Home   Package List   Routine Alphabetical List   Global Alphabetical List   FileMan Files List   FileMan Sub-Files List   Package Component Lists   Package-Namespace Mapping  
Routine: IBDEI384

IBDEI384.m

Go to the documentation of this file.
IBDEI384 ; ; 04-FEB-2020
 ;;3.0;IB ENCOUNTER FORM IMP/EXP;;FEB 04, 2020
 Q:'DIFQR(358.3)  F I=1:2 S X=$T(Q+I) Q:X=""  S Y=$E($T(Q+I+1),4,999),X=$E(X,4,999) S:$A(Y)=126 I=I+1,Y=$E(Y,2,999)_$E($T(Q+I+1),5,999) S:$A(Y)=61 Y=$E(Y,2,999) X NO E  S @X=Y
Q Q
 ;;^UTILITY(U,$J,358.3,51467,1,4,0)
 ;;=4^T74.21XD
 ;;^UTILITY(U,$J,358.3,51467,2)
 ;;=^5054153
 ;;^UTILITY(U,$J,358.3,51468,0)
 ;;=T74.21XS^^193^2508^9
 ;;^UTILITY(U,$J,358.3,51468,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51468,1,3,0)
 ;;=3^Adult Sexual Abuse,Confirmed,Sequela
 ;;^UTILITY(U,$J,358.3,51468,1,4,0)
 ;;=4^T74.21XS
 ;;^UTILITY(U,$J,358.3,51468,2)
 ;;=^5054154
 ;;^UTILITY(U,$J,358.3,51469,0)
 ;;=T76.21XD^^193^2508^11
 ;;^UTILITY(U,$J,358.3,51469,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51469,1,3,0)
 ;;=3^Adult Sexual Abuse,Suspected,Sub Encntr
 ;;^UTILITY(U,$J,358.3,51469,1,4,0)
 ;;=4^T76.21XD
 ;;^UTILITY(U,$J,358.3,51469,2)
 ;;=^5054228
 ;;^UTILITY(U,$J,358.3,51470,0)
 ;;=T76.21XS^^193^2508^12
 ;;^UTILITY(U,$J,358.3,51470,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51470,1,3,0)
 ;;=3^Adult Sexual Abuse,Suspected,Sequela
 ;;^UTILITY(U,$J,358.3,51470,1,4,0)
 ;;=4^T76.21XS
 ;;^UTILITY(U,$J,358.3,51470,2)
 ;;=^5054229
 ;;^UTILITY(U,$J,358.3,51471,0)
 ;;=Y07.53^^193^2508^13
 ;;^UTILITY(U,$J,358.3,51471,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51471,1,3,0)
 ;;=3^Instructor,Perpetrator of MST
 ;;^UTILITY(U,$J,358.3,51471,1,4,0)
 ;;=4^Y07.53
 ;;^UTILITY(U,$J,358.3,51471,2)
 ;;=^5061207
 ;;^UTILITY(U,$J,358.3,51472,0)
 ;;=Y07.59^^193^2508^14
 ;;^UTILITY(U,$J,358.3,51472,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51472,1,3,0)
 ;;=3^Non-Family Member,Perpetrator of MST/Abuse NEC
 ;;^UTILITY(U,$J,358.3,51472,1,4,0)
 ;;=4^Y07.59
 ;;^UTILITY(U,$J,358.3,51472,2)
 ;;=^5061208
 ;;^UTILITY(U,$J,358.3,51473,0)
 ;;=T74.51XA^^193^2508^1
 ;;^UTILITY(U,$J,358.3,51473,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51473,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Confirmed,Init enctr
 ;;^UTILITY(U,$J,358.3,51473,1,4,0)
 ;;=4^T74.51XA
 ;;^UTILITY(U,$J,358.3,51473,2)
 ;;=^5157560
 ;;^UTILITY(U,$J,358.3,51474,0)
 ;;=T74.51XD^^193^2508^2
 ;;^UTILITY(U,$J,358.3,51474,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51474,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Confirmed,Subs
 ;;^UTILITY(U,$J,358.3,51474,1,4,0)
 ;;=4^T74.51XD
 ;;^UTILITY(U,$J,358.3,51474,2)
 ;;=^5157561
 ;;^UTILITY(U,$J,358.3,51475,0)
 ;;=T74.51XS^^193^2508^3
 ;;^UTILITY(U,$J,358.3,51475,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51475,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Confirmed,Sequela
 ;;^UTILITY(U,$J,358.3,51475,1,4,0)
 ;;=4^T74.51XS
 ;;^UTILITY(U,$J,358.3,51475,2)
 ;;=^5157562
 ;;^UTILITY(U,$J,358.3,51476,0)
 ;;=T76.51XA^^193^2508^4
 ;;^UTILITY(U,$J,358.3,51476,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51476,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Suspected,Init 
 ;;^UTILITY(U,$J,358.3,51476,1,4,0)
 ;;=4^T76.51XA
 ;;^UTILITY(U,$J,358.3,51476,2)
 ;;=^5157572
 ;;^UTILITY(U,$J,358.3,51477,0)
 ;;=T76.51XD^^193^2508^5
 ;;^UTILITY(U,$J,358.3,51477,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51477,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Suspected,Subs
 ;;^UTILITY(U,$J,358.3,51477,1,4,0)
 ;;=4^T76.51XD
 ;;^UTILITY(U,$J,358.3,51477,2)
 ;;=^5157573
 ;;^UTILITY(U,$J,358.3,51478,0)
 ;;=T76.51XS^^193^2508^6
 ;;^UTILITY(U,$J,358.3,51478,1,0)
 ;;=^358.31IA^4^2
 ;;^UTILITY(U,$J,358.3,51478,1,3,0)
 ;;=3^Adult Forced Sexual Exploit,Suspected,Sequela
 ;;^UTILITY(U,$J,358.3,51478,1,4,0)
 ;;=4^T76.51XS
 ;;^UTILITY(U,$J,358.3,51478,2)
 ;;=^5157574
 ;;^UTILITY(U,$J,358.3,51479,0)
 ;;=E66.01^^193^2509^125
 ;;^UTILITY(U,$J,358.3,51479,1,0)
 ;;=^358.31IA^4^2