DICOM Application Level Confidentiality Profile Attributes

DICOM 2021b

PS3.15 Table E.1-1. Application Level Confidentiality Profile Attributes ¹

[1] Additional dates and times attributes on the basis of their Value Representation of DT, DA or TM, are used. This is the legal approach according to standard.
  • D replace with a non-zero length value that may be a dummy value and consistent with the VR

  • Z replace with a zero length value, or a non-zero length value that may be a dummy value and consistent with the VR

  • X remove

  • K keep (unchanged for non-sequence attributes, cleaned for sequences)

  • C clean, that is replace with values of similar meaning known not to contain identifying information and consistent with the VR

  • U replace with a non-zero length UID that is internally consistent within a set of Instances

  • Z/D Z unless D is required to maintain IOD conformance (Type 2 versus Type 1)

  • X/Z X unless Z is required to maintain IOD conformance (Type 3 versus Type 2)

  • X/D X unless D is required to maintain IOD conformance (Type 3 versus Type 1)

  • X/Z/D X unless Z or D is required to maintain IOD conformance (Type 3 versus Type 2 versus Type 1)

  • X/Z/U* X unless Z or replacement of contained instance UIDs (U) is required to maintain IOD conformance (Type 3 versus Type 2 versus Type 1 sequences containing UID references)