Home   Package List   Routine Alphabetical List   Global Alphabetical List   FileMan Files List   FileMan Sub-Files List   Package Component Lists   Package-Namespace Mapping  
Routine: IBDEI1K7

IBDEI1K7.m

Go to the documentation of this file.
IBDEI1K7 ; ; 01-FEB-2022
 ;;3.0;IB ENCOUNTER FORM IMP/EXP;;FEB 01, 2022
 Q:'DIFQR(358.3)  F I=1:2 S X=$T(Q+I) Q:X=""  S Y=$E($T(Q+I+1),4,999),X=$E(X,4,999) S:$A(Y)=126 I=I+1,Y=$E(Y,2,999)_$E($T(Q+I+1),5,999) S:$A(Y)=61 Y=$E(Y,2,999) X NO E  S @X=Y
Q Q
 ;;^UTILITY(U,$J,358.3,25285,2)
 ;;=^5054228
 ;;^UTILITY(U,$J,358.3,25286,0)
 ;;=Z69.81^^92^1147^23
 ;;^UTILITY(U,$J,358.3,25286,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25286,1,3,0)
 ;;=3^MH Svc for Victim of Other Abuse
 ;;^UTILITY(U,$J,358.3,25286,1,4,0)
 ;;=4^Z69.81
 ;;^UTILITY(U,$J,358.3,25286,2)
 ;;=^5063234
 ;;^UTILITY(U,$J,358.3,25287,0)
 ;;=Z69.82^^92^1147^21
 ;;^UTILITY(U,$J,358.3,25287,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25287,1,3,0)
 ;;=3^MH Svc for Perpetrator of Other Abuse
 ;;^UTILITY(U,$J,358.3,25287,1,4,0)
 ;;=4^Z69.82
 ;;^UTILITY(U,$J,358.3,25287,2)
 ;;=^5063235
 ;;^UTILITY(U,$J,358.3,25288,0)
 ;;=T74.01XA^^92^1147^3
 ;;^UTILITY(U,$J,358.3,25288,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25288,1,3,0)
 ;;=3^Adult Neglect,Confirmed,Init Enctr
 ;;^UTILITY(U,$J,358.3,25288,1,4,0)
 ;;=4^T74.01XA
 ;;^UTILITY(U,$J,358.3,25288,2)
 ;;=^5054140
 ;;^UTILITY(U,$J,358.3,25289,0)
 ;;=T74.01XD^^92^1147^4
 ;;^UTILITY(U,$J,358.3,25289,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25289,1,3,0)
 ;;=3^Adult Neglect,Confirmed,Subs Enctr
 ;;^UTILITY(U,$J,358.3,25289,1,4,0)
 ;;=4^T74.01XD
 ;;^UTILITY(U,$J,358.3,25289,2)
 ;;=^5054141
 ;;^UTILITY(U,$J,358.3,25290,0)
 ;;=T76.01XA^^92^1147^5
 ;;^UTILITY(U,$J,358.3,25290,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25290,1,3,0)
 ;;=3^Adult Neglect,Suspected,Init Enctr
 ;;^UTILITY(U,$J,358.3,25290,1,4,0)
 ;;=4^T76.01XA
 ;;^UTILITY(U,$J,358.3,25290,2)
 ;;=^5054215
 ;;^UTILITY(U,$J,358.3,25291,0)
 ;;=T76.01XD^^92^1147^6
 ;;^UTILITY(U,$J,358.3,25291,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25291,1,3,0)
 ;;=3^Adult Neglect,Suspected,Subs Enctr
 ;;^UTILITY(U,$J,358.3,25291,1,4,0)
 ;;=4^T76.01XD
 ;;^UTILITY(U,$J,358.3,25291,2)
 ;;=^5054216
 ;;^UTILITY(U,$J,358.3,25292,0)
 ;;=Z91.412^^92^1147^25
 ;;^UTILITY(U,$J,358.3,25292,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25292,1,3,0)
 ;;=3^Personal Hx of Adult Neglect
 ;;^UTILITY(U,$J,358.3,25292,1,4,0)
 ;;=4^Z91.412
 ;;^UTILITY(U,$J,358.3,25292,2)
 ;;=^5063621
 ;;^UTILITY(U,$J,358.3,25293,0)
 ;;=T74.31XA^^92^1147^11
 ;;^UTILITY(U,$J,358.3,25293,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25293,1,3,0)
 ;;=3^Adult Psychological Abuse,Confirmed,Init Enctr
 ;;^UTILITY(U,$J,358.3,25293,1,4,0)
 ;;=4^T74.31XA
 ;;^UTILITY(U,$J,358.3,25293,2)
 ;;=^5054158
 ;;^UTILITY(U,$J,358.3,25294,0)
 ;;=T74.31XD^^92^1147^12
 ;;^UTILITY(U,$J,358.3,25294,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25294,1,3,0)
 ;;=3^Adult Psychological Abuse,Confirmed,Subs Enctr
 ;;^UTILITY(U,$J,358.3,25294,1,4,0)
 ;;=4^T74.31XD
 ;;^UTILITY(U,$J,358.3,25294,2)
 ;;=^5054159
 ;;^UTILITY(U,$J,358.3,25295,0)
 ;;=T76.31XA^^92^1147^13
 ;;^UTILITY(U,$J,358.3,25295,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25295,1,3,0)
 ;;=3^Adult Psychological Abuse,Suspected,Init Enctr
 ;;^UTILITY(U,$J,358.3,25295,1,4,0)
 ;;=4^T76.31XA
 ;;^UTILITY(U,$J,358.3,25295,2)
 ;;=^5054233
 ;;^UTILITY(U,$J,358.3,25296,0)
 ;;=T76.31XD^^92^1147^14
 ;;^UTILITY(U,$J,358.3,25296,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25296,1,3,0)
 ;;=3^Adult Psychological Abuse,Suspected,Subs Enctr
 ;;^UTILITY(U,$J,358.3,25296,1,4,0)
 ;;=4^T76.31XD
 ;;^UTILITY(U,$J,358.3,25296,2)
 ;;=^5054234
 ;;^UTILITY(U,$J,358.3,25297,0)
 ;;=Z91.411^^92^1147^27
 ;;^UTILITY(U,$J,358.3,25297,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,25297,1,3,0)
 ;;=3^Personal Hx of Adult Psychological Abuse
 ;;^UTILITY(U,$J,358.3,25297,1,4,0)
 ;;=4^Z91.411