evidence, or document used to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. The type of evidence is coded as observation values."; 1781 case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "Code specifying financial indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay stub; tax or income document; asset document; living expenses."; 1782 case ASSET: return "Codes specifying asset indicators used to assess or establish eligibility for coverage under a policy or program."; 1783 case ANNUITY: return "Indicator of annuity ownership or status as beneficiary."; 1784 case PROP: return "Indicator of real property ownership, e.g., deed or real estate contract."; 1785 case RETACCT: return "Indicator of retirement investment account ownership."; 1786 case TRUST: return "Indicator of status as trust beneficiary."; 1787 case INCOME: return "Code specifying income indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay or pension check, child support payments received or provided, and taxes paid."; 1788 case CHILD: return "Indicator of child support payments received or provided."; 1789 case DISABL: return "Indicator of disability income replacement payment."; 1790 case INVEST: return "Indicator of investment income, e.g., dividend check, annuity payment; real estate rent, investment divestiture proceeds; trust or endowment check."; 1791 case PAY: return "Indicator of paid employment, e.g., letter of hire, contract, employer letter; copy of pay check or pay stub."; 1792 case RETIRE: return "Indicator of retirement payment, e.g., pension check."; 1793 case SPOUSAL: return "Indicator of spousal or partner support payments received or provided; e.g., alimony payment; support stipulations in a divorce settlement."; 1794 case SUPPLE: return "Indicator of income supplement, e.g., gifting, parental income support; stipend, or grant."; 1795 case TAX: return "Indicator of tax obligation or payment, e.g., statement of taxable income."; 1796 case LIVEXP: return "Codes specifying living expense indicators used to assess or establish eligibility for coverage under a policy or program."; 1797 case CLOTH: return "Indicator of clothing expenses."; 1798 case FOOD: return "Indicator of transportation expenses."; 1799 case HEALTH: return "Indicator of health expenses; including medication costs, health service costs, financial participations, and health coverage premiums."; 1800 case HOUSE: return "Indicator of housing expense, e.g., household appliances, fixtures, furnishings, and maintenance and repairs."; 1801 case LEGAL: return "Indicator of legal expenses."; 1802 case MORTG: return "Indicator of mortgage amount, interest, and payments."; 1803 case RENT: return "Indicator of rental or lease payments."; 1804 case SUNDRY: return "Indicator of transportation expenses."; 1805 case TRANS: return "Indicator of transportation expenses, e.g., vehicle payments, vehicle insurance, vehicle fuel, and vehicle maintenance and repairs."; 1806 case UTIL: return "Indicator of transportation expenses."; 1807 case ELSTAT: return "Code specifying eligibility indicators used to assess or establish eligibility for coverage under a policy or program eligibility status, e.g., certificates of creditable coverage; student enrollment; adoption, marriage or birth certificate."; 1808 case ADOPT: return "Indicator of adoption."; 1809 case BTHCERT: return "Indicator of birth."; 1810 case CCOC: return "Indicator of creditable coverage."; 1811 case DRLIC: return "Indicator of driving status."; 1812 case FOSTER: return "Indicator of foster child status."; 1813 case MEMBER: return "Indicator of status as covered member under a policy or program, e.g., member id card or coverage document."; 1814 case MIL: return "Indicator of military status."; 1815 case MRGCERT: return "Indicator of marriage status."; 1816 case PASSPORT: return "Indicator of citizenship."; 1817 case STUDENRL: return "Indicator of student status."; 1818 case HLSTAT: return "Code specifying non-clinical indicators related to health status used to assess or establish eligibility for coverage under a policy or program, e.g., pregnancy, disability, drug use, mental health issues."; 1819 case DISABLE: return "Indication of disability."; 1820 case DRUG: return "Indication of drug use."; 1821 case IVDRG: return "Indication of IV drug use ."; 1822 case PGNT: return "Non-clinical report of pregnancy."; 1823 case LIVDEP: return "Code specifying observations related to living dependency, such as dependent upon spouse for activities of daily living."; 1824 case RELDEP: return "Continued living in private residence requires functional and health care assistance from one or more relatives."; 1825 case SPSDEP: return "Continued living in private residence requires functional and health care assistance from spouse or life partner."; 1826 case URELDEP: return "Continued living in private residence requires functional and health care assistance from one or more unrelated persons."; 1827 case LIVSIT: return "Code specifying observations related to living situation for a person in a private residence."; 1828 case ALONE: return "Living alone. Maps to PD1-2 Living arrangement (IS) 00742 [A]"; 1829 case DEPCHD: return "Living with one or more dependent children requiring moderate supervision."; 1830 case DEPSPS: return "Living with disabled spouse requiring functional and health care assistance"; 1831 case DEPYGCHD: return "Living with one or more dependent children requiring intensive supervision"; 1832 case FAM: return "Living with family. Maps to PD1-2 Living arrangement (IS) 00742 [F]"; 1833 case RELAT: return "Living with one or more relatives. Maps to PD1-2 Living arrangement (IS) 00742 [R]"; 1834 case SPS: return "Living only with spouse or life partner. Maps to PD1-2 Living arrangement (IS) 00742 [S]"; 1835 case UNREL: return "Living with one or more unrelated persons."; 1836 case SOECSTAT: return "Code specifying observations or indicators related to socio-economic status used to assess to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program."; 1837 case ABUSE: return "Indication of abuse victim."; 1838 case HMLESS: return "Indication of status as homeless."; 1839 case ILGIM: return "Indication of status as illegal immigrant."; 1840 case INCAR: return "Indication of status as incarcerated."; 1841 case PROB: return "Indication of probation status."; 1842 case REFUG: return "Indication of refugee status."; 1843 case UNEMPL: return "Indication of unemployed status."; 1844 case _ALLERGYTESTVALUE: return "Indicates the result of a particular allergy test. E.g. Negative, Mild, Moderate, Severe"; 1845 case A0: return "Description:Patient exhibits no reaction to the challenge agent."; 1846 case A1: return "Description:Patient exhibits a minimal reaction to the challenge agent."; 1847 case A2: return "Description:Patient exhibits a mild reaction to the challenge agent."; 1848 case A3: return "Description:Patient exhibits moderate reaction to