PRCA*4.5*375 (12179)    BUILD (9.6)

Name Value
NAME PRCA*4.5*375
DATE DISTRIBUTED 2021-01-27 00:00:00
PACKAGE FILE LINK ACCOUNTS RECEIVABLE
REQUIRED BUILD
  • PRCA*4.5*184
    ACTION:   Don't install, remove global
  • PRCA*4.5*332
    ACTION:   Don't install, remove global
  • PRCA*4.5*345
    ACTION:   Don't install, remove global
TYPE SINGLE PACKAGE
DESCRIPTION OF ENHANCEMENTS
The purpose of this patch is to address issues arising with
1. Receipt transactions for a debit type EFT will be marked with
 
Remote Procedure Name                                 New/Modified/Deleted
---------------------                                 --------------------
N/A 
 
 
 
Parameter Definitions Associated:
 
Parameter Name                                        New/Modified/Deleted
   a new debit flag.  These transactions will be subtracted from the
--------------                                        --------------------
N/A
 
 
Additional Information:
-----------------------
 
New Service Requests (NSRs):
N/A
 
   calculated receipt total, which may result in a negative receipt total.
 
Patient Safety Issues (PSIs):
N/A
 
 
Defect Tracking System Ticket(s) & Overview:
N/A
 
 
Test Sites:
 
----------
 
 
 
Software and Documentation Retrieval Instructions:
--------------------------------------------------
N/A
 
Pre/Post Installation Overview:
-------------------------------
 
** IMPORTANT: Do not install this patch while the "Accounts Receivable 
Nightly Process Background Job" [PRCA NIGHTLY PROCESS] is running **
 
This patch may be installed with users on the system although it is 
recommended it be queued to run after normal business hours, but before 
the Accounts Receivable Nightly Process Background Job starts, to minimize
potential disruption to users. This patch will take less than 5 minutes to
install.   
 
Pre-Installation Instructions:
2. When an EFT is removed from the system using the menu option
------------------------------
N/A
 
Installation Instructions:
--------------------------
 
    1. Choose the PackMan message containing this patch.
    
    2. Choose the INSTALL/CHECK MESSAGE PackMan option.
    
   Remove Duplicate EFT Deposits, [RCDPE REMOVE DUP DEPOSITS], the
    3. From the Kernel Installation & Distribution System Menu, select the
       Installation Menu. From this menu, you may select to use the
       following options. When prompted for the INSTALL NAME, enter
       the patch PRCA*4.5*364:
          a. Verify Checksums in Transport Global - This option will allow
             you to ensure the integrity of the routines that are in the
             transport global.
          b. Print Transport Global - This option will allow you to view
             the components of the KIDS build.
          c. Compare Transport Global to Current System - This option will
   new field REMOVAL TYPE [.2] will be entered, after the removal reason 
             allow you to view all changes that will be made when this 
             patch is installed. It compares all components of this patch
             (routines, DD's, templates, etc.).
          d. Backup a Transport Global - This option will create a backup
             message containing the components of this patch. When 
             prompted, select 'B' for Build, to back-up the routines and
             other components affected by this patch.
 
    
     4. From the Installation Menu, select the Install Package(s) option
   text. The user must enter one of two codes from the set:
        and choose the patch to install.
   
     5. When Prompted "Want KIDS to INHIBIT LOGONs during the install? 
        NO//" respond NO.  
    
     6. When Prompted "Want to DISABLE Scheduled Options, Menu Options, 
        and Protocols? NO//" respond NO.
 
                           
Post-Installation Instructions:
 
-------------------------------
N/A
 
Back-Out/Roll Back Plan:
------------------------
Prior to installing the updated KIDS package, the site/region should have 
saved a backup of the build in a mail message using the Backup a 
Transport Global [XPD BACKUP] menu option. The message containing the 
backed-up build can be loaded with the "Xtract PackMan" function at 
the Message Action prompt.  The PackMan function INSTALL/CHECK MESSAGE is 
Electronic Fund Transfers (EFTs), received into VistA, that have been
          D         DUPLICATE EFT
then used to install the backed-up build onto the VistA system.
          M         MILLENIUM EFT
 
   The new field will show on the Duplicate EFT Deposits Audit report
   [RCDPE EFT AUDIT REPORT].
 
