Clinical. Financial. Integrated.
|
|
- Samson Norman
- 8 years ago
- Views:
Transcription
1 Clinical. Financial. Integrated. Enhancement January 2015
2 Table of Contents Entry... 3 Single Occurrence Type... 3 Account Type Selection... 4 Employee Account Type Entry... 5 Visitor Type Entry... 6 Other Account Type Entry... 7 Other Witnesses to the Occurrence... 8 Incident Reviewers... 9 Triggered Forms Print Master Files Occurrence Category Maintenance Critical Incident Maintenance Category Triggered Forms by State and Facility Occurrence Answer Triggered Form Entry Occurrence Reviewer Maintenance Occurrence Witness Types Updates and Patches... 17
3 Entry Single Occurrence Type A new update combines occurrence categories and critical incident codes into a combined occurrence category, which is displayed as critical or non-critical. When selecting from the category code drop-down considered critical, it will be highlighted in red for easy identification. Critical incident code entry is no longer required and removed from occurrence entry as shown below.
4 Entry Account Type Selection Internal indicators, which are used to denote inpatient, outpatient, or emergency room registration, controls which account types will be displayed in the account selection window. All account types are checked when the initial window is displayed, and can be turned on/off to locate a patient.
5 Entry Employee Account Type Entry Two new fields, employee title and employee sex, have been added to employee occurrences. The required entry of employee Social Security number and department has changed to system preferences. The organization will determine if this field is required during installation.
6 Entry Visitor Type Entry The fields, title and sex, have been added to visitor occurrences.
7 7 Entry Other Account Type Entry The required entry of name has changed to system preferences. The organization will determine if this field is required during installation.
8 8 Entry Other Witnesses to the Occurrence The field, other witnesses to the occurrence, has been added to each occurrence. Each witness entry consists of a witness type, name, and title. Witness types are organizationally defined, allowing a coded classification. The number of witnesses is unlimited.
9 9 Entry Incident Reviewers The number of possible reviewers has been increased to eight. The number and titles of each reviewer are organizationally defined during installation.
10 10 Entry Triggered Forms Print Users can now print individual triggered occurrence reporting forms.
11 11 Master Files Occurrence Category Maintenance Category codes can be classified as critical or non-critical in the category code master file. Categories flagged as critical will display in red in the drop-down box. Critical Incident Maintenance Critical incident code maintenance and listing have been removed from the occurrence maintenance page, as critical incident codes are now combined with category codes.
12 12 Master Files Category Triggered Forms by State and Facility The triggering of forms has been expanded to allow for conditional forms, which are triggered by state or facility. For example, your organization may have facilities in multiple states, and each state has its own incident form and data requirement. Now, two different incident forms can be created for each state. Conditional triggered forms can be used to trigger each state form based on defined rule.
13 13 Master Files Occurrence Answer Triggered Form Entry An answer in occurrence forms can trigger an additional occurrence form to be completed. Conditional form entry has been added to form response maintenance.
14 14 Master Files Occurrence Answer Triggered Form Entry Selecting conditional forms will list current conditional entries, and allow the addition of new entries. Forms can be triggered by state or facility for as many entries per response as required.
15 15 Master Files Occurrence Reviewer Maintenance Occurrence reviewer types limits the number of entries to match the number of reviewers defined by your organization. This value is organizationally defined during installation.
16 16 Master Files Occurrence Witness Types A new field provides witness types.
17 17 Updates and Patches In addition to the listed enhancements above, various patches and other system integration updates will be installed.
Course Schedule for Graduate School of Science. Special Integrated Science Course SISC International Physics Course IPC ( 2015.
Course Schedule for Graduate School of Science Special Integrated Science CourseSISC International Physics CourseIPC ( 2015.Spring to Fall ) Contents Contents How to Read Course Schedule Spring Semester
More informationB. Clinical Data Management
B. Clinical Data Management The purpose of the applications of this group is to support the clinical needs of care providers including maintaining accurate medical records. Ideally, a clinical data management
More informationUsing Electronic Medical Records Data for Health Services Research Case Study: Development and Use of Ambulatory Adverse Event Trigger Tools
Using Electronic Medical Records Data for Health Services Research Case Study: Development and Use of Ambulatory Adverse Event Trigger Tools Hillary Mull VA Boston Healthcare System Boston University School
More informationInformation Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
More informationHealth Information Technology and Management
Health Information Technology and Management CHAPTER 12 Management and Decision Support Systems Pretest (True/False) Integrated systems require HL7 to exchange information with other healthcare systems.