the challenge agent."; 1849 case A4: return "Description:Patient exhibits a severe reaction to the challenge agent."; 1850 case _COVERAGELIMITOBSERVATIONVALUE: return "Description:Coded observation values for coverage limitations, for e.g., types of claims or types of parties covered under a policy or program."; 1851 case _COVERAGELEVELOBSERVATIONVALUE: return "Description:Coded observation values for types of covered parties under a policy or program based on their personal relationships or employment status."; 1852 case ADC: return "Description:Child over an age as specified by coverage policy or program, e.g., student, differently abled, and income dependent."; 1853 case CHD: return "Description:Dependent biological, adopted, foster child as specified by coverage policy or program."; 1854 case DEP: return "Description:Person requiring functional and/or financial assistance from another person as specified by coverage policy or program."; 1855 case DP: return "Description:Persons registered as a family unit in a domestic partner registry as specified by law and by coverage policy or program."; 1856 case ECH: return "Description:An individual employed by an employer who receive remuneration in wages, salary, commission, tips, piece-rates, or pay-in-kind through the employeraTMs payment system (i.e., not a contractor) as specified by coverage policy or program."; 1857 case FLY: return "Description:As specified by coverage policy or program."; 1858 case IND: return "Description:Person as specified by coverage policy or program."; 1859 case SSP: return "Description:A pair of people of the same gender who live together as a family as specified by coverage policy or program, e.g., Naomi and Ruth from the Book of Ruth; Socrates and Alcibiades"; 1860 case _CRITICALITYOBSERVATIONVALUE: return "A clinical judgment as to the worst case result of a future exposure (including substance administration). When the worst case result is assessed to have a life-threatening or organ system threatening potential, it is considered to be of high criticality."; 1861 case CRITH: return "Worst case result of a future exposure is assessed to be life-threatening or having high potential for organ system failure."; 1862 case CRITL: return "Worst case result of a future exposure is not assessed to be life-threatening or having high potential for organ system failure."; 1863 case CRITU: return "Unable to assess the worst case result of a future exposure."; 1864 case _GENETICOBSERVATIONVALUE: return "Description: The domain contains genetic analysis specific observation values, e.g. Homozygote, Heterozygote, etc."; 1865 case HOMOZYGOTE: return "Description: An individual having different alleles at one or more loci regarding a specific character"; 1866 case _OBSERVATIONMEASURESCORING: return "Observation values used to indicate the type of scoring (e.g. proportion, ratio) used by a health quality measure."; 1867 case COHORT: return "A measure in which either short-term cross-section or long-term longitudinal analysis is performed over a group of subjects defined by a set of common properties or defining characteristics (e.g., Male smokers between the ages of 40 and 50 years, exposure to treatment, exposure duration)."; 1868 case CONTVAR: return "A measure score in which each individual value for the measure can fall anywhere along a continuous scale (e.g., mean time to thrombolytics which aggregates the time in minutes from a case presenting with chest pain to the time of administration of thrombolytics)."; 1869 case PROPOR: return "A score derived by dividing the number of cases that meet a criterion for quality (the numerator) by the number of eligible cases within a given time frame (the denominator) where the numerator cases are a subset of the denominator cases (e.g., percentage of eligible women with a mammogram performed in the last year)."; 1870 case RATIO: return "A score that may have a value of zero or greater that is derived by dividing a count of one type of data by a count of another type of data (e.g., the number of patients with central lines who develop infection divided by the number of central line days)."; 1871 case _OBSERVATIONMEASURETYPE: return "Observation values used to indicate what kind of health quality measure is used."; 1872 case COMPOSITE: return "A measure that is composed from one or more other measures and indicates an overall summary of those measures."; 1873 case EFFICIENCY: return "A measure related to the efficiency of medical treatment."; 1874 case EXPERIENCE: return "A measure related to the level of patient engagement or patient experience of care."; 1875 case OUTCOME: return "A measure that indicates the result of the performance (or non-performance) of a function or process."; 1876 case PROCESS: return "A measure which focuses on a process which leads to a certain outcome, meaning that a scientific basis exists for believing that the process, when executed well, will increase the probability of achieving a desired outcome."; 1877 case RESOURCE: return "A measure related to the extent of use of clinical resources or cost of care."; 1878 case STRUCTURE: return "A measure related to the structure of patient care."; 1879 case _OBSERVATIONPOPULATIONINCLUSION: return "Observation values used to assert various populations that a subject falls into."; 1880 case DENEX: return "Patients who should be removed from the eMeasure population and denominator before determining if numerator criteria are met. Denominator exclusions are used in proportion and ratio measures to help narrow the denominator."; 1881 case DENEXCEP: return "Denominator exceptions are those conditions that should remove a patient, procedure or unit of measurement from the denominator only if the numerator criteria are not met. Denominator exceptions allow for adjustment of the calculated score for those providers with higher risk populations. Denominator exceptions are used only in proportion eMeasures. They are not appropriate for ratio or continuous variable eMeasures. Denominator exceptions allow for the exercise of clinical judgment and should be specifically defined where capturing the information in a structured manner fits the clinical workflow. Generic denominator exception reasons used in proportion eMeasures fall into three general categories:\r\n\n \n Medical reasons\n Patient reasons\n System reasons"; 1882 case DENOM: return "It can be the same as the initial patient population or a subset of the initial patient population to further constrain the population for the purpose of the eMeasure. Different measures within an eMeasure set may have different Denominators. Continuous Variable eMeasures do not have a Denominator, but instead define a Measure Population."; 1883 case IP: return "The initial population refers to all entities to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs."; 1884 case IPP: return "The initial patient population refers to all patients