What is our current door policy?
All clinic and sensory room doors must be open unless someone is managing a behavior. This includes not having doors ajar.
What is continuous reinforcement?
Reinforcement given every instance of the behavior, or after every trial. Used with new or emerging skills.
Every time it happens, we reinforce
How do we increase appropriate behaviors?
Using effective reinforcement
Define Preference Assessment.
A procedure used to determine the most effective reinforcer for a learner at that moment.
What lessons should we refrain from practicing in public?
Eye contact, personal information
who was June's employee of the month?
Kayleen
What is Intermittent Reinforcement?
Reinforcing some responses but not all. May be every second, third or tenth response. Used for mastered or known skills.
What is a reinforcer?
A stimulus (given or removed) that follows a behavior that increases the future likelihood of that behavior occurring in the similar circumstances.
Item/action that is followed after clients response to increase likelihood of appropriate response to continue in the future.
Define Reinforcement.
Stimulus change that immediately follows a response, which increases the future frequency of that behavior in similar situations.
Change in stimulus (given or removed) after a response to increase future independence.
What are some best Practices for to protect PHI?
Do not discuss patients in public areas, Do not take photos of patients without permission. Do not post patient photo, photos, videos, or other private information on any social media. Refer to patients by patient ID (Initials) or other means to limit personal health information when possible.
How many client's have an AAC device?
2
What is Extinction?
No reinforcement given. Used for behaviors we aim to decrease.
Give an example of no assent and client assent
no assent is when a client pulls away from us, is manding no or to stop, engaging in behaviors
client assent is when the client is willing and open to learning and being prompted with lessons. They're smiling and look for us.
Define Motivating Operation.
An environmental condition, stimulus, or event that alters the effectiveness of a reinforcer.
Change in environment that can alter how motivating the reinforcer can e at that moment.
What is HIPPA?
Who took care of our office while Anthony was out?
Rhy from SFS as OM, Victoria as AC
What is Fixed Schedule Reinforcement?
Provide the two example for double points.
Reinforcement that is available following a set amount of time/ responses.
FIXED INTERVAL: reinforcement available and provided after set amount of time.
FIXED RATIO: reinforcement given after set number of responses.
List the two ways/strategies to identify assent?
Direct: pausing to check in with patient to determine if they agree to the trial
Indirect: Checking vocal and non-vocal behaviors and continues when assent is provided
Define Functional Reinforcement.
Reinforcers built into an activity or tasks that mirror the reinforcement in everyday life.
Natural reinforcement
What does HIPPA stand for?
Health Insurance Portability and Accountability Act of 1996
Name each member of the following Titles for this office: OM, AC, BCBA(s), ASUP(s), BTL, Trainer(s), Senior Technicians
OM: Anthony AC: Victoria BCBA(s): Nayelly, Maria, Kristin ASUP(s): Jessica BTL: Nayeli Trainer(s): Anaya Senior BTs: Dania
What should you first do (first 5-10 minutes) when running a fill in session?
Read BIPs, General Sup Notes, Correspondence Notes, creating our first 3-5 NET set
Why is Assent important?
It supports patient dignity, increases self-advocacy, reduces risks of patient victimization, you build a relationship/trust with your patient, improved patient/caregiver satisfaction, Ethics Code of Behavior analysis requires that we monitor assent.
What is the core principle of ABA?
Desirable consequences will increase behavior, whereas undesirable consequences will decrease behaviors.
What are some Key PHI identifiers?
Identifiers include name, postal address, names of relatives, names of employers, date of birth, telephone number, fax number, e-mail address, Social Security number, medical record number, account numbers, license or certificate numbers, health plan beneficiary numbers, web URLs, IP addresses, biometric identifiers such as finger or voice prints, photographic images, vehicle identifiers, or any other unique identifying number, code, or characteristic.