More informationSTATE OF MARYLAND KIDNEY DISEASE PROGRAM UB-04. Billing Instructions. for. Freestanding Dialysis Facility Services. Revised 9/1/08.
STATE OF MARYLAND KIDNEY DISEASE PROGRAM UB-04 Billing Instructions for Freestanding Dialysis Facility Services Revised 9/1/08 Page 1 of 13 UB04 Instructions TABLE of CONTENTS Introduction 4 Sample UB04
More informationNIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
More informationMaterials Management Terms in SAP
Materials Management Terms in SAP 1. ABC Classification 2. Framework Order 3. Goods Receipt 4. Invoice Verification 5. Material Group 6. Material Master Record 7. MRP 8. Outline Agreement 9. Plant 10.
More informationAdded Admin and Support sections, and information on accessing the system for physicians, patients, and labs -- 8/1/2007 B. Hurley Initial Release
Document Number: INR-P-001 Title: INR Pro Patient Anticoagulation Tracking System Revision: A A beginner s guide to using INR Pro (www.inrpro.com) to manage patients on warfarin, within a clinic setting,
More informationVulnerability Management Policy
Vulnerability Management Policy Policy Statement Computing devices storing the University s Sensitive Information (as defined below) or Mission-Critical computing devices (as defined below) must be fully
More informationCirculation. o Check Out receipts printed after a patron checks items out. o Check in receipts printed after items are checked in.
RECEIPT TEMPLATE MANAGER OVERVIEW The interface for customizable receipts is located in Tools > Receipt Template Manager. This feature is turned on/off using the UseReceiptTemplates system preference.
More informationGUIDE TO USING THE SEVERITY ASSESSMENT CODE (SAC) Purpose
Health and Disability Sector Incident Management Project GUIDE TO USING THE SEVERITY ASSESSMENT CODE (SAC) Purpose The purpose of this document is to outline for District Health Board users, the most effective
More informationInformation Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
More informationWORK INJURY BENEFIT CLAIM FORM
WORK INJURY BENEFIT CLAIM FORM Important information please read carefully i. This report is to be completed by the employer in case of injury to or death of a workman and returned back along with the
More informationLiability Insurance 101. Liability Insurance 101. Larry Hornsby, CRNA, BSN
Liability Insurance 101 Liability Insurance 101 Larry Hornsby, CRNA, BSN Liability Insurance Liability Insurance Defined Contractual Relationship Insurance Company agrees to provide a service CRNA/MD/Company
More informationNASA DESK GUIDE ON THE EMPLOYMENT OF NONCITIZENS
NASA DESK GUIDE ON THE EMPLOYMENT OF NONCITIZENS Agency Workforce Management and Development Division Office of Human Capital Management NASA Headquarters DG-08 August 2006 Table of Contents Page Section
More informationDatix Event Reporting System Review
Management Staff Version Datix Event Reporting System Review Risk Management s Event Reporting System- Intranet Datix EVENT (Incident) REPORTING SYSTEM Datix online reporting is to be used to report any
More informationAccident/Incident Guidelines
Accident/Incident Guidelines Version 1.1 TRIM file number Short description Relevant to Approved by Responsible officer Responsible office 06/XXXX Guidelines on reporting, recording and investigating incidents
More informationB2W Maintain. Setup and Preventive Maintenance
B2W Maintain Setup and Preventive Maintenance Session Contents B2W Maintain - Setup and Preventive Maintenance... 2 1: Learning About Maintenance Categories... 3 2: Learning About Equipment Level Enhancements...
More informationLANCOM Techpaper Content Filter
The architecture Content filters can be implemented in a variety of different architectures: 11 Client-based solutions, where filter software is installed directly on a desktop computer, are suitable for
More informationWho Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
More informationIntegrity We are above reproach in everything we do.