to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. Details often include information based upon specific age groups, diagnoses, diagnostic and procedure codes, and enrollment periods."; 1885 case MSRPOPL: return "Measure population is used only in continuous variable eMeasures. It is a narrative description of the eMeasure population. \n(e.g., all patients seen in the Emergency Department during the measurement period)."; 1886 case NUMER: return "Numerators are used in proportion and ratio eMeasures. In proportion measures the numerator criteria are the processes or outcomes expected for each patient, procedure, or other unit of measurement defined in the denominator. In ratio measures the numerator is related, but not directly derived from the denominator (e.g., a numerator listing the number of central line blood stream infections and a denominator indicating the days per thousand of central line usage in a specific time period)."; 1887 case NUMEX: return "Numerator Exclusions are used only in ratio eMeasures to define instances that should not be included in the numerator data. (e.g., if the number of central line blood stream infections per 1000 catheter days were to exclude infections with a specific bacterium, that bacterium would be listed as a numerator exclusion.)"; 1888 case _PARTIALCOMPLETIONSCALE: return "PartialCompletionScale"; 1889 case G: return "Value for Act.partialCompletionCode attribute that implies 81-99% completion"; 1890 case LE: return "Value for Act.partialCompletionCode attribute that implies 61-80% completion"; 1891 case ME: return "Value for Act.partialCompletionCode attribute that implies 41-60% completion"; 1892 case MI: return "Value for Act.partialCompletionCode attribute that implies 1-20% completion"; 1893 case N: return "Value for Act.partialCompletionCode attribute that implies 0% completion"; 1894 case S: return "Value for Act.partialCompletionCode attribute that implies 21-40% completion"; 1895 case _SECURITYOBSERVATIONVALUE: return "Observation values used to indicate security observation metadata."; 1896 case _SECINTOBV: return "Abstract security observation values used to indicate security integrity metadata.\r\n\n \n Examples: Codes conveying integrity status, integrity confidence, and provenance."; 1897 case _SECALTINTOBV: return "Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability)"; 1898 case ABSTRED: return "Security metadata observation values used to indicate the use of a more abstract version of the content, e.g., replacing exact value of an age or date field with a range, or remove the left digits of a credit card number or SSN."; 1899 case AGGRED: return "Security metadata observation values used to indicate the use of an algorithmic combination of actual values with the result of an aggregate function, e.g., average, sum, or count in order to limit disclosure of an IT resource (data, information object, service, or system capability) to the minimum necessary."; 1900 case ANONYED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by used to indicate the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject. No key to relink the data is retained."; 1901 case MAPPED: return "Security metadata observation value used to indicate that the IT resource semantic content has been transformed from one encoding to another.\r\n\n \n Usage Note: \"MAP\" code does not indicate the semantic fidelity of the transformed content.\r\n\n To indicate semantic fidelity for maps of HL7 to other code systems, this security alteration integrity observation may be further specified using an Act valued with Value Set: MapRelationship (2.16.840.1.113883.1.11.11052).\r\n\n Semantic fidelity of the mapped IT Resource may also be indicated using a SecurityIntegrityConfidenceObservation."; 1902 case MASKED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by indicating the mechanism by which software systems can make data unintelligible (that is, as unreadable and unusable by algorithmically transforming plaintext into ciphertext) such that it can only be accessed or used by authorized users. An authorized user may be provided a key to decrypt per license or \"shared secret\".\r\n\n \n Usage Note: \"MASKED\" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has been further encrypted, and may be accessed only by an authorized user or receiver to which a decryption key is provided."; 1903 case PSEUDED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability), by indicating the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject. Custodian may retain a key to relink data necessary to reidentify the information subject.\r\n\n \n Rationale: Personal data which has been processed to make it impossible to know whose data it is. Used particularly for secondary use of health data. In some cases, it may be possible for authorized individuals to restore the identity of the individual, e.g.,for public health case management. Based on ISO/TS 25237:2008 Health informatics—Pseudonymization"; 1904 case REDACTED: return "Security metadata observation value used to indicate the mechanism by which software systems can filter an IT resource (data, information object, service, or system capability) to remove any portion of the resource that is not authorized to be access, used, or disclosed.\r\n\n \n Usage Note: \"REDACTED\" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has filtered and not included in the content accessed or received."; 1905 case SUBSETTED: return "Metadata observation used to indicate that some information has been removed from the source object when the view this object contains was constructed because of configuration options when the view was created. The content may not be suitable for use as the basis of a record update\r\n\n \n Usage Note: This is not suitable to be used when information is removed for security reasons - see the code REDACTED for this use."; 1906 case SYNTAC: return "Security metadata observation value used to indicate that the IT resource syntax has been transformed from one syntactical representation to another. \r\n\n \n Usage Note: \"SYNTAC\" code does not indicate the syntactical correctness of the syntactically transformed IT resource."; 1907 case TRSLT: return "Security metadata observation value used to indicate that the IT resource has been translated from one human language to another. \r\n\n \n Usage Note: \"TRSLT\" does not indicate the fidelity of the translation or the languages translated.\r\n\n The fidelity of the IT Resource translation may be indicated using a SecurityIntegrityConfidenceObservation.\r\n\n To indicate languages, use the Value Set:HumanLanguage (2.16.840.1.113883.1.11.11526)"; 1908 case VERSIONED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) which indicates that the resource only retains versions of an IT resource for access and use per applicable policy\r\n\n \n Usage Note: When this code is used, expectation is that the system has removed historical versions of the data that falls outside the time period deemed to be the effective time of the applicable version."; 1909 case _SECDATINTOBV: return "Abstract security observation values used to indicate data integrity metadata.