001package org.hl7.fhir.dstu2016may.model.codesystems;
002
003
004
005
006/*
007  Copyright (c) 2011+, HL7, Inc.
008  All rights reserved.
009  
010  Redistribution and use in source and binary forms, with or without modification, 
011  are permitted provided that the following conditions are met:
012  
013   * Redistributions of source code must retain the above copyright notice, this 
014     list of conditions and the following disclaimer.
015   * Redistributions in binary form must reproduce the above copyright notice, 
016     this list of conditions and the following disclaimer in the documentation 
017     and/or other materials provided with the distribution.
018   * Neither the name of HL7 nor the names of its contributors may be used to 
019     endorse or promote products derived from this software without specific 
020     prior written permission.
021  
022  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND 
023  ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 
024  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 
025  IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, 
026  INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 
027  NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 
028  PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 
029  WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 
030  ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 
031  POSSIBILITY OF SUCH DAMAGE.
032  
033*/
034
035// Generated on Sun, May 8, 2016 03:05+1000 for FHIR v1.4.0
036
037
038import org.hl7.fhir.exceptions.FHIRException;
039
040public enum V3ObservationValue {
041
042        /**
043         * Codes specify the category of observation, evidence, or document used to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. The type of evidence is coded as observation values.
044         */
045        _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE, 
046        /**
047         * Code specifying financial indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay stub; tax or income document; asset document; living expenses.
048         */
049        _ACTFINANCIALSTATUSOBSERVATIONVALUE, 
050        /**
051         * Codes specifying asset indicators used to assess or establish eligibility for coverage under a policy or program.
052         */
053        ASSET, 
054        /**
055         * Indicator of annuity ownership or status as beneficiary.
056         */
057        ANNUITY, 
058        /**
059         * Indicator of real property ownership, e.g., deed or real estate contract.
060         */
061        PROP, 
062        /**
063         * Indicator of retirement investment account ownership.
064         */
065        RETACCT, 
066        /**
067         * Indicator of status as trust beneficiary.
068         */
069        TRUST, 
070        /**
071         * Code specifying income indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay or pension check, child support payments received or provided, and taxes paid.
072         */
073        INCOME, 
074        /**
075         * Indicator of child support payments received or provided.
076         */
077        CHILD, 
078        /**
079         * Indicator of disability income replacement payment.
080         */
081        DISABL, 
082        /**
083         * Indicator of investment income, e.g., dividend check, annuity payment; real estate rent, investment divestiture proceeds; trust or endowment check.
084         */
085        INVEST, 
086        /**
087         * Indicator of paid employment, e.g., letter of hire, contract, employer letter; copy of pay check or pay stub.
088         */
089        PAY, 
090        /**
091         * Indicator of retirement payment, e.g., pension check.
092         */
093        RETIRE, 
094        /**
095         * Indicator of spousal or partner support payments received or provided; e.g., alimony payment; support stipulations in a divorce settlement.
096         */
097        SPOUSAL, 
098        /**
099         * Indicator of income supplement, e.g., gifting, parental income support; stipend, or grant.
100         */
101        SUPPLE, 
102        /**
103         * Indicator of tax obligation or payment, e.g., statement of taxable income.
104         */
105        TAX, 
106        /**
107         * Codes specifying living expense indicators used to assess or establish eligibility for coverage under a policy or program.
108         */
109        LIVEXP, 
110        /**
111         * Indicator of clothing expenses.
112         */
113        CLOTH, 
114        /**
115         * Indicator of transportation expenses.
116         */
117        FOOD, 
118        /**
119         * Indicator of health expenses; including medication costs, health service costs, financial participations, and health coverage premiums.
120         */
121        HEALTH, 
122        /**
123         * Indicator of housing expense, e.g., household appliances, fixtures, furnishings, and maintenance and repairs.
124         */
125        HOUSE, 
126        /**
127         * Indicator of legal expenses.
128         */
129        LEGAL, 
130        /**
131         * Indicator of mortgage amount, interest, and payments.
132         */
133        MORTG, 
134        /**
135         * Indicator of rental or lease payments.
136         */
137        RENT, 
138        /**
139         * Indicator of transportation expenses.
140         */
141        SUNDRY, 
142        /**
143         * Indicator of transportation expenses, e.g., vehicle payments, vehicle insurance, vehicle fuel, and vehicle maintenance and repairs.
144         */
145        TRANS, 
146        /**
147         * Indicator of transportation expenses.
148         */
149        UTIL, 
150        /**
151         * Code specifying eligibility indicators used to assess or establish eligibility for coverage under a policy or program eligibility status, e.g., certificates of creditable coverage; student enrollment; adoption, marriage or birth certificate.
152         */
153        ELSTAT, 
154        /**
155         * Indicator of adoption.
156         */
157        ADOPT, 
158        /**
159         * Indicator of birth.
160         */
161        BTHCERT, 
162        /**
163         * Indicator of creditable coverage.
164         */
165        CCOC, 
166        /**
167         * Indicator of driving status.
168         */
169        DRLIC, 
170        /**
171         * Indicator of foster child status.
172         */
173        FOSTER, 
174        /**
175         * Indicator of status as covered member under a policy or program, e.g., member id card or coverage document.
176         */
177        MEMBER, 
178        /**
179         * Indicator of military status.
180         */
181        MIL, 
182        /**
183         * Indicator of marriage status.
184         */
185        MRGCERT, 
186        /**
187         * Indicator of citizenship.
188         */
189        PASSPORT, 
190        /**
191         * Indicator of student status.
192         */
193        STUDENRL, 
194        /**
195         * Code specifying non-clinical indicators related to health status used to assess or establish eligibility for coverage under a policy or program, e.g., pregnancy, disability, drug use, mental health issues.
196         */
197        HLSTAT, 
198        /**
199         * Indication of disability.
200         */
201        DISABLE, 
202        /**
203         * Indication of drug use.
204         */
205        DRUG, 
206        /**
207         * Indication of IV drug use .
208         */
209        IVDRG, 
210        /**
211         * Non-clinical report of pregnancy.
212         */
213        PGNT, 
214        /**
215         * Code specifying observations related to living dependency, such as dependent upon spouse for activities of daily living.
216         */
217        LIVDEP, 
218        /**
219         * Continued living in private residence requires functional and health care assistance from one or more relatives.
220         */
221        RELDEP, 
222        /**
223         * Continued living in private residence requires functional and health care assistance from spouse or life partner.
224         */
225        SPSDEP, 
226        /**
227         * Continued living in private residence requires functional and health care assistance from one or more unrelated persons.
228         */
229        URELDEP, 
230        /**
231         * Code specifying observations related to living situation for a person in a private residence.
232         */
233        LIVSIT, 
234        /**
235         * Living alone.  Maps to PD1-2   Living arrangement   (IS)   00742 [A]
236         */
237        ALONE, 
238        /**
239         * Living with one or more dependent children requiring moderate supervision.
240         */
241        DEPCHD, 
242        /**
243         * Living with disabled spouse requiring functional and health care assistance
244         */
245        DEPSPS, 
246        /**
247         * Living with one or more dependent children requiring intensive supervision
248         */
249        DEPYGCHD, 
250        /**
251         * Living with family. Maps to PD1-2   Living arrangement   (IS)   00742 [F]
252         */
253        FAM, 
254        /**
255         * Living with one or more relatives. Maps to PD1-2   Living arrangement   (IS)   00742 [R]
256         */
257        RELAT, 
258        /**
259         * Living only with spouse or life partner. Maps to PD1-2   Living arrangement   (IS)   00742 [S]
260         */
261        SPS, 
262        /**
263         * Living with one or more unrelated persons.
264         */
265        UNREL, 
266        /**
267         * Code specifying observations or indicators related to socio-economic status used to assess to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program.
268         */
269        SOECSTAT, 
270        /**
271         * Indication of abuse victim.
272         */
273        ABUSE, 
274        /**
275         * Indication of status as homeless.
276         */
277        HMLESS, 
278        /**
279         * Indication of status as illegal immigrant.
280         */
281        ILGIM, 
282        /**
283         * Indication of status as incarcerated.
284         */
285        INCAR, 
286        /**
287         * Indication of probation status.
288         */
289        PROB, 
290        /**
291         * Indication of refugee status.
292         */
293        REFUG, 
294        /**
295         * Indication of unemployed status.
296         */
297        UNEMPL, 
298        /**
299         * Indicates the result of a particular allergy test.  E.g. Negative, Mild, Moderate, Severe
300         */
301        _ALLERGYTESTVALUE, 
302        /**
303         * Description:Patient exhibits no reaction to the challenge agent.
304         */
305        A0, 
306        /**
307         * Description:Patient exhibits a minimal reaction to the challenge agent.
308         */
309        A1, 
310        /**
311         * Description:Patient exhibits a mild reaction to the challenge agent.
312         */
313        A2, 
314        /**
315         * Description:Patient exhibits moderate reaction to the challenge agent.
316         */
317        A3, 
318        /**
319         * Description:Patient exhibits a severe reaction to the challenge agent.
320         */
321        A4, 
322        /**
323         * Description:Coded observation values for coverage limitations, for e.g., types of claims or types of parties covered under a policy or program.
324         */
325        _COVERAGELIMITOBSERVATIONVALUE, 
326        /**
327         * Description:Coded observation values for types of covered parties under a policy or program based on their personal relationships or employment status.
328         */
329        _COVERAGELEVELOBSERVATIONVALUE, 
330        /**
331         * Description:Child over an age as specified by coverage policy or program, e.g., student, differently abled, and income dependent.
332         */
333        ADC, 
334        /**
335         * Description:Dependent biological, adopted, foster child as specified by coverage policy or program.
336         */
337        CHD, 
338        /**
339         * Description:Person requiring functional and/or financial assistance from another person as specified by coverage policy or program.
340         */
341        DEP, 
342        /**
343         * Description:Persons registered as a family unit in a domestic partner registry as specified by law and by coverage policy or program.
344         */
345        DP, 
346        /**
347         * Description:An individual employed by an employer who receive remuneration in wages, salary, commission, tips, piece-rates, or pay-in-kind through the employeraTMs payment system (i.e., not a contractor) as specified by coverage policy or program.
348         */
349        ECH, 
350        /**
351         * Description:As specified by coverage policy or program.
352         */
353        FLY, 
354        /**
355         * Description:Person as specified by coverage policy or program.
356         */
357        IND, 
358        /**
359         * Description:A pair of people of the same gender who live together as a family as specified by coverage policy or program, e.g., Naomi and Ruth from the Book of Ruth; Socrates and Alcibiades
360         */
361        SSP, 
362        /**
363         * A clinical judgment as to the worst case result of a future exposure (including substance administration). When the worst case result is assessed to have a life-threatening or organ system threatening potential, it is considered to be of high criticality.
364         */
365        _CRITICALITYOBSERVATIONVALUE, 
366        /**
367         * Worst case result of a future exposure is assessed to be life-threatening or having high potential for organ system failure.
368         */
369        CRITH, 
370        /**
371         * Worst case result of a future exposure is not assessed to be life-threatening or having high potential for organ system failure.
372         */
373        CRITL, 
374        /**
375         * Unable to assess the worst case result of a future exposure.
376         */
377        CRITU, 
378        /**
379         * Description: The domain contains genetic analysis specific observation values, e.g. Homozygote, Heterozygote, etc.
380         */
381        _GENETICOBSERVATIONVALUE, 
382        /**
383         * Description: An individual having different alleles at one or more loci regarding a specific character
384         */
385        HOMOZYGOTE, 
386        /**
387         * Observation values used to indicate the type of scoring (e.g. proportion, ratio) used by a health quality measure.
388         */
389        _OBSERVATIONMEASURESCORING, 
390        /**
391         * A measure in which either short-term cross-section or long-term longitudinal analysis is performed over a group of subjects defined by a set of common properties or defining characteristics (e.g., Male smokers between the ages of 40 and 50 years, exposure to treatment, exposure duration).
392         */
393        COHORT, 
394        /**
395         * A measure score in which each individual value for the measure can fall anywhere along a continuous scale (e.g., mean time to thrombolytics which aggregates the time in minutes from a case presenting with chest pain to the time of administration of thrombolytics).
396         */
397        CONTVAR, 
398        /**
399         * A score derived by dividing the number of cases that meet a criterion for quality (the numerator) by the number of eligible cases within a given time frame (the denominator) where the numerator cases are a subset of the denominator cases (e.g., percentage of eligible women with a mammogram performed in the last year).
400         */
401        PROPOR, 
402        /**
403         * A score that may have a value of zero or greater that is derived by dividing a count of one type of data by a count of another type of data (e.g., the number of patients with central lines who develop infection divided by the number of central line days).
404         */
405        RATIO, 
406        /**
407         * Observation values used to indicate what kind of health quality measure is used.
408         */
409        _OBSERVATIONMEASURETYPE, 
410        /**
411         * A measure that is composed from one or more other measures and indicates an overall summary of those measures.
412         */
413        COMPOSITE, 
414        /**
415         * A measure related to the efficiency of medical treatment.
416         */
417        EFFICIENCY, 
418        /**
419         * A measure related to the level of patient engagement or patient experience of care.
420         */
421        EXPERIENCE, 
422        /**
423         * A measure that indicates the result of the performance (or non-performance) of a function or process.
424         */
425        OUTCOME, 
426        /**
427         * A measure which focuses on a process which leads to a certain outcome, meaning that a scientific basis exists for believing that the process, when executed well, will increase the probability of achieving a desired outcome.
428         */
429        PROCESS, 
430        /**
431         * A measure related to the extent of use of clinical resources or cost of care.
432         */
433        RESOURCE, 
434        /**
435         * A measure related to the structure of patient care.
436         */
437        STRUCTURE, 
438        /**
439         * Observation values used to assert various populations that a subject falls into.
440         */
441        _OBSERVATIONPOPULATIONINCLUSION, 
442        /**
443         * Patients who should be removed from the eMeasure population and denominator before determining if numerator criteria are met. Denominator exclusions are used in proportion and ratio measures to help narrow the denominator.
444         */
445        DENEX, 
446        /**
447         * Denominator exceptions are those conditions that should remove a patient, procedure or unit of measurement from the denominator only if the numerator criteria are not met. Denominator exceptions allow for adjustment of the calculated score for those providers with higher risk populations. Denominator exceptions are used only in proportion eMeasures. They are not appropriate for ratio or continuous variable eMeasures.  Denominator exceptions allow for the exercise of clinical judgment and should be specifically defined where capturing the information in a structured manner fits the clinical workflow. Generic denominator exception reasons used in proportion eMeasures fall into three general categories:
448
449                        
450                           Medical reasons
451                           Patient reasons
452                           System reasons
453         */
454        DENEXCEP, 
455        /**
456         * It can be the same as the initial patient population or a subset of the initial patient population to further constrain the population for the purpose of the eMeasure. Different measures within an eMeasure set may have different Denominators. Continuous Variable eMeasures do not have a Denominator, but instead define a Measure Population.
