role play for Intake information

Description

this is the flow process that should go during the role play
Training Medellin procall18
Flowchart by Training Medellin procall18, updated more than 1 year ago
Training Medellin procall18
Created by Training Medellin procall18 over 7 years ago
13
0

Resource summary

Flowchart nodes

  • Plays HIPAA Recording
  • Explains HIPAA correctly
  • Does not explainHIPAA correctly
  • Explains the HIPPAbut leaves doubt
  • Very sick ladyShe wants to finish the process quickly, because she is in bed.
  • Pt H/U
  • Pt has a heavier tone of voice
  • Pt has a very nice tone of vocie
  • The recording is basically saying that your information will remain secure and private in our server and it will not be shared with anyone other than the Dr, you are allowing us to send you information regarding your process only to the numbers you provide us with, and you can opt out at any time. 
  • Deshi Akhtakhanov 1420 Angie DriveWestminster, CA 92683714-899-1940July 10, 1964FemaleDeshiAkhtakhanov@dayrep.com
  • Does agent make pt repeat more than 3 times with out phonetic alphabet
  • Does agent make pt repeat with phonetic alphabet morethan 3 times.
  • Pt H/U
  • Yes
  • No
  • Yes
  • No
  • Pt H/U
  • Pt continues until xfer
  • Role play intake information
  • Agent introduces proparlyand explains the reason ofthe call.
  • Agent does not introduceproparly or does not explaincorrectly the reason of thecall.
  • Pt has a very nice tone of vocie
  • Both done improparly
  • Pt H/U
  • One done very well
  • both done great
  • Pt has a heavier tone of voice
Show full summary Hide full summary

Similar

Sanciones aplicables por violaciones a HIPAA
Jacqueline Rodríguez
Acids and Bases
silviaod119
GCSE History of Medicine: Key Individuals
James McConnell
Biology AQA 3.1.3 Cells
evie.daines
AQA GCSE Biology B1 unit 1
Olivia Phillips
INFORMÁTICA - Periféricos de entrada y salida
Serna Izaoly
AQA Physics: A2 Unit 4
Michael Priest
Poetic Techniques
Monique Govind
Maintenance, Resources, and Data Security
kristinephil558
Keywords & Definitions for A Level Computer Science
Lyndsay Hope