Home   Package List   Routine Alphabetical List   Global Alphabetical List   FileMan Files List   FileMan Sub-Files List   Package Component Lists   Package-Namespace Mapping  
Routine: IBDEI2J6

IBDEI2J6.m

Go to the documentation of this file.
IBDEI2J6 ; ; 04-FEB-2020
 ;;3.0;IB ENCOUNTER FORM IMP/EXP;;FEB 04, 2020
 Q:'DIFQR(358.3)  F I=1:2 S X=$T(Q+I) Q:X=""  S Y=$E($T(Q+I+1),4,999),X=$E(X,4,999) S:$A(Y)=126 I=I+1,Y=$E(Y,2,999)_$E($T(Q+I+1),5,999) S:$A(Y)=61 Y=$E(Y,2,999) X NO E  S @X=Y
Q Q
 ;;^UTILITY(U,$J,358.3,40407,1,4,0)
 ;;=4^T74.21XD
 ;;^UTILITY(U,$J,358.3,40407,2)
 ;;=^5054153
 ;;^UTILITY(U,$J,358.3,40408,0)
 ;;=T74.21XS^^152^2011^9
 ;;^UTILITY(U,$J,358.3,40408,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40408,1,3,0)
 ;;=3^Adult Sexual Abuse,Confirmed,Sequela
 ;;^UTILITY(U,$J,358.3,40408,1,4,0)
 ;;=4^T74.21XS
 ;;^UTILITY(U,$J,358.3,40408,2)
 ;;=^5054154
 ;;^UTILITY(U,$J,358.3,40409,0)
 ;;=T76.21XD^^152^2011^11
 ;;^UTILITY(U,$J,358.3,40409,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40409,1,3,0)
 ;;=3^Adult Sexual Abuse,Suspected,Sub Encntr
 ;;^UTILITY(U,$J,358.3,40409,1,4,0)
 ;;=4^T76.21XD
 ;;^UTILITY(U,$J,358.3,40409,2)
 ;;=^5054228
 ;;^UTILITY(U,$J,358.3,40410,0)
 ;;=T76.21XS^^152^2011^12
 ;;^UTILITY(U,$J,358.3,40410,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40410,1,3,0)
 ;;=3^Adult Sexual Abuse,Suspected,Sequela
 ;;^UTILITY(U,$J,358.3,40410,1,4,0)
 ;;=4^T76.21XS
 ;;^UTILITY(U,$J,358.3,40410,2)
 ;;=^5054229
 ;;^UTILITY(U,$J,358.3,40411,0)
 ;;=Y07.53^^152^2011^13
 ;;^UTILITY(U,$J,358.3,40411,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40411,1,3,0)
 ;;=3^Instructor,Perpetrator of MST
 ;;^UTILITY(U,$J,358.3,40411,1,4,0)
 ;;=4^Y07.53
 ;;^UTILITY(U,$J,358.3,40411,2)
 ;;=^5061207
 ;;^UTILITY(U,$J,358.3,40412,0)
 ;;=Y07.59^^152^2011^14
 ;;^UTILITY(U,$J,358.3,40412,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40412,1,3,0)
 ;;=3^Non-Family Member,Perpetrator of MST/Abuse NEC
 ;;^UTILITY(U,$J,358.3,40412,1,4,0)
 ;;=4^Y07.59
 ;;^UTILITY(U,$J,358.3,40412,2)
 ;;=^5061208
 ;;^UTILITY(U,$J,358.3,40413,0)
 ;;=T74.51XA^^152^2011^1
 ;;^UTILITY(U,$J,358.3,40413,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40413,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Confirmed,Init enctr
 ;;^UTILITY(U,$J,358.3,40413,1,4,0)
 ;;=4^T74.51XA
 ;;^UTILITY(U,$J,358.3,40413,2)
 ;;=^5157560
 ;;^UTILITY(U,$J,358.3,40414,0)
 ;;=T74.51XD^^152^2011^2
 ;;^UTILITY(U,$J,358.3,40414,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40414,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Confirmed,Subs
 ;;^UTILITY(U,$J,358.3,40414,1,4,0)
 ;;=4^T74.51XD
 ;;^UTILITY(U,$J,358.3,40414,2)
 ;;=^5157561
 ;;^UTILITY(U,$J,358.3,40415,0)
 ;;=T74.51XS^^152^2011^3
 ;;^UTILITY(U,$J,358.3,40415,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40415,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Confirmed,Sequela
 ;;^UTILITY(U,$J,358.3,40415,1,4,0)
 ;;=4^T74.51XS
 ;;^UTILITY(U,$J,358.3,40415,2)
 ;;=^5157562
 ;;^UTILITY(U,$J,358.3,40416,0)
 ;;=T76.51XA^^152^2011^4
 ;;^UTILITY(U,$J,358.3,40416,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40416,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Suspected,Init 
 ;;^UTILITY(U,$J,358.3,40416,1,4,0)
 ;;=4^T76.51XA
 ;;^UTILITY(U,$J,358.3,40416,2)
 ;;=^5157572
 ;;^UTILITY(U,$J,358.3,40417,0)
 ;;=T76.51XD^^152^2011^5
 ;;^UTILITY(U,$J,358.3,40417,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40417,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Suspected,Subs
 ;;^UTILITY(U,$J,358.3,40417,1,4,0)
 ;;=4^T76.51XD
 ;;^UTILITY(U,$J,358.3,40417,2)
 ;;=^5157573
 ;;^UTILITY(U,$J,358.3,40418,0)
 ;;=T76.51XS^^152^2011^6
 ;;^UTILITY(U,$J,358.3,40418,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,40418,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Suspected,Sequela
 ;;^UTILITY(U,$J,358.3,40418,1,4,0)
 ;;=4^T76.51XS
 ;;^UTILITY(U,$J,358.3,40418,2)
 ;;=^5157574
 ;;^UTILITY(U,$J,358.3,40419,0)
 ;;=E66.01^^152^2012^125
 ;;^UTILITY(U,$J,358.3,40419,1,0)
 ;;=^358.31IA^4^2