This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
HL7_PRIVSEC_LM_R1_N1_2021JAN
HL7 Privacy and Security Logical Data Model, Release 1
HL7 licenses its standards and select IP free of charge. If you did not acquire a free license from HL7 for this document, you are not authorized to access or make any use of it. To obtain a free license, please visit:
http://www.HL7.org/implement/standards/index.cfm.
If you are the individual that obtained the license for this HL7 Standard, specification, or other freely licensed work (in each and every instance “Specified Material”), the following describes the permitted uses of the Material.
A. HL7 INDIVIDUAL, STUDENT AND HEALTH PROFESSIONAL MEMBERS, who register and agree to the terms of HL7’s license, are authorized, without additional charge, to read, and to use Specified Material to develop and sell products and services that implement, but do not directly incorporate, the Specified Material in whole or in part without paying license fees to HL7.
INDIVIDUAL, STUDENT AND HEALTH PROFESSIONAL MEMBERS wishing to incorporate additional items of Special Material in whole or part, into products and services, or to enjoy additional authorizations granted to HL7 ORGANIZATIONAL MEMBERS as noted below, must become ORGANIZATIONAL MEMBERS of HL7.
B. HL7 ORGANIZATION MEMBERS, who register and agree to the terms of HL7’s License, are authorized, without additional charge, on a perpetual (except as provided for in the full license terms governing the Material), non-exclusive and worldwide basis, the right to (a) download, copy (for internal purposes only) and share this Material with your employees and consultants for study purposes, and (b) utilize the Material for the purpose of developing, making, having made, using, marketing, importing, offering to sell or license, and selling or licensing, and to otherwise distribute, Compliant Products, in all cases subject to the conditions set forth in this Agreement and any relevant patent and other intellectual property rights of third parties (which may include members of HL7). No other license, sublicense, or other rights of any kind are granted under this Agreement.
C. NON-MEMBERS, who register and agree to the terms of HL7’s IP policy for Specified Material, are authorized, without additional charge, to read and use the Specified Material for evaluating whether to implement, or in implementing, the Specified Material, and to use Specified Material to develop and sell products and services that implement, but do not directly incorporate, the Specified Material in whole or in part.
NON-MEMBERS wishing to incorporate additional items of Specified Material in whole or part, into products and services, or to enjoy the additional authorizations granted to HL7 ORGANIZATIONAL MEMBERS, as noted above, must become ORGANIZATIONAL MEMBERS of HL7.
Please see http://www.HL7.org/legal/ippolicy.cfm for the full license terms governing the Material.
Ownership. Licensee agrees and acknowledges that HL7 owns all right, title, and interest, in and to the Materials. Licensee shall take no action contrary to, or inconsistent with, the foregoing.
Licensee agrees and acknowledges that HL7 may not own all right, title, and interest, in and to the Materials and that the Materials may contain and/or reference intellectual property owned by third parties (“Third Party IP”). Acceptance of these License Terms does not grant Licensee any rights with respect to Third Party IP. Licensee alone is responsible for identifying and obtaining any necessary licenses or authorizations to utilize Third Party IP in connection with the Materials or otherwise. Any actions, claims or suits brought by a third party resulting from a breach of any Third-Party IP right by the Licensee remains the Licensee’s liability.
Following is a non-exhaustive list of third-party terminologies that may require a separate license:
The following classes are based on security policy requirements as well as the hierarchy
specified by ISO 22600-2.
4.5.1 Class: AuthorizationPolicy
AuthorizationPolicy is a specialization of a BasicPolicy and is used to describe an authorization
policy that may be exchanged across domains. An instance of AuthorizationPolicy specifies
'permitted actions' according to ISO 22600-2. A positive (or negative) AuthorizationPolicy defines
the actions ('OperationType') that a subject is permitted (or forbidden) to perform on a target.
Actions encoded using the 'OperationType' class represents the operations defined in the interface
of a target object. The following are attributes of an AuthorizationPolicy:
Multiplicity Notes
Attribute ‘AuthorizationPolicy.levelOfA
ssurance’ of type ‘INT’
[0...1] Level of Assurance (LoA) refers to the degree of certainty that (1) a resource owner has that a person's physical self has been adequately verified before credentials are issued by a registration authority, and (2) a user owns the credentials they are subsequently presenting to access the resource. LoA is relevant to authentication, authorization, and access control. A BasicPolicy requires the level of assurance as indicated within the AuthorizationPolicy specialization.
Attribute
‘AuthorizationPolicy.enable’
of type ‘Boolean’
[1...1] This attribute is used to specify if the policy enables or declines an authorization. If this attribute is set to 'true', the policy authorizes the actions and conditions pertaining to the resources referenced by the policy. Otherwise, the authorization is declined.
4.5.2 Class: Basic Policy
This is the base class for a variety of policy types. It extends the abstract Policy class and
provides additional attributes. This class may be used to instantiate specific policies. ISO-22600-
2 specifies a Security Policy as 'plan or course of action adopted for providing computer security'.
BasicPolicy is a specialization of the abstract Policy class and inherits all its attributes. It also
defines additional attributes and associations:
Multiplicity Notes
Association 'BasicPolicy.informationReference' of type 'InformationReference'
[*] This association references the attributes of the information referenced in the policy.
HL7 Privacy and Security Logical Data Model, Release 1 Page 17
Association 'BasicPolicy.operationType' of type 'OperationType'
[*] This association refers to the operation associated with the policy.
Attribute 'BasicPolicy.purposeOfUse' of type 'PurposeCode'
[0...1] This attribute is used to specify the purpose to permit a specific type of action/operation according to the policy. The vocabulary analysis section provides additional illustrative values for the concept embodied by this attribute.
Attribute 'BasicPolicy.route' of type ' '
[1] This attribute specifies whether access to protected information may only be granted for a specified route of access. For example, access may be restricted to remote users using a Virtual Private Network (VPN). The route is a context qualifier as specified by ISO/IEC 10164-9.
Association 'BasicPolicy.securityRole' of type 'SecurityRole'
[*] This association references the user role specified in the policy defined as a granted set of competencies and/or performances which is associated with a task.
Attribute 'BasicPolicy.timePeriod' of type 'Time'
[*] This attribute specifies that access may be allowed only during specific time periods of the day (e.g., 9 am to 5 pm).
Attribute ‘BasicPolicy.integityMarkings’ of type ‘IntegrityCodeList’
[0..*] Target integrity levels to which access is allowed.
Attribute ‘BasicPolicy.securityLabels’ of type ‘String’
[0..*] Target tags(security attributes) to which access is allowed.
