HIPAA-Compliant Computer Security Method and System for Recording Visual Personal Health Information in an Electronic Format Relating to at least Two Individuals, at least one of whom is an Individual Under Care, from a Video Camera, Preventing Unauthorized Access of a User to the Information, Formatting the Information, and Populating Forms with the Information

ABSTRACT

HIPAA-compliant computer security method and system for recording, using a video camera, electronic visual personal health information of at least two individuals, including an individual under care, and preventing unauthorized access of the user to the video information. The video is compared to physical attribute information of the individuals stored in the computer system&#39;s memory, and the individuals are identified by facial matching. The user&#39;s stored caseload has authorization profile information including access to individuals under care. The identified individuals are compared to the user&#39;s caseload information, and the user is granted access to part of the video of the individual under care, the video of the other individuals is blurred, and the resulting video is transmitted to the user&#39;s caseload for viewing. Data fields of an information request are populated using formatted data from the video information.

RELATED APPLICATIONS

The present invention is a Divisional application of U.S. patentapplication Ser. No. 16/695,591, filed Nov. 25, 2019, which is aDivisional application of U.S. patent application Ser. No. 13/675,440filed Nov. 13, 2012, which is a Continuation-In-Part application of U.S.patent application Ser. Nos. 13/600,388 and 13/600,402, both filed onAug. 31, 2012, and both of which are Continuation applications of U.S.application Ser. No. 11/604,577, filed Nov. 27, 2006, which issued asU.S. Pat. No. 8,281,370 on Oct. 2, 2012. All description, drawings andteachings set forth therein are expressly incorporated by referenceherein and claim priority upon the teachings expressly made herein.

FIELD OF THE INVENTION

The present invention relates to methods and system for acquiring andprocessing information collected from individuals having intellectual orcognitive disabilities, and for providing treatment, proof-of-service,and prevention of abuse and neglect based on that information.

BACKGROUND OF THE INVENTION AND DISCLOSURE

A goal of human service agencies may be to have more person centereddocumentation. Having the responses of a person is a key component forperson centered documentation. For individuals with intellectual orcognitive disabilities who are receiving supports from others, there isa challenge to make sure that their goals and opinions are properlyrepresented. In many cases these individuals are receiving support frommultiple agencies with multiple oversights and monitoring organizations.Even within one organization there are multiple shifts of people withdifferent access to information.

In applications requiring proof of positive or negative individualsatisfaction, proof of service delivery, time, location and meetingindividual goals for people with intellectual and/or cognitivedisabilities who have guardians and or funded caregivers, or monitoredby funding agencies, the state of the art is including an individualother than the person being documented for in the process of gatheringinformation and treating information as if it is correct and reflectsthe individual with intellectual and/or cognitive disabilities.Unfortunately, this method does not include a system for receiving andreporting directly from individuals with certain cognitive andintellectual disabilities when it is shared among different caseloads,security domains and with defined access roles, called super roles.

Typically proof of service delivery, individual satisfaction of serviceprovided and achievement of individual goals is documented using eitherpaper or electronic formats. The desired information is entered on paperforms or some form of electronic database. These methods are prone toinformation which does not accurately reflect the wishes of the personwho information is being documented on. Different staff, consultants,family members and others may either inaccurately interpret or falselydocument information about an individual's satisfaction, achievement oradditional responses. These are challenges with the current system of(static) (dropdown choices) answers, rating systems or defined checkboxes to questions.

In addition, organizations providing these services work withsignificant budgetary issues. While most agencies work hard to provideexcellent services, there are some agencies which do not have the samereputation, service quality or training and it is important to be ableto have accurate documentation of service delivery and achievement ofgoals. It is a challenge for people with intellectual and/or cognitivedisabilities to be able to self-report on the achievement of goals,satisfaction of service received, or potential problems such as abuseand neglect.

