Home   Package List   Routine Alphabetical List   Global Alphabetical List   FileMan Files List   FileMan Sub-Files List   Package Component Lists   Package-Namespace Mapping  
Routine: IBDEI1O8

IBDEI1O8.m

Go to the documentation of this file.
IBDEI1O8 ; ; 04-FEB-2020
 ;;3.0;IB ENCOUNTER FORM IMP/EXP;;FEB 04, 2020
 Q:'DIFQR(358.3)  F I=1:2 S X=$T(Q+I) Q:X=""  S Y=$E($T(Q+I+1),4,999),X=$E(X,4,999) S:$A(Y)=126 I=I+1,Y=$E(Y,2,999)_$E($T(Q+I+1),5,999) S:$A(Y)=61 Y=$E(Y,2,999) X NO E  S @X=Y
Q Q
 ;;^UTILITY(U,$J,358.3,26712,2)
 ;;=^5054141
 ;;^UTILITY(U,$J,358.3,26713,0)
 ;;=T76.01XA^^110^1283^5
 ;;^UTILITY(U,$J,358.3,26713,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26713,1,3,0)
 ;;=3^Adult Neglect,Suspected,Init Enctr
 ;;^UTILITY(U,$J,358.3,26713,1,4,0)
 ;;=4^T76.01XA
 ;;^UTILITY(U,$J,358.3,26713,2)
 ;;=^5054215
 ;;^UTILITY(U,$J,358.3,26714,0)
 ;;=T76.01XD^^110^1283^6
 ;;^UTILITY(U,$J,358.3,26714,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26714,1,3,0)
 ;;=3^Adult Neglect,Suspected,Subs Enctr
 ;;^UTILITY(U,$J,358.3,26714,1,4,0)
 ;;=4^T76.01XD
 ;;^UTILITY(U,$J,358.3,26714,2)
 ;;=^5054216
 ;;^UTILITY(U,$J,358.3,26715,0)
 ;;=Z91.412^^110^1283^25
 ;;^UTILITY(U,$J,358.3,26715,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26715,1,3,0)
 ;;=3^Personal Hx of Adult Neglect
 ;;^UTILITY(U,$J,358.3,26715,1,4,0)
 ;;=4^Z91.412
 ;;^UTILITY(U,$J,358.3,26715,2)
 ;;=^5063621
 ;;^UTILITY(U,$J,358.3,26716,0)
 ;;=T74.31XA^^110^1283^11
 ;;^UTILITY(U,$J,358.3,26716,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26716,1,3,0)
 ;;=3^Adult Psychological Abuse,Confirmed,Init Enctr
 ;;^UTILITY(U,$J,358.3,26716,1,4,0)
 ;;=4^T74.31XA
 ;;^UTILITY(U,$J,358.3,26716,2)
 ;;=^5054158
 ;;^UTILITY(U,$J,358.3,26717,0)
 ;;=T74.31XD^^110^1283^12
 ;;^UTILITY(U,$J,358.3,26717,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26717,1,3,0)
 ;;=3^Adult Psychological Abuse,Confirmed,Subs Enctr
 ;;^UTILITY(U,$J,358.3,26717,1,4,0)
 ;;=4^T74.31XD
 ;;^UTILITY(U,$J,358.3,26717,2)
 ;;=^5054159
 ;;^UTILITY(U,$J,358.3,26718,0)
 ;;=T76.31XA^^110^1283^13
 ;;^UTILITY(U,$J,358.3,26718,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26718,1,3,0)
 ;;=3^Adult Psychological Abuse,Suspected,Init Enctr
 ;;^UTILITY(U,$J,358.3,26718,1,4,0)
 ;;=4^T76.31XA
 ;;^UTILITY(U,$J,358.3,26718,2)
 ;;=^5054233
 ;;^UTILITY(U,$J,358.3,26719,0)
 ;;=T76.31XD^^110^1283^14
 ;;^UTILITY(U,$J,358.3,26719,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26719,1,3,0)
 ;;=3^Adult Psychological Abuse,Suspected,Subs Enctr
 ;;^UTILITY(U,$J,358.3,26719,1,4,0)
 ;;=4^T76.31XD
 ;;^UTILITY(U,$J,358.3,26719,2)
 ;;=^5054234
 ;;^UTILITY(U,$J,358.3,26720,0)
 ;;=Z91.411^^110^1283^27
 ;;^UTILITY(U,$J,358.3,26720,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26720,1,3,0)
 ;;=3^Personal Hx of Adult Psychological Abuse
 ;;^UTILITY(U,$J,358.3,26720,1,4,0)
 ;;=4^Z91.411
 ;;^UTILITY(U,$J,358.3,26720,2)
 ;;=^5063620
 ;;^UTILITY(U,$J,358.3,26721,0)
 ;;=Z69.021^^110^1283^20
 ;;^UTILITY(U,$J,358.3,26721,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26721,1,3,0)
 ;;=3^MH Svc for Perpetrator of Nonparental Child Abuse
 ;;^UTILITY(U,$J,358.3,26721,1,4,0)
 ;;=4^Z69.021
 ;;^UTILITY(U,$J,358.3,26721,2)
 ;;=^5063231
 ;;^UTILITY(U,$J,358.3,26722,0)
 ;;=Z69.011^^110^1283^22
 ;;^UTILITY(U,$J,358.3,26722,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26722,1,3,0)
 ;;=3^MH Svc for Perpetrator of Parental Child Abuse
 ;;^UTILITY(U,$J,358.3,26722,1,4,0)
 ;;=4^Z69.011
 ;;^UTILITY(U,$J,358.3,26722,2)
 ;;=^5063229
 ;;^UTILITY(U,$J,358.3,26723,0)
 ;;=Z69.12^^110^1283^19
 ;;^UTILITY(U,$J,358.3,26723,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26723,1,3,0)
 ;;=3^MH SVC for Perpetrator of Spousal/Partner Abuse
 ;;^UTILITY(U,$J,358.3,26723,1,4,0)
 ;;=4^Z69.12
 ;;^UTILITY(U,$J,358.3,26723,2)
 ;;=^5063233
 ;;^UTILITY(U,$J,358.3,26724,0)
 ;;=Z62.812^^110^1283^28
 ;;^UTILITY(U,$J,358.3,26724,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,26724,1,3,0)
 ;;=3^Personal Hx of Childhood Neglect