Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


RBT Module 33, 34

No description

Michael Cameron

on 18 June 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of RBT Module 33, 34

Dr. Michael Cameron

Registered Behavior Technician
You will be required to report all
changes in
your client's circumstances that
may impact their progress
Factors that
Affect Individuals
Registered Behavior Technician
Registered Behavior Technician Modules:

E-02, and E-03, E-04 and E-05 (Documentation and Reporting)


Report variables that might affect the client (E-01). Generate objective session notes (E-02). Effectively communicate with your supervisor (E-03). Comply with applicable legal, regulatory, and workplace reporting requirements centered on abuse and neglect (E-04). Comply with applicable legal, regulatory, and workplace requirements for data collection, storage, and transportation (E-05).


60 Minutes


Competency based quiz (5 questions)

Demonstration Recommendations:

At the conclusion of this training,
your BCBA supervisor to show you a sample of a "model"
session note and a copy of the evaluation tool they will use to assess your performance,
expectations regarding communication (mode, frequency, and topics) and HIPAA compliance, and
your ability to document information about a session and use HIPAA compliance systems

Environmental Factors

Biological Factors
Interpersonal Relationships

Transportation Issues

This is your final module series

33, 34, 35, 36 & 37

Complete Session Notes
Session notes are a way to communicate
with multiple stakeholders
Your BCBA supervisor
The payer (e.g., school system, insurance
company, Regional Center in the state
of California)
The Structure of a
Session Note

Session Verification
Hard Copy
Electronic copy
Rendering sessions for schools, insurance
companies, home-based services
Communication with your
Discuss your observations, and your
ideas for client progress

Discuss case logistics (e.g., your ability to
maintain consistency)
Discuss ethical concerns when required (e.g.,
professional boundaries)
Discuss your training needs
Discuss your professional
development (career
trajectory, conferences)
Creativity is just connecting things. When
you ask creative people how they did
something, they feel a little guilty
because they didn't really do it, they just
saw something. It seemed obvious to them
after a while. That's because they were
able to connect experiences they've had
to synthesize new things.
Health and safety
Report Abuse

A mandatated reporter is a person who
is required by law to report reasonable
suspicions of abuse
Within your capacity as a Registered Behavior
Technician, you will be a mandated reporter
When a Person Discloses

Listen without judgement
Do not make false promises regarding
what you will do with the information
Report to protective services
(e.g., child or adult) or to
law enforcement

Name of the person (your name
is optional)
Address of the person

Addresses of parents or guardians

Nature of the abuse
Those persons making a report in
good faith are protected from
A person required to report abuse who
has failed to do so has committed a crime
Why People do not Report

Confusion about reporting responsibilities
Do not know the warning signs of abuse
Do not want to get involved
Fear of being wrong

Fear of reprisal
Data Collection Storage and
Health Insurance Portability and Accountability (HIPAA)
What is HIPAA?

HIPAA is a federal law (1996) designed to protect a subset of sensitive
information known as Protected Health Information (PHI)
Forms of Sensitive Information

Examples of Sensitive Information
Social Security Numbers
Credit Card Numbers

Personal Information
Research Data
Individually identifiable
health information

How it Impacts your
A "covered entity" is any person or organization that furnishes, bills, or is paid for health care services in the course of business
Registered Behavior Technicians and the organizations they work for are covered entities

Administrative Infrastrucure
Security management processes
to manage
risk of HIPAA infractions
Appointment of security personnel
to develop
security policies and procedures
Information access management
to manage
who receives access to sensitive information
(e.g., Minimum Necessary)
A HIPAA recurrent
training program

12 Recommendations
1. Do not post information on your social media site
2. Do not post or share pictures of your
paperwork (pictures can be enlarged)
3. Do not download protected health information
to an unsecured device (laptop, smart phone,
tablet) to make data more accessible to do your
4. Do not check the medical record of a
co-worker, a friend, or someone's child
because you are concerend for their well
5. Do not share your log-in information or ID
6. Do not leave your computer unattended while
you are logged-in to a system containing protected
health information
7. Do not share information considered
Client's names
Geographic sub-divisions (smaller than state)
Telephone or fax numbers
Social security numbers
Vehicle identifiers
E-mail addresses
Names of relatives
Full face photographs or images
Healthcare record numbers
Account numbers
Healthcare beneficiary numbers
Use Excel in a HIPAA compliant manner (e.g., file
names, use Excel password protection,
up-to-date encryption if your version of
Excel is prior to 2007, password control)
You are responsible for
protecting the privacy rights of
the people you serve

Do not leave hard copies of assessments,
Progress Notes, data sheets, program books
in open areas such as the back seat of your
Take precautions when sharing documents
(e.g., Google Docs or DropBox). Both documents
and file names cannot have "identifiers". Use
password protection
Do not assume that Google Docs or
Drop Box is HIPAA compliant
Speak to your BCBA supervisor about
safeguards, including:
(a) encryption, (b) document shredding,
(c) locking doors and file storage areas,
(d) use of passwords and codes for
access, (e) use of antivirus and anti-spyware
software, and (f) reporting the loss of your
moble computing device

Breaches of your oganziation's policies or an individual's confidentiality
must be
to your supervisor
one of the following people within your organization:

Your HIPAA Privacy Liason
Your HIPAA Security Liason
the HIPAA Privacy Officer
the HIPAA Security Officer, or
the Information Security Office
Your organziation is required to take reasonable steps to lessen harmful effects of a confirmed breach involving compromised PHI. This includes notifying the individual(s)
whose information has been breached.
Best Practice Reminders
keep computer sign-on codes and passwords secret.
Do not
allow unauthorized persons access to your computer
keep notes, files, memory sticks, and computers in a secure location.
Do not
leave them in open areas such as your car or a coffee shop.
Do not
put PHI on a mobile device without required approaval. Do use encryption when sending or storing PHI on a mobile device, including "thumb" or "flash" drives

hold discussion about PHI in private job-related locations.
Do not
hold discussions in compromised locations (waitng room, elevator)
follow procedures for proper disposal of sensitive information, such as shredding information. However, ensure you follow proper procedures regarding the storage of files for 7 years
When sending email,
do not
include PHI or other sensitive information such as social security numbers of other "identifiers" unless you have explict permission and you use encryption
What checklist serves as a useful guide for identifying and reporting factors that may impact a client?
Setting Event Checklist
Who benefits from session notes?
All stakeholders
Are Registered Behavior Technicians mandated reporters?
Name three forms of sensitive information
Print Spoken Electronic
What is your responsibility when a person's
PHI has been compromised?
Report to your supervisor and designated security
officers in your organization
You have completed
all sections of the
Behavior Analyst
Certification Board's
Task List for
Registered Behavior
Next Steps
You will log-in the the Behavior
Analyst Certificaton Board's
to complete your RBT application
You will submit your Certificate of
Completion for the 40-hour RBT training

You will submit an initiated and signed
copy of your RBT competency-based assessment

You will submit a diploma or transcript
verifying completion of US high school or
equivalent (non-English transcripts
should be translated by a NACES member)
If you complete the course on
or after the
14th of December
you will be required to take
the BACB exam (75 scored and
10 unscored questions)
Module Goals
Discuss the use of the Setting Event Checklist as job-aid for reporting factors that may impact your client

To review the rationale for completing session notes

To review the anatomy of a session note
To review the Registered Behavior Technician's responsibilities as a Mandated Reporter

To review the Registered Behavior Technician's HIPAA requirements

Steve Jobs
Full transcript