Identity Theft Protection Program Compliance with FTC Red Flags Rule Approved by AHC Organizational Committee on: May 26 th, 2009 Electronic Copy Available on AHC s OIP Web Site Integrity We are above
More informationHow To Import Credit Card Charges Into Concur
Importing Credit Card Expenses into Concur For faster expense reporting and less manual data entry, try importing your credit card charges into Concur. Step 1: Download Credit Card Data Log onto your credit
More informationDescription of AMA Physician Masterfile Data Elements
Description of AMA Physician Masterfile Data Elements Individual AMA Physician Profiles (containing the following primary source reported information from the AMA Physician Masterfile) can be generated
More informationKey Crime Analysis Data Sources. Crime
Part 2 Processes of Crime Analysis coming into the police agency, but those dispatched to or initiated by officers. Because of the vast information contained in a CAD system, information is often purged
More informationUndergraduate Admission Process for Applicants with Criminal Records Survey
Undergraduate Admission Process for Applicants with Criminal Records Survey The following portion of the Executive Summary and the more detailed survey findings that follow were written by the Center for
More informationElectronic Logbook. Hedgehog-2. version 2.7. Quick Start. Revision 1.3 of 10/31/2012
Electronic Logbook Hedgehog-2 version 2.7 Quick Start Revision 1.3 of 10/31/2012 Monitor Electric, 2012 2 CONTENTS Introduction 3 Entry List 4 Event Entry 4 Filtering and Sorting 6 Chaining 7 Attachments,
More informationMonitoring Server File Integrity With CloudPassage Halo
Contents: Monitoring Server File Integrity With CloudPassage Halo How File Integrity Monitoring Works Run a File Integrity Scan 1. Define a Server Group to Scan 2. Create or Clone a File Integrity Policy
More informationITIL Service Lifecycle: Service Operation
Certification ITIL Service Lifecycle: Service Operation ITIL Intermediate Qualification: Service Operation certificate Prerequisites ITIL Foundation Certification (v3 or newer) required Two years of relevant
More informationHow to Register for an Event Using Cheer America s New Online Registration System
Step 1: Go to our website (www.cachampionships.com). Click on the Registration Button. Step 2: On the Registration Page, click on the blue button Click HERE to REGISTER. Step 3: Welcome to our Registration
More informationJIRA RAID User Manual
JIRA RAID User Manual CONTENTS 1 OBJECTIVE... 3 2 INTRODUCTION... 4 3 RISK ISSUE TYPE TEMPLATE... 4 3.1 CREATE ISSUE SCREEN... 4 3.2 VIEW ISSUE SCREEN AFTER REQUIREMENTS CAPTURED AND ISSUE CREATED... 13
More informationMenu Case Study 3: Medication Administration Record
Menu Case Study 3: Medication Administration Record Applicant Organization: Ontario Shores Centre for Mental Health Sciences Organization s Address: 700 Gordon Street, Whitby, Ontario, Canada, L1N5S9 Submitter
More informationSecondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
More informationCreating a Digital Signature in Adobe Acrobat Created on 1/11/2013 2:48:00 PM
Creating a Digital Signature in Adobe Acrobat Created on 1/11/2013 2:48:00 PM Table of Contents Creating a Digital Signature in Adobe Acrobat... 1 Page ii Creating a Digital Signature in Adobe Acrobat
More informationVIRTUAL TERMINAL CREDIT CARD
Merchant Processing a Sale A sale is a transaction that is authorized and captured for settlement. After a sale is processed, the transaction is automatically flagged to be settled. A sale can be voided
More informationSafetyNET online incident reporting
SafetyNET online incident reporting This presentation gives you some background information about the online reporting system and takes you through the process of reporting incidents using the new online
More informationOSHA s Revised Final Regulations: Must Hawaii Employers Comply?