Attribute ‘BasicPolicy.relationships’ of type ‘Relationships’.
[0..*] Relationships to which access is allowed, Primary Care Provider, Care Team, etc.
4.5.3 Class: Composite Policy
This class is the focal class for electronic privacy policies. It contains a set of basic policies
that work together to enforce a privacy policy, organizational standard operating procedure, or a
privacy consent directive. Its basic characteristic is that it contains other policies. An instance of a
CompositePolicy may include several Authorization, Delegation, Refrain, or Obligation policies.
A CompositePolicy is specialization of the abstract Policy class and inherits all its attributes and
associations. In addition to the attributes, it inherits from its base class ('Policy'), this type of class
contains the following association and attribute:
Page 18 HL7 Privacy and Security Logical Data Model, Release 1
‘ContextualInformation.authenticationMechanism’ of type ‘ ‘
[1..*] Allowable mechanisms by which an Initiator may be authenticated.
4.5.6 Class: DelegationPolicy
A delegation policy is intended to assign access rights to a specific individual or organization
(a grantee). ISO 22600-2 defines delegation as 'conveyance of privilege from one entity that holds
such privilege, to another entity'. A DelegationPolicy 'defines what authorizations can be delegated
to whom'.
Multiplicity Notes
Association 'DelegationPolicy.grantee' of type 'Grantee'
[*] The person or organization that is the subject of delegation. This is the entity that receives the privilege granted by the DelegationPolicy.
4.5.7 Class: Location Policy
Access may be granted only to initiators on specific end-Initiator systems, workstations, or
terminals or only to initiators in a specific physical location. This class is required to support
Initiator authorization as specified by Custodian business requirements.
Multiplicity Notes
Association 'Location.providerOrganization' of type 'ProviderOrganization'
[1] This association identifies the organization where the location is scoped.
Attribute 'Location.workstationId' of type 'ST'
[*] Association 'Functional Role.rolePermissions' of type 'Permission' with cardinality of [*]
This association identifies the permissions that are associated with a functional role.
4.5.8 Class: ObligationPolicy
An obligation policy may be used to specify additional privacy preferences specified by an
Individual/patient. An ObligationPolicy may be specified in addition to a ConstraintPolicy to fully
describe an Individual's access control preferences. In some cases, an obligation policy may be
used to indicate that the receiver of an information object may not be allowed to re-disclose or
persist that information object indefinitely. According to ISO 22600-2, ObligationPolicy instances
'are event-triggered and define actions to be performed by manager agent'.
Multiplicity Notes
Attribute 'ObligationPolicy.eventCode' of type 'ObligationCode'
[*] This attribute identifies the action required before completing a step in the workflow. We assume it is coded concept but in today's implementations
Page 20 HL7 Privacy and Security Logical Data Model, Release 1
it is primarily an ad-hoc rule reference (e.g., the name of a data base stored procedure). An obligation may be associated with the release of an object. For example, it may require a signature. This information is passed as rule for an application to enforce. In other cases, it may require that an audit record be created.
4.5.9 Class: Functional Role
Functional Roles can be grouped according to their authorization to access Protected
Information (PI) and perform various operations on healthcare information. For example, a
healthcare provider in Organization A is authorized to access PI from Organization B (when
Organization A and B have entered into a trusted relationship) if that provider is associated with
the Functional Group whose permissions grant access per that FunctionalRole. In summary, the
functional role defines the access control decision. A functional role is bound to a policy.
Multiplicity Notes
Attribute 'Functional Role.name' of type 'String
[0...1] This attribute is used to represent the user role name, if specified.
Attribute ‘Functional Role.roleCode’ of type ‘FunctionalRoleCode’
[0..1] The functional role may specify that the user is part of the healthcare team that is directly involved in the Individual’s care. This attribute refers to a functional role assigned by an organization to computer users.
Association 'Functional Role.rolePermissions' of type 'Permission'
[*] This association identifies the permissions that are associated with a functional role.
4.5.10 Class: Policy (Abstract)
This is the abstract policy class from which all concrete policy classes in this model are derived
and instantiated. Because this class is abstract, it cannot be instantiated as a security policy for
healthcare, however, it specifies the properties reused by all policies. ISO 22600-2 specifies a
policy as 'set of legal, political, organizational, functional and technical obligations for
communication and cooperation'.
Multiplicity Notes
Association 'Policy.authority' of type 'Authority'
[1...1] This attribute reflects the type code for the HL7 RIM ActPolicyClass. The ActPolicyClass.act PolicyType represents a mandate, obligation, requirement, rule, or expectation about the activity or behavior of another party, or the manner in which an act is executed.
HL7 Privacy and Security Logical Data Model, Release 1 Page 21
[0...1] This attribute is used to represent the Initiator role name, if specified.
Attribute ‘Functional Role.roleCode’ of type ‘RoleCode’
[0..1] The role may specify that the Initiator is part of the healthcare team that is directly involved in the Individual’s care. This attribute refers to a functional role assigned to computer Initiators by their organization.
Association 'Functional Role.rolePermissions' of type 'Permission'
[*] This association identifies the permissions that are associated with a functional role.
4.6.2 Class: Permission
This class corresponds to a Role-Based Access Control (RBAC) permission. It specifies an
information object and action/operation allowed on that object. A permission contains one
operation and precisely one information reference.
Multiplicity Notes
Attribute 'Permission.id' of type 'Id'
[1] This attribute is used to specify the unique identifier of the permission.
Association 'Permission.informationObject' of type 'InformationObject’
[1] This association identifies the information resources specified by a permission.
Association 'Permission.operationType' of type 'OperationType’
[1] This association identifies the action or operation that is specified by a permission.
4.6.3 Class: PermissionCatalog
The permission catalog specifies a set of standard permissions. The permission catalog is the
subject of separate HL7 standards. This reference is intended to show it relates to the rest of the
information classes required to support the use cases.
4.6.4 Class: SecurityRole (Abstract)
ISO/TS 22600-2 – Heath Informatics – Privilege Management and Access Control defines
methods for managing authorization and access control to data and/or functions. It accommodates
policy bridging. Privilege management and authorization may be based on roles that individual
actors or groups of individual actors play. ISO-22600-2 specifies a Role as 'set of competences
and/or performances which is associated with a task.' A SecurityRole is a specialization of the
class CompositePolicy that defines a group of policies (authorization, obligation, delegation, and
refrain policies). A 'SecurityRole' is an abstract class that is equivalent to 'Role.’ FunctionalRole
and StructuralRole are specializations of the abstract SecurityRole class.