\r\n\n \n Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function."; 1910 case CRYTOHASH: return "Security metadata observation value used to indicate the mechanism by which software systems can establish that data was not modified in transit.\r\n\n \n Rationale: This definition is intended to align with the ISO 22600-2 3.3.19 definition of cryptographic checkvalue: Information which is derived by performing a cryptographic transformation (see cryptography) on the data unit. The derivation of the checkvalue may be performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit.\r\n\n \n Examples: \n \r\n\n \n SHA-1\n SHA-2 (Secure Hash Algorithm)"; 1911 case DIGSIG: return "Security metadata observation value used to indicate the mechanism by which software systems use digital signature to establish that data has not been modified. \r\n\n \n Rationale: This definition is intended to align with the ISO 22600-2 3.3.26 definition of digital signature: Data appended to, or a cryptographic transformation (see cryptography) of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g., by the recipient."; 1912 case _SECINTCONOBV: return "Abstract security observation value used to indicate integrity confidence metadata.\r\n\n \n Examples: Codes conveying the level of reliability and trustworthiness of an IT resource."; 1913 case HRELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be very high."; 1914 case RELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be adequate."; 1915 case UNCERTREL: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be uncertain."; 1916 case UNRELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be inadequate."; 1917 case _SECINTPRVOBV: return "Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability).\r\n\n \n Examples: Codes conveying the provenance metadata about the entity reporting an IT resource."; 1918 case _SECINTPRVABOBV: return "Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability).\r\n\n \n Examples: Codes conveying the provenance metadata about the entity asserting the resource."; 1919 case CLINAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a clinician."; 1920 case DEVAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a device."; 1921 case HCPAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a healthcare professional."; 1922 case PACQAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient acquaintance."; 1923 case PATAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient."; 1924 case PAYAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a payer."; 1925 case PROAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a professional."; 1926 case SDMAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a substitute decision maker."; 1927 case _SECINTPRVRBOBV: return "Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability).\r\n\n \n Examples: Codes conveying the provenance metadata about the entity reporting an IT resource."; 1928 case CLINRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a clinician."; 1929 case DEVRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a device."; 1930 case HCPRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a healthcare professional."; 1931 case PACQRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient acquaintance."; 1932 case PATRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient."; 1933 case PAYRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a payer."; 1934 case PRORPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a professional."; 1935 case SDMRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a substitute decision maker."; 1936 case SECTRSTOBV: return "Observation value used to indicate aspects of trust applicable to an IT resource (data, information object, service, or system capability)."; 1937 case TRSTACCRDOBV: return "Values for security trust accreditation metadata observation made about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework."; 1938 case TRSTAGREOBV: return "Values for security trust agreement metadata observation made about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1]\n[ISO IEC 10181-1]"; 1939 case TRSTCERTOBV: return "Values for security trust certificate metadata observation made about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1]\r\n\n For example, a Certificate Policy (CP), which is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. A particular Certificate Policy might indicate the applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range. Another example is Cross Certification with Federal Bridge."; 1940 case TRSTLOAOBV: return "Values for security trust assurance metadata observation made about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol."; 1941 case LOAAN: return "The value assigned as the indicator of the digital quality or reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2]\r\n\n For example, the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]"; 1942 case LOAAN1: return "Indicator of low digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] \r\n\n Low authentication level of assurance indicates that the relying party may have little or no confidence in the asserted identity's validity. Level 1 requires little or no confidence in the asserted identity. No identity proofing is required at this level, but the authentication mechanism should provide some assurance that the same claimant is accessing the protected transaction or data. A wide range of available authentication technologies can be employed and any of the token methods of Levels 2, 3, or 4, including Personal Identification Numbers (PINs), may be used. To be authenticated, the claimant must prove control of the token through a secure authentication protocol. At Level 1, long-term shared authentication secrets may be revealed to verifiers. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1943 case LOAAN2: return "Indicator of basic digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]\r\n\n Basic authentication level of assurance indicates that the relying party may have some confidence in the asserted identity's validity. Level 2 requires confidence that the asserted identity is accurate. Level 2 provides for single-factor remote network authentication, including identity-proofing requirements for presentation of identifying materials or information. A wide range of available authentication technologies can be employed, including any of the token methods of Levels 3 or 4, as well as passwords. Successful authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, and online guessing attacks are prevented. \nLong-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are required. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1944 case LOAAN3: return "Indicator of medium digital quality or reliability of the digital reliability of verification and validation of the process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] \r\n\n Medium authentication level of assurance indicates that the relying party may have high confidence in the asserted identity's validity. Level 3 is appropriate for transactions that need high confidence in the accuracy of the asserted identity. Level 3 provides multifactor remote network authentication. At this level, identity-proofing procedures require verification of identifying materials and information. Authentication is based on proof of possession of a key or password through a cryptographic protocol. Cryptographic strength mechanisms should protect the primary authentication token (a cryptographic key) against compromise by the protocol threats, including eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks. A minimum of two authentication factors is required. Three kinds of tokens may be used:\r\n\n \n \"soft\" cryptographic token, which has the key stored on a general-purpose computer, \n \"hard\" cryptographic token, which has the key stored on a special hardware device, and \n \"one-time password\" device token, which has symmetric key stored on a personal hardware device that is a cryptographic module validated at FIPS 140-2 Level 1 or higher. Validation testing of cryptographic modules and algorithms for conformance to Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, is managed by NIST.\n \n Authentication requires that the claimant prove control of the token through a secure authentication protocol. The token must be unlocked with a password or biometric representation, or a password must be used in a secure authentication protocol, to establish two-factor authentication. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are used for all operations. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1945 case LOAAN4: return "Indicator of high digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]\r\n\n High authentication level of assurance indicates that the relying party may have very high confidence in the asserted identity's validity. Level 4 is for transactions that need very high confidence in the accuracy of the asserted identity. Level 4 provides the highest practical assurance of remote network authentication. Authentication is based on proof of possession of a key through a cryptographic protocol. This level is similar to Level 3 except that only “hard� cryptographic tokens are allowed, cryptographic module validation requirements are strengthened, and subsequent critical data transfers must be authenticated via a key that is bound to the authentication process. The token should be a hardware cryptographic module validated at FIPS 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. This level requires a physical token, which cannot readily be copied, and operator authentication at Level 2 and higher, and ensures good, two-factor remote authentication.\r\n\n Level 4 requires strong cryptographic authentication of all parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks are prevented. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Strong approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1946 case LOAAP: return "The value assigned as the indicator of the digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]"; 1947 case LOAAP1: return "Indicator of the low digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n Low authentication process level of assurance indicates that (1) long-term shared authentication secrets may be revealed to verifiers; and (2) assertions and assertion references require protection from manufacture/modification and reuse attacks. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1948 case LOAAP2: return "Indicator of the basic digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n Basic authentication process level of assurance indicates that long-term shared authentication secrets are never revealed to any other party except Credential Service Provider (CSP). Sessions (temporary) shared secrets may be provided to independent verifiers by CSP. Long-term shared authentication secrets, if used, are never revealed to any other party except Verifiers operated by the Credential Service Provider (CSP); however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 1 requirements, assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1949 case LOAAP3: return "Indicator of the medium digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n Medium authentication process level of assurance indicates that the token can be unlocked with password, biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication. Long-term shared authentication secrets are never revealed to any party except the Claimant and Credential Service Provider (CSP).\r\n\n Authentication requires that the Claimant prove, through a secure authentication protocol, that he or she controls the token. The Claimant unlocks the token with a password or biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication (through proof of possession of a physical or software token in combination with some memorized secret knowledge). Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 2 requirements, assertions are protected against repudiation by the Verifier."; 1950 case LOAAP4: return "Indicator of the high digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n High authentication process level of assurance indicates all sensitive data transfer are cryptographically authenticated using keys bound to the authentication process. Level 4 requires strong cryptographic authentication of all communicating parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the Claimant prove through a secure authentication protocol that he or she controls the token. All protocol threats at Level 3 are required to be prevented at Level 4. Protocols shall also be strongly resistant to man-in-the-middle attacks. Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. Approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1951 case LOAAS: return "The value assigned as the indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes."; 1952 case LOAAS1: return "Indicator of the low quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n Assertions and assertion references require protection from modification and reuse attacks. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1953 case LOAAS2: return "Indicator of the basic quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n Assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required for all assertion protocols. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1954 case LOAAS3: return "Indicator of the medium quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n Assertions are protected against repudiation by the verifier. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1955 case LOAAS4: return "Indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n Strongly resistant to man-in-the-middle attacks. \"Bearer\" assertions are not used. \"Holder-of-key\" assertions may be used. RP maintains records of the assertions. [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]"; 1956 case LOACM: return "Indicator of the digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1957 case LOACM1: return "Indicator of the low digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Little or no confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include weak identity binding to tokens and plaintext passwords or secrets not transmitted across a network. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1958 case LOACM2: return "Indicator of the basic digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Some confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verification must prove claimant controls the token; token resists online guessing, replay, session hijacking, and eavesdropping attacks; and token is at least weakly resistant to man-in-the middle attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1959 case LOACM3: return "Indicator of the medium digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity. High confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Ownership of token verifiable through security authentication protocol and credential management protects against verifier impersonation attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1960 case LOACM4: return "Indicator of the high digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity. Very high confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verifier can prove control of token through a secure protocol; credential management supports strong cryptographic authentication of all communication parties. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1961 case LOAID: return "Indicator of the quality or reliability in the process of ascertaining that an individual is who he or she claims to be."; 1962 case LOAID1: return "Indicator of low digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires that a continuity of identity be maintained but does not require identity proofing. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1963 case LOAID2: return "Indicator of some digital quality or reliability in the process of ascertaining that that an individual is who he or she claims to be. Requires identity proofing via presentation of identifying material or information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1964 case LOAID3: return "Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1965 case LOAID4: return "Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be. Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1966 case LOANR: return "Indicator of the digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 1967 case LOANR1: return "Indicator of low digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 1968 case LOANR2: return "Indicator of basic digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 1969 case LOANR3: return "Indicator of medium digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 1970 case LOANR4: return "Indicator of high digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]"; 1971 case LOARA: return "Indicator of the digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]"; 1972 case LOARA1: return "Indicator of low digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]"; 1973 case LOARA2: return "Indicator of basic digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]"; 1974 case LOARA3: return "Indicator of medium digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]"; 1975 case LOARA4: return "Indicator of high digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization's security controls. [Based on NIST SP 800-63-2]"; 1976 case LOATK: return "Indicator of the digital quality or reliability of single and multi-token authentication. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1977 case LOATK1: return "Indicator of the low digital quality or reliability of single and multi-token authentication. Permits the use of any of the token methods of Levels 2, 3, or 4. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1978 case LOATK2: return "Indicator of the basic digital quality or reliability of single and multi-token authentication. Requires single factor authentication using memorized secret tokens, pre-registered knowledge tokens, look-up secret tokens, out of band tokens, or single factor one-time password devices. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1979 case LOATK3: return "Indicator of the medium digital quality or reliability of single and multi-token authentication. Requires two authentication factors. Provides multi-factor remote network authentication. Permits multi-factor software cryptographic token. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1980 case LOATK4: return "Indicator of the high digital quality or reliability of single and multi-token authentication. Requires token that is a hardware cryptographic module validated at validated at Federal Information Processing Standard (FIPS) 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. Level 4 token requirements can be met by using the PIV authentication key of a FIPS 201 compliant Personal Identity Verification (PIV) Card. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]"; 1981 case TRSTMECOBV: return "Values for security trust mechanism metadata observation made about a security architecture system component that supports enforcement of security policies."; 1982 case _SEVERITYOBSERVATION: return "Potential values for observations of severity."; 1983 case H: return "Indicates the condition may be life-threatening or has the potential to cause permanent injury."; 1984 case L: return "Indicates the condition may result in some adverse consequences but is unlikely to substantially affect the situation of the subject."; 1985 case M: return "Indicates the condition may result in noticable adverse adverse consequences but is unlikely to be life-threatening or cause permanent injury."; 1986 case _SUBJECTBODYPOSITION: return "Contains codes for defining the observed, physical position of a subject, such as during an observation, assessment, collection of a specimen, etc. ECG waveforms and vital signs, such as blood pressure, are two examples where a general, observed position typically needs to be noted."; 1987 case LLD: return "Lying on the left side."; 1988 case PRN: return "Lying with the front or ventral surface downward; lying face down."; 1989 case RLD: return "Lying on the right side."; 1990 case SFWL: return "A semi-sitting position in bed with the head of the bed elevated approximately 45 degrees."; 1991 case SIT: return "Resting the body on the buttocks, typically with upper torso erect or