October 6, 2014 OSHA s Revised Final Regulations: Must Hawaii Employers Comply? On September 18, 2014, the Occupational Safety and Health Administration (OSHA) issued final rules amending recording and
More informationProblem Management Overview HDI Capital Area Chapter September 16, 2009 Hugo Mendoza, Column Technologies
Problem Management Overview HDI Capital Area Chapter September 16, 2009 Hugo Mendoza, Column Technologies Problem Management Overview Agenda Overview of the ITIL framework Overview of Problem Management
More informationManaging EHS Incidents Using Integrated Managment Systems. By Matt Noth
Managing EHS Incidents Using Integrated Managment Systems By Matt Noth 2 Managing EHS Incidents Using Integrated Managment Systems Introduction Most organizations have been managing safety and environment-related
More informationMadison County Board Of Education
JOB-RELATED INJURY INSTRUCTIONS In compliance with Board Policy FILE: 5.9.4, Absences Due to Job-Related Injuries, the following instructions must be followed when injuries occur on the job. Please read
More informationDEPARTMENT OF THE NAVY OFFICE OF THE JUDGE ADVOCATE GENERAL TORT CLAIMS UNIT NORFOLK 9620 MARYLAND AVENUE, SUITE 205 NORFOLK, VIRGINIA 23511-2949
DEPARTMENT OF THE NAVY OFFICE OF THE JUDGE ADVOCATE GENERAL TORT CLAIMS UNIT NORFOLK 9620 MARYLAND AVENUE, SUITE 205 NORFOLK, VIRGINIA 23511-2949 FEDERAL TORT CLAIMS ACT CLAIMS PROCEDURES Claims for property
More informationDEFENDANT'S ARBITRATION DISCOVERY REQUESTS PERSONAL INJURY CLAIMS. IDENTITY OF PLAINTIFF(s) WITNESSES
,, Plaintiff vs. Defendant IN THE COURT OF COMMON PLEAS OF McKEAN COUNTY, PENNSYLVANIA CIVIL DIVISION NO. CD 20 DEFENDANT'S ARBITRATION DISCOVERY REQUESTS PERSONAL INJURY CLAIMS These discovery requests
More informationCompleted. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method
NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method R2 Critical Asset Identification R3 Critical Cyber Asset Identification Procedures and Evaluation
More informationOSHA 29 CFR Part 1904 Recording and Reporting Occupational Injuries and Illnesses
OSHA 29 CFR Part 1904 Recording and Reporting Occupational Injuries and Illnesses The following are explanations and instructions on what you need to do to be in compliance with the above OSHA Standard.
More informationBILL TYPES PAGE 1 OF 8 UPDATED: 9/13
INPATIENT HOSPITAL 111 REGULAR INPATIENT 112 FIRST PORTION: CONTINUOUS STAY INPATIENT 113 SUBSEQUENT PORTION: CONTINUOUS STAY INPATIENT 114 FINAL PORTION: CONTINUOUS STAY INPATIENT 115 INPATIENT: LATE
More informationMSA Enterprise 1. GENERAL TERMS AND CONDITIONS
1 1. GENERAL TERMS AND CONDITIONS Herein is given a list of technical support cases, in relation to which Kaspersky Lab will provide assistance to the owner of this Extended Technical Support Certificate
More informationJobs at CU APPLICANT TRACKING STEP-BY-STEP GUIDE. Posting Jobs & Managing Applicants 1
Jobs at CU APPLICANT TRACKING STEP-BY-STEP GUIDE Posting Jobs & Managing Applicants 1 INTRODUCTION Welcome to Jobs at CU, the University of Colorado s online position description, employment application
More informationYou must do Windows updates with Microsoft Internet Explorer.