There are many current, significant issues with the prevention of abuseand neglect of individuals in this country receiving healthcareservices. Having documentation by the same staff, consultants, or familyof who might be causing the abuse and neglect may not be as optimal ashaving the individuals themselves giving their opinions on care,services and relationships. Not only does the abuse and neglect andnegative outcomes need to be accurately documented, but so too doesindividuals' daily activities and positive. Staff might enter data in adaily service log for an individual where it might be the case that theindividual did not receive that service on that day. Therefore, the needfor accurately recording these activities is a challenge with paperbased documentation or with the current standard in the industry, whenit cannot be independently filled out and submitted by a person who isthe subject of the documentation. It can also be a challenge when astaff can video an individual and then submit that video after the factdepending on the answer given. Broader real time documentation and datacapture of all activities including treatment and other supportactivities, both positive and negative, may be preferable to selectivedocumentation which could have either only positive results that mightprevent negative issues from coming to light.

The proposed solution, aspects of the present invention, provides amethod for direct connection of a phone, pc, smartphone, mobile deviceor other device connected securely to a central physical location overthe internet or equivalent. Data measurements regarding the targetindividual could preferably be taken (or asked in real time in the formof questions) with a secure connection and then recorded and saved. Theresponses could be correlated and the information could be compared withpredetermined person centered responses for specific individuals basedon who was asking the questions and how the questions were asked.

This is particularly challenging for individuals with intellectual,cognitive, and developmental disabilities, which are lifelong conditionswith varying degrees of impairments. They can have significant medicaland other health conditions, and may often have emergencies. Individualscan receive support services beyond a traditional patient relationship.As they can receive funding from the government or other fundingagencies, their daily activities, tasks, goals, objectives as well asmedical or health conditions need to be documented by the entitiesproviding supports to the individuals. Entities may only get paid uponproof of service delivery and proof of satisfaction by the individuals.

Access to Personal Health Information (“PHI”) about health and relatedconditions is strictly regulated by the Health Insurance Portability andAccountability Act of 1996 (“HIPAA”), the American Recovery andReinvestment Act of 2009 (“ARRA”), and Health Information Technology forEconomic and Clinical Health Act (“HITECH”) and other state and federalregulations which complicates providing support and services includinganalyzing and reviewing documentation.

Care and support for Individuals with Developmental Disabilities isoften distributed among many people and organizations, includingparents, service providers, doctors and other health professionals,volunteers and case managers and others appointed by various funding andregulatory jurisdictions. The responsibilities and privileges ofdifferent users (ranging from Parents to Guardians to health careprofessionals and staff members) may differ by funding sources andorganizational structures, and thus a flexible system for understandingan individual with cognitive disabilities communication is essential.

For example, often an entity providing support to an individual may havedifferent groups with separate staff providing various relatedfunctions, and thus processes may be used to control who has access towhat information. Each of these services may need to be documented withproof of service delivery and service satisfaction. However, thepossibility exists for various entities to be unaware of the servicesprovided simultaneously by other entities.

Currently documentation may be done by asking an individual questionsand then a staff member (or other person) documenting that informationobserving an individual and then entering documentation on a paper orelectronic form. The information entered is thus interpreted by thestaff member entering the documentation.

This method allows for the situation where different staff membersobserve an individual doing the same action or responding in a certainway and each staff member might interpret that information and documentit differently. Given that an individual might have a lifelong conditionand staff members can be transitory and thus have limited information,there exists a problem with the information flow available to a staffmember. Some staff members might have worked longer with an individualand interpret non-verbal responses differently. This means the sameresponse by an individual may cause different reporting interpretations.The responses would be stored so there is an ability to review responsesas part of an audit or other look back.

In addition, an individual might respond differently to the same staffmember asking the same question based on their psychological orbehavioral condition at that time.

In the face of such challenges it becomes difficult for care providersto both ensure satisfaction of service provided to the individual andproof of service delivery provided to an individual. Themisinterpretation of the responses received from an individual regardingsatisfaction of services received might lead to incorrect documentation.These records might not reflect the individual's actual progress towardsgoals and consequently might not be analyzed properly as proof ofsatisfaction. Also, if the responses of service delivery are notrecorded properly then the records may not be very useful to verify thatthe services were actually provided to the individual.

