Relations Introduction
In Oracle Health Insurance a relation represents one single Persons or Organizations The application uses person records to store members, policyholders, contact persons and several other roles represented by a natural person. The application uses organization records to store employer organizations, reinsurers and several other roles represented by non-natural persons.
Persons and organizations share many common attributes and features, as they can fulfill the same role. For example, a beneficiary on a claim can be a person or an organization.
This page introduces the shared attributes, as well as those that are specific to the person only.
Shared Attributes
Identifiers
Every relation has a unique code as its primary assigned identifier. This identifier is either system generated or assigned by an external source upon creating the relation record.
In addition, you can attach any number of alternative identifiers to the relation. The application uses these alternative identifiers to recognize the relation with context of the intake process for claims and enrollment updates, when it fails to recognize the relation by its primary identifier.
Person Only Attributes
Access Control
Relations are subject to several access controls. Some of these controls conceal the entire relation, while others conceal specific details only.
All relations have access controls on their line of business and on their alternative identifiers. To see a relation that belongs to a certain line of business, you require access to that specific line of business. This access control protects the complete relation record and all its details.
To see a relation’s alternative identifiers, you require access per identifier type. For example, to see a person’s social security number, you require access to the identifier type for social security numbers. This access control only protects the identifier values; other attributes on the relation record are not protected by this access control.
Persons have three additional access controls.
The first conceals the complete person record, based on a user defined restriction that is more granular then the line of business restriction.
For example, an access control to conceal person records that belong to the payer’s employees.
The second control restricts access to a person’s address information. The third restricts access to other contact details such as phone number and email address.