Windows Update Walkthrough Begin by going to this Internet address with Internet Explorer: http://windowsupdate.microsoft.com You must do Windows updates with Microsoft Internet Explorer. The first thing
More informationStress-related workers compensation claims in the Tasmanian State Service: A research overview. Lisa Jarman PhD Candidate Partnering Healthy@Work
Stress-related workers compensation claims in the Tasmanian State Service: A research overview Lisa Jarman PhD Candidate Partnering Healthy@Work What is workers compensation? Compensation payable under
More informationSecurity Organization & Awareness. Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke
Security Organization & Awareness Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke Goals Creating a awareness plan Describing the security organization What is necessary regarding
More informationThe Source For Workers Comp
The Source For Workers Comp The 4 things you should understand about Workers Comp. and WE bet you don t! Workers' Comp Beating You Up The Source For Making the Complicated Simple Ohio BWC: 4 states have
More informationCheckpoint Learning Forensic Accounting Certificate Program
Checkpoint Learning Forensic Accounting Certificate Program Powered by CPEasy, part of the Checkpoint Learning portfolio Firm Admin & User s Guide Develop Technical Forensic Accounting Knowledge Tax &
More informationRisk/Issue Management Plan
Risk/Issue Management Plan Centralized Revenue Opportunity System November 2014 Version 2.0 This page intentionally left blank Table of Contents 1. Overview... 3 1.1 Purpose... 3 1.2 Scope... 3 2. Roles
More informationCentral Commissioning Facility Research Management Systems (RMS): User Guidance
Central Commissioning Facility Research Management Systems (RMS): User Guidance Contents 1. How to login and register a new account... 2 2. How to accept an invitation to review... 8 3. How to submit a
More informationREGISTRATION FOR ONTARIO HEALTH INSURANCE COVERAGE
REGISTRATION FOR ONTARIO HEALTH INSURANCE COVERAGE 5 5.1 CLIENT REGISTRATION OVERVIEW... 2 5.2 ELIGIBILITY OVERVIEW... 2 5.3 HEALTH CARDS... 4 Red and White Health Cards... 4 Photo Health Card... 4 Health
More informationSUMMARY OF POSITION ROLE/RESPONSIBILITIES:
SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant
More informationDRAFT MOTOR TRAFFIC (THIRD- PARTY INSURANCE) (COST RECOVERY) (JERSEY) REGULATIONS
STATES OF JERSEY r DRAFT MOTOR TRAFFIC (THIRD- PARTY INSURANCE) (COST RECOVERY) (JERSEY) REGULATIONS 201- Lodged au Greffe on 13th December 2012 by the Minister for Health and Social Services STATES GREFFE
More informationMEDICAL CODING AND INSURANCE
MEDICAL CODING AND INSURANCE DIPLOMA 50 CREDITS About this program The Medical Coding and Insurance diploma program prepares students in many of the procedures associated with billing for medical services.
More informationOr log on to your account via the Employers / Recruiters button located on the right side of the screen.
Log On to your account via the log on area on the left side of the screen. Or log on to your account via the Employers / Recruiters button located on the right side of the screen. Employer / Recruiter
More informationCA Clarity PPM. Demand Management User Guide. v13.0.00
CA Clarity PPM Demand Management User Guide v13.0.00 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationIT Security Incident Management Policies and Practices
IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document
More informationUser guide VERSION 1.1 - JANUARY 2016
User guide VERSION 1.1 - JANUARY 2016 Important Note: Please note that a new version of Company360 has recently been released. If you experience any functionality issues or problems with the Company360
More informationCorelDRAW X5 & CorelDRAW X6
CorelDRAW X5 & CorelDRAW X6 CorelDRAW X5 & CorelDRAW X6 work best with Windows 7 but can be used with Windows Vista & Windows XP. Step One: Make sure that you have installed all Service Releases and software
More informationCHAPTER 22 LEGAL ASPECTS OF NURSING DOCUMENTATION: THE 25 DOs AND DON'Ts OF NURSING DOCUMENTATION
CHAPTER 22 LEGAL ASPECTS OF NURSING DOCUMENTATION: THE 25 DOs AND DON'Ts OF NURSING DOCUMENTATION I. INTRODUCTION Documentation of patients' records, in the nursing field as well as other health care fields,
More informationThis page contains following topics :
This page contains following topics : A) General Concept of Asset Accounting 1. Asset Accounting Overview 2. Structure of fixed assets 3. Asset Life Cycle Asset Accounting Overview The Asset Accounting
More informationCITY OF NAPLES VENDOR REGISTRATION TUTORIAL VENDOR SELF SERVICE (VSS) VENDOR REGISTATION TUTORIAL
CITY OF NAPLES VENDOR REGISTRATION TUTORIAL VENDOR SELF SERVICE (VSS) 3/5/2015 VENDOR REGISTATION TUTORIAL Start Vendor Registration Process: Please start by going to the City of Naples website located
More informationBoard briefing of Nursing and Midwifery Staffing Levels. January 2014
Board briefing of Nursing and Midwifery Staffing Levels January 2014 Paper produced: February 2015 Status: A Paper for Information Dame Eileen Sills DBE Chief Nurse and Director of Patient Experience Board
More informationCyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
More informationSix federal agencies1 have jointly issued final rules imposing identity
Final Federal Rules Require Identity Theft Prevention Programs to Be Implemented in 2008 JOHN L. NICHOLSON AND MEIGHAN E. O REARDON The authors discuss the new federal rules imposing identity theft-related
More informationSession Attribution in SAS Web Analytics
Session Attribution Session Attribution Session Attribution Session Attribution Session Attribution Session Attribution Session Attributi Technical Paper Session Attribution in SAS Web Analytics The online
More informationITIL: Service Operation
ITIL: Service Operation Course Course Chapter 01 - Course Lesson: Course Organization Welcome to the Course! Mentoring Community s Why Are You Here? Using Bloom s Taxonomy What do you Expect? Housekeeping
More informationDRAFT National Rural Water Association Identity Theft Program Model September 22, 2008
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)
More informationForm Builder Manual. A brief overview of your website s Form Builder with screenshots.
A brief overview of your website s with screenshots. 1 Table of Contents:...1...3 Creating a New Web Form...4 Editing a Form Element...7 Creating a Form Action...9 Adding a Form Layout to an Action...11
More informationINFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS
INFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS Revised: 12/5/2011 Table of Contents Overview... 3 Roles and Responsibilities... 4 Management Process Definition... 6 Management Process
More informationSole Proprietorship. Forming a Sole Proprietorship. Sole Proprietor Taxes
Sole Proprietorship A sole proprietorship is the simplest and most common structure chosen to start a business. It is an unincorporated business owned and run by one individual with no distinction between
More informationInjury and Illness Reporting Guide
Injury and Illness Reporting Guide August 2012 Office of Corporate Analysis Office of Health, Safety and Security TABLE OF CONTENTS Introduction... 1 Injury and Illness Reporting Using CAIRS... 2 Data
More informationCh. 109 NURSING SERVICES 28 CHAPTER 109. NURSING SERVICES GENERAL PROVISIONS
Ch. 109 NURSING SERVICES 28 CHAPTER 109. NURSING SERVICES GENERAL PROVISIONS Sec. 109.1. Principle. 109.2. Director of nursing services. 109.3. Assistants to director of nursing services. 109.4. Professional
More informationHazard/Incident Recording, Reporting and Investigation
Hazard/Incident Recording, Reporting and Investigation Power and Water Corporation Procedure 1 Purpose... 1 2 Scope... 1 3 References... 2 4 Roles and Responsibilities... 2 5 Definitions... 6 6 Records...
More informationTHE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM
Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing
More informationEA-ISP-002-Business Continuity Management and Planning Policy
Technology & Information Services EA-ISP-002-Business Continuity Management and Planning Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 17/03/2015 Document Security Level: PUBLIC Document Version:
More informationUntimed Billing Procedure CPT Codes Effective February 1, 2010
20552 Therapeutic injections: Tendons, trigger points single or multiple trigger points; 1 or 2 muscles 20553 Therapeutic injections: Tendons, trigger points single or multiple trigger points; 3 or more
More informationRURAL VMO/HMO CONTRACT OF LIABILITY COVERAGE (INCLUDING PRIVATE INPATIENT INDEMNITY COVER)
RURAL VMO/HMO CONTRACT OF LIABILITY COVERAGE (INCLUDING PRIVATE INPATIENT INDEMNITY COVER) THIS CONTRACT is made on the day of 2006, BETWEEN (insert the name of public health organisation) ("the PHO")
More informationINSTITUTIONAL POLICY AND PROCEDURE (IPP) Department: Manual: Section:
HOSPITAL NAME INSTITUTIONAL POLICY AND PROCEDURE (IPP) Department: Manual: Section: TITLE/DESCRIPTION POLICY NUMBER OCCURRENCE VARIANCE REPORT SYSTEM EFFECTIVE DATE REVIEW DUE REPLACES NUMBER NO. OF PAGES
More informationTechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified
TechExcel ITIL Process Guide Sample Project for Incident Management, Management, and Problem Management. Certified Incident Management Red Arrows indicate that the transition is done automatically using
More informationSave Actions User Guide
Microsoft Dynamics CRM for Sitecore 6.6-8.0 Save Actions User Guide Rev: 2015-04-15 Microsoft Dynamics CRM for Sitecore 6.6-8.0 Save Actions User Guide A practical guide to using Microsoft Dynamics CRM
More information16) INFORMATION SECURITY INCIDENT MANAGEMENT
Ing. Ondřej Ševeček GOPAS a.s. MCM: Directory Services MVP: Enterprise Security CHFI: Computer Hacking Forensic Investigator CISA CEH: Certified Ethical Hacker ondrej@sevecek.com www.sevecek.com 16) INFORMATION