HL7 Privacy and Security Logical Data Model, Release 1 Page 23
This class corresponds to those ABAC clearances which may be required by an Initiator in
order to access correspondingly classified Custodian-owned PI. See HL7 Healthcare Classification
System (HCS).5
Multiplicity Notes
Attribute ‘Initiator.clearance’ of type ‘Confidentiality”
[1..1] This attribute references the Initiator Confidentiality value asserted in an information request.
Attribute ‘Custodian.classification of type ‘Confidentiality
[1..*] The minimum Confidentiality attribute value required to allow access to requested information as specified by Custodian policy (higher values acceptable).
Attribute ‘Initiator.clearance of type ‘Sensitivity ’
[0..*]
This attribute references Initiator Sensitivity value(s) asserted in an information request.
Attribute ‘Custodian.classification of type ‘Sensitivity’.
[0..*]
The Sensitivity value(s) required to allow access to requested information as specified by Custodian policy.
Attribute ‘Initiator.clearance’ of type ‘Compartment’.
[0..*] This attribute references Initiator Compartment value(s) asserted in an information request.
Attribute ‘Custodian.classification of type ‘Compartment’.
[0..*] The Compartment value(s) required to allow access to requested information as specified by Custodian policy.
Attribute ‘Initiator.integrity’ of type ‘Integrity’.’
[0..*] This attribute references Initiator Integrity value(s) asserted in an information request.
Attribute ‘Custodian.clearance’ of type ‘Integriy’.
[0..*] The Integrity value(s) required to allow access to requested information as specified by Custodian policy.
Attribute ‘Initiator.handling caveat.purposeofuse’ of type ‘PurposeCode’
[1..*] This attribute is used to specify the Security Purpose of Use6 for requested information as asserted by the Initiator.
5 HL7 Healthcare Privacy and Security Classification System (HCS), Release 1
When an initiator is a human user (or an initiator process represents a human user), the label bound to the initiator
often is called a clearance. In these cases, the label bound to the IT resource is called a classification. 6 Security Controls (Handling Caveats) are instructions about mandatory and prohibited actions (obligations and refrain policies) within a permitted use context or “purpose of use”. Handling caveat labels convey dissemination controls and information handling caveats such as obligations and refrain policies to which an IT resource custodian or receiver must comply. Assign handling caveats as access control decision information (ADI) to an
If one considers an initiator identity as initiator-bound ACI, and a set of (initiator
identity.subjectofcare.relationship type) pairs and optionally a set of
(initiator.clearance/classification type pairs) as target-bound ACI, under an appropriate access
control policy, one obtains what is essentially a Relationship-based (ReBac) access control
scheme.7
Per NIST Special Publication 800-162 described above, ABAC includes the concept of
relationships. The viewpoint is that ReBac by itself may be insufficient to provide adequate
security and must be under-pinned by foundational underpinning of subject, object, and requested
operations which can then also include relationships as an additional access-control factor. ReBac
allows for greater granularity of control than provided by Clearance/Classification pairs alone.
4.8.1 Class: Relationship-Based Access Control
Multiplicity Notes
Association 'InitiatorIdentity.relationship' of type 'Relationship'
[1..*] This association references the Initiator relationship(s) to the Subject of Care.
Association
‘Custodian.securityAttribute’ of type ‘Relationship’
[1..*] This association references the allowed relationship(s) specified in the Custodian policy.
Association 'InitiatorIdentity.securityAttribute' of type 'Clearance'
[1..*] This association references the Initiator clearance(s) specified in the ABAC policy.
Attribute ‘Classification’ of Type ‘String’
[1] This attribute is used to specify information tagging by reference to HL7 HCS Security Sensitivity, Compartment and Integrity Labels including Handling Caveats for .Purpose of Use, Obligations and Refrains.
4.9 Custodian Viewpoint
This section demonstrates how security and privacy policies may be used computationally to
determine how Individual health records should be protected when exchanged between healthcare
information resource as required by policy to obtain an end user’s implicit or explicit acceptance of a source rule
prior to use or access. HL7 Healthcare Privacy and Security Classification System (HCS), Release 1. (A)dditional attributes for use in access control decision making. Such attributes might include, for example, handling and distribution caveats compartment indicators, timing constraints, and/or initiator
identification information. Warwick Ford –Computer Communications Security.
Identification of a condition, disease, disorder, or problem by systematic analysis of the
background or history, examination of the signs or symptoms and evaluation of the research or test
results.
4.10.4 Class: Encounter
An interaction between an Individual/patient and care provider(s) for the purpose of providing
healthcare-related service(s).
4.10.5 Class: HealthRecord
This class is used to store a reference to the health record that is the subject of the consent rules
in the privacy Consent Directive.
Multiplicity Notes
Attribute 'HealthRecord.recordId' of type 'oid'
[0..1] The id of the record that is the target of a privacy consent directive.
Attribute 'HealthRecord.recordLocation' of type 'String'
[0..1] The location of the record that is the target of a privacy consent directive.
4.10.6 Class: InformationReference
This class and its associations specify the attributes of the Protected Information referenced by
a policy.
Multiplicity Notes
Attribute 'InformationReference.category' of type 'CategoryType'
[0..1] Information category (e.g., medication, allergies, laboratory).
Attribute 'InformationReference.confidentialityIndicator' of type 'ConfidentialityCode'
[0..1] The confidentiality indicator is a coded attribute that assigns access controls on Individual health records based on the information or type of access.
Attribute ‘InformationReference.dataIntegrity’ of type ‘IntegrityCodeList’
[0..1] The integrity indicator is a coded attribute that assigns access contols on individual health records based on the integrity values of an information object.
Page 30 HL7 Privacy and Security Logical Data Model, Release 1
Attribute 'InformationReference.sensitivity' of type 'Sensitivity'
[0..1] This is a coded attribute that describes the sensitivity of an information artifact. Sensitivity is a characteristic of a resource which implies its value or importance and may include its vulnerability [ISO 7498-2:1989]. Sensitivity may be associated with the Subject of Record or information artifact.
4.10.8 Class: InformationObject
This class represents a reference to specific type of information object that may be referenced
by a policy. This information object refers to the types of objects that may be used in a permission
(e.g., a category of lab orders, document types, etc.)
Multiplicity Notes
Attribute 'InformationObject.code' of type 'ObjectCode'
[0..1] Coded attribute that identifies the type of object referenced in the policy.
Attribute 'InformationObject.sensitivity' of type 'Sensitivity'
[0..1] This is a coded attribute that describes the sensitivity of an information artifact. Sensitivity is a characteristic of a resource which implies its value or importance and may include its vulnerability [ISO 7498-2:1989]. Sensitivity may be associated with the Subject of Record or information artifact.
