Home   Package List   Routine Alphabetical List   Global Alphabetical List   FileMan Files List   FileMan Sub-Files List   Package Component Lists   Package-Namespace Mapping  
Routine: IBDEI384

IBDEI384.m

Go to the documentation of this file.
  1. IBDEI384 ; ; 04-FEB-2020
  1. ;;3.0;IB ENCOUNTER FORM IMP/EXP;;FEB 04, 2020
  1. Q:'DIFQR(358.3) F I=1:2 S X=$T(Q+I) Q:X="" S Y=$E($T(Q+I+1),4,999),X=$E(X,4,999) S:$A(Y)=126 I=I+1,Y=$E(Y,2,999)_$E($T(Q+I+1),5,999) S:$A(Y)=61 Y=$E(Y,2,999) X NO E S @X=Y
  1. Q Q
  1. ;;^UTILITY(U,$J,358.3,51467,1,4,0)
  1. ;;=4^T74.21XD
  1. ;;^UTILITY(U,$J,358.3,51467,2)
  1. ;;=^5054153
  1. ;;^UTILITY(U,$J,358.3,51468,0)
  1. ;;=T74.21XS^^193^2508^9
  1. ;;^UTILITY(U,$J,358.3,51468,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51468,1,3,0)
  1. ;;=3^Adult Sexual Abuse,Confirmed,Sequela
  1. ;;^UTILITY(U,$J,358.3,51468,1,4,0)
  1. ;;=4^T74.21XS
  1. ;;^UTILITY(U,$J,358.3,51468,2)
  1. ;;=^5054154
  1. ;;^UTILITY(U,$J,358.3,51469,0)
  1. ;;=T76.21XD^^193^2508^11
  1. ;;^UTILITY(U,$J,358.3,51469,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51469,1,3,0)
  1. ;;=3^Adult Sexual Abuse,Suspected,Sub Encntr
  1. ;;^UTILITY(U,$J,358.3,51469,1,4,0)
  1. ;;=4^T76.21XD
  1. ;;^UTILITY(U,$J,358.3,51469,2)
  1. ;;=^5054228
  1. ;;^UTILITY(U,$J,358.3,51470,0)
  1. ;;=T76.21XS^^193^2508^12
  1. ;;^UTILITY(U,$J,358.3,51470,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51470,1,3,0)
  1. ;;=3^Adult Sexual Abuse,Suspected,Sequela
  1. ;;^UTILITY(U,$J,358.3,51470,1,4,0)
  1. ;;=4^T76.21XS
  1. ;;^UTILITY(U,$J,358.3,51470,2)
  1. ;;=^5054229
  1. ;;^UTILITY(U,$J,358.3,51471,0)
  1. ;;=Y07.53^^193^2508^13
  1. ;;^UTILITY(U,$J,358.3,51471,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51471,1,3,0)
  1. ;;=3^Instructor,Perpetrator of MST
  1. ;;^UTILITY(U,$J,358.3,51471,1,4,0)
  1. ;;=4^Y07.53
  1. ;;^UTILITY(U,$J,358.3,51471,2)
  1. ;;=^5061207
  1. ;;^UTILITY(U,$J,358.3,51472,0)
  1. ;;=Y07.59^^193^2508^14
  1. ;;^UTILITY(U,$J,358.3,51472,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51472,1,3,0)
  1. ;;=3^Non-Family Member,Perpetrator of MST/Abuse NEC
  1. ;;^UTILITY(U,$J,358.3,51472,1,4,0)
  1. ;;=4^Y07.59
  1. ;;^UTILITY(U,$J,358.3,51472,2)
  1. ;;=^5061208
  1. ;;^UTILITY(U,$J,358.3,51473,0)
  1. ;;=T74.51XA^^193^2508^1
  1. ;;^UTILITY(U,$J,358.3,51473,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51473,1,3,0)
  1. ;;=3^Adult Forced Sexual Exploit,Confirmed,Init enctr
  1. ;;^UTILITY(U,$J,358.3,51473,1,4,0)
  1. ;;=4^T74.51XA
  1. ;;^UTILITY(U,$J,358.3,51473,2)
  1. ;;=^5157560
  1. ;;^UTILITY(U,$J,358.3,51474,0)
  1. ;;=T74.51XD^^193^2508^2
  1. ;;^UTILITY(U,$J,358.3,51474,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51474,1,3,0)
  1. ;;=3^Adult Forced Sexual Exploit,Confirmed,Subs
  1. ;;^UTILITY(U,$J,358.3,51474,1,4,0)
  1. ;;=4^T74.51XD
  1. ;;^UTILITY(U,$J,358.3,51474,2)
  1. ;;=^5157561
  1. ;;^UTILITY(U,$J,358.3,51475,0)
  1. ;;=T74.51XS^^193^2508^3
  1. ;;^UTILITY(U,$J,358.3,51475,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51475,1,3,0)
  1. ;;=3^Adult Forced Sexual Exploit,Confirmed,Sequela
  1. ;;^UTILITY(U,$J,358.3,51475,1,4,0)
  1. ;;=4^T74.51XS
  1. ;;^UTILITY(U,$J,358.3,51475,2)
  1. ;;=^5157562
  1. ;;^UTILITY(U,$J,358.3,51476,0)
  1. ;;=T76.51XA^^193^2508^4
  1. ;;^UTILITY(U,$J,358.3,51476,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51476,1,3,0)
  1. ;;=3^Adult Forced Sexual Exploit,Suspected,Init
  1. ;;^UTILITY(U,$J,358.3,51476,1,4,0)
  1. ;;=4^T76.51XA
  1. ;;^UTILITY(U,$J,358.3,51476,2)
  1. ;;=^5157572
  1. ;;^UTILITY(U,$J,358.3,51477,0)
  1. ;;=T76.51XD^^193^2508^5
  1. ;;^UTILITY(U,$J,358.3,51477,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51477,1,3,0)
  1. ;;=3^Adult Forced Sexual Exploit,Suspected,Subs
  1. ;;^UTILITY(U,$J,358.3,51477,1,4,0)
  1. ;;=4^T76.51XD
  1. ;;^UTILITY(U,$J,358.3,51477,2)
  1. ;;=^5157573
  1. ;;^UTILITY(U,$J,358.3,51478,0)
  1. ;;=T76.51XS^^193^2508^6
  1. ;;^UTILITY(U,$J,358.3,51478,1,0)
  1. ;;=^358.31IA^4^2
  1. ;;^UTILITY(U,$J,358.3,51478,1,3,0)
  1. ;;=3^Adult Forced Sexual Exploit,Suspected,Sequela
  1. ;;^UTILITY(U,$J,358.3,51478,1,4,0)
  1. ;;=4^T76.51XS
  1. ;;^UTILITY(U,$J,358.3,51478,2)
  1. ;;=^5157574
  1. ;;^UTILITY(U,$J,358.3,51479,0)
  1. ;;=E66.01^^193^2509^125
  1. ;;^UTILITY(U,$J,358.3,51479,1,0)
  1. ;;=^358.31IA^4^2