The system can have applications for an individual to report proof ofservice satisfaction or proof of service delivery. It may not bepossible with the existing paper based or electronic documentation asother people document and interpret proof of satisfaction or proof ofservice delivery. For example, an individual might respond that he/shewas not happy with the service or the appropriate service was notprovided to him/her. But there exists the possibility that the staffentering documentation may record that the individual was happy or theappropriate service was provided to the individual. In such cases, theexisting process of documentation of activities can fail to provideaccurate proof of satisfaction and proof of service delivery.

Similar situations exist in other industries and populations. Situationswith other cognitive conditions which might affect driving or otheractions might need to be interpreted based on the individuals' intentand capabilities. This could include students, prisoners and minors withlimited reporting capabilities.

Information may also be obtained from multiple actions, including verbalanswers, facial movements, eye movements, variations in sound, handgestures, body movements, body chemistry, temperature, photo orelectrochemical modifications, facial or other tics, and other actionsfrom an individual. These gestures can be recorded in the database. Thesystem can store the information received in a database based on avariety of factors including the person asking the question, otherpeople in the room, a recent history of actions regarding theindividual, the individual's plans and goals, time and date, locationand more. The system can have automated validations to generatenotifications for potential negative outcomes such as abuse and neglectas well as positive outcomes. This data can be stored as multimediadocumentation. Only individuals with appropriate access based oncaseload and super role may be able to access the data.

Information can be generated from a video, tactile, thermal,electrochemical sensor, body worn sensors or audio capture system(including phones, computers, and other commercially available devices).The information is preferably captured and generated in real time. Thiseliminates the ability of a staff member to edit or only upload datawhich generates desired responses.

If potential for abuse and neglect is determined a specified subset ofpeople based on caseloads and defined access roles, called super rolesmay view information as appropriate to review the situation. One benefitof the system is that the system can look for abuse and neglect acrossmultiple caseloads and super roles based on predetermined rules.

SUMMARY

A system and method of generating information regarding one or moregoals of an individual under care, comprising recording firstinformation pertaining to one or more individuals, wherein at least aportion of the information pertains to an initial inquiry relating toone or more goals of the individual, transmitting at least a portion ofthe first recorded information to a computer system with a memory and aprocessor, storing, by the computer system, at least a portion of thefirst recorded information, storing, by the computer system, historicalinformation, wherein the historical information pertains to an initialinquiry relating to an individual's care, and determining, by thecomputer system, a portion of first transmitted informationcorresponding to the historical information. The computer system furthercomprises any one or more of the steps of a) editing informationpertaining to one or more individuals for viewing by a user authorizedto view the information; b) populating data fields of an informationrequest using formatted data; c) determining, based on an indicatednegative outcome, a first preventative action relating to the firstindicated negative outcome, and transmitting a signal for initiating afirst preventative action; d) determining based on a firstinterpretation and a first caregiver action, whether at least a portionof the first caregiver action was appropriate; and e) determining basedon an indicated need, an action to satisfy that need, and transmitting asignal for initiating the action to satisfy the need.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 illustrates an overview of a preferred embodiment of thedisclosed system;

FIG. 2 illustrates an overview of determining data fields theinformation can be collected on as required for a number of objectives;

FIG. 3 illustrates an overview of the information flow process;

FIG. 4 shows the overview of the system architecture and infrastructure;

FIG. 5 illustrates an overview of the cognitive conditions;

FIG. 6 illustrates an overview of the sample data flow for reporting;

FIG. 7 illustrates an overview on the detection and prevention ofundesirable outcomes;

FIG. 8 illustrates the process of determining the methods to analyze,map or use predictions for the input information;

FIG. 9 illustrates how the system can generate queries and collectinformation;

FIG. 10 the variety of modes of the responses obtained from theindividual;

FIG. 11 illustrates an overview on data collection to preventundesirable outcome;

FIG. 12 illustrates the process of making prediction on undesirableoutcomes for an individual and determining the information to preventundesirable outcomes;

FIG. 13 illustrates how the system with caseloads makes predictions onundesirable outcomes for multiple individuals and determines theinformation to prevent undesirable outcomes;