457         */
458        DENOM, 
459        /**
460         * The initial population refers to all entities to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs.
461         */
462        IP, 
463        /**
464         * The initial patient population refers to all patients to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. Details often include information based upon specific age groups, diagnoses, diagnostic and procedure codes, and enrollment periods.
465         */
466        IPP, 
467        /**
468         * Measure population is used only in continuous variable eMeasures. It is a narrative description of the eMeasure population. 
469(e.g., all patients seen in the Emergency Department during the measurement period).
470         */
471        MSRPOPL, 
472        /**
473         * Numerators are used in proportion and ratio eMeasures. In proportion measures the numerator criteria are the processes or outcomes expected for each patient, procedure, or other unit of measurement defined in the denominator. In ratio measures the numerator is related, but not directly derived from the denominator (e.g., a numerator listing the number of central line blood stream infections and a denominator indicating the days per thousand of central line usage in a specific time period).
474         */
475        NUMER, 
476        /**
477         * Numerator Exclusions are used only in ratio eMeasures to define instances that should not be included in the numerator data. (e.g., if the number of central line blood stream infections per 1000 catheter days were to exclude infections with a specific bacterium, that bacterium would be listed as a numerator exclusion.)
478         */
479        NUMEX, 
480        /**
481         * PartialCompletionScale
482         */
483        _PARTIALCOMPLETIONSCALE, 
484        /**
485         * Value for Act.partialCompletionCode attribute that implies 81-99% completion
486         */
487        G, 
488        /**
489         * Value for Act.partialCompletionCode attribute that implies 61-80% completion
490         */
491        LE, 
492        /**
493         * Value for Act.partialCompletionCode attribute that implies 41-60% completion
494         */
495        ME, 
496        /**
497         * Value for Act.partialCompletionCode attribute that implies 1-20% completion
498         */
499        MI, 
500        /**
501         * Value for Act.partialCompletionCode attribute that implies 0% completion
502         */
503        N, 
504        /**
505         * Value for Act.partialCompletionCode attribute that implies 21-40% completion
506         */
507        S, 
508        /**
509         * Observation values used to indicate security observation metadata.
510         */
511        _SECURITYOBSERVATIONVALUE, 
512        /**
513         * Abstract security observation values used to indicate security integrity metadata.
514
515                        
516                           Examples: Codes conveying integrity status, integrity confidence, and provenance.
517         */
518        _SECINTOBV, 
519        /**
520         * Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability)
521         */
522        _SECALTINTOBV, 
523        /**
524         * Security metadata observation values used to indicate the use of a more abstract version of the content, e.g., replacing exact value of an age or date field with a range, or remove the left digits of a credit card number or SSN.
525         */
526        ABSTRED, 
527        /**
528         * Security metadata observation values used to indicate the use of an algorithmic combination of actual values with the result of an aggregate function, e.g., average, sum, or count in order to limit disclosure of an IT resource (data, information object, service, or system capability) to the minimum necessary.
529         */
530        AGGRED, 
531        /**
532         * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by used to indicate the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject.  No key to relink the data is retained.
533         */
534        ANONYED, 
535        /**
536         * Security metadata observation value used to indicate that the IT resource semantic content has been transformed from one encoding to another.
537
538                        
539                           Usage Note: "MAP" code does not indicate the semantic fidelity of the transformed content.
540
541                        To indicate semantic fidelity for maps of HL7 to other code systems, this security alteration integrity observation may be further specified using an Act valued with Value Set: MapRelationship (2.16.840.1.113883.1.11.11052).
542
543                        Semantic fidelity of the mapped IT Resource may also be indicated using a SecurityIntegrityConfidenceObservation.
544         */
545        MAPPED, 
546        /**
547         * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by indicating the mechanism by which software systems can make data unintelligible (that is, as unreadable and unusable by algorithmically transforming plaintext into ciphertext) such that it can only be accessed or used by authorized users.  An authorized user may be provided a key to decrypt per license or "shared secret".
548
549                        
550                           Usage Note: "MASKED" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has been further encrypted, and may be accessed only by an authorized user or receiver to which a decryption key is provided.
551         */
552        MASKED, 
553        /**
554         * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability), by indicating the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject.  Custodian may retain a key to relink data necessary to reidentify the information subject.
555
556                        
557                           Rationale: Personal data which has been processed to make it impossible to know whose data it is. Used particularly for secondary use of health data. In some cases, it may be possible for authorized individuals to restore the identity of the individual, e.g.,for public health case management.  Based on ISO/TS 25237:2008 Health informatics—Pseudonymization
558         */
559        PSEUDED, 
560        /**
561         * Security metadata observation value used to indicate the mechanism by which software systems can filter an IT resource (data, information object, service, or system capability) to remove any portion of the resource that is not authorized to be access, used, or disclosed.
562
563                        
564                           Usage Note: "REDACTED" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has filtered and not included in the content accessed or received.
565         */
566        REDACTED, 
567        /**
568         * Metadata observation used to indicate that some information has been removed from the source object when the view this object contains was constructed because of configuration options when the view was created. The content may not be suitable for use as the basis of a record update
569
570                        
571                           Usage Note: This is not suitable to be used when information is removed for security reasons - see the code REDACTED for this use.
572         */
573        SUBSETTED, 
574        /**
575         * Security metadata observation value used to indicate that the IT resource syntax has been transformed from one syntactical representation to another.  
576
577                        
578                           Usage Note: "SYNTAC" code does not indicate the syntactical correctness of the syntactically transformed IT resource.
579         */
580        SYNTAC, 
581        /**
582         * Security metadata observation value used to indicate that the IT resource has been translated from one human language to another.  
583
584                        
585                           Usage Note: "TRSLT" does not indicate the fidelity of the translation or the languages translated.
586
587                        The fidelity of the IT Resource translation may be indicated using a SecurityIntegrityConfidenceObservation.
588
589                        To indicate languages, use the Value Set:HumanLanguage (2.16.840.1.113883.1.11.11526)
590         */
591        TRSLT, 
592        /**
593         * Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability)  which indicates that the resource only retains versions of an IT resource  for access and use per applicable policy
594
595                        
596                           Usage Note: When this code is used, expectation is that the system has removed historical versions of the data that falls outside the time period deemed to be the effective time of the applicable version.
597         */
598        VERSIONED, 
599        /**
600         * Abstract security observation values used to indicate data integrity metadata.
601
602                        
603                           Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function.
604         */
605        _SECDATINTOBV, 
606        /**
607         * Security metadata observation value used to indicate the mechanism by which software systems can establish that data was not modified in transit.
608
609                        
610                           Rationale: This definition is intended to align with the ISO 22600-2 3.3.19 definition of cryptographic checkvalue: Information which is derived by performing a cryptographic transformation (see cryptography) on the data unit.  The derivation of the checkvalue may be performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit.
611
612                        
613                           Examples: 
614                        
615
616                        
617                           SHA-1
618                           SHA-2 (Secure Hash Algorithm)
619         */
620        CRYTOHASH, 
621        /**
622         * Security metadata observation value used to indicate the mechanism by which software systems use digital signature to establish that data has not been modified.  
623
624                        
625                           Rationale: This definition is intended to align with the ISO 22600-2 3.3.26 definition of digital signature:  Data appended to, or a cryptographic transformation (see cryptography) of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g., by the recipient.
626         */
627        DIGSIG, 
628        /**
629         * Abstract security observation value used to indicate integrity confidence metadata.
630
631                        
632                           Examples: Codes conveying the level of reliability and trustworthiness of an IT resource.
633         */
634        _SECINTCONOBV, 
635        /**
636         * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be very high.
637         */
638        HRELIABLE, 
639        /**
640         * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be adequate.
641         */
642        RELIABLE, 
643        /**
644         * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be uncertain.
645         */
646        UNCERTREL, 
647        /**
648         * Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be inadequate.
649         */
650        UNRELIABLE, 
651        /**
652         * Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability).
653
654                        
655                           Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.
656         */
657        _SECINTPRVOBV, 
658        /**
659         * Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability).
660
661                        
662                           Examples: Codes conveying the provenance metadata about the entity asserting the resource.
663         */
664        _SECINTPRVABOBV, 
665        /**
666         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a clinician.
667         */
668        CLINAST, 
669        /**
670         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a device.
671         */
672        DEVAST, 
673        /**
674         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a healthcare professional.
675         */
676        HCPAST, 
677        /**
678         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient acquaintance.
679         */
680        PACQAST, 
681        /**
682         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient.
683         */
684        PATAST, 
685        /**
686         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a payer.
687         */
688        PAYAST, 
689        /**
690         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a professional.
691         */
692        PROAST, 
693        /**
694         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a substitute decision maker.
695         */
696        SDMAST, 
697        /**
698         * Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability).
699
700                        
701                           Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.
702         */
703        _SECINTPRVRBOBV, 
704        /**
705         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a clinician.
706         */
707        CLINRPT, 
708        /**
709         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a device.
710         */
711        DEVRPT, 
712        /**
713         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a healthcare professional.
714         */
715        HCPRPT, 
716        /**
717         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient acquaintance.
718         */
719        PACQRPT, 
720        /**
721         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient.
722         */
723        PATRPT, 
724        /**
725         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a payer.
726         */
727        PAYRPT, 
728        /**
729         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a professional.
730         */
731        PRORPT, 
732        /**
733         * Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a substitute decision maker.
734         */
735        SDMRPT, 
736        /**
737         * Observation value used to indicate aspects of trust applicable to an IT resource (data, information object, service, or system capability).
738         */
739        SECTRSTOBV, 
740        /**
741         * Values for security trust accreditation metadata observation made about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework.
742         */
743        TRSTACCRDOBV, 
744        /**
745         * Values for security trust agreement metadata observation made about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1]
746[ISO IEC 10181-1]
747         */
748        TRSTAGREOBV, 
749        /**
750         * Values for security trust certificate metadata observation made about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1]
751
752                        For example, a Certificate Policy (CP), which is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements.  A particular Certificate Policy might indicate the applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range.  Another example is Cross Certification with Federal Bridge.
753         */
754        TRSTCERTOBV, 
755        /**
756         * Values for security trust assurance metadata observation made about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol.
757         */
758        TRSTLOAOBV, 
759        /**
760         * The value assigned as the indicator of the digital quality or reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2]
761
762                        For example, the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]
763         */
764        LOAAN, 
765        /**
766         * Indicator of low digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 
767
768                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 
769
770                        Low authentication level of assurance indicates that the relying party may have little or no confidence in the asserted identity's validity. Level 1 requires little or no confidence in the asserted identity. No identity proofing is required at this level, but the authentication mechanism should provide some assurance that the same claimant is accessing the protected transaction or data. A wide range of available authentication technologies can be employed and any of the token methods of Levels 2, 3, or 4, including Personal Identification Numbers (PINs), may be used. To be authenticated, the claimant must prove control of the token through a secure authentication protocol. At Level 1, long-term shared authentication secrets may be revealed to verifiers.  Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
771         */
772        LOAAN1, 
773        /**
774         * Indicator of basic digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 
775
776                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]
777
778                        Basic authentication level of assurance indicates that the relying party may have some confidence in the asserted identity's validity. Level 2 requires confidence that the asserted identity is accurate. Level 2 provides for single-factor remote network authentication, including identity-proofing requirements for presentation of identifying materials or information. A wide range of available authentication technologies can be employed, including any of the token methods of Levels 3 or 4, as well as passwords. Successful authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token.  Eavesdropper, replay, and online guessing attacks are prevented.  
779Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are required. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
780         */
781        LOAAN2, 
782        /**
783         * Indicator of medium digital quality or reliability of the digital reliability of verification and validation of the process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 
784
785                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] 
786
787                        Medium authentication level of assurance indicates that the relying party may have high confidence in the asserted identity's validity.  Level 3 is appropriate for transactions that need high confidence in the accuracy of the asserted identity. Level 3 provides multifactor remote network authentication. At this level, identity-proofing procedures require verification of identifying materials and information. Authentication is based on proof of possession of a key or password through a cryptographic protocol. Cryptographic strength mechanisms should protect the primary authentication token (a cryptographic key) against compromise by the protocol threats, including eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks. A minimum of two authentication factors is required. Three kinds of tokens may be used:
788
789                        
790                           "soft" cryptographic token, which has the key stored on a general-purpose computer, 
791                           "hard" cryptographic token, which has the key stored on a special hardware device, and 
792                           "one-time password" device token, which has symmetric key stored on a personal hardware device that is a cryptographic module validated at FIPS 140-2 Level 1 or higher. Validation testing of cryptographic modules and algorithms for conformance to Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, is managed by NIST.
793                        
794                        Authentication requires that the claimant prove control of the token through a secure authentication protocol. The token must be unlocked with a password or biometric representation, or a password must be used in a secure authentication protocol, to establish two-factor authentication. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are used for all operations.  Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.    [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
795         */
796        LOAAN3, 
797        /**
798         * Indicator of high digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] 
799
800                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]
801
802                        High authentication level of assurance indicates that the relying party may have very high confidence in the asserted identity's validity. Level 4 is for transactions that need very high confidence in the accuracy of the asserted identity. Level 4 provides the highest practical assurance of remote network authentication. Authentication is based on proof of possession of a key through a cryptographic protocol. This level is similar to Level 3 except that only “hard� cryptographic tokens are allowed, cryptographic module validation requirements are strengthened, and subsequent critical data transfers must be authenticated via a key that is bound to the authentication process. The token should be a hardware cryptographic module validated at FIPS 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. This level requires a physical token, which cannot readily be copied, and operator authentication at Level 2 and higher, and ensures good, two-factor remote authentication.
803
804                        Level 4 requires strong cryptographic authentication of all parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks are prevented. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Strong approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
805         */
806        LOAAN4, 
807        /**
808         * The value assigned as the indicator of the digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
809         */
810        LOAAP, 
811        /**
812         * Indicator of the low digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
813
814                        Low authentication process level of assurance indicates that (1) long-term shared authentication secrets may be revealed to verifiers; and (2) assertions and assertion references require protection from manufacture/modification and reuse attacks.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
815         */
816        LOAAP1, 
817        /**
818         * Indicator of the basic digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
819
820                        Basic authentication process level of assurance indicates that long-term shared authentication secrets are never revealed to any other party except Credential Service Provider (CSP).  Sessions (temporary) shared secrets may be provided to independent verifiers by CSP. Long-term shared authentication secrets, if used, are never revealed to any other party except Verifiers operated by the Credential Service Provider (CSP); however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 1 requirements, assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
821         */
822        LOAAP2, 
823        /**
824         * Indicator of the medium digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
825
826                        Medium authentication process level of assurance indicates that the token can be unlocked with password, biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication.  Long-term shared authentication secrets are never revealed to any party except the Claimant and Credential Service Provider (CSP).
827
828                        Authentication requires that the Claimant prove, through a secure authentication protocol, that he or she controls the token. The Claimant unlocks the token with a password or biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication (through proof of possession of a physical or software token in combination with some memorized secret knowledge). Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 2 requirements, assertions are protected against repudiation by the Verifier.
829         */
830        LOAAP3, 
831        /**
832         * Indicator of the high digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]
833
834                        High authentication process level of assurance indicates all sensitive data transfer are cryptographically authenticated using keys bound to the authentication process.  Level 4 requires strong cryptographic authentication of all communicating parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the Claimant prove through a secure authentication protocol that he or she controls the token. All protocol threats at Level 3 are required to be prevented at Level 4. Protocols shall also be strongly resistant to man-in-the-middle attacks. Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. Approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
835         */
836        LOAAP4, 
837        /**
838         * The value assigned as the indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
839         */
840        LOAAS, 
841        /**
842         * Indicator of the low quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
843
844                        Assertions and assertion references require protection from modification and reuse attacks.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
845         */
846        LOAAS1, 
847        /**
848         * Indicator of the basic quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
849
850                        Assertions are resistant to disclosure, redirection, capture and substitution attacks.  Approved cryptographic techniques are required for all assertion protocols.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
851         */
852        LOAAS2, 
853        /**
854         * Indicator of the medium quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
855
856                        Assertions are protected against repudiation by the verifier.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
857         */
858        LOAAS3, 
859        /**
860         * Indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.
861
862                        Strongly resistant to man-in-the-middle attacks. "Bearer" assertions are not used.  "Holder-of-key" assertions may be used. RP maintains records of the assertions.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]
863         */
864        LOAAS4, 
865        /**
866         * Indicator of the digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
867         */
868        LOACM, 
869        /**
870         * Indicator of the low digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Little or no confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include weak identity binding to tokens and plaintext passwords or secrets not transmitted across a network. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
871         */
872        LOACM1, 
873        /**
874         * Indicator of the basic digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity.  Some confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include:  Verification must prove claimant controls the token; token resists online guessing, replay, session hijacking, and eavesdropping attacks; and  token is at least weakly resistant to man-in-the middle attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
875         */
876        LOACM2, 
877        /**
878         * Indicator of the medium digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity.  High confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics  include: Ownership of token verifiable through security authentication protocol and credential management protects against verifier impersonation attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
879         */
880        LOACM3, 
881        /**
882         * Indicator of the high digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity.  Very high confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verifier can prove control of token through a secure protocol; credential management supports strong cryptographic authentication of all communication parties. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
883         */
884        LOACM4, 
885        /**
886         * Indicator of the quality or reliability in the process of ascertaining that an individual is who he or she claims to be.
887         */
888        LOAID, 
889        /**
890         * Indicator of low digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires that a continuity of identity be maintained but does not require identity proofing. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
891         */
892        LOAID1, 
893        /**
894         * Indicator of some digital quality or reliability in the process of ascertaining that that an individual is who he or she claims to be. Requires identity proofing via presentation of identifying material or information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
895         */
896        LOAID2, 
897        /**
898         * Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
899         */
900        LOAID3, 
901        /**
902         * Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
903         */
904        LOAID4, 
905        /**
906         * Indicator of the digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
907         */
908        LOANR, 
909        /**
910         * Indicator of low digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
911         */
912        LOANR1, 
913        /**
914         * Indicator of basic digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
915         */
916        LOANR2, 
917        /**
918         * Indicator of medium digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
919         */
920        LOANR3, 
921        /**
922         * Indicator of high digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]
923         */
924        LOANR4, 
925        /**
926         * Indicator of the digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]
927         */
928        LOARA, 
929        /**
930         * Indicator of low digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]
931         */
932        LOARA1, 
933        /**
934         * Indicator of basic digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]
935         */
936        LOARA2, 
937        /**
938         * Indicator of medium digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]
939         */
940        LOARA3, 
941        /**
942         * Indicator of high digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization's security controls. [Based on NIST SP 800-63-2]
943         */
944        LOARA4, 
945        /**
946         * Indicator of the digital quality or reliability of single and multi-token authentication. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
947         */
948        LOATK, 
949        /**
950         * Indicator of the low digital quality or reliability of single and multi-token authentication. Permits the use of any of the token methods of Levels 2, 3, or 4. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
951         */
952        LOATK1, 
953        /**
954         * Indicator of the basic digital quality or reliability of single and multi-token authentication. Requires single factor authentication using memorized secret tokens, pre-registered knowledge tokens, look-up secret tokens, out of band tokens, or single factor one-time password devices. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
955         */
956        LOATK2, 
957        /**
958         * Indicator of the medium digital quality or reliability of single and multi-token authentication. Requires two authentication factors. Provides multi-factor remote network authentication. Permits multi-factor software cryptographic token. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
959         */
960        LOATK3, 
961        /**
962         * Indicator of the high digital quality or reliability of single and multi-token authentication. Requires token that is a hardware cryptographic module validated at validated at Federal Information Processing Standard (FIPS) 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. Level 4 token requirements can be met by using the PIV authentication key of a FIPS 201 compliant Personal Identity Verification (PIV) Card.  [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]
963         */
964        LOATK4, 
965        /**
966         * Values for security trust mechanism metadata observation made about a security architecture system component that supports enforcement of security policies.
967         */
968        TRSTMECOBV, 
969        /**
970         * Potential values for observations of severity.
971         */
972        _SEVERITYOBSERVATION, 
973        /**
974         * Indicates the condition may be life-threatening or has the potential to cause permanent injury.
975         */
976        H, 
977        /**
978         * Indicates the condition may result in some adverse consequences but is unlikely to substantially affect the situation of the subject.
979         */
980        L, 
981        /**
982         * Indicates the condition may result in noticable adverse adverse consequences but is unlikely to be life-threatening or cause permanent injury.
983         */
984        M, 
985        /**
986         * Contains codes for defining the observed, physical position of a subject, such as during an observation, assessment, collection of a specimen, etc.  ECG waveforms and vital signs, such as blood pressure, are two examples where a general, observed position typically needs to be noted.
987         */
988        _SUBJECTBODYPOSITION, 
989        /**
990         * Lying on the left side.
991         */
992        LLD, 
993        /**
994         * Lying with the front or ventral surface downward; lying face down.
995         */
996        PRN, 
997        /**
998         * Lying on the right side.
999         */
1000        RLD, 
1001        /**
1002         * A semi-sitting position in bed with the head of the bed elevated approximately 45 degrees.
1003         */
1004        SFWL, 
1005        /**
1006         * Resting the body on the buttocks, typically with upper torso erect or semi erect.
1007         */
1008        SIT, 
1009        /**
1010         * To be stationary, upright, vertical, on one's legs.
1011         */
1012        STN, 
1013        /**
1014         * supine
1015         */
1016        SUP, 
1017        /**
1018         * Lying on the back, on an inclined plane, typically about 30-45 degrees with head raised and feet lowered.
1019         */
1020        RTRD, 
1021        /**
1022         * Lying on the back, on an inclined plane, typically about 30-45 degrees, with  head lowered and feet raised.
1023         */
1024        TRD, 
1025        /**
1026         * Values for observations of verification act results
1027
1028                        
1029                           Examples: Verified, not verified, verified with warning.
1030         */
1031        _VERIFICATIONOUTCOMEVALUE, 
1032        /**
1033         * Definition: Coverage is in effect for healthcare service(s) and/or product(s).
1034         */
1035        ACT, 
1036        /**
1037         * Definition: Coverage is in effect for healthcare service(s) and/or product(s) - Pending Investigation
1038         */
1039        ACTPEND, 
1040        /**
1041         * Definition: Coverage is in effect for healthcare service(s) and/or product(s).
1042         */
1043        ELG, 
1044        /**
1045         * Definition: Coverage is not in effect for healthcare service(s) and/or product(s).
1046         */
1047        INACT, 
1048        /**
1049         * Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Investigation.
1050         */
1051        INPNDINV, 
1052        /**
1053         * Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Eligibility Update.
1054         */
1055        INPNDUPD, 
1056        /**
1057         * Definition: Coverage is not in effect for healthcare service(s) and/or product(s). May optionally include reasons for the ineligibility.
1058         */
1059        NELG, 
1060        /**
1061         * AnnotationValue
1062         */
1063        _ANNOTATIONVALUE, 
1064        /**
1065         * Description:Used in a patient care message to value simple clinical (non-lab) observations.
1066         */
1067        _COMMONCLINICALOBSERVATIONVALUE, 
1068        /**
1069         * This domain is established as a parent to a variety of value domains being defined to support the communication of Individual Case Safety Reports to regulatory bodies. Arguably, this aggregation is not taxonomically pure, but the grouping will facilitate the management of these domains.
1070         */
1071        _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS, 
1072        /**
1073         * Indicates the specific observation result which is the reason for the action (prescription, lab test, etc.). E.g. Headache, Ear infection, planned diagnostic image (requiring contrast agent), etc.
1074         */
1075        _INDICATIONVALUE, 
1076        /**
1077         * added to help the parsers
1078         */
1079        NULL;
1080        public static V3ObservationValue fromCode(String codeString) throws FHIRException {
1081            if (codeString == null || "".equals(codeString))
1082                return null;
1083        if ("_ActCoverageAssessmentObservationValue".equals(codeString))
1084          return _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE;
1085        if ("_ActFinancialStatusObservationValue".equals(codeString))
1086          return _ACTFINANCIALSTATUSOBSERVATIONVALUE;
1087        if ("ASSET".equals(codeString))
1088          return ASSET;
1089        if ("ANNUITY".equals(codeString))
1090          return ANNUITY;
1091        if ("PROP".equals(codeString))
1092          return PROP;
1093        if ("RETACCT".equals(codeString))
1094          return RETACCT;
1095        if ("TRUST".equals(codeString))
1096          return TRUST;
1097        if ("INCOME".equals(codeString))
1098          return INCOME;
1099        if ("CHILD".equals(codeString))
1100          return CHILD;
1101        if ("DISABL".equals(codeString))
1102          return DISABL;
1103        if ("INVEST".equals(codeString))
1104          return INVEST;
1105        if ("PAY".equals(codeString))
1106          return PAY;
1107        if ("RETIRE".equals(codeString))
1108          return RETIRE;
1109        if ("SPOUSAL".equals(codeString))
1110          return SPOUSAL;
1111        if ("SUPPLE".equals(codeString))
1112          return SUPPLE;
1113        if ("TAX".equals(codeString))
1114          return TAX;
1115        if ("LIVEXP".equals(codeString))
1116          return LIVEXP;
1117        if ("CLOTH".equals(codeString))
1118          return CLOTH;
1119        if ("FOOD".equals(codeString))
1120          return FOOD;
1121        if ("HEALTH".equals(codeString))
1122          return HEALTH;
1123        if ("HOUSE".equals(codeString))
1124          return HOUSE;
1125        if ("LEGAL".equals(codeString))
1126          return LEGAL;
1127        if ("MORTG".equals(codeString))
1128          return MORTG;
1129        if ("RENT".equals(codeString))
1130          return RENT;
1131        if ("SUNDRY".equals(codeString))
1132          return SUNDRY;
1133        if ("TRANS".equals(codeString))
1134          return TRANS;
1135        if ("UTIL".equals(codeString))
1136          return UTIL;
1137        if ("ELSTAT".equals(codeString))
1138          return ELSTAT;
1139        if ("ADOPT".equals(codeString))
1140          return ADOPT;
1141        if ("BTHCERT".equals(codeString))
1142          return BTHCERT;
1143        if ("CCOC".equals(codeString))
1144          return CCOC;
1145        if ("DRLIC".equals(codeString))
1146          return DRLIC;
1147        if ("FOSTER".equals(codeString))
1148          return FOSTER;
1149        if ("MEMBER".equals(codeString))
1150          return MEMBER;
1151        if ("MIL".equals(codeString))
1152          return MIL;
1153        if ("MRGCERT".equals(codeString))
1154          return MRGCERT;
1155        if ("PASSPORT".equals(codeString))
1156          return PASSPORT;
1157        if ("STUDENRL".equals(codeString))
1158          return STUDENRL;
1159        if ("HLSTAT".equals(codeString))
1160          return HLSTAT;
1161        if ("DISABLE".equals(codeString))
1162          return DISABLE;
1163        if ("DRUG".equals(codeString))
1164          return DRUG;
1165        if ("IVDRG".equals(codeString))
1166          return IVDRG;
1167        if ("PGNT".equals(codeString))
1168          return PGNT;
1169        if ("LIVDEP".equals(codeString))
1170          return LIVDEP;
1171        if ("RELDEP".equals(codeString))
1172          return RELDEP;
1173        if ("SPSDEP".equals(codeString))
1174          return SPSDEP;
1175        if ("URELDEP".equals(codeString))
1176          return URELDEP;
1177        if ("LIVSIT".equals(codeString))
1178          return LIVSIT;
1179        if ("ALONE".equals(codeString))
1180          return ALONE;
1181        if ("DEPCHD".equals(codeString))
1182          return DEPCHD;
1183        if ("DEPSPS".equals(codeString))
1184          return DEPSPS;
1185        if ("DEPYGCHD".equals(codeString))
1186          return DEPYGCHD;
1187        if ("FAM".equals(codeString))
1188          return FAM;
1189        if ("RELAT".equals(codeString))
1190          return RELAT;
1191        if ("SPS".equals(codeString))
1192          return SPS;
1193        if ("UNREL".equals(codeString))
1194          return UNREL;
1195        if ("SOECSTAT".equals(codeString))
1196          return SOECSTAT;
1197        if ("ABUSE".equals(codeString))
1198          return ABUSE;
1199        if ("HMLESS".equals(codeString))
1200          return HMLESS;
1201        if ("ILGIM".equals(codeString))
1202          return ILGIM;
1203        if ("INCAR".equals(codeString))
1204          return INCAR;
1205        if ("PROB".equals(codeString))
1206          return PROB;
1207        if ("REFUG".equals(codeString))
1208          return REFUG;
1209        if ("UNEMPL".equals(codeString))
1210          return UNEMPL;
1211        if ("_AllergyTestValue".equals(codeString))
1212          return _ALLERGYTESTVALUE;
1213        if ("A0".equals(codeString))
1214          return A0;
1215        if ("A1".equals(codeString))
1216          return A1;
1217        if ("A2".equals(codeString))
1218          return A2;
1219        if ("A3".equals(codeString))
1220          return A3;
1221        if ("A4".equals(codeString))
1222          return A4;
1223        if ("_CoverageLimitObservationValue".equals(codeString))
1224          return _COVERAGELIMITOBSERVATIONVALUE;
1225        if ("_CoverageLevelObservationValue".equals(codeString))
1226          return _COVERAGELEVELOBSERVATIONVALUE;
1227        if ("ADC".equals(codeString))
1228          return ADC;
1229        if ("CHD".equals(codeString))
1230          return CHD;
1231        if ("DEP".equals(codeString))
1232          return DEP;
1233        if ("DP".equals(codeString))
1234          return DP;
1235        if ("ECH".equals(codeString))
1236          return ECH;
1237        if ("FLY".equals(codeString))
1238          return FLY;
1239        if ("IND".equals(codeString))
1240          return IND;
1241        if ("SSP".equals(codeString))
1242          return SSP;
1243        if ("_CriticalityObservationValue".equals(codeString))
1244          return _CRITICALITYOBSERVATIONVALUE;
1245        if ("CRITH".equals(codeString))
1246          return CRITH;
1247        if ("CRITL".equals(codeString))
1248          return CRITL;
1249        if ("CRITU".equals(codeString))
1250          return CRITU;
1251        if ("_GeneticObservationValue".equals(codeString))
1252          return _GENETICOBSERVATIONVALUE;
1253        if ("Homozygote".equals(codeString))
1254          return HOMOZYGOTE;
1255        if ("_ObservationMeasureScoring".equals(codeString))
1256          return _OBSERVATIONMEASURESCORING;
1257        if ("COHORT".equals(codeString))
1258          return COHORT;
1259        if ("CONTVAR".equals(codeString))
1260          return CONTVAR;
1261        if ("PROPOR".equals(codeString))
1262          return PROPOR;
1263        if ("RATIO".equals(codeString))
1264          return RATIO;
1265        if ("_ObservationMeasureType".equals(codeString))
1266          return _OBSERVATIONMEASURETYPE;
1267        if ("COMPOSITE".equals(codeString))
1268          return COMPOSITE;
1269        if ("EFFICIENCY".equals(codeString))
1270          return EFFICIENCY;
1271        if ("EXPERIENCE".equals(codeString))
1272          return EXPERIENCE;
1273        if ("OUTCOME".equals(codeString))
1274          return OUTCOME;
1275        if ("PROCESS".equals(codeString))
1276          return PROCESS;
1277        if ("RESOURCE".equals(codeString))
1278          return RESOURCE;
1279        if ("STRUCTURE".equals(codeString))
1280          return STRUCTURE;
1281        if ("_ObservationPopulationInclusion".equals(codeString))
1282          return _OBSERVATIONPOPULATIONINCLUSION;
1283        if ("DENEX".equals(codeString))
1284          return DENEX;
1285        if ("DENEXCEP".equals(codeString))
1286          return DENEXCEP;
1287        if ("DENOM".equals(codeString))
1288          return DENOM;
1289        if ("IP".equals(codeString))
1290          return IP;
1291        if ("IPP".equals(codeString))
1292          return IPP;
1293        if ("MSRPOPL".equals(codeString))
1294          return MSRPOPL;
1295        if ("NUMER".equals(codeString))
1296          return NUMER;
1297        if ("NUMEX".equals(codeString))
1298          return NUMEX;
1299        if ("_PartialCompletionScale".equals(codeString))
1300          return _PARTIALCOMPLETIONSCALE;
1301        if ("G".equals(codeString))
1302          return G;
1303        if ("LE".equals(codeString))
1304          return LE;
1305        if ("ME".equals(codeString))
1306          return ME;
1307        if ("MI".equals(codeString))
1308          return MI;
1309        if ("N".equals(codeString))
1310          return N;
1311        if ("S".equals(codeString))
1312          return S;
1313        if ("_SecurityObservationValue".equals(codeString))
1314          return _SECURITYOBSERVATIONVALUE;
1315        if ("_SECINTOBV".equals(codeString))
1316          return _SECINTOBV;
1317        if ("_SECALTINTOBV".equals(codeString))
1318          return _SECALTINTOBV;
1319        if ("ABSTRED".equals(codeString))
1320          return ABSTRED;
1321        if ("AGGRED".equals(codeString))
1322          return AGGRED;
1323        if ("ANONYED".equals(codeString))
1324          return ANONYED;
1325        if ("MAPPED".equals(codeString))
1326          return MAPPED;
1327        if ("MASKED".equals(codeString))
1328          return MASKED;
1329        if ("PSEUDED".equals(codeString))
1330          return PSEUDED;
1331        if ("REDACTED".equals(codeString))
1332          return REDACTED;
1333        if ("SUBSETTED".equals(codeString))
1334          return SUBSETTED;
1335        if ("SYNTAC".equals(codeString))
1336          return SYNTAC;
1337        if ("TRSLT".equals(codeString))
1338          return TRSLT;
1339        if ("VERSIONED".equals(codeString))
1340          return VERSIONED;
1341        if ("_SECDATINTOBV".equals(codeString))
1342          return _SECDATINTOBV;
1343        if ("CRYTOHASH".equals(codeString))
1344          return CRYTOHASH;
1345        if ("DIGSIG".equals(codeString))
1346          return DIGSIG;
1347        if ("_SECINTCONOBV".equals(codeString))
1348          return _SECINTCONOBV;
1349        if ("HRELIABLE".equals(codeString))
1350          return HRELIABLE;
1351        if ("RELIABLE".equals(codeString))
1352          return RELIABLE;
1353        if ("UNCERTREL".equals(codeString))
1354          return UNCERTREL;
1355        if ("UNRELIABLE".equals(codeString))
1356          return UNRELIABLE;
1357        if ("_SECINTPRVOBV".equals(codeString))
1358          return _SECINTPRVOBV;
1359        if ("_SECINTPRVABOBV".equals(codeString))
1360          return _SECINTPRVABOBV;
1361        if ("CLINAST".equals(codeString))
1362          return CLINAST;
1363        if ("DEVAST".equals(codeString))
1364          return DEVAST;
1365        if ("HCPAST".equals(codeString))
1366          return HCPAST;
1367        if ("PACQAST".equals(codeString))
1368          return PACQAST;
1369        if ("PATAST".equals(codeString))
1370          return PATAST;
1371        if ("PAYAST".equals(codeString))
1372          return PAYAST;
1373        if ("PROAST".equals(codeString))
1374          return PROAST;
1375        if ("SDMAST".equals(codeString))
1376          return SDMAST;
1377        if ("_SECINTPRVRBOBV".equals(codeString))
1378          return _SECINTPRVRBOBV;
1379        if ("CLINRPT".equals(codeString))
1380          return CLINRPT;
1381        if ("DEVRPT".equals(codeString))
1382          return DEVRPT;
1383        if ("HCPRPT".equals(codeString))
1384          return HCPRPT;
1385        if ("PACQRPT".equals(codeString))
1386          return PACQRPT;
1387        if ("PATRPT".equals(codeString))
1388          return PATRPT;
1389        if ("PAYRPT".equals(codeString))
1390          return PAYRPT;
1391        if ("PRORPT".equals(codeString))
1392          return PRORPT;
1393        if ("SDMRPT".equals(codeString))
1394          return SDMRPT;
1395        if ("SECTRSTOBV".equals(codeString))
1396          return SECTRSTOBV;
1397        if ("TRSTACCRDOBV".equals(codeString))
1398          return TRSTACCRDOBV;
1399        if ("TRSTAGREOBV".equals(codeString))
1400          return TRSTAGREOBV;
1401        if ("TRSTCERTOBV".equals(codeString))
1402          return TRSTCERTOBV;
1403        if ("TRSTLOAOBV".equals(codeString))
1404          return TRSTLOAOBV;
1405        if ("LOAAN".equals(codeString))
1406          return LOAAN;
1407        if ("LOAAN1".equals(codeString))
1408          return LOAAN1;
1409        if ("LOAAN2".equals(codeString))
1410          return LOAAN2;
1411        if ("LOAAN3".equals(codeString))
1412          return LOAAN3;
1413        if ("LOAAN4".equals(codeString))
1414          return LOAAN4;
1415        if ("LOAAP".equals(codeString))
1416          return LOAAP;
1417        if ("LOAAP1".equals(codeString))
1418          return LOAAP1;
1419        if ("LOAAP2".equals(codeString))
1420          return LOAAP2;
1421        if ("LOAAP3".equals(codeString))
1422          return LOAAP3;
1423        if ("LOAAP4".equals(codeString))
1424          return LOAAP4;
1425        if ("LOAAS".equals(codeString))
1426          return LOAAS;
1427        if ("LOAAS1".equals(codeString))
1428          return LOAAS1;
1429        if ("LOAAS2".equals(codeString))
1430          return LOAAS2;
1431        if ("LOAAS3".equals(codeString))
1432          return LOAAS3;
1433        if ("LOAAS4".equals(codeString))
1434          return LOAAS4;
1435        if ("LOACM".equals(codeString))
1436          return LOACM;
1437        if ("LOACM1".equals(codeString))
1438          return LOACM1;
1439        if ("LOACM2".equals(codeString))
1440          return LOACM2;
1441        if ("LOACM3".equals(codeString))
1442          return LOACM3;
1443        if ("LOACM4".equals(codeString))
1444          return LOACM4;
1445        if ("LOAID".equals(codeString))
1446          return LOAID;
1447        if ("LOAID1".equals(codeString))
1448          return LOAID1;
1449        if ("LOAID2".equals(codeString))
1450          return LOAID2;
1451        if ("LOAID3".equals(codeString))
1452          return LOAID3;
1453        if ("LOAID4".equals(codeString))
1454          return LOAID4;
1455        if ("LOANR".equals(codeString))
1456          return LOANR;
1457        if ("LOANR1".equals(codeString))
1458          return LOANR1;
1459        if ("LOANR2".equals(codeString))
1460          return LOANR2;
1461        if ("LOANR3".equals(codeString))
1462          return LOANR3;
1463        if ("LOANR4".equals(codeString))
1464          return LOANR4;
1465        if ("LOARA".equals(codeString))
1466          return LOARA;
1467        if ("LOARA1".equals(codeString))
1468          return LOARA1;
1469        if ("LOARA2".equals(codeString))
1470          return LOARA2;
1471        if ("LOARA3".equals(codeString))
1472          return LOARA3;
1473        if ("LOARA4".equals(codeString))
1474          return LOARA4;
1475        if ("LOATK".equals(codeString))
1476          return LOATK;
1477        if ("LOATK1".equals(codeString))
1478          return LOATK1;
1479        if ("LOATK2".equals(codeString))
1480          return LOATK2;
1481        if ("LOATK3".equals(codeString))
1482          return LOATK3;
1483        if ("LOATK4".equals(codeString))
1484          return LOATK4;
1485        if ("TRSTMECOBV".equals(codeString))
1486          return TRSTMECOBV;
1487        if ("_SeverityObservation".equals(codeString))
1488          return _SEVERITYOBSERVATION;
1489        if ("H".equals(codeString))
1490          return H;
1491        if ("L".equals(codeString))
1492          return L;
1493        if ("M".equals(codeString))
1494          return M;
1495        if ("_SubjectBodyPosition".equals(codeString))
1496          return _SUBJECTBODYPOSITION;
1497        if ("LLD".equals(codeString))
1498          return LLD;
1499        if ("PRN".equals(codeString))
1500          return PRN;
1501        if ("RLD".equals(codeString))
1502          return RLD;
1503        if ("SFWL".equals(codeString))
1504          return SFWL;
1505        if ("SIT".equals(codeString))
1506          return SIT;
1507        if ("STN".equals(codeString))
1508          return STN;
1509        if ("SUP".equals(codeString))
1510          return SUP;
1511        if ("RTRD".equals(codeString))
1512          return RTRD;
1513        if ("TRD".equals(codeString))
1514          return TRD;
1515        if ("_VerificationOutcomeValue".equals(codeString))
1516          return _VERIFICATIONOUTCOMEVALUE;
1517        if ("ACT".equals(codeString))
1518          return ACT;
1519        if ("ACTPEND".equals(codeString))
1520          return ACTPEND;
1521        if ("ELG".equals(codeString))
1522          return ELG;
1523        if ("INACT".equals(codeString))
1524          return INACT;
1525        if ("INPNDINV".equals(codeString))
1526          return INPNDINV;
1527        if ("INPNDUPD".equals(codeString))
1528          return INPNDUPD;
1529        if ("NELG".equals(codeString))
1530          return NELG;
1531        if ("_AnnotationValue".equals(codeString))
1532          return _ANNOTATIONVALUE;
1533        if ("_CommonClinicalObservationValue".equals(codeString))
1534          return _COMMONCLINICALOBSERVATIONVALUE;
1535        if ("_IndividualCaseSafetyReportValueDomains".equals(codeString))
1536          return _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS;
1537        if ("_IndicationValue".equals(codeString))
1538          return _INDICATIONVALUE;
1539        throw new FHIRException("Unknown V3ObservationValue code '"+codeString+"'");
1540        }
1541        public String toCode() {
1542          switch (this) {
1543            case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "_ActCoverageAssessmentObservationValue";
1544            case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "_ActFinancialStatusObservationValue";
1545            case ASSET: return "ASSET";
1546            case ANNUITY: return "ANNUITY";
1547            case PROP: return "PROP";
1548            case RETACCT: return "RETACCT";
1549            case TRUST: return "TRUST";
1550            case INCOME: return "INCOME";
1551            case CHILD: return "CHILD";
1552            case DISABL: return "DISABL";
1553            case INVEST: return "INVEST";
1554            case PAY: return "PAY";
1555            case RETIRE: return "RETIRE";
1556            case SPOUSAL: return "SPOUSAL";
1557            case SUPPLE: return "SUPPLE";
1558            case TAX: return "TAX";
1559            case LIVEXP: return "LIVEXP";
1560            case CLOTH: return "CLOTH";
1561            case FOOD: return "FOOD";
1562            case HEALTH: return "HEALTH";
1563            case HOUSE: return "HOUSE";
1564            case LEGAL: return "LEGAL";
1565            case MORTG: return "MORTG";
1566            case RENT: return "RENT";
1567            case SUNDRY: return "SUNDRY";
1568            case TRANS: return "TRANS";
1569            case UTIL: return "UTIL";
1570            case ELSTAT: return "ELSTAT";
1571            case ADOPT: return "ADOPT";
1572            case BTHCERT: return "BTHCERT";
1573            case CCOC: return "CCOC";
1574            case DRLIC: return "DRLIC";
1575            case FOSTER: return "FOSTER";
1576            case MEMBER: return "MEMBER";
1577            case MIL: return "MIL";
1578            case MRGCERT: return "MRGCERT";
1579            case PASSPORT: return "PASSPORT";
1580            case STUDENRL: return "STUDENRL";
1581            case HLSTAT: return "HLSTAT";
1582            case DISABLE: return "DISABLE";
1583            case DRUG: return "DRUG";
1584            case IVDRG: return "IVDRG";
1585            case PGNT: return "PGNT";
1586            case LIVDEP: return "LIVDEP";
1587            case RELDEP: return "RELDEP";
1588            case SPSDEP: return "SPSDEP";
1589            case URELDEP: return "URELDEP";
1590            case LIVSIT: return "LIVSIT";
1591            case ALONE: return "ALONE";
1592            case DEPCHD: return "DEPCHD";
1593            case DEPSPS: return "DEPSPS";
1594            case DEPYGCHD: return "DEPYGCHD";
1595            case FAM: return "FAM";
1596            case RELAT: return "RELAT";
1597            case SPS: return "SPS";
1598            case UNREL: return "UNREL";
1599            case SOECSTAT: return "SOECSTAT";
1600            case ABUSE: return "ABUSE";
1601            case HMLESS: return "HMLESS";
1602            case ILGIM: return "ILGIM";
1603            case INCAR: return "INCAR";
1604            case PROB: return "PROB";
1605            case REFUG: return "REFUG";
1606            case UNEMPL: return "UNEMPL";
1607            case _ALLERGYTESTVALUE: return "_AllergyTestValue";
1608            case A0: return "A0";
1609            case A1: return "A1";
1610            case A2: return "A2";
1611            case A3: return "A3";
1612            case A4: return "A4";
1613            case _COVERAGELIMITOBSERVATIONVALUE: return "_CoverageLimitObservationValue";
1614            case _COVERAGELEVELOBSERVATIONVALUE: return "_CoverageLevelObservationValue";
1615            case ADC: return "ADC";
1616            case CHD: return "CHD";
1617            case DEP: return "DEP";
1618            case DP: return "DP";
1619            case ECH: return "ECH";
1620            case FLY: return "FLY";
1621            case IND: return "IND";
1622            case SSP: return "SSP";
1623            case _CRITICALITYOBSERVATIONVALUE: return "_CriticalityObservationValue";
1624            case CRITH: return "CRITH";
1625            case CRITL: return "CRITL";
1626            case CRITU: return "CRITU";
1627            case _GENETICOBSERVATIONVALUE: return "_GeneticObservationValue";
1628            case HOMOZYGOTE: return "Homozygote";
1629            case _OBSERVATIONMEASURESCORING: return "_ObservationMeasureScoring";
1630            case COHORT: return "COHORT";
1631            case CONTVAR: return "CONTVAR";
1632            case PROPOR: return "PROPOR";
1633            case RATIO: return "RATIO";
1634            case _OBSERVATIONMEASURETYPE: return "_ObservationMeasureType";
1635            case COMPOSITE: return "COMPOSITE";
1636            case EFFICIENCY: return "EFFICIENCY";
1637            case EXPERIENCE: return "EXPERIENCE";
1638            case OUTCOME: return "OUTCOME";
1639            case PROCESS: return "PROCESS";
1640            case RESOURCE: return "RESOURCE";
1641            case STRUCTURE: return "STRUCTURE";
1642            case _OBSERVATIONPOPULATIONINCLUSION: return "_ObservationPopulationInclusion";
1643            case DENEX: return "DENEX";
1644            case DENEXCEP: return "DENEXCEP";
1645            case DENOM: return "DENOM";
1646            case IP: return "IP";
1647            case IPP: return "IPP";
1648            case MSRPOPL: return "MSRPOPL";
1649            case NUMER: return "NUMER";
1650            case NUMEX: return "NUMEX";
1651            case _PARTIALCOMPLETIONSCALE: return "_PartialCompletionScale";
1652            case G: return "G";
1653            case LE: return "LE";
1654            case ME: return "ME";
1655            case MI: return "MI";
1656            case N: return "N";
1657            case S: return "S";
1658            case _SECURITYOBSERVATIONVALUE: return "_SecurityObservationValue";
1659            case _SECINTOBV: return "_SECINTOBV";
1660            case _SECALTINTOBV: return "_SECALTINTOBV";
1661            case ABSTRED: return "ABSTRED";
1662            case AGGRED: return "AGGRED";
1663            case ANONYED: return "ANONYED";
1664            case MAPPED: return "MAPPED";
1665            case MASKED: return "MASKED";
1666            case PSEUDED: return "PSEUDED";
1667            case REDACTED: return "REDACTED";
1668            case SUBSETTED: return "SUBSETTED";
1669            case SYNTAC: return "SYNTAC";
1670            case TRSLT: return "TRSLT";
1671            case VERSIONED: return "VERSIONED";
1672            case _SECDATINTOBV: return "_SECDATINTOBV";
1673            case CRYTOHASH: return "CRYTOHASH";
1674            case DIGSIG: return "DIGSIG";
1675            case _SECINTCONOBV: return "_SECINTCONOBV";
1676            case HRELIABLE: return "HRELIABLE";
1677            case RELIABLE: return "RELIABLE";
1678            case UNCERTREL: return "UNCERTREL";
1679            case UNRELIABLE: return "UNRELIABLE";
1680            case _SECINTPRVOBV: return "_SECINTPRVOBV";
1681            case _SECINTPRVABOBV: return "_SECINTPRVABOBV";
1682            case CLINAST: return "CLINAST";
1683            case DEVAST: return "DEVAST";
1684            case HCPAST: return "HCPAST";
1685            case PACQAST: return "PACQAST";
1686            case PATAST: return "PATAST";
1687            case PAYAST: return "PAYAST";
1688            case PROAST: return "PROAST";
1689            case SDMAST: return "SDMAST";
1690            case _SECINTPRVRBOBV: return "_SECINTPRVRBOBV";
1691            case CLINRPT: return "CLINRPT";
1692            case DEVRPT: return "DEVRPT";
1693            case HCPRPT: return "HCPRPT";
1694            case PACQRPT: return "PACQRPT";
1695            case PATRPT: return "PATRPT";
1696            case PAYRPT: return "PAYRPT";
1697            case PRORPT: return "PRORPT";
1698            case SDMRPT: return "SDMRPT";
1699            case SECTRSTOBV: return "SECTRSTOBV";
1700            case TRSTACCRDOBV: return "TRSTACCRDOBV";
1701            case TRSTAGREOBV: return "TRSTAGREOBV";
1702            case TRSTCERTOBV: return "TRSTCERTOBV";
1703            case TRSTLOAOBV: return "TRSTLOAOBV";
1704            case LOAAN: return "LOAAN";
1705            case LOAAN1: return "LOAAN1";
1706            case LOAAN2: return "LOAAN2";
1707            case LOAAN3: return "LOAAN3";
1708            case LOAAN4: return "LOAAN4";
1709            case LOAAP: return "LOAAP";
1710            case LOAAP1: return "LOAAP1";
1711            case LOAAP2: return "LOAAP2";
1712            case LOAAP3: return "LOAAP3";
1713            case LOAAP4: return "LOAAP4";
1714            case LOAAS: return "LOAAS";
1715            case LOAAS1: return "LOAAS1";
1716            case LOAAS2: return "LOAAS2";
1717            case LOAAS3: return "LOAAS3";
1718            case LOAAS4: return "LOAAS4";
1719            case LOACM: return "LOACM";
1720            case LOACM1: return "LOACM1";
1721            case LOACM2: return "LOACM2";
1722            case LOACM3: return "LOACM3";
1723            case LOACM4: return "LOACM4";
1724            case LOAID: return "LOAID";
1725            case LOAID1: return "LOAID1";
1726            case LOAID2: return "LOAID2";
1727            case LOAID3: return "LOAID3";
1728            case LOAID4: return "LOAID4";
1729            case LOANR: return "LOANR";
1730            case LOANR1: return "LOANR1";
1731            case LOANR2: return "LOANR2";
1732            case LOANR3: return "LOANR3";
1733            case LOANR4: return "LOANR4";
1734            case LOARA: return "LOARA";
1735            case LOARA1: return "LOARA1";
1736            case LOARA2: return "LOARA2";
1737            case LOARA3: return "LOARA3";
1738            case LOARA4: return "LOARA4";
1739            case LOATK: return "LOATK";
1740            case LOATK1: return "LOATK1";
1741            case LOATK2: return "LOATK2";
1742            case LOATK3: return "LOATK3";
1743            case LOATK4: return "LOATK4";
1744            case TRSTMECOBV: return "TRSTMECOBV";
1745            case _SEVERITYOBSERVATION: return "_SeverityObservation";
1746            case H: return "H";
1747            case L: return "L";
1748            case M: return "M";
1749            case _SUBJECTBODYPOSITION: return "_SubjectBodyPosition";
1750            case LLD: return "LLD";
1751            case PRN: return "PRN";
1752            case RLD: return "RLD";
1753            case SFWL: return "SFWL";
1754            case SIT: return "SIT";
1755            case STN: return "STN";
1756            case SUP: return "SUP";
1757            case RTRD: return "RTRD";
1758            case TRD: return "TRD";
1759            case _VERIFICATIONOUTCOMEVALUE: return "_VerificationOutcomeValue";
1760            case ACT: return "ACT";
1761            case ACTPEND: return "ACTPEND";
1762            case ELG: return "ELG";
1763            case INACT: return "INACT";
1764            case INPNDINV: return "INPNDINV";
1765            case INPNDUPD: return "INPNDUPD";
1766            case NELG: return "NELG";
1767            case _ANNOTATIONVALUE: return "_AnnotationValue";
1768            case _COMMONCLINICALOBSERVATIONVALUE: return "_CommonClinicalObservationValue";
1769            case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "_IndividualCaseSafetyReportValueDomains";
1770            case _INDICATIONVALUE: return "_IndicationValue";
1771            case NULL: return null;
1772            default: return "?";
1773          }
1774        }
1775        public String getSystem() {
1776          return "http://hl7.org/fhir/v3/ObservationValue";
1777        }
1778        public String getDefinition() {
1779          switch (this) {
1780            case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "Codes specify the category of observation, evidence, or document used to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program. The type of evidence is coded as observation values.";
1781            case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "Code specifying financial indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay stub; tax or income document; asset document; living expenses.";
1782            case ASSET: return "Codes specifying asset indicators used to assess or establish eligibility for coverage under a policy or program.";
1783            case ANNUITY: return "Indicator of annuity ownership or status as beneficiary.";
1784            case PROP: return "Indicator of real property ownership, e.g., deed or real estate contract.";
1785            case RETACCT: return "Indicator of retirement investment account ownership.";
1786            case TRUST: return "Indicator of status as trust beneficiary.";
1787            case INCOME: return "Code specifying income indicators used to assess or establish eligibility for coverage under a policy or program; e.g., pay or pension check, child support payments received or provided, and taxes paid.";
1788            case CHILD: return "Indicator of child support payments received or provided.";
1789            case DISABL: return "Indicator of disability income replacement payment.";
1790            case INVEST: return "Indicator of investment income, e.g., dividend check, annuity payment; real estate rent, investment divestiture proceeds; trust or endowment check.";
1791            case PAY: return "Indicator of paid employment, e.g., letter of hire, contract, employer letter; copy of pay check or pay stub.";
1792            case RETIRE: return "Indicator of retirement payment, e.g., pension check.";
1793            case SPOUSAL: return "Indicator of spousal or partner support payments received or provided; e.g., alimony payment; support stipulations in a divorce settlement.";
1794            case SUPPLE: return "Indicator of income supplement, e.g., gifting, parental income support; stipend, or grant.";
1795            case TAX: return "Indicator of tax obligation or payment, e.g., statement of taxable income.";
1796            case LIVEXP: return "Codes specifying living expense indicators used to assess or establish eligibility for coverage under a policy or program.";
1797            case CLOTH: return "Indicator of clothing expenses.";
1798            case FOOD: return "Indicator of transportation expenses.";
1799            case HEALTH: return "Indicator of health expenses; including medication costs, health service costs, financial participations, and health coverage premiums.";
1800            case HOUSE: return "Indicator of housing expense, e.g., household appliances, fixtures, furnishings, and maintenance and repairs.";
1801            case LEGAL: return "Indicator of legal expenses.";
1802            case MORTG: return "Indicator of mortgage amount, interest, and payments.";
1803            case RENT: return "Indicator of rental or lease payments.";
1804            case SUNDRY: return "Indicator of transportation expenses.";
1805            case TRANS: return "Indicator of transportation expenses, e.g., vehicle payments, vehicle insurance, vehicle fuel, and vehicle maintenance and repairs.";
1806            case UTIL: return "Indicator of transportation expenses.";
1807            case ELSTAT: return "Code specifying eligibility indicators used to assess or establish eligibility for coverage under a policy or program eligibility status, e.g., certificates of creditable coverage; student enrollment; adoption, marriage or birth certificate.";
1808            case ADOPT: return "Indicator of adoption.";
1809            case BTHCERT: return "Indicator of birth.";
1810            case CCOC: return "Indicator of creditable coverage.";
1811            case DRLIC: return "Indicator of driving status.";
1812            case FOSTER: return "Indicator of foster child status.";
1813            case MEMBER: return "Indicator of status as covered member under a policy or program, e.g., member id card or coverage document.";
1814            case MIL: return "Indicator of military status.";
1815            case MRGCERT: return "Indicator of marriage status.";
1816            case PASSPORT: return "Indicator of citizenship.";
1817            case STUDENRL: return "Indicator of student status.";
1818            case HLSTAT: return "Code specifying non-clinical indicators related to health status used to assess or establish eligibility for coverage under a policy or program, e.g., pregnancy, disability, drug use, mental health issues.";
1819            case DISABLE: return "Indication of disability.";
1820            case DRUG: return "Indication of drug use.";
1821            case IVDRG: return "Indication of IV drug use .";
1822            case PGNT: return "Non-clinical report of pregnancy.";
1823            case LIVDEP: return "Code specifying observations related to living dependency, such as dependent upon spouse for activities of daily living.";
1824            case RELDEP: return "Continued living in private residence requires functional and health care assistance from one or more relatives.";
1825            case SPSDEP: return "Continued living in private residence requires functional and health care assistance from spouse or life partner.";
1826            case URELDEP: return "Continued living in private residence requires functional and health care assistance from one or more unrelated persons.";
1827            case LIVSIT: return "Code specifying observations related to living situation for a person in a private residence.";
1828            case ALONE: return "Living alone.  Maps to PD1-2   Living arrangement   (IS)   00742 [A]";
1829            case DEPCHD: return "Living with one or more dependent children requiring moderate supervision.";
1830            case DEPSPS: return "Living with disabled spouse requiring functional and health care assistance";
1831            case DEPYGCHD: return "Living with one or more dependent children requiring intensive supervision";
1832            case FAM: return "Living with family. Maps to PD1-2   Living arrangement   (IS)   00742 [F]";
1833            case RELAT: return "Living with one or more relatives. Maps to PD1-2   Living arrangement   (IS)   00742 [R]";
1834            case SPS: return "Living only with spouse or life partner. Maps to PD1-2   Living arrangement   (IS)   00742 [S]";
1835            case UNREL: return "Living with one or more unrelated persons.";
1836            case SOECSTAT: return "Code specifying observations or indicators related to socio-economic status used to assess to assess for services, e.g., discharge planning, or to establish eligibility for coverage under a policy or program.";
1837            case ABUSE: return "Indication of abuse victim.";
1838            case HMLESS: return "Indication of status as homeless.";
1839            case ILGIM: return "Indication of status as illegal immigrant.";
1840            case INCAR: return "Indication of status as incarcerated.";
1841            case PROB: return "Indication of probation status.";
1842            case REFUG: return "Indication of refugee status.";
1843            case UNEMPL: return "Indication of unemployed status.";
1844            case _ALLERGYTESTVALUE: return "Indicates the result of a particular allergy test.  E.g. Negative, Mild, Moderate, Severe";
1845            case A0: return "Description:Patient exhibits no reaction to the challenge agent.";
1846            case A1: return "Description:Patient exhibits a minimal reaction to the challenge agent.";
1847            case A2: return "Description:Patient exhibits a mild reaction to the challenge agent.";
1848            case A3: return "Description:Patient exhibits moderate reaction to the challenge agent.";
1849            case A4: return "Description:Patient exhibits a severe reaction to the challenge agent.";
1850            case _COVERAGELIMITOBSERVATIONVALUE: return "Description:Coded observation values for coverage limitations, for e.g., types of claims or types of parties covered under a policy or program.";
1851            case _COVERAGELEVELOBSERVATIONVALUE: return "Description:Coded observation values for types of covered parties under a policy or program based on their personal relationships or employment status.";
1852            case ADC: return "Description:Child over an age as specified by coverage policy or program, e.g., student, differently abled, and income dependent.";
1853            case CHD: return "Description:Dependent biological, adopted, foster child as specified by coverage policy or program.";
1854            case DEP: return "Description:Person requiring functional and/or financial assistance from another person as specified by coverage policy or program.";
1855            case DP: return "Description:Persons registered as a family unit in a domestic partner registry as specified by law and by coverage policy or program.";
1856            case ECH: return "Description:An individual employed by an employer who receive remuneration in wages, salary, commission, tips, piece-rates, or pay-in-kind through the employeraTMs payment system (i.e., not a contractor) as specified by coverage policy or program.";
1857            case FLY: return "Description:As specified by coverage policy or program.";
1858            case IND: return "Description:Person as specified by coverage policy or program.";
1859            case SSP: return "Description:A pair of people of the same gender who live together as a family as specified by coverage policy or program, e.g., Naomi and Ruth from the Book of Ruth; Socrates and Alcibiades";
1860            case _CRITICALITYOBSERVATIONVALUE: return "A clinical judgment as to the worst case result of a future exposure (including substance administration). When the worst case result is assessed to have a life-threatening or organ system threatening potential, it is considered to be of high criticality.";
1861            case CRITH: return "Worst case result of a future exposure is assessed to be life-threatening or having high potential for organ system failure.";
1862            case CRITL: return "Worst case result of a future exposure is not assessed to be life-threatening or having high potential for organ system failure.";
1863            case CRITU: return "Unable to assess the worst case result of a future exposure.";
1864            case _GENETICOBSERVATIONVALUE: return "Description: The domain contains genetic analysis specific observation values, e.g. Homozygote, Heterozygote, etc.";
1865            case HOMOZYGOTE: return "Description: An individual having different alleles at one or more loci regarding a specific character";
1866            case _OBSERVATIONMEASURESCORING: return "Observation values used to indicate the type of scoring (e.g. proportion, ratio) used by a health quality measure.";
1867            case COHORT: return "A measure in which either short-term cross-section or long-term longitudinal analysis is performed over a group of subjects defined by a set of common properties or defining characteristics (e.g., Male smokers between the ages of 40 and 50 years, exposure to treatment, exposure duration).";
1868            case CONTVAR: return "A measure score in which each individual value for the measure can fall anywhere along a continuous scale (e.g., mean time to thrombolytics which aggregates the time in minutes from a case presenting with chest pain to the time of administration of thrombolytics).";
1869            case PROPOR: return "A score derived by dividing the number of cases that meet a criterion for quality (the numerator) by the number of eligible cases within a given time frame (the denominator) where the numerator cases are a subset of the denominator cases (e.g., percentage of eligible women with a mammogram performed in the last year).";
1870            case RATIO: return "A score that may have a value of zero or greater that is derived by dividing a count of one type of data by a count of another type of data (e.g., the number of patients with central lines who develop infection divided by the number of central line days).";
1871            case _OBSERVATIONMEASURETYPE: return "Observation values used to indicate what kind of health quality measure is used.";
1872            case COMPOSITE: return "A measure that is composed from one or more other measures and indicates an overall summary of those measures.";
1873            case EFFICIENCY: return "A measure related to the efficiency of medical treatment.";
1874            case EXPERIENCE: return "A measure related to the level of patient engagement or patient experience of care.";
1875            case OUTCOME: return "A measure that indicates the result of the performance (or non-performance) of a function or process.";
1876            case PROCESS: return "A measure which focuses on a process which leads to a certain outcome, meaning that a scientific basis exists for believing that the process, when executed well, will increase the probability of achieving a desired outcome.";
1877            case RESOURCE: return "A measure related to the extent of use of clinical resources or cost of care.";
1878            case STRUCTURE: return "A measure related to the structure of patient care.";
1879            case _OBSERVATIONPOPULATIONINCLUSION: return "Observation values used to assert various populations that a subject falls into.";
1880            case DENEX: return "Patients who should be removed from the eMeasure population and denominator before determining if numerator criteria are met. Denominator exclusions are used in proportion and ratio measures to help narrow the denominator.";
1881            case DENEXCEP: return "Denominator exceptions are those conditions that should remove a patient, procedure or unit of measurement from the denominator only if the numerator criteria are not met. Denominator exceptions allow for adjustment of the calculated score for those providers with higher risk populations. Denominator exceptions are used only in proportion eMeasures. They are not appropriate for ratio or continuous variable eMeasures.  Denominator exceptions allow for the exercise of clinical judgment and should be specifically defined where capturing the information in a structured manner fits the clinical workflow. Generic denominator exception reasons used in proportion eMeasures fall into three general categories:\r\n\n                        \n                           Medical reasons\n                           Patient reasons\n                           System reasons";
1882            case DENOM: return "It can be the same as the initial patient population or a subset of the initial patient population to further constrain the population for the purpose of the eMeasure. Different measures within an eMeasure set may have different Denominators. Continuous Variable eMeasures do not have a Denominator, but instead define a Measure Population.";
1883            case IP: return "The initial population refers to all entities to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs.";
1884            case IPP: return "The initial patient population refers to all patients to be evaluated by a specific quality measure who share a common set of specified characteristics within a specific measurement set to which a given measure belongs. Details often include information based upon specific age groups, diagnoses, diagnostic and procedure codes, and enrollment periods.";
1885            case MSRPOPL: return "Measure population is used only in continuous variable eMeasures. It is a narrative description of the eMeasure population. \n(e.g., all patients seen in the Emergency Department during the measurement period).";
1886            case NUMER: return "Numerators are used in proportion and ratio eMeasures. In proportion measures the numerator criteria are the processes or outcomes expected for each patient, procedure, or other unit of measurement defined in the denominator. In ratio measures the numerator is related, but not directly derived from the denominator (e.g., a numerator listing the number of central line blood stream infections and a denominator indicating the days per thousand of central line usage in a specific time period).";
1887            case NUMEX: return "Numerator Exclusions are used only in ratio eMeasures to define instances that should not be included in the numerator data. (e.g., if the number of central line blood stream infections per 1000 catheter days were to exclude infections with a specific bacterium, that bacterium would be listed as a numerator exclusion.)";
1888            case _PARTIALCOMPLETIONSCALE: return "PartialCompletionScale";
1889            case G: return "Value for Act.partialCompletionCode attribute that implies 81-99% completion";
1890            case LE: return "Value for Act.partialCompletionCode attribute that implies 61-80% completion";
1891            case ME: return "Value for Act.partialCompletionCode attribute that implies 41-60% completion";
1892            case MI: return "Value for Act.partialCompletionCode attribute that implies 1-20% completion";
1893            case N: return "Value for Act.partialCompletionCode attribute that implies 0% completion";
1894            case S: return "Value for Act.partialCompletionCode attribute that implies 21-40% completion";
1895            case _SECURITYOBSERVATIONVALUE: return "Observation values used to indicate security observation metadata.";
1896            case _SECINTOBV: return "Abstract security observation values used to indicate security integrity metadata.\r\n\n                        \n                           Examples: Codes conveying integrity status, integrity confidence, and provenance.";
1897            case _SECALTINTOBV: return "Abstract security metadata observation values used to indicate mechanism used for authorized alteration of an IT resource (data, information object, service, or system capability)";
1898            case ABSTRED: return "Security metadata observation values used to indicate the use of a more abstract version of the content, e.g., replacing exact value of an age or date field with a range, or remove the left digits of a credit card number or SSN.";
1899            case AGGRED: return "Security metadata observation values used to indicate the use of an algorithmic combination of actual values with the result of an aggregate function, e.g., average, sum, or count in order to limit disclosure of an IT resource (data, information object, service, or system capability) to the minimum necessary.";
1900            case ANONYED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by used to indicate the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject.  No key to relink the data is retained.";
1901            case MAPPED: return "Security metadata observation value used to indicate that the IT resource semantic content has been transformed from one encoding to another.\r\n\n                        \n                           Usage Note: \"MAP\" code does not indicate the semantic fidelity of the transformed content.\r\n\n                        To indicate semantic fidelity for maps of HL7 to other code systems, this security alteration integrity observation may be further specified using an Act valued with Value Set: MapRelationship (2.16.840.1.113883.1.11.11052).\r\n\n                        Semantic fidelity of the mapped IT Resource may also be indicated using a SecurityIntegrityConfidenceObservation.";
1902            case MASKED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability) by indicating the mechanism by which software systems can make data unintelligible (that is, as unreadable and unusable by algorithmically transforming plaintext into ciphertext) such that it can only be accessed or used by authorized users.  An authorized user may be provided a key to decrypt per license or \"shared secret\".\r\n\n                        \n                           Usage Note: \"MASKED\" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has been further encrypted, and may be accessed only by an authorized user or receiver to which a decryption key is provided.";
1903            case PSEUDED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability), by indicating the mechanism by which software systems can strip portions of the resource that could allow the identification of the source of the information or the information subject.  Custodian may retain a key to relink data necessary to reidentify the information subject.\r\n\n                        \n                           Rationale: Personal data which has been processed to make it impossible to know whose data it is. Used particularly for secondary use of health data. In some cases, it may be possible for authorized individuals to restore the identity of the individual, e.g.,for public health case management.  Based on ISO/TS 25237:2008 Health informatics—Pseudonymization";
1904            case REDACTED: return "Security metadata observation value used to indicate the mechanism by which software systems can filter an IT resource (data, information object, service, or system capability) to remove any portion of the resource that is not authorized to be access, used, or disclosed.\r\n\n                        \n                           Usage Note: \"REDACTED\" may be used, per applicable policy, as a flag to indicate to a user or receiver that some portion of an IT resource has filtered and not included in the content accessed or received.";
1905            case SUBSETTED: return "Metadata observation used to indicate that some information has been removed from the source object when the view this object contains was constructed because of configuration options when the view was created. The content may not be suitable for use as the basis of a record update\r\n\n                        \n                           Usage Note: This is not suitable to be used when information is removed for security reasons - see the code REDACTED for this use.";
1906            case SYNTAC: return "Security metadata observation value used to indicate that the IT resource syntax has been transformed from one syntactical representation to another.  \r\n\n                        \n                           Usage Note: \"SYNTAC\" code does not indicate the syntactical correctness of the syntactically transformed IT resource.";
1907            case TRSLT: return "Security metadata observation value used to indicate that the IT resource has been translated from one human language to another.  \r\n\n                        \n                           Usage Note: \"TRSLT\" does not indicate the fidelity of the translation or the languages translated.\r\n\n                        The fidelity of the IT Resource translation may be indicated using a SecurityIntegrityConfidenceObservation.\r\n\n                        To indicate languages, use the Value Set:HumanLanguage (2.16.840.1.113883.1.11.11526)";
1908            case VERSIONED: return "Security metadata observation value conveying the alteration integrity of an IT resource (data, information object, service, or system capability)  which indicates that the resource only retains versions of an IT resource  for access and use per applicable policy\r\n\n                        \n                           Usage Note: When this code is used, expectation is that the system has removed historical versions of the data that falls outside the time period deemed to be the effective time of the applicable version.";
1909            case _SECDATINTOBV: return "Abstract security observation values used to indicate data integrity metadata.\r\n\n                        \n                           Examples: Codes conveying the mechanism used to preserve the accuracy and consistency of an IT resource such as a digital signature and a cryptographic hash function.";
1910            case CRYTOHASH: return "Security metadata observation value used to indicate the mechanism by which software systems can establish that data was not modified in transit.\r\n\n                        \n                           Rationale: This definition is intended to align with the ISO 22600-2 3.3.19 definition of cryptographic checkvalue: Information which is derived by performing a cryptographic transformation (see cryptography) on the data unit.  The derivation of the checkvalue may be performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit.\r\n\n                        \n                           Examples: \n                        \r\n\n                        \n                           SHA-1\n                           SHA-2 (Secure Hash Algorithm)";
1911            case DIGSIG: return "Security metadata observation value used to indicate the mechanism by which software systems use digital signature to establish that data has not been modified.  \r\n\n                        \n                           Rationale: This definition is intended to align with the ISO 22600-2 3.3.26 definition of digital signature:  Data appended to, or a cryptographic transformation (see cryptography) of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g., by the recipient.";
1912            case _SECINTCONOBV: return "Abstract security observation value used to indicate integrity confidence metadata.\r\n\n                        \n                           Examples: Codes conveying the level of reliability and trustworthiness of an IT resource.";
1913            case HRELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be very high.";
1914            case RELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be adequate.";
1915            case UNCERTREL: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be uncertain.";
1916            case UNRELIABLE: return "Security metadata observation value used to indicate that the veracity or trustworthiness of an IT resource (data, information object, service, or system capability) for a specified purpose of use is perceived to be or deemed by policy to be inadequate.";
1917            case _SECINTPRVOBV: return "Abstract security metadata observation value used to indicate the provenance of an IT resource (data, information object, service, or system capability).\r\n\n                        \n                           Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.";
1918            case _SECINTPRVABOBV: return "Abstract security provenance metadata observation value used to indicate the entity that asserted an IT resource (data, information object, service, or system capability).\r\n\n                        \n                           Examples: Codes conveying the provenance metadata about the entity asserting the resource.";
1919            case CLINAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a clinician.";
1920            case DEVAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a device.";
1921            case HCPAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a healthcare professional.";
1922            case PACQAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient acquaintance.";
1923            case PATAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a patient.";
1924            case PAYAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a payer.";
1925            case PROAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a professional.";
1926            case SDMAST: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was asserted by a substitute decision maker.";
1927            case _SECINTPRVRBOBV: return "Abstract security provenance metadata observation value used to indicate the entity that reported the resource (data, information object, service, or system capability).\r\n\n                        \n                           Examples: Codes conveying the provenance metadata about the entity reporting an IT resource.";
1928            case CLINRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a clinician.";
1929            case DEVRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a device.";
1930            case HCPRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a healthcare professional.";
1931            case PACQRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient acquaintance.";
1932            case PATRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a patient.";
1933            case PAYRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a payer.";
1934            case PRORPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a professional.";
1935            case SDMRPT: return "Security provenance metadata observation value used to indicate that an IT resource (data, information object, service, or system capability) was reported by a substitute decision maker.";
1936            case SECTRSTOBV: return "Observation value used to indicate aspects of trust applicable to an IT resource (data, information object, service, or system capability).";
1937            case TRSTACCRDOBV: return "Values for security trust accreditation metadata observation made about the formal declaration by an authority or neutral third party that validates the technical, security, trust, and business practice conformance of Trust Agents to facilitate security, interoperability, and trust among participants within a security domain or trust framework.";
1938            case TRSTAGREOBV: return "Values for security trust agreement metadata observation made about privacy and security requirements with which a security domain must comply. [ISO IEC 10181-1]\n[ISO IEC 10181-1]";
1939            case TRSTCERTOBV: return "Values for security trust certificate metadata observation made about a set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for an IT resource (data, information object, service, or system capability). [Based on ISO IEC 10181-1]\r\n\n                        For example, a Certificate Policy (CP), which is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements.  A particular Certificate Policy might indicate the applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range.  Another example is Cross Certification with Federal Bridge.";
1940            case TRSTLOAOBV: return "Values for security trust assurance metadata observation made about the digital quality or reliability of a trust assertion, activity, capability, information exchange, mechanism, process, or protocol.";
1941            case LOAAN: return "The value assigned as the indicator of the digital quality or reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2]\r\n\n                        For example, the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]";
1942            case LOAAN1: return "Indicator of low digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] \r\n\n                        Low authentication level of assurance indicates that the relying party may have little or no confidence in the asserted identity's validity. Level 1 requires little or no confidence in the asserted identity. No identity proofing is required at this level, but the authentication mechanism should provide some assurance that the same claimant is accessing the protected transaction or data. A wide range of available authentication technologies can be employed and any of the token methods of Levels 2, 3, or 4, including Personal Identification Numbers (PINs), may be used. To be authenticated, the claimant must prove control of the token through a secure authentication protocol. At Level 1, long-term shared authentication secrets may be revealed to verifiers.  Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1943            case LOAAN2: return "Indicator of basic digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]\r\n\n                        Basic authentication level of assurance indicates that the relying party may have some confidence in the asserted identity's validity. Level 2 requires confidence that the asserted identity is accurate. Level 2 provides for single-factor remote network authentication, including identity-proofing requirements for presentation of identifying materials or information. A wide range of available authentication technologies can be employed, including any of the token methods of Levels 3 or 4, as well as passwords. Successful authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token.  Eavesdropper, replay, and online guessing attacks are prevented.  \nLong-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are required. Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1944            case LOAAN3: return "Indicator of medium digital quality or reliability of the digital reliability of verification and validation of the process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies] \r\n\n                        Medium authentication level of assurance indicates that the relying party may have high confidence in the asserted identity's validity.  Level 3 is appropriate for transactions that need high confidence in the accuracy of the asserted identity. Level 3 provides multifactor remote network authentication. At this level, identity-proofing procedures require verification of identifying materials and information. Authentication is based on proof of possession of a key or password through a cryptographic protocol. Cryptographic strength mechanisms should protect the primary authentication token (a cryptographic key) against compromise by the protocol threats, including eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks. A minimum of two authentication factors is required. Three kinds of tokens may be used:\r\n\n                        \n                           \"soft\" cryptographic token, which has the key stored on a general-purpose computer, \n                           \"hard\" cryptographic token, which has the key stored on a special hardware device, and \n                           \"one-time password\" device token, which has symmetric key stored on a personal hardware device that is a cryptographic module validated at FIPS 140-2 Level 1 or higher. Validation testing of cryptographic modules and algorithms for conformance to Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, is managed by NIST.\n                        \n                        Authentication requires that the claimant prove control of the token through a secure authentication protocol. The token must be unlocked with a password or biometric representation, or a password must be used in a secure authentication protocol, to establish two-factor authentication. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Approved cryptographic techniques are used for all operations.  Assertions issued about claimants as a result of a successful authentication are either cryptographically authenticated by relying parties (using approved methods) or are obtained directly from a trusted party via a secure authentication protocol.    [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1945            case LOAAN4: return "Indicator of high digital quality or reliability of the digital reliability of the verification and validation process used to verify the claimed identity of an entity by securely associating an identifier and its authenticator. [Based on ISO 7498-2] \r\n\n                        The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and 2) the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. [OMB M-04-04 E-Authentication Guidance for Federal Agencies]\r\n\n                        High authentication level of assurance indicates that the relying party may have very high confidence in the asserted identity's validity. Level 4 is for transactions that need very high confidence in the accuracy of the asserted identity. Level 4 provides the highest practical assurance of remote network authentication. Authentication is based on proof of possession of a key through a cryptographic protocol. This level is similar to Level 3 except that only “hard� cryptographic tokens are allowed, cryptographic module validation requirements are strengthened, and subsequent critical data transfers must be authenticated via a key that is bound to the authentication process. The token should be a hardware cryptographic module validated at FIPS 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. This level requires a physical token, which cannot readily be copied, and operator authentication at Level 2 and higher, and ensures good, two-factor remote authentication.\r\n\n                        Level 4 requires strong cryptographic authentication of all parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the claimant prove through a secure authentication protocol that the claimant controls the token. Eavesdropper, replay, online guessing, verifier impersonation, and man-in-the-middle attacks are prevented. Long-term shared authentication secrets, if used, are never revealed to any party except the claimant and verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent verifiers by the CSP. Strong approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1946            case LOAAP: return "The value assigned as the indicator of the digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]";
1947            case LOAAP1: return "Indicator of the low digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n                        Low authentication process level of assurance indicates that (1) long-term shared authentication secrets may be revealed to verifiers; and (2) assertions and assertion references require protection from manufacture/modification and reuse attacks.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1948            case LOAAP2: return "Indicator of the basic digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n                        Basic authentication process level of assurance indicates that long-term shared authentication secrets are never revealed to any other party except Credential Service Provider (CSP).  Sessions (temporary) shared secrets may be provided to independent verifiers by CSP. Long-term shared authentication secrets, if used, are never revealed to any other party except Verifiers operated by the Credential Service Provider (CSP); however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 1 requirements, assertions are resistant to disclosure, redirection, capture and substitution attacks. Approved cryptographic techniques are required.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1949            case LOAAP3: return "Indicator of the medium digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n                        Medium authentication process level of assurance indicates that the token can be unlocked with password, biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication.  Long-term shared authentication secrets are never revealed to any party except the Claimant and Credential Service Provider (CSP).\r\n\n                        Authentication requires that the Claimant prove, through a secure authentication protocol, that he or she controls the token. The Claimant unlocks the token with a password or biometric, or uses a secure multi-token authentication protocol to establish two-factor authentication (through proof of possession of a physical or software token in combination with some memorized secret knowledge). Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. In addition to Level 2 requirements, assertions are protected against repudiation by the Verifier.";
1950            case LOAAP4: return "Indicator of the high digital quality or reliability of a defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier. [Based on NIST SP 800-63-2]\r\n\n                        High authentication process level of assurance indicates all sensitive data transfer are cryptographically authenticated using keys bound to the authentication process.  Level 4 requires strong cryptographic authentication of all communicating parties and all sensitive data transfers between the parties. Either public key or symmetric key technology may be used. Authentication requires that the Claimant prove through a secure authentication protocol that he or she controls the token. All protocol threats at Level 3 are required to be prevented at Level 4. Protocols shall also be strongly resistant to man-in-the-middle attacks. Long-term shared authentication secrets, if used, are never revealed to any party except the Claimant and Verifiers operated directly by the CSP; however, session (temporary) shared secrets may be provided to independent Verifiers by the CSP. Approved cryptographic techniques are used for all operations. All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process.   [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1951            case LOAAS: return "The value assigned as the indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.";
1952            case LOAAS1: return "Indicator of the low quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n                        Assertions and assertion references require protection from modification and reuse attacks.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1953            case LOAAS2: return "Indicator of the basic quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n                        Assertions are resistant to disclosure, redirection, capture and substitution attacks.  Approved cryptographic techniques are required for all assertion protocols.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1954            case LOAAS3: return "Indicator of the medium quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n                        Assertions are protected against repudiation by the verifier.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1955            case LOAAS4: return "Indicator of the high quality or reliability of the statement from a Verifier to a Relying Party (RP) that contains identity information about a Subscriber. Assertions may also contain verified attributes.\r\n\n                        Strongly resistant to man-in-the-middle attacks. \"Bearer\" assertions are not used.  \"Holder-of-key\" assertions may be used. RP maintains records of the assertions.  [Summary of the technical requirements specified in NIST SP 800-63 for the four levels of assurance defined by the December 2003, the Office of Management and Budget (OMB) issued Memorandum M-04-04, E-Authentication Guidance for Federal Agencies.]";
1956            case LOACM: return "Indicator of the digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1957            case LOACM1: return "Indicator of the low digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity. Little or no confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include weak identity binding to tokens and plaintext passwords or secrets not transmitted across a network. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1958            case LOACM2: return "Indicator of the basic digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and its binding to an identity.  Some confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include:  Verification must prove claimant controls the token; token resists online guessing, replay, session hijacking, and eavesdropping attacks; and  token is at least weakly resistant to man-in-the middle attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1959            case LOACM3: return "Indicator of the medium digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity.  High confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics  include: Ownership of token verifiable through security authentication protocol and credential management protects against verifier impersonation attacks. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1960            case LOACM4: return "Indicator of the high digital quality or reliability of the activities performed by the Credential Service Provider (CSP) subsequent to electronic authentication registration, identity proofing and issuance activities to manage and safeguard the integrity of an issued credential and it’s binding to an identity.  Very high confidence that an individual has maintained control over a token that has been entrusted to him or her and that that token has not been compromised. Characteristics include: Verifier can prove control of token through a secure protocol; credential management supports strong cryptographic authentication of all communication parties. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1961            case LOAID: return "Indicator of the quality or reliability in the process of ascertaining that an individual is who he or she claims to be.";
1962            case LOAID1: return "Indicator of low digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires that a continuity of identity be maintained but does not require identity proofing. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1963            case LOAID2: return "Indicator of some digital quality or reliability in the process of ascertaining that that an individual is who he or she claims to be. Requires identity proofing via presentation of identifying material or information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1964            case LOAID3: return "Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1965            case LOAID4: return "Indicator of high digital quality or reliability in the process of ascertaining that an individual is who he or she claims to be.  Requires identity proofing procedures for verification of identifying materials and information. [Based on Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1966            case LOANR: return "Indicator of the digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
1967            case LOANR1: return "Indicator of low digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
1968            case LOANR2: return "Indicator of basic digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
1969            case LOANR3: return "Indicator of medium digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
1970            case LOANR4: return "Indicator of high digital quality or reliability in the process of establishing proof of delivery and proof of origin. [Based on ISO 7498-2]";
1971            case LOARA: return "Indicator of the digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]";
1972            case LOARA1: return "Indicator of low digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]";
1973            case LOARA2: return "Indicator of basic digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]";
1974            case LOARA3: return "Indicator of medium digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization’s security controls. [Based on NIST SP 800-63-2]";
1975            case LOARA4: return "Indicator of high digital quality or reliability of the information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization's security controls. [Based on NIST SP 800-63-2]";
1976            case LOATK: return "Indicator of the digital quality or reliability of single and multi-token authentication. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1977            case LOATK1: return "Indicator of the low digital quality or reliability of single and multi-token authentication. Permits the use of any of the token methods of Levels 2, 3, or 4. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1978            case LOATK2: return "Indicator of the basic digital quality or reliability of single and multi-token authentication. Requires single factor authentication using memorized secret tokens, pre-registered knowledge tokens, look-up secret tokens, out of band tokens, or single factor one-time password devices. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1979            case LOATK3: return "Indicator of the medium digital quality or reliability of single and multi-token authentication. Requires two authentication factors. Provides multi-factor remote network authentication. Permits multi-factor software cryptographic token. [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1980            case LOATK4: return "Indicator of the high digital quality or reliability of single and multi-token authentication. Requires token that is a hardware cryptographic module validated at validated at Federal Information Processing Standard (FIPS) 140-2 Level 2 or higher overall with at least FIPS 140-2 Level 3 physical security. Level 4 token requirements can be met by using the PIV authentication key of a FIPS 201 compliant Personal Identity Verification (PIV) Card.  [Electronic Authentication Guideline - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-63-1, Dec 2011]";
1981            case TRSTMECOBV: return "Values for security trust mechanism metadata observation made about a security architecture system component that supports enforcement of security policies.";
1982            case _SEVERITYOBSERVATION: return "Potential values for observations of severity.";
1983            case H: return "Indicates the condition may be life-threatening or has the potential to cause permanent injury.";
1984            case L: return "Indicates the condition may result in some adverse consequences but is unlikely to substantially affect the situation of the subject.";
1985            case M: return "Indicates the condition may result in noticable adverse adverse consequences but is unlikely to be life-threatening or cause permanent injury.";
1986            case _SUBJECTBODYPOSITION: return "Contains codes for defining the observed, physical position of a subject, such as during an observation, assessment, collection of a specimen, etc.  ECG waveforms and vital signs, such as blood pressure, are two examples where a general, observed position typically needs to be noted.";
1987            case LLD: return "Lying on the left side.";
1988            case PRN: return "Lying with the front or ventral surface downward; lying face down.";
1989            case RLD: return "Lying on the right side.";
1990            case SFWL: return "A semi-sitting position in bed with the head of the bed elevated approximately 45 degrees.";
1991            case SIT: return "Resting the body on the buttocks, typically with upper torso erect or semi erect.";
1992            case STN: return "To be stationary, upright, vertical, on one's legs.";
1993            case SUP: return "supine";
1994            case RTRD: return "Lying on the back, on an inclined plane, typically about 30-45 degrees with head raised and feet lowered.";
1995            case TRD: return "Lying on the back, on an inclined plane, typically about 30-45 degrees, with  head lowered and feet raised.";
1996            case _VERIFICATIONOUTCOMEVALUE: return "Values for observations of verification act results\r\n\n                        \n                           Examples: Verified, not verified, verified with warning.";
1997            case ACT: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s).";
1998            case ACTPEND: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s) - Pending Investigation";
1999            case ELG: return "Definition: Coverage is in effect for healthcare service(s) and/or product(s).";
2000            case INACT: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s).";
2001            case INPNDINV: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Investigation.";
2002            case INPNDUPD: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s) - Pending Eligibility Update.";
2003            case NELG: return "Definition: Coverage is not in effect for healthcare service(s) and/or product(s). May optionally include reasons for the ineligibility.";
2004            case _ANNOTATIONVALUE: return "AnnotationValue";
2005            case _COMMONCLINICALOBSERVATIONVALUE: return "Description:Used in a patient care message to value simple clinical (non-lab) observations.";
2006            case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "This domain is established as a parent to a variety of value domains being defined to support the communication of Individual Case Safety Reports to regulatory bodies. Arguably, this aggregation is not taxonomically pure, but the grouping will facilitate the management of these domains.";
2007            case _INDICATIONVALUE: return "Indicates the specific observation result which is the reason for the action (prescription, lab test, etc.). E.g. Headache, Ear infection, planned diagnostic image (requiring contrast agent), etc.";
2008            case NULL: return null;
2009            default: return "?";
2010          }
2011        }
2012        public String getDisplay() {
2013          switch (this) {
2014            case _ACTCOVERAGEASSESSMENTOBSERVATIONVALUE: return "ActCoverageAssessmentObservationValue";
2015            case _ACTFINANCIALSTATUSOBSERVATIONVALUE: return "ActFinancialStatusObservationValue";
2016            case ASSET: return "asset";
2017            case ANNUITY: return "annuity";
2018            case PROP: return "real property";
2019            case RETACCT: return "retirement investment account";
2020            case TRUST: return "trust";
2021            case INCOME: return "income";
2022            case CHILD: return "child support";
2023            case DISABL: return "disability pay";
2024            case INVEST: return "investment income";
2025            case PAY: return "paid employment";
2026            case RETIRE: return "retirement pay";
2027            case SPOUSAL: return "spousal or partner support";
2028            case SUPPLE: return "income supplement";
2029            case TAX: return "tax obligation";
2030            case LIVEXP: return "living expense";
2031            case CLOTH: return "clothing expense";
2032            case FOOD: return "food expense";
2033            case HEALTH: return "health expense";
2034            case HOUSE: return "household expense";
2035            case LEGAL: return "legal expense";
2036            case MORTG: return "mortgage";
2037            case RENT: return "rent";
2038            case SUNDRY: return "sundry expense";
2039            case TRANS: return "transportation expense";
2040            case UTIL: return "utility expense";
2041            case ELSTAT: return "eligibility indicator";
2042            case ADOPT: return "adoption document";
2043            case BTHCERT: return "birth certificate";
2044            case CCOC: return "creditable coverage document";
2045            case DRLIC: return "driver license";
2046            case FOSTER: return "foster child document";
2047            case MEMBER: return "program or policy member";
2048            case MIL: return "military identification";
2049            case MRGCERT: return "marriage certificate";
2050            case PASSPORT: return "passport";
2051            case STUDENRL: return "student enrollment";
2052            case HLSTAT: return "health status";
2053            case DISABLE: return "disabled";
2054            case DRUG: return "drug use";
2055            case IVDRG: return "IV drug use";
2056            case PGNT: return "pregnant";
2057            case LIVDEP: return "living dependency";
2058            case RELDEP: return "relative dependent";
2059            case SPSDEP: return "spouse dependent";
2060            case URELDEP: return "unrelated person dependent";
2061            case LIVSIT: return "living situation";
2062            case ALONE: return "alone";
2063            case DEPCHD: return "dependent children";
2064            case DEPSPS: return "dependent spouse";
2065            case DEPYGCHD: return "dependent young children";
2066            case FAM: return "live with family";
2067            case RELAT: return "relative";
2068            case SPS: return "spouse only";
2069            case UNREL: return "unrelated person";
2070            case SOECSTAT: return "socio economic status";
2071            case ABUSE: return "abuse victim";
2072            case HMLESS: return "homeless";
2073            case ILGIM: return "illegal immigrant";
2074            case INCAR: return "incarcerated";
2075            case PROB: return "probation";
2076            case REFUG: return "refugee";
2077            case UNEMPL: return "unemployed";
2078            case _ALLERGYTESTVALUE: return "AllergyTestValue";
2079            case A0: return "no reaction";
2080            case A1: return "minimal reaction";
2081            case A2: return "mild reaction";
2082            case A3: return "moderate reaction";
2083            case A4: return "severe reaction";
2084            case _COVERAGELIMITOBSERVATIONVALUE: return "CoverageLimitObservationValue";
2085            case _COVERAGELEVELOBSERVATIONVALUE: return "CoverageLevelObservationValue";
2086            case ADC: return "adult child";
2087            case CHD: return "child";
2088            case DEP: return "dependent";
2089            case DP: return "domestic partner";
2090            case ECH: return "employee";
2091            case FLY: return "family coverage";
2092            case IND: return "individual";
2093            case SSP: return "same sex partner";
2094            case _CRITICALITYOBSERVATIONVALUE: return "CriticalityObservationValue";
2095            case CRITH: return "high criticality";
2096            case CRITL: return "low criticality";
2097            case CRITU: return "unable to assess criticality";
2098            case _GENETICOBSERVATIONVALUE: return "GeneticObservationValue";
2099            case HOMOZYGOTE: return "HOMO";
2100            case _OBSERVATIONMEASURESCORING: return "ObservationMeasureScoring";
2101            case COHORT: return "cohort measure scoring";
2102            case CONTVAR: return "continuous variable measure scoring";
2103            case PROPOR: return "proportion measure scoring";
2104            case RATIO: return "ratio measure scoring";
2105            case _OBSERVATIONMEASURETYPE: return "ObservationMeasureType";
2106            case COMPOSITE: return "composite measure type";
2107            case EFFICIENCY: return "efficiency measure type";
2108            case EXPERIENCE: return "experience measure type";
2109            case OUTCOME: return "outcome measure type";
2110            case PROCESS: return "process measure type";
2111            case RESOURCE: return "resource use measure type";
2112            case STRUCTURE: return "structure measure type";
2113            case _OBSERVATIONPOPULATIONINCLUSION: return "ObservationPopulationInclusion";
2114            case DENEX: return "denominator exclusions";
2115            case DENEXCEP: return "denominator exceptions";
2116            case DENOM: return "denominator";
2117            case IP: return "initial population";
2118            case IPP: return "initial patient population";
2119            case MSRPOPL: return "measure population";
2120            case NUMER: return "numerator";
2121            case NUMEX: return "numerator exclusions";
2122            case _PARTIALCOMPLETIONSCALE: return "PartialCompletionScale";
2123            case G: return "Great extent";
2124            case LE: return "Large extent";
2125            case ME: return "Medium extent";
2126            case MI: return "Minimal extent";
2127            case N: return "None";
2128            case S: return "Some extent";
2129            case _SECURITYOBSERVATIONVALUE: return "SecurityObservationValue";
2130            case _SECINTOBV: return "security integrity";
2131            case _SECALTINTOBV: return "alteration integrity";
2132            case ABSTRED: return "abstracted";
2133            case AGGRED: return "aggregated";
2134            case ANONYED: return "anonymized";
2135            case MAPPED: return "mapped";
2136            case MASKED: return "masked";
2137            case PSEUDED: return "pseudonymized";
2138            case REDACTED: return "redacted";
2139            case SUBSETTED: return "subsetted";
2140            case SYNTAC: return "syntactic transform";
2141            case TRSLT: return "translated";
2142            case VERSIONED: return "versioned";
2143            case _SECDATINTOBV: return "data integrity";
2144            case CRYTOHASH: return "cryptographic hash function";
2145            case DIGSIG: return "digital signature";
2146            case _SECINTCONOBV: return "integrity confidence";
2147            case HRELIABLE: return "highly reliable";
2148            case RELIABLE: return "reliable";
2149            case UNCERTREL: return "uncertain reliability";
2150            case UNRELIABLE: return "unreliable";
2151            case _SECINTPRVOBV: return "provenance";
2152            case _SECINTPRVABOBV: return "provenance asserted by";
2153            case CLINAST: return "clinician asserted";
2154            case DEVAST: return "device asserted";
2155            case HCPAST: return "healthcare professional asserted";
2156            case PACQAST: return "patient acquaintance asserted";
2157            case PATAST: return "patient asserted";
2158            case PAYAST: return "payer asserted";
2159            case PROAST: return "professional asserted";
2160            case SDMAST: return "substitute decision maker asserted";
2161            case _SECINTPRVRBOBV: return "provenance reported by";
2162            case CLINRPT: return "clinician reported";
2163            case DEVRPT: return "device reported";
2164            case HCPRPT: return "healthcare professional reported";
2165            case PACQRPT: return "patient acquaintance reported";
2166            case PATRPT: return "patient reported";
2167            case PAYRPT: return "payer reported";
2168            case PRORPT: return "professional reported";
2169            case SDMRPT: return "substitute decision maker reported";
2170            case SECTRSTOBV: return "security trust observation";
2171            case TRSTACCRDOBV: return "trust accreditation observation";
2172            case TRSTAGREOBV: return "trust agreement observation";
2173            case TRSTCERTOBV: return "trust certificate observation";
2174            case TRSTLOAOBV: return "trust assurance observation";
2175            case LOAAN: return "authentication level of assurance value";
2176            case LOAAN1: return "low authentication level of assurance";
2177            case LOAAN2: return "basic authentication level of assurance";
2178            case LOAAN3: return "medium authentication level of assurance";
2179            case LOAAN4: return "high authentication level of assurance";
2180            case LOAAP: return "authentication process level of assurance value";
2181            case LOAAP1: return "low authentication process level of assurance";
2182            case LOAAP2: return "basic authentication process level of assurance";
2183            case LOAAP3: return "medium authentication process level of assurance";
2184            case LOAAP4: return "high authentication process level of assurance";
2185            case LOAAS: return "assertion level of assurance value";
2186            case LOAAS1: return "low assertion level of assurance";
2187            case LOAAS2: return "basic assertion level of assurance";
2188            case LOAAS3: return "medium assertion level of assurance";
2189            case LOAAS4: return "high assertion level of assurance";
2190            case LOACM: return "token and credential management level of assurance value)";
2191            case LOACM1: return "low token and credential management level of assurance";
2192            case LOACM2: return "basic token and credential management level of assurance";
2193            case LOACM3: return "medium token and credential management level of assurance";
2194            case LOACM4: return "high token and credential management level of assurance";
2195            case LOAID: return "identity proofing level of assurance";
2196            case LOAID1: return "low identity proofing level of assurance";
2197            case LOAID2: return "basic identity proofing level of assurance";
2198            case LOAID3: return "medium identity proofing level of assurance";
2199            case LOAID4: return "high identity proofing level of assurance";
2200            case LOANR: return "non-repudiation level of assurance value";
2201            case LOANR1: return "low non-repudiation level of assurance";
2202            case LOANR2: return "basic non-repudiation level of assurance";
2203            case LOANR3: return "medium non-repudiation level of assurance";
2204            case LOANR4: return "high non-repudiation level of assurance";
2205            case LOARA: return "remote access level of assurance value";
2206            case LOARA1: return "low remote access level of assurance";
2207            case LOARA2: return "basic remote access level of assurance";
2208            case LOARA3: return "medium remote access level of assurance";
2209            case LOARA4: return "high remote access level of assurance";
2210            case LOATK: return "token level of assurance value";
2211            case LOATK1: return "low token level of assurance";
2212            case LOATK2: return "basic token level of assurance";
2213            case LOATK3: return "medium token level of assurance";
2214            case LOATK4: return "high token level of assurance";
2215            case TRSTMECOBV: return "none supplied 6";
2216            case _SEVERITYOBSERVATION: return "SeverityObservation";
2217            case H: return "High";
2218            case L: return "Low";
2219            case M: return "Moderate";
2220            case _SUBJECTBODYPOSITION: return "_SubjectBodyPosition";
2221            case LLD: return "left lateral decubitus";
2222            case PRN: return "prone";
2223            case RLD: return "right lateral decubitus";
2224            case SFWL: return "Semi-Fowler's";
2225            case SIT: return "sitting";
2226            case STN: return "standing";
2227            case SUP: return "supine";
2228            case RTRD: return "reverse trendelenburg";
2229            case TRD: return "trendelenburg";
2230            case _VERIFICATIONOUTCOMEVALUE: return "verification outcome";
2231            case ACT: return "active coverage";
2232            case ACTPEND: return "active - pending investigation";
2233            case ELG: return "eligible";
2234            case INACT: return "inactive";
2235            case INPNDINV: return "inactive - pending investigation";
2236            case INPNDUPD: return "inactive - pending eligibility update";
2237            case NELG: return "not eligible";
2238            case _ANNOTATIONVALUE: return "AnnotationValue";
2239            case _COMMONCLINICALOBSERVATIONVALUE: return "common clinical observation";
2240            case _INDIVIDUALCASESAFETYREPORTVALUEDOMAINS: return "Individual Case Safety Report Value Domains";
2241            case _INDICATIONVALUE: return "IndicationValue";
2242            case NULL: return null;
2243            default: return "?";
2244          }
2245    }
2246
2247
2248}