 
This patch will have no significant impact on disk space or journal file 
usage.
 
split between VistA and CERNER as a result of the EHMR implementation.
Patch Components
================
 
Files & Fields Associated:
 
File Name (Number)        Field Name (Number)         New/Modified/Deleted
  Sub-file Name (#)                     
------------------------  -------------------------   --------------------
AR BATCH PAYMENT (#344)
 TRANSACTION (#344.01)    DEBIT/CREDIT FLAG (#9)         NEW
This process may result in the receipt of debit EFTs, which need to be
 
EDI THIRD PARTY EFT DETAIL (#344.31)
                          REMOVAL TYPE                   NEW 
 
Bulletins Associated:
 
Bulletin Name                                         New/Modified/Deleted
-------------                                         --------------------
N/A
 
correctly identified and passed to the Financial Management System (FMS). 
 
Dialogs Associated:
 
Dialog Name                                           New/Modified/Deleted
-----------                                           --------------------
N/A 
 
 
Forms Associated:
 
 
Form Name                   File Number               New/Modified/Deleted
---------                   -----------               --------------------
N/A
 
 
Mail Groups Associated:
 
Mail Group Name                                       New/Modified/Deleted
---------------                                       --------------------
N/A
The following features of the PRCA software will be affected by this 
 
 
Options Associated:
 
Option Name                 Type                      New/Modified/Deleted
-----------                 ----                      --------------------
N/A
 
 
Protocols Associated:
patch:
 
Protocol Name                                         New/Modified/Deleted
-------------                                         --------------------
N/A
 
 
Security Keys Associated: 
 
Security Key Name
-----------------
 
N/A
 
Templates Associated:
 
Template Name         Type    File Name (Number)      New/Modified/Deleted
-------------         ----    ------------------      --------------------
N/A
 
 
Remote Procedures Associated:
TRACK PACKAGE NATIONALLY YES
XPI1 NO
XPO1 NO
XPZ1 NO
FILE
  • DD NUMBER:
    • TRANSACTION (sub-file)
      FIELD NUMBER:
      • DEBIT/CREDIT FLAG
    UPDATE THE DATA DICTIONARY:   YES
    SEND SECURITY CODE:   YES
    SEND FULL OR PARTIAL DD:   PARTIAL
    DATA COMES WITH FILE:   NO
    MAY USER OVERRIDE DATA UPDATE:   NO
  • DD NUMBER:
    • EDI THIRD PARTY EFT DETAIL (File-top level)
      FIELD NUMBER:
      • REMOVAL TYPE
    UPDATE THE DATA DICTIONARY:   YES
    SEND SECURITY CODE:   YES
    SEND FULL OR PARTIAL DD:   PARTIAL
    DATA COMES WITH FILE:   NO
    MAY USER OVERRIDE DATA UPDATE:   NO
SEQ# 330
BUILD COMPONENTS
  • ENTRIES:
    • RCDPEM3
      ACTION:   SEND TO SITE
      CHECKSUM:   B208058844
    • RCDPEM0
      ACTION:   SEND TO SITE
      CHECKSUM:   B94784656
    • RCDPURED
      ACTION:   SEND TO SITE
      CHECKSUM:   B79685245
    • RCXFMSCR
      ACTION:   SEND TO SITE
      CHECKSUM:   B36659145
    • RCDPE8NZ
      ACTION:   SEND TO SITE
      CHECKSUM:   B128118614
    • RCDPRPLM
      ACTION:   SEND TO SITE
      CHECKSUM:   B103067195
    • RCDPR215
      ACTION:   SEND TO SITE
      CHECKSUM:   B47235018
    • RCDPEM6
      ACTION:   SEND TO SITE
      CHECKSUM:   B99399922