semi erect."; 1992 case STN: return "To be stationary, upright, vertical, on one's legs."; 1993 case SUP: return "supine"; 1994 case RTRD: return "Lying on the back, on an inclined plane, typically about 30-45 degrees with head raised and feet lowered."; 1995 case TRD: return "Lying on the back, on an inclined plane, typically about 30-45 degrees, with head lowered and feet raised."; 1996 case _VERIFICATIONOUTCOMEVALUE: return "Values for observations of verification act results\r\n\n \n Examples: Verified, not verified, verified with warning."; 1997 case ACT: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s)."; 1998 case ACTPEND: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s) - Pending Investigation"; 1999 case ELG: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s)."; 2000 case INACT: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s)."; 2001 case INPNDINV: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Investigation."; 2002 case INPNDUPD: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Eligibility Update."; 2003 case NELG: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s). May optionally include reasons for the ineligibility."; 2004 case _ANNOTATIONVALUE: return "AnnotationValue"; 2005 case _COMMONCLINICALOBSERVATIONVALUE: return "Description:Used in a patient care message to value simple clinical (non-lab) observations."; 2006 case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "This domain is established as a parent to a variety of value domains being defined to support the communication of Individual Case Safety Reports to regulatory bodies. Arguably, this aggregation is not taxonomically pure, but the grouping will facilitate the management of these domains."; 2007 case _INDICATIONVALUE: return "Indicates the specific observation result which is the reason for the action (prescription, lab test, etc.). E.g. Headache, Ear infection, planned diagnostic image (requiring contrast agent), etc."; 2008 case NULL: return null; 2009 default: return "?"; 2010 } 2011 } 2012 public String getDisplay() { 2013 switch (this) { 2014 case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "ActCoverageAssessmentObservationValue"; 2015 case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "ActFinancialStatusObservationValue"; 2016 case ASSET: return "asset"; 2017 case ANNUITY: return "annuity"; 2018 case PROP: return "real property"; 2019 case RETACCT: return "retirement investment account"; 2020 case TRUST: return "trust"; 2021 case INCOME: return "income"; 2022 case CHILD: return "child support"; 2023 case DISABL: return "disability pay"; 2024 case INVEST: return "investment income"; 2025 case PAY: return "paid employment"; 2026 case RETIRE: return "retirement pay"; 2027 case SPOUSAL: return "spousal or partner support"; 2028 case SUPPLE: return "income supplement"; 2029 case TAX: return "tax obligation"; 2030 case LIVEXP: return "living expense"; 2031 case CLOTH: return "clothing expense"; 2032 case FOOD: return "food expense"; 2033 case HEALTH: return "health expense"; 2034 case HOUSE: return "household expense"; 2035 case LEGAL: return "legal expense"; 2036 case MORTG: return "mortgage"; 2037 case RENT: return "rent"; 2038 case SUNDRY: return "sundry expense"; 2039 case TRANS: return "transportation expense"; 2040 case UTIL: return "utility expense"; 2041 case ELSTAT: return "eligibility indicator"; 2042 case ADOPT: return "adoption document"; 2043 case BTHCERT: return "birth certificate"; 2044 case CCOC: return "creditable coverage document"; 2045 case DRLIC: return "driver license"; 2046 case FOSTER: return "foster child document"; 2047 case MEMBER: return "program or policy member"; 2048 case MIL: return "military identification"; 2049 case MRGCERT: return "marriage certificate"; 2050 case PASSPORT: return "passport"; 2051 case STUDENRL: return "student enrollment"; 2052 case HLSTAT: return "health status"; 2053 case DISABLE: return "disabled"; 2054 case DRUG: return "drug use"; 2055 case IVDRG: return "IV drug use"; 2056 case PGNT: return "pregnant"; 2057 case LIVDEP: return "living dependency"; 2058 case RELDEP: return "relative dependent"; 2059 case SPSDEP: return "spouse dependent"; 2060 case URELDEP: return "unrelated person dependent"; 2061 case LIVSIT: return "living situation"; 2062 case ALONE: return "alone"; 2063 case DEPCHD: return "dependent children"; 2064 case DEPSPS: return "dependent spouse"; 2065 case DEPYGCHD: return "dependent young children"; 2066 case FAM: return "live with family"; 2067 case RELAT: return "relative"; 2068 case SPS: return "spouse only"; 2069 case UNREL: return "unrelated person"; 2070 case SOECSTAT: return "socio economic status"; 2071 case ABUSE: return "abuse victim"; 2072 case HMLESS: return "homeless"; 2073 case ILGIM: return "illegal immigrant"; 2074 case INCAR: return "incarcerated"; 2075 case PROB: return "probation"; 2076 case REFUG: return "refugee"; 2077 case UNEMPL: return "unemployed"; 2078 case _ALLERGYTESTVALUE: return "AllergyTestValue"; 2079 case A0: return "no reaction"; 2080 case A1: return "minimal reaction"; 2081 case A2: return "mild reaction"; 2082 case A3: return "moderate reaction"; 2083 case A4: return "severe reaction"; 2084 case _COVERAGELIMITOBSERVATIONVALUE: return "CoverageLimitObservationValue"; 2085 case _COVERAGELEVELOBSERVATIONVALUE: return "CoverageLevelObservationValue"; 2086 case ADC: return "adult child"; 2087 case CHD: return "child"; 2088 case DEP: return "dependent"; 2089 case DP: return "domestic partner"; 2090 case ECH: return "employee"; 2091 case FLY: return "family coverage"; 2092 case IND: return "individual"; 2093 case SSP: return "same sex partner"; 2094 case _CRITICALITYOBSERVATIONVALUE: return "CriticalityObservationValue"; 2095 case CRITH: return "high criticality"; 2096 case CRITL: return "low criticality"; 2097 case CRITU: return "unable to assess criticality"; 2098 case _GENETICOBSERVATIONVALUE: return "GeneticObservationValue"; 2099 case HOMOZYGOTE: return "HOMO"; 2100 case _OBSERVATIONMEASURESCORING: return "ObservationMeasureScoring"; 2101 case COHORT: return "cohort measure scoring"; 2102 case CONTVAR: return "continuous variable measure scoring"; 2103 case PROPOR: return "proportion measure scoring"; 2104 case RATIO: return "ratio measure scoring"; 2105 case _OBSERVATIONMEASURETYPE: return "ObservationMeasureType"; 2106 case COMPOSITE: return "composite measure type"; 2107 case EFFICIENCY: return "efficiency measure type"; 2108 case EXPERIENCE: return "experience measure type"; 2109 case OUTCOME: return "outcome measure type"; 2110 case PROCESS: return "process measure type"; 2111 case RESOURCE: return "resource use measure type"; 2112 case STRUCTURE: return "structure measure type"; 2113 case _OBSERVATIONPOPULATIONINCLUSION: return "ObservationPopulationInclusion"; 2114 case DENEX: return "denominator exclusions"; 2115 case DENEXCEP: return "denominator exceptions"; 2116 case DENOM: return "denominator"; 2117 