Assess. Identify and develop a problem list Develop a medical and medication therapy problem list in order of decreasing priority. Evaluate the problem(s) Interpret subjective and/or objective evidence that supports a new or acute problem or requires a referral. Classify the disease (stage, severity, and/or treatment group) Assess and justify the current status of the disease state. Identify the goals of therapy per the literature. Assess therapy Assess appropriateness of current medications or medications to be added per evidence. Identify current or potential medication related problems (inappropriate indication, dose, frequency, route, dosage form, therapeutic indication, drug allergy or intolerance, adverse effects, drug interactions, contraindications. Identify current or potential patient related problems (patient understanding, knowledge or medication, adherence, cost, barriers, health literacy).
Assess. 174:1-2. For the German and French version, see xxxxx://xxx.xxx.xx/de/wald/waldentwicklung- und-monitoring/langfristige-waldoekosystemforschung-lwf/daten/datenanfrage.html and xxxxx://xxx.xxx.xx/fr/foret/evolution-et-suivi-de-xx-xxxxx/recherches-a-long-terme-sur-les- ecosystemes-forestiers-lwf/donnees/demande-de-donnees.html
Assess. In your first meeting, you will meet with the Assistant to describe your situation, any obstacles you face in obtaining the resources you need, and any resources you have used thus far and their results.
Assess. What are the implications, positive or negative (and evidence for this) of the policy/strategy/decision in relation to GCU’s duty to have due regard to the need to:
Assess. CRA will routinely assess the effectiveness of its communication, monitoring, documentation and other compliance with the obligations specified in Article VIII and this Exhibit D and make changes to correct any deficiencies identified in such assessments. CRA will create and preserve documentation to evidence such assessments and corrective actions taken in response to such deficiencies.
Assess. Once an incident or suspected incident has been reported to your Program Manager and Coordinator, they need to immediately determine if a privacy breach has occurred. In making this assessment, two important questions need to be answered: Is personal information involved? Not all data in the custody or control of an institution is personal information. Therefore, the first part of your assessment is to identity the type of information affected by the incident. Definition: Personal information is defined in subsection 2(1) of FIPPA as recorded information about an identifiable individual (i.e., natural person) and includes, but is not limited to: race, nationality, religion, age, sex, marital status, education, medical or criminal history, financial information, identifying numbers, address, telephone number, fingerprints, blood type, and opinions. The definition of personal information is not exhaustive – an institution may have other types of personal information in its custody or control. Personal information may include information that is not recorded (e.g., a verbal disclosure). Also, if there is a reasonable expectation that an individual can be identified from the information disclosed (either alone or when combined with other information), such information will likely qualify as personal information. Has an unauthorized disclosure occurred? Unauthorized disclosure, whether it is intentional, inadvertent, or as a result of a criminal activity, is the defining activity for privacy breaches. It is the “threshold” or “trigger” mechanism for the application of this Guide. If the answer to both questions is “yes”, a privacy breach has occurred and you need to follow the rest of the privacy breach response protocol outlined in this Guide. Note: Institutions have a responsibility to protect personal information and to secure general records, particularly sensitive records.11 Respond to security breaches involving general records in accordance with established rules and regulations. Report incidents involving unauthorized collection, use, retention or disposal of personal information to your Coordinator. Key Players Suggested Responsibilities Program Manager and Coordinator Work together to: ▪ Obtain all available information about the nature of the breach or suspected breach (e.g., when, where, whose personal information involved, how much personal information involved, verbal disclosure or hard copies involved, etc.). ▪ Determine what happened (e.g., did ...
Assess. The Committee will assess the routes, route structures, equipment and locations.
Assess. To evaluate an individual’s condition, including social supports, health status, functional status, psychological history, and environment. Information is collected from the individual, family, significant others, and medical professionals, as well as the assessor’s observation of the individual.
Assess. 7.6.1.1.1. Once every three years, complete a Community Needs Assessment which contains key findings on the causes and conditions of poverty in the community(ies) served.
Assess. As an initial step in the Ra3 process, designated individuals within the Compliance organization coordinate the collection of fact-based information, including information about each product, soliciting feedback from other groups within Amgen as appropriate, and record product information using standardized questionnaires (Product Profiles). Completed Product Profiles are used to inform the completion of risk assessment documents (Product Risk Matrices) that calibrate risk according to instructions in the Risk Matrices and using approved risk rating criteria. A separate Product Risk Matrix is completed for each Government Reimbursed Product. The Compliance organization reviews the Product Risk Matrix for each Government Reimbursed Product and identifies product-specific areas and activities for risk mitigation.