4.10.9 Class: Target
This class represents Information Objects subject to access control.
Multiplicity Notes
Attribute ‘Target.name’ of type ‘String'
[1..*] The information entity referenced in an access control request. See Information Object.
Attribute ‘Target.accessControlIdentity’ of type ‘AccessControlId’
[*] The identity of an access control service (e.g. an access enforcement function)
Attribute ‘Target.sensitivityMarking’ of type ‘Sensitivity’
[0..*] Security label metadata that “segments” an IT resource by categorizing the value, importance, and vulnerability of an IT resource perceived as undesirable to share.
HL7 Privacy and Security Logical Data Model, Release 1 Page 31
Forms include labels and access-control lists. Target-bound ACI is not necessarily delivered
by the target.
Multiplicity Notes
Attribute ‘Target-BoundACI.initiatorAccessControlIdentity’ of type ‘Id’
[0..*] Individual initiator access control identities and the accesses on the target allowed or denied to them.
Attribute ‘Target-BoundACI.hierarchicalGroupAccessControlIdentity’ of type ‘HierarchicalGroup’
[0..*] Hierarchical group membership access control identities and the accesses on the target allowed or denied to them.
Attribute ‘Target-BoundACI.functionalGroupAccessControlIdentity’ of type ‘FunctionalGroup’
[0..1] Functional group membership access conrol identities and the accesses on the target allowed or denied to them.
Attribute ‘Target-BoundACI.RoleAccessControlIdentity’ of type ‘Role’
[0..*] Role access control identities and the accesses on the target allowed or denied to them.
Attribute ‘Target-BoundACI.AuthoritiesAccesses’ of type ‘Authorities’
[0..*] Authorites and the accesses authorized to them.
4.10.11 Class: PublicServices
This class references the public service program that produced the information. This may be
an important criterion in privacy policies -especially jurisdictional policies. This class is specified
to draw a clear distinction between the privacy policies that affect patients who receive healthcare
services paid by public programs versus private insurance or self-pay.
Multiplicity Notes
Attribute 'PublicServices.type' of type 'PublicCoverageType'
[0..1] This attribute specifies the type of public program that provided coverage for the services documented in the electronic health records. Policies governing services rendered by some public programs may operate under more restrictive confidentiality constraints than others. Example: Substance Abuse and Mental Health Services Administration (SAMHSA) under CFR 42 Part 2.
HL7 Privacy and Security Logical Data Model, Release 1 Page 33
A section is a context that subdivides the body of a clinical document. Document sections are
typically used for human navigation, to give a reader a clue as to the expected content. Document
sections are used to organize and provide consistency to the contents of a document body.
4.10.13 Class: SubjectOfRecord (Abstract)
This abstract class represents the type of subject of record: Individual/patient or population.
4.10.14 Class: Individual
This class is intended to capture the properties of an Individual/'Patient' who is the subject of
a privacy ConsentDirective. See 'Actors' specified in the Use Case Analysis for additional detail.
The consenter may be the person whose preferences it represents (the Individual/patient) or their
designated Substitute Decision Maker (SDM).
Multiplicity Notes
Attribute 'Individual.keywordDigitalId' of type 'Integer'
[0...1] This is a private attribute. A private attribute is one that is accessible only to the class itself --it cannot be used by any outside class. This keyword/shared secret may be used by a patient to provide temporary access to their electronic health records. This attribute is required to support HL7 Security and Privacy Domain Analysis Model Security use case P.12 which originated in Canada.
4.10.15 Class: Consenter
This class is intended to capture the properties of a Consenter/Substitute Decision Maker – see
'Actors' in Section 3.1.
Multiplicity Notes
Association ‘Consenter.relationship’ of type ‘RelationshipCode’
[0..*] Individual who signs the patient Consent Directive. May be the Subject of Care or other authorized person (e.g. holder of Power of Attorner, Spouse, etc.)
Attribute ‘Consenter.recordLocation’ of type ‘String’
[0..1] Location of consent.
Attribute ‘Consenter.signatureRecorded’ of type ‘Boolean’
[0..1] If a digital signature is allowed by policy, this attribute indicates whether a signature was captured.
Attribute ‘Consenter.name’ of type ‘String’
[0..1] Name of consenter
Page 34 HL7 Privacy and Security Logical Data Model, Release 1
Figure 7 Privacy Policy Structure Overview Diagram9 shows the elements of a privacy policy from
a jurisdictional or organizational standpoint. Electronic privacy policies are exchanged in a
platform-independent, semantically interoperable, and standard-based way. A privacy policy is
intended to safeguard protected Information10 from unauthorized use and disclosure. This diagram
illustrates the Privacy Policy structure specified in the 'Composite Privacy LDM - Draft Standard
for Trial Use'.
4.12 Privacy Policy Classes
The following classes support the definition of privacy policies. While these classes are reused
in the other viewpoints, they were initially specified to support the needs of privacy policy makers
to define computer-ready policies.
9 Adapted from HL7 Version 3 Domain Analysis Model: Composite Security and Privacy, May 2020 10 Protected Information is information that is protected by a security policy. In healthcare, this includes a variety of
clinical and administrative information that can be identified as belonging to a specific healthcare individual.
Individually identifiable health information (IIHI) is a sub-type of Protected Information. Security Glossary HL7
2008(c), Version 3
Page 36 HL7 Privacy and Security Logical Data Model, Release 1
This abstract class is used to designate the authority that issues the policy. Authority is an
organization (either Jurisdictional or Provider) that is responsible for the Privacy Policy. This is
the authority that grants authorizations described in the privacy policy. This class is consistent with
the 'Security Authority' specified by the ISO/IEC 15816 standard as 'the entity accountable for the
administration of a security policy within a security domain'.
Multiplicity Notes
‘Authority.domain’ of type ‘String’
[0...1] This attribute represents the registered domain name of the healthcare organization that issues a specific privacy policy used to uniquely identify the Authority.
4.12.2 Class: Grantee (Abstract)
This class is used to delegate specific rights to a grantee (such as an Individual or
Clearinghouse). The 'Grantee' is not necessarily an authority; the Grantee may be an Individual,
Substitute Decision Maker, or an organization. For example, in the case of substance abuse related
information, under certain conditions the authority to grant, withhold, or withdraw consent to the
disclosure of the information is granted to the Individual. In another example, a Clearinghouse
may act as an agent/proxy for a provider organization as an intermediary and therefore can be a
grantee as well.
4.12.3 Class: PrivacyPolicy
This is the focal class for electronic privacy policies. It contains a set of rules that are intended
to be enforced by security systems and are used as the basis for Individual privacy consent
directives. This class encapsulates the location of a human-readable version of the Electronic
Privacy Policy. The human-readable version is accessible to any authorized system and user via
the supplied URI.
Multiplicity Notes
‘PrivacyPolicy.policyId’ of type ‘oid’
[1...1] This attribute specifies the unique identifier of for a privacy policy.
‘PrivacyPolicy.description’ of type ‘String’
[0...1] This attribute is a narrative description of the privacy policy.
‘PrivacyPolicy.uri of type ‘String’
[0...1] This attribute specifies the location of published policy.
‘PrivacyPolicy.authority’ of type ‘Authority’
* This is an association to the Authority that issued the policy.
HL7 Privacy and Security Logical Data Model, Release 1 Page 37
The Consent Directive viewpoint describes the structure and attributes of privacy consent
directives issued by Individuals in the context of a default/existing privacy policy. These privacy
consent directives are intended to be exchanged as messages or documents containing structured
content. Figure 1.4 describes the structure of those directives as specified by an Individual in order
to stipulate additional privacy rules.
As seen here, the privacy consent directive references one or more policies and contains a set
of consent rules. The privacy consent directive is expressed using a permission, information
category and user role, similar to the way privacy policy rules are described. This is not surprising
considering that an Individual's privacy consent represents a further constraint of default privacy
policies applicable in that territory.
4.14 Subject of Care Consent Directive Classes
The following section details the classes derived from analyzing the information required to
convey a privacy consent directive.
4.14.1 Class: ConsentDirective
This is the focal class representing a set of privacy consent directives issued by a Subject of
Care consenter on behalf of self or someone else. This is the root or entry class into the privacy
ConsentDirective structure.
The privacy ConsentDirective may be published to a registry. If an Individual’s privacy
consent directive is published, a URL/URI is made available for reference. The Individual may
use this URI to allow providers access to the privacy consent directive created by the consenter.
Multiplicity Notes
'ConsentDirective.documentImage' of type ' base64Binary'
[0...1] This optional attribute references a signed paper document containing the Individual's privacy consent directive.
'ConsentDirective.effectiveTime' of type ' dateTime'
[1...1] This attribute specifies the date when the policy/consent is in effect.
'ConsentDirective.expirationTime' of type ' dateTime'
[0...1] This attribute specifies when the privacy
consent directive automatically expires. A privacy consent directive may be revoked prior to its expiration date.
'ConsentDirective.id' of type ' oid'
[1] This attribute specifies a unique identifier that refers to a specific privacy Consent Directive instance. This id or the published URI may be used to lookup the Individual's privacy consent directives in order to apply them to the collection, access, use or disclosure of health records.
'ConsentDirective.reasonCode' of type ' '
[1] This attribute is used to specify the reason for revoking a privacy Consent Directive (e.g., requested vs. correction/error). An error would
Page 40 HL7 Privacy and Security Logical Data Model, Release 1
be a discrepancy between the intent of privacy Consent Directive (as communicated by the Consenter) and that which was entered into the Consent Directive Management System (CDMS).
'ConsentDirective.statusCode' of type ' '
[1] This attribute indicates whether the privacy consent directive is active or not.
'ConsentDirective.uri' of type ' String'
[0..1] If a specific privacy consent directive (for an Individual) is published, this attribute provides the means to locate and download the privacy consent directive from a registry.
5 COMPUTATIONAL VIEWPOINT
5.1 Computational Model and Viewpoint
The computational viewpoint is modeled after the access control concepts of . [ISO 10181-
3/ITU X.812]. The interaction between the Initiator and an information Custodian is assumed to
be between independent entities exercising pre-negotiated interoperability criteria. Such features
involve transport, syntactic and semantic interoperability following Health Information and
Management Systems Society definitions (See Appendix C).
The precise nature of these interactions may vary considerably depending upon use case (health
information exchange, research, etc.). In many cases, the rules of the exchange will be facilitated
by a formal Trust Framework whereby the requirements of secure exchange (e.g, required ADI)
are specified between Initiator and Organization (data manager). While a formal trust framework
is not a requirement of the model, it is assumed that the entities will have agreed to some equivalent
mutual understanding of how the exchange and protection of received information will progress
including any enduring obligations on the part of the recipient.13
5.2 Overview
This section describes the actors and processes of the LDM Computational View from the
perspective of access control.
The fuel for access control services is information…specifically access control information.
Which is any information that is needed to evaluate the rules of attempted access to a protected
resource. It involves information about the:
Requestor (Initiator)
Resource (Target) and,
Request context.
13 See HL7 Version 3 Standard: Privacy and Security Architecture Framework, Release 1, July 2020, Volume 1: Trust
Framework for Federated Authorition, Conceptual Model
Figure 10 illustrates the activities, ADI and classes involved in computing a response to an
Initiator’s request. Actors in the Computational View workflow are illustrated using LDM Class
Diagrams from Section 1.
1. Trust Framework. Prior to any access request, both the Initiator and the
Jurisdiction/Organization (Healthcare Provider) agree to conduct information exchange and establish the policy that define the conditions under which an access can take place.
2. Initiator. An Initiator makes a request for protected healthcare information access to an
external Healthcare Provider Target. As part of the request, the initiator provides certain
Access Request Decision and Initiator Access Control Decision Information ACI such a
role, clearance, relationship, etc.
3. Healthcare Provider. The receiving Healthcare Provider validates the requester’s identity
and ACI, along with using other internal ADI used to make an Access Control Decision.
Certain contextual information about or derived from the context is established such as
ADI derived from target-bound ACI. Additionally, ADI is derived from operand-bound
ACI.
4. Access Control. The Organization’s Access Control Decision Function makes access
control decisions by applying access control rules to an access request, ADI (that portion,
possibly all ACI made available to the ADF including access request bound ADI, ADI of
initiators, targets, or that retained from prior decisions), and the context in which the
access request was made.
5. Access Enforcement (Grant or deny access). Finally, the Access Control Enforcement
Function (AEF) acting as part of the access path between Initiator and Target, enforces
the decision made by the ADF.
Summary Workflow
The Initiator submits an Access Request to a Healthcare Organization consistent with the pre-
agreed Trust Framework including:
The operations and operands that form part of the attempted access
ACI about the operands, operand-bound ACI, and request ACI (including any access
control tokens).
Processing
Target information (InformationReference) ADI relevant to the request is collected,
Any ContextualInformation and RetainedInformation ADI from previous requests is collected,
Access Control Policy relevant to the decision environment is collected.
The Access Control Decision Function (ADF) then computes a decision as to whether or not
the request meets the requirements of the corresponding (Access Control) Policy.
Enforcement
The AEF enforces the ADF decision by providing a Response back to the Initiator (either
providing or denying the Initiator’s Request) including any Obligations.
Page 44 HL7 Privacy and Security Logical Data Model, Release 1
The following terms are from International Telecommunication Union (ITU) X.812
INFORMATION TECHNOLOGY –OPEN SYSTEMS INTERCONNECTION –SECURITY
FRAMEWORKS FOR OPEN SYSTEMS: ACCESS CONTROL FRAMEWORK dated 11/95
access control certificate A security certificate that contains ACI.
Access Control Decision Information (ADI) The portion (possibly all) of the ACI made available to the ADF in making a particular access control decision.
Access Control Decision Function (ADF) A specialized function that makes access control decisions by applying access control policy rules to an access request, ADI (of initiators, targets, access requests, or that retained from prior decisions), and the context in which the access request is made.
Access Control Enforcement Function (AEF) A specialized function that is part of the access path between an initiator and a target on each access request and enforces the decision made by the ADF.
Access Control Information (ACI) Any information used for access control purposes, including contextual information.
access control policy The set of rules that define the conditions under which an access may take place.
access control token A security token that contains ACI.
access request The operations and operands that form part of an attempted access.
access request access control decision information
Access request ADI. ADI derived from access request-bound ACI.
access request access control information Access request ACI. ACI about an access request.
access request-bound access control information
Access request-bound ACI. ACI bound to an access request.
clearance Initiator-bound ACI that can be compared with security labels of targets.
HL7 Privacy and Security Logical Data Model, Release 1 Page 45
Subject of Care The subject of an information request who may also specify/request personal access control policy to be enforced by a Custodian.
Custodian: An individual or organization that collects, uses, or discloses Protected Information (PI) for the purposes of care and treatment, planning and management of the health system or health research. Security Glossary HL7 2008(c), Version 3
Privacy Consent Directive: A patient’s instructions regarding consent and contextual conditions to collect, use, and/or disclose Personal Health Information.' This definition is adapted from the British Columbia, E-Health (Personal Health Information Access and Protection of Privacy) Act, S.B.C. 2008, c. 38, s. 1. A Consent Directive is also referenced as a 'Data Consent' to be distinguished from other types of consents including consent to receive a procedure or service. In the United States, Consent Directives are the consumer-based set of options regarding the consumer's preferences in regards to the control (access, use, disclosure, collection, etc.) of their electronic health records.
Protected Information (PI): Protected Information is information that is protected by a security policy. In healthcare, this includes a variety of clinical and administrative information that can be identified as belonging to a specific healthcare individual. Individually identifiable health information (IIHI) is a sub-type of Protected Information.
Purpose of Use Reason for performing one or more operations on information, which may be permitted by source system’s security policy in accordance with one or more privacy policies and consent directives. Description: The rationale or purpose for an act relating to the management of personal health information, such as collecting personal health information for research or public health purposes.
Information Object An abstract data model used to specify information about real-world objects.
Healthcare Classification System Glossary
The following terms are from the “HL7 Healthcare Privacy and Security Classification System (HCS), Release 1, 2019” (cited here in entirety for completeness)
Term Note that hyperlinked terms are either links back to text or to related terms.
Definitions and Descriptions Note that where no source is specified, the terms are defined in the context of HCS. Some entries are authoritative descriptions about the use of the term and may contain the term being defined in this glossary. These descriptions are not considered definitions.
Access (Security) Level The combination of a hierarchical security classification and a security category that represents the sensitivity of an object or the security clearance of an individual. [ISO 2382-8] A level associated with an individual who may be accessing information (for example, a clearance level) or with the information which may be accessed (for example, a classification level). [HIPAA
Security Glossary]
Access Control Decision Information (ADI)
The portion (possibly all) of the ACI made available to the ADF in making a particular access control decision. [ISO 10181-3/ITU X.812]
Access Control Information (ACI)
Any information used for access control purposes, including contextual information. [ISO 10181-
Term Note that hyperlinked terms are either links back to text or to related terms.
Definitions and Descriptions Note that where no source is specified, the terms are defined in the context of HCS. Some entries are authoritative descriptions about the use of the term and may contain the term being defined in this glossary. These descriptions are not considered definitions.
Access Control Service A service that provides the basic operational aspects of access control such as making ADI available to access decision components and performing access control functions. The service also provides security labeling and privacy and security protection functions.
The service, known as an Access Control Service (ACS), requires the following information:
Access policy rules, Contextual information needed to interpret ADI,
Initiator, target, and access request ADI,
Security labeling rules and vocabulary,
Transform rules and services.
ACS generates information made available to other elements includes transformed information response to an information request as well as handling caveats. [HL7 PASS-Security Labeling Service]
Confidential protection of data elements by segmentation into restricted and specifically controlled categories set by policies. [Adapted from ASTM E-1986]
Clearance Initiator-bound access control information (ACI) that can be compared with security labels of targets. [ISO 10181-3/ITU X.812]
Permission granted to an individual to access data or information at or below a particular security level. [ISO/IEC 2382-8:1998]
Clinical attribute Any clinical characteristic that binds a health care relevant parameter to a clinical element by a rule. Parameters may include authorship, category of information, terminological characteristics, history of permutations, integrity, and provenance, as well as the relationship to and inclusive of associated clinical facts necessary to provide context essential for applying security labels. [PCAST] discusses attributes that provide context to clinical data elements such as patient demographics.]
Clinical Attribute set The complete collection of parameters that in total describe the relevant characteristics of a clinical fact. These include, clinical attributes, security labels and provenance: For example, the patient's name and birthdate, diagnosis code, the applicable privacy rules and policies, including any patient's pre-consented privacy choices security label classification and sensitivity codes, and the data source (provider).
Clinical element A clinical object that has been disaggregated into the smallest possible data element suitable for use in a healthcare context. [PCAST p. 70 description of clinical elements as the smallest clinical data units that make sense to exchange and aggregate.]
Clinical fact A healthcare data IT resource comprised of a clinical element associated or “tagged” with at least one clinical attribute such as a clinical information category, patient information, and provenance. A clinical fact is a type of “tagged data element.” [PCAST p. 89 “Tagged data element: Data accompanied by metadata describing the data.”]
Clinical rule A computational algorithm used for assigning a clinical attribute to a clinical element.
Compartment A security label tag that "segments" an IT resource by indicating that access and use is restricted to members of a defined community or project.
Term Note that hyperlinked terms are either links back to text or to related terms.
Definitions and Descriptions Note that where no source is specified, the terms are defined in the context of HCS. Some entries are authoritative descriptions about the use of the term and may contain the term being defined in this glossary. These descriptions are not considered definitions.
A set of categories in a security label. [Sandhu]
Compartment-based policies
In a compartment-based policy, sets of targets are associated with a named security compartment or category, which isolates them from other targets. Users need to be given a distinct clearance for a compartment to be able to access targets in the compartment. [Ford Chapter 6 p.155]
Compartmentalization A division of data into isolated blocks with separate security controls for the purpose of reducing risk. [ISO 7498-2]
Example: The division of data relative to a major project into blocks corresponding to subprojects, each with its own security protection, in order to limit exposure of the overall project.
Confidentiality Privacy metadata classifying an IT resource (data, information object, service, or system capability) according to its level of sensitivity, which is based on an analysis of applicable privacy policies and the risk of financial, reputational, or other harm to an individual or entity that could result if made available or disclosed to unauthorized individuals, entities, or processes.
Usage Notes: Confidentiality codes are used in security labels and privacy markings to classify IT resources based on sensitivity to indicate the custodian or receiver obligation to ensure that the protected resource is not made available or redisclosed to individuals, entities, or processes (security principals) per applicable policies. Confidentiality codes are also used in the clearances of initiators requesting access to protected resources.
Map: Definition aligns with ISO 7498-2: Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes. [HL7 Confidentiality code system 2.16.840.1.113883.5.25 and value set 2.16.840.1.113883.1.11.10228]
Data Segmentation Process of sequestering from capture, access or view certain data elements that are perceived by a legal entity, institution, organization or individual as being undesirable to share. [Goldstein
GWU]
Healthcare Privacy and Security Classification System (HCS)
A defined scheme for the classification and handling of health care and healthcare related information.
IT Resource Any data, information object, operation, process, service, or system capability. An IT resource that is assigned a security label is sometimes referred to as a “security object”. An IT resource that is represented as a requested security object of an initiator’s access request is sometimes referred to as a “target”.
Data, service or system component. [XACML]
The term resource embraces (e.g., information resources, processing resources, communication resources, and physical resources). [Ford]
An object that is the target of security controls, including data, information, record, system file, service, or capability). [HL7 RBAC]
Metadata Data about other data. [ISO 14721]
Page 50 HL7 Privacy and Security Logical Data Model, Release 1
Term Note that hyperlinked terms are either links back to text or to related terms.
Definitions and Descriptions Note that where no source is specified, the terms are defined in the context of HCS. Some entries are authoritative descriptions about the use of the term and may contain the term being defined in this glossary. These descriptions are not considered definitions.
Data describing context, content, and structure of records and their management through time. [ISO 15489-1]
Structured information that describes, explains, locates, and otherwise makes it easier to retrieve and use an information resource. (NISO)
Information that characterizes data, such as contextual information. [PCAST]
Security labels are a type of security metadata that is associated with a security object/IT resource and considered a security attribute.
Named Tag Set Field containing a Tag Set Name and its associated set of security tags. [NIST FIPS PUB 188]
Object An object is an entity that contains or receives information. The objects can represent information containers (e.g., files or directories in an operating system, and/or columns, rows, tables, and views within a database management system) or objects can represent exhaustible system resources, such as printers, disk space, and central processing unit (CPU) cycles. [ANSI RBAC] Synonymous with IT resource.
Predicate A statement about attributes whose truth can be evaluated. [XACML]
Privacy The claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. [Westin] This definition is foundational for Privacy Act of 1974 (P.L. 93579; 5 U.S.C. § 552a).
Freedom from intrusion into the private life or affairs of an individual when that intrusion results from undue or illegal gathering and use of data about that individual. [ISO/IEC 2382-8]
The right of individuals to control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed. [ISO 7498-2]
[T]he right to control access to one's person and information about one's self. The right to privacy means that individuals get to decide what and how much information to give up, to whom it is given, and for what uses." June 13, 2002, speech to the Freedom of Information and Protection of Privacy Conference Privacy Commissioner of Canada June 13, 2002]
Individual's or organization's right to determine whether, when, and to whom, personal or organizational information is released. Also, the right of individuals to control or influence information that is related to them, in terms of who may collect or store it, and to whom that information may be disclosed. [HITSP Glossary]
Privacy Mark Human readable security labels, which are rendered in the graphic user interface on accessed electronic information, are called “privacy marks.” The act of enabling the rendering of a privacy mark is called “privacy marking”.
If present, the privacy-mark is not used for access control. The content of the privacy-mark may be defined by the security policy in force (identified by the security-policy-identifier) which may define a list of values to be used. Alternately, the value may be determined by the originator of the security-label. [ISO 22600-3 Section A.3.4.3]
Provenance
The history of the ownership of an object, especially when documented or authenticated. For example, references to a type of equipment, standard clinical procedure, attestable content author, data source, provider or other clinical facts. [PCAST]
Term Note that hyperlinked terms are either links back to text or to related terms.
Definitions and Descriptions Note that where no source is specified, the terms are defined in the context of HCS. Some entries are authoritative descriptions about the use of the term and may contain the term being defined in this glossary. These descriptions are not considered definitions.
Information about entities, activities, and people involved in producing a piece of data or thing, which can be used to form assessments about its quality, reliability or trustworthiness. [W3C
PROV-Overview]
Provenance of a resource is a record that describes entities and processes involved in producing and delivering or otherwise influencing that resource. Provenance provides a critical foundation for assessing authenticity, enabling trust, and allowing reproducibility. Provenance assertions are a form of contextual metadata and can themselves become important records with their own provenance. [W3C Provenance XG Final Report]
Data provenance is information that helps determine the derivation history of a data product, starting from its original sources. Data product or dataset refers to data in any form, such as files, tables, and virtual collections. […] Two important features of the provenance of a data product are the ancestral data products from which this data product evolved, and the process of transformation of these ancestral data product(s), potentially through workflows, that helped derive this data product. [Simmhan]
The information that documents the history of the Content Information. This information tells the origin or source of the Content Information, any changes that may have taken place since it was originated, and who has had custody of it since it was originated. The archive is responsible for creating and preserving Provenance Information from the point of Ingest; however, earlier Provenance Information should be provided by the Producer. Provenance Information adds to the
evidence to support Authenticity. [ISO 14721)
Security Attribute A security-related quality of an object. Security attributes may be represented as hierarchical levels, bits in a bit map, or numbers. Compartments, caveats, and release markings are examples of security attributes. NIST FIPS PUB 188
Characteristic of a subject, resource, action or environment that may be referenced in a predicate or target. [ XACML]
Security Classification The determination of which specific degree of protection against access the data or information requires, together with a designation of that degree of protection. Examples: "Top secret", "secret", "confidential". ISO 2382-8/T-REC-X.812-199511-I!!PDF-E
Security Label Synonymous with Target Label
Note to Readers: In the definitions below, “security label” is defined as both a verb: “means used to associate security attributes” as in “security labeling”, and as noun: “the markings bound to a resource”. As a noun, the term is sometimes considered synonymous with “security metadata” and “security tag.” As a verb, the term is sometimes considered synonymous with “tagging”. However, authoritative security standards sometimes use the term “security label” for both the classification given to IT resources and the classification level in an initiator’s clearance. In addition, some authoritative standards use the term “marking bound to a resource” to refer to both computable security labels and the human readable rendering of security label fields better known as “privacy markings”.
The means used to associate a set of security attributes with a specific information object as part of the data structure for that object [ISO 10181-3/ITU X.812]
Access control information associated with the attribute values being accessed. [ISO/IEC 9594-
Term Note that hyperlinked terms are either links back to text or to related terms.
Definitions and Descriptions Note that where no source is specified, the terms are defined in the context of HCS. Some entries are authoritative descriptions about the use of the term and may contain the term being defined in this glossary. These descriptions are not considered definitions.
The marking bound to a resource (which may be a data unit) that names or designates the security attributes of that resource. NOTE - The marking and/or binding may be explicit or implicit. [ISO
7498-2/CCITT Rec. X.800]
The means used to associate a set of security attributes with a specific information object as part of the data structure for that object. [NIST SP 800-53]
Security labels may be used to associate security-relevant information with attributes within the Directory. Security labels may be assigned to an attribute value in line with the security policy in force for that attribute. The security policy may also define how security labels are to be used to enforce that security policy. A security label comprises a set of elements optionally including a security policy identifier, a security classification, a privacy mark, and a set of security categories. The security label is bound to the attribute value using a digital signature or other integrity mechanism. [ISO/IEC 9594-2:2008/ITU X.501]
Sensitivity labels are security labels which support data confidentiality models, like the Bell and LaPadula model. The sensitivity label tells the amount of damage that will result from the disclosure of the data and also indicates which measures the data requires for protection from disclosure. The amount of damage that results from unauthorized disclosure depends on who obtains the data; the sensitivity label should reflect the worst case. [IETF RFC 1457]
A security label, sometimes referred to as a confidentiality label, is a structured representation of the sensitivity of a piece of information. A security label is used in conjunction with a clearance, a structured representation of what information sensitivities a person (or other entity) is authorized to access and a security policy to control access to each piece of information. [XMPP Core]
A security label is a type of PCAST Metadata Tag defined as “information that characterizes data, such as contextual information.”
Security (Labeling) Policy
The definition of which classification and category values are used and how security labels are checked against clearances.
Security label rule A computational algorithm used for assigning a security label to an IT resource such as a clinical fact.
Security Policy Information File (SPIF)
A construct that conveys domain-specific security policy information. [ISO/IEC 15816]
An XML schema, that provides a high level representation of a security labeling policy in a generic and open fashion. [Open XML SPIF]
Security Tag A type of Security Metadata
Information unit containing a representation of certain security-related information (e.g., a restrictive attribute bit map). [NIST FIPS PUB 188]
Segmentation The process of sequestering from capture, access or view certain data elements or “datatypes” (clinical information categories) that are perceived by a legal entity, institution, organization, or individual as being undesirable to share.
Sensitivity The characteristic of a resource which implies its value or importance and may include its vulnerability. [ISO/IEC 7498-2:1989/CCITT Rec. X.800]
Sensitivity Label Security labels which support data confidentiality models, like the Bell and LaPadula model. The sensitivity label tells the amount of damage that will result from the disclosure of the data and also indicates which measures the data requires for protection from disclosure. The amount of
Term Note that hyperlinked terms are either links back to text or to related terms.
Definitions and Descriptions Note that where no source is specified, the terms are defined in the context of HCS. Some entries are authoritative descriptions about the use of the term and may contain the term being defined in this glossary. These descriptions are not considered definitions.
damage that results from unauthorized disclosure depends on who obtains the data; the sensitivity label should reflect the worst case. [IETF RFC 1457]
Tag Set Name Numeric identifier associated with a set of security tags. [NIST FIPS PUB 188]
Target
A target is a resource subject to access control. [Ford]
The set of decision requests, identified by definitions for resource, subject and action that a rule, policy or policy set is intended to evaluate. [XACML]
A target is an IT resource for which an initiator seeks access.
Target Label Synonymous with Security Label
A security label can be used as target ACI to protect a target. Access rules define the access permissions (operations) granted given the security label of the initiator and the security label assigned to a target. If the security policy requires that the ACI held in the security label are used for target ACI, then overall flow of data in and out of that target can be controlled. Hence, the overall flow of data in and out of targets may be analyzed for security domains applying the same security policy. Targets can be created within other targets. The security label of the containing target limits the security labels that may be assigned to the contained target under the rules for the appropriate security policy. Examples of targets to which labels may be applied include: OSI n-entities; Directory Service entries; files held in a file store; database entries. [ISO 10181-3/ITU X.812]
It is the ability of different information systems, devices, and applications (systems) to access,
exchange, integrate and cooperatively use data in a coordinated manner, within and across
organizational, regional, and national boundaries, to provide timely and seamless portability of
information and optimize the health of individuals and populations globally.
Health data exchange architectures, application interfaces and standards enable data to be
accessed and shared appropriately and securely across the complete spectrum of care, within all
applicable settings and with relevant stakeholders, including the individual.
Four Levels of Interoperability
Foundational (Level 1): Establishes the inter-connectivity requirements needed for one
system or application to securely communicate data to and receive data from another
Structural (Level 2): Defines the format, syntax and organization of data exchange including at the data field level for interpretation
Semantic (Level 3): Provides for common underlying models and codification of the
data including the use of data elements with standardized definitions from publicly
available value sets and coding vocabularies, providing shared understanding and
meaning to the user
Organizational (Level 4): Includes governance, policy, social, legal and organizational
considerations to facilitate the secure, seamless and timely communication and use of
data both within and between organizations, entities and individuals. These components enable shared consent, trust and integrated end-user processes and workflows