More informationEmail Administration User Guide
Email Administration User Guide Table of Contents Accessing Your Email Administration Dashboard... 2 Navigating the Email Administration Site... 3 General Settings... 4 Change Password... 4 Whitelist/Blacklist
More informationClaim-Segment RIF Record Structure for SAF Files
Claim- RIF Record Structure for SAF Files This document explains the Claim- record structure of the Research Identifiable Files (RIF) Standard Analytical Files (SAF). A record in a Claim- record structure
More informationXYZ Medica Inc. Incident Management
XYZ Medica Inc. Incident Management December 2006 Suggested additions to this basic report template Classify Incidents as per the recommendations of ITIL then report against the separate classifications.
More informationInformation Security Management Criteria for Our Business Partners
Information Security Management Criteria for Our Business Partners Ver. 2.0 October 1, 2012 Procurement Group, Manufacturing Enhancement Center, Global Manufacturing Division Information Security Group,
More informationMODEL POLICY TO COMPLY WITH NEW OSHA INJURY REPORTING REQUIREMENTS
MODEL POLICY TO COMPLY WITH NEW OSHA INJURY REPORTING REQUIREMENTS XYZ COMPANY INCIDENT & INJURY REPORTING POLICY 1.0 Purpose It is the policy of XYZ Company (Company) that all incidents that result in
More informationSophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
More informationISO 27000 Information Security Management Systems Professional
ISO 27000 Information Security Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. A single framework of business continuity plans should be maintained to ensure
More informationHealth Economics. University of Linz & Hospital Data and Evidence in Austria. Gerald J. Pruckner. Lecture Notes, Summer Term 2009
Health Economics Hospital Data and Evidence in Austria University of Linz & Gerald J. Pruckner Lecture Notes, Summer Term 2009 Gerald J. Pruckner Hospitals in Austria 1 / 20 Introductory facts I Inpatient
More informationExploring Medical Identity Theft
Exploring Medical Identity Theft 1 Exploring Medical Identity Theft by Desla Mancilla, MPA, RHIA, and Jackie Moczygemba, MBA, RHIA, CCS Abstract The crime of medical identity theft is a growing concern
More informationThe "Great American" Presentation
RAB's Nontraditional Revenue Proposal Collection: Volume #7 Proposal #12: The "Great American" Presentation Contributor: WUBT A Great Submitted by David Bevins American presentation for Presented To: David
More informationClient Update SEC Releases Updated Cybersecurity Examination Guidelines
Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson jfeigelson@debevoise.com Jim Pastore jjpastore@debevoise.com David Sarratt
More informationGenerali Worldwide Health Insurance Medical Claim Form
Generali Worldwide Health Insurance Medical Claim Form Please complete all sections in BLOCK CAPITALS or tick the boxes, where appropriate. INSTRUCTIONS FOR FILING A MEDICAL CLAIM 1. Please type or print
More informationSURVEILLANCE OF INTENTIONAL INJURIES USING HOSPITAL DISCHARGE DATA. Jay S. Buechner, Ph.D. Rhode Island Department of Health
SURVEILLANCE OF INTENTIONAL INJURIES USING HOSPITAL DISCHARGE DATA Jay S. Buechner, Ph.D. Rhode Island Department of Health Background. Hospital discharge data systems have great potential for injury surveillance
More informationMcLennan Community College
McLennan Community College POLICIES AND PROCEDURES Subject: Identity Theft Prevention Program Reference: E-XXVIII-f Source: Board of Trustees Eff. Date: November 27, 2012 Approval Auth: Board of Trustees
More information