case IP: return "initial population"; 2118 case IPP: return "initial patient population"; 2119 case MSRPOPL: return "measure population"; 2120 case NUMER: return "numerator"; 2121 case NUMEX: return "numerator exclusions"; 2122 case _PARTIALCOMPLETIONSCALE: return "PartialCompletionScale"; 2123 case G: return "Great extent"; 2124 case LE: return "Large extent"; 2125 case ME: return "Medium extent"; 2126 case MI: return "Minimal extent"; 2127 case N: return "None"; 2128 case S: return "Some extent"; 2129 case _SECURITYOBSERVATIONVALUE: return "SecurityObservationValue"; 2130 case _SECINTOBV: return "security integrity"; 2131 case _SECALTINTOBV: return "alteration integrity"; 2132 case ABSTRED: return "abstracted"; 2133 case AGGRED: return "aggregated"; 2134 case ANONYED: return "anonymized"; 2135 case MAPPED: return "mapped"; 2136 case MASKED: return "masked"; 2137 case PSEUDED: return "pseudonymized"; 2138 case REDACTED: return "redacted"; 2139 case SUBSETTED: return "subsetted"; 2140 case SYNTAC: return "syntactic transform"; 2141 case TRSLT: return "translated"; 2142 case VERSIONED: return "versioned"; 2143 case _SECDATINTOBV: return "data integrity"; 2144 case CRYTOHASH: return "cryptographic hash function"; 2145 case DIGSIG: return "digital signature"; 2146 case _SECINTCONOBV: return "integrity confidence"; 2147 case HRELIABLE: return "highly reliable"; 2148 case RELIABLE: return "reliable"; 2149 case UNCERTREL: return "uncertain reliability"; 2150 case UNRELIABLE: return "unreliable"; 2151 case _SECINTPRVOBV: return "provenance"; 2152 case _SECINTPRVABOBV: return "provenance asserted by"; 2153 case CLINAST: return "clinician asserted"; 2154 case DEVAST: return "device asserted"; 2155 case HCPAST: return "healthcare professional asserted"; 2156 case PACQAST: return "patient acquaintance asserted"; 2157 case PATAST: return "patient asserted"; 2158 case PAYAST: return "payer asserted"; 2159 case PROAST: return "professional asserted"; 2160 case SDMAST: return "substitute decision maker asserted"; 2161 case _SECINTPRVRBOBV: return "provenance reported by"; 2162 case CLINRPT: return "clinician reported"; 2163 case DEVRPT: return "device reported"; 2164 case HCPRPT: return "healthcare professional reported"; 2165 case PACQRPT: return "patient acquaintance reported"; 2166 case PATRPT: return "patient reported"; 2167 case PAYRPT: return "payer reported"; 2168 case PRORPT: return "professional reported"; 2169 case SDMRPT: return "substitute decision maker reported"; 2170 case SECTRSTOBV: return "security trust observation"; 2171 case TRSTACCRDOBV: return "trust accreditation observation"; 2172 case TRSTAGREOBV: return "trust agreement observation"; 2173 case TRSTCERTOBV: return "trust certificate observation"; 2174 case TRSTLOAOBV: return "trust assurance observation"; 2175 case LOAAN: return "authentication level of assurance value"; 2176 case LOAAN1: return "low authentication level of assurance"; 2177 case LOAAN2: return "basic authentication level of assurance"; 2178 case LOAAN3: return "medium authentication level of assurance"; 2179 case LOAAN4: return "high authentication level of assurance"; 2180 case LOAAP: return "authentication process level of assurance value"; 2181 case LOAAP1: return "low authentication process level of assurance"; 2182 case LOAAP2: return "basic authentication process level of assurance"; 2183 case LOAAP3: return "medium authentication process level of assurance"; 2184 case LOAAP4: return "high authentication process level of assurance"; 2185 case LOAAS: return "assertion level of assurance value"; 2186 case LOAAS1: return "low assertion level of assurance"; 2187 case LOAAS2: return "basic assertion level of assurance"; 2188 case LOAAS3: return "medium assertion level of assurance"; 2189 case LOAAS4: return "high assertion level of assurance"; 2190 case LOACM: return "token and credential management level of assurance value)"; 2191 case LOACM1: return "low token and credential management level of assurance"; 2192 case LOACM2: return "basic token and credential management level of assurance"; 2193 case LOACM3: return "medium token and credential management level of assurance"; 2194 case LOACM4: return "high token and credential management level of assurance"; 2195 case LOAID: return "identity proofing level of assurance"; 2196 case LOAID1: return "low identity proofing level of assurance"; 2197 case LOAID2: return "basic identity proofing level of assurance"; 2198 case LOAID3: return "medium identity proofing level of assurance"; 2199 case LOAID4: return "high identity proofing level of assurance"; 2200 case LOANR: return "non-repudiation level of assurance value"; 2201 case LOANR1: return "low non-repudiation level of assurance"; 2202 case LOANR2: return "basic non-repudiation level of assurance"; 2203 case LOANR3: return "medium non-repudiation level of assurance"; 2204 case LOANR4: return "high non-repudiation level of assurance"; 2205 case LOARA: return "remote access level of assurance value"; 2206 case LOARA1: return "low remote access level of assurance"; 2207 case LOARA2: return "basic remote access level of assurance"; 2208 case LOARA3: return "medium remote access level of assurance"; 2209 case LOARA4: return "high remote access level of assurance"; 2210 case LOATK: return "token level of assurance value"; 2211 case LOATK1: return "low token level of assurance"; 2212 case LOATK2: return "basic token level of assurance"; 2213 case LOATK3: return "medium token level of assurance"; 2214 case LOATK4: return "high token level of assurance"; 2215 case TRSTMECOBV: return "none supplied 6"; 2216 case _SEVERITYOBSERVATION: return "SeverityObservation"; 2217 case H: return "High"; 2218 case L: return "Low"; 2219 case M: return "Moderate"; 2220 case _SUBJECTBODYPOSITION: return "_SubjectBodyPosition"; 2221 case LLD: return "left lateral decubitus"; 2222 case PRN: return "prone"; 2223 case RLD: return "right lateral decubitus"; 2224 case SFWL: return "Semi-Fowler's"; 2225 case SIT: return "sitting"; 2226 case STN: return "standing"; 2227 case SUP: return "supine"; 2228 case RTRD: return "reverse trendelenburg"; 2229 case TRD: return "trendelenburg"; 2230 case _VERIFICATIONOUTCOMEVALUE: return "verification outcome"; 2231 case ACT: return "active coverage"; 2232 case ACTPEND: return "active - pending investigation"; 2233 case ELG: return "eligible"; 2234 case INACT: return "inactive"; 2235 case INPNDINV: return "inactive - pending investigation"; 2236 case INPNDUPD: return "inactive - pending eligibility update"; 2237 case NELG: return "not eligible"; 2238 case _ANNOTATIONVALUE: return "AnnotationValue"; 2239 case _COMMONCLINICALOBSERVATIONVALUE: return "common clinical observation"; 2240 case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "Individual Case Safety Report Value Domains"; 2241 case _INDICATIONVALUE: return "IndicationValue"; 2242 case NULL: return null; 2243 default: return "?"; 2244 } 2245 } 2246 2247 2248}