FIG. 14 illustrates an overview on determining caseload access;

FIG. 15 illustrates how the system could capture and store the videofootage for the individuals who are present in the current situation;

FIG. 15 a represents the video recording of individuals' activities inreal time and the raw footage available in the system;

FIG. 15 b represents the video footages of individuals' activitiesmodified depending on the caseloads privileges of users;

FIG. 15 c represents the raw transcript obtained from the videorecording of the individuals' activities as well as modified transcriptsfor users with limited caseload privileges;

FIG. 16 illustrates the example of how the video recording of anincident can be analyzed for incident reporting;

FIG. 16 a represents the real time video recording of an incident wherean individual is hit by a staff member, recorded by two differentcameras located in different angles;

FIG. 16 b represents the raw footage stored by the system for the firstcamera and the corresponding modified footage for users with limitedcaseload privileges;

FIG. 16 c represents the raw footage available for the second camera andthe corresponding modified footage for users with limited caseloadprivileges;

FIG. 17 illustrates the example of how the video recording of anactivity program can be analyzed for ISP Data collection and incidentreporting;

FIG. 17 a represents the sample video recording of an activity programwhere one of the individuals is hit by a staff member;

FIG. 18 illustrates an example of how the system can analyze client toclient altercations by means of a video record;

FIG. 18 a represents the sample video recording of an incident of clientto client altercation and the corresponding raw footage stored by thesystem;

FIG. 18 b represents audio recording of an incident of clientaltercation and the sample raw audio clip stored by the system;

FIG. 18 c represents the modified audio clips for the user with limitedcaseload privileges;

FIG. 18 d represents the modified video footage of the incident ofclient altercation for the user with limited caseload privileges;

FIG. 19 represents the sample screenshot of creating an automatedGeneral Event Report form using the live video recording of an incident;

FIG. 19 a represents the sample screenshot of the section of the GeneralEvent Report form where the system can automatically enter real timeincident details using live video recording;

FIG. 19 b represents the sample screenshot of the section of the GeneralEvent Report form where the system can automatically record notificationand other information after analyzing the available real time data andgenerating notifications;

FIG. 20 shows the variety of options that can be used to obtain datafrom the individuals;

FIG. 21 illustrates an example of a device implanted in braces togenerate information;

FIG. 21 a represents the sample video recording of an individual wearingwireless brace devices at the time eating and the sample screenshotwhere the system can analyze the information generated by the implantedbrace device;

FIG. 22 illustrates the process of entering an automated ISP Data formusing the live video recording of the activity program;

FIG. 23 illustrates the process for the implementation and monitoring ofHealth Care Plans for individuals;

FIG. 24 shows the data the system can provide the funding agencies withfor analysis;

FIG. 25 illustrates the overview of the infrastructure of the system;

FIG. 26 illustrates the system's security feature of using electronicsignature;

FIG. 26 a represents the sample screenshot of the security feature ofusing electronic signature;

FIG. 27 illustrates the system's access control mechanism;

FIG. 27 a represents the sample screenshot of the access control featureby assigning combination of super roles, caseloads and agency-wide rolesto users;

FIG. 28 illustrates the overview of how the system can track all theactivities within the system;

FIG. 28 a represents sample screenshot of the users' activity trackingfeature.

FIG. 29 illustrates the overview of person-centered data available inthe system;

FIG. 30 illustrates the overview of the suite of applications that havebeen designed for the entities providing support to the individuals;

FIG. 31 illustrates the overview of the suite of applications that havebeen designed for the states and counties;

FIG. 32 illustrates the overview of the demographic data available inthe system which can be used for analysis;

FIG. 33 shows the incident reporting data available in the system foranalysis;

FIG. 34 illustrates the overview of the referral and waiting listmanagement data available in the system which can be used for analysis;

FIG. 35 illustrates the process of entering an automated Attendance Dataform using the video recording of an activity program; and

FIG. 36 illustrates the process of generating an automated Hab Checklistbased on the data available in the system.

DETAILED DESCRIPTION AND PREFERRