FHIR Release 3 (STU) Current Build

4.3.1.399 4.4.1.363 Value Set http://hl7.org/fhir/ValueSet/issue-type

FHIR Infrastructure Work Group   Maturity Level : 5 N Informative Normative (from v4.0.0) Use Context : Any

This is a value set defined by the FHIR project.

Summary

Defining URL: http://hl7.org/fhir/ValueSet/issue-type
Version: 4.0.0
Name: IssueType
Title: IssueType
Definition:

A code that describes the type of issue.

Committee: FHIR Infrastructure Work Group
OID: 2.16.840.1.113883.4.642.3.399 2.16.840.1.113883.4.642.3.410 (for OID based terminology systems)
Source Resource XML / JSON

This value set is used in the following places:


This value set includes codes from the following code systems:

 

This expansion generated 19 Apr 2017 15 Dec 2018


This value set contains 29 31 concepts

Expansion based on http://hl7.org/fhir/issue-type version 3.0.1 4.0.0

All codes from system http://hl7.org/fhir/issue-type
Lvl Code Display Definition
0 invalid Invalid Content Content invalid against the specification or a profile.
1    structure Structural Issue A structural issue in the content such as wrong namespace, or unable to parse the content completely, or invalid json syntax. syntax, etc.
1    required Required element missing A required element is missing.
1    value Element value invalid An element or header value is invalid.
1    invariant Validation rule failed A content validation rule failed - e.g. a schematron rule.
0 security Security Problem An authentication/authorization/permissions issue of some kind.
1    login Login Required The client needs to initiate an authentication process.
1    unknown Unknown User The user or system was not able to be authenticated (either there is no process, or the proferred token is unacceptable).
1    expired Session Expired User session expired; a login may be required.
1    forbidden Forbidden The user does not have the rights to perform this action.
1    suppressed Information Suppressed Some information was not or may might not have been returned due to business rules, consent or privacy rules, or access permission constraints. This information may be accessible through alternate processes.
0 processing Processing Failure Processing issues. These are expected to be final e.g. there is no point resubmitting the same content unchanged.
1    not-supported Content not supported The interaction, operation, resource or profile is not supported.
1    duplicate Duplicate An attempt was made to create a duplicate record.
1    multiple-matches Multiple Matches Multiple matching records were found when the operation required only one match.
1    not-found Not Found The reference provided was not found. In a pure RESTful environment, this would be an HTTP 404 error, but this code may be used where the content is not found further into the application architecture.
2      deleted Deleted The reference pointed to content (usually a resource) that has been deleted.
1    too-long Content Too Long Provided content is too long (typically, this is a denial of service protection type of error).
1    code-invalid Invalid Code The code or system could not be understood, or it was not valid in the context of a particular ValueSet.code.
1    extension Unacceptable Extension An extension was found that was not acceptable, could not be resolved, or a modifierExtension was not recognized.
1    too-costly Operation Too Costly The operation was stopped to protect server resources; e.g. a request for a value set expansion on all of SNOMED CT.
1    business-rule Business Rule Violation The content/operation failed to pass some business rule, rule and so could not proceed.
1    conflict Edit Version Conflict Content could not be accepted because of an edit conflict (i.e. version aware updates) updates). (In a pure RESTful environment, this would be an HTTP 404 409 error, but this code may be used where the conflict is discovered further into the application architecture.)    incomplete Incomplete Results Not all data sources typically accessed could be reached, or responded in time, so the returned information may not be complete. architecture.).
0 transient Transient Issue Transient processing issues. The system receiving the error message may be able to resubmit the same content once an underlying issue is resolved.
1    lock-error Lock Error A resource/record locking failure (usually in an underlying database).
1    no-store No Store Available The persistent store is unavailable; e.g. the database is down for maintenance or similar action. action, and the interaction or operation cannot be processed.
1    exception Exception An unexpected internal error has occurred. y.
1    timeout Timeout An internal timeout has occurred.
1    incomplete Incomplete Results Not all data sources typically accessed could be reached or responded in time, so the returned information might not be complete (applies to search interactions and some operations).
1    throttled Throttled The system is not prepared to handle this request due to load management.
0 informational Informational Note A message unrelated to the processing success of the completed operation (examples of the latter include things like reminders of password expiry, system maintenance times, etc.).

 

See the full registry of value sets defined as part of FHIR.


Explanation of the columns that may appear on this page:

Level Lvl A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes For value sets, levels are under other codes, and imply that the mostly used to organize codes for user convenience, but may follow code they are under also applies system hierarchy - see Code System for further information
Source The source of the definition of the code (when the value set draws in codes defined elsewhere)
Code The code (used as the code in the resource instance). If the code is in italics, this indicates that the code is not selectable ('Abstract')
Display The display (used in the display element of a Coding ). If there is no display, implementers should not simply display the code, but map the concept into their application
Definition An explanation of the meaning of the concept
Comments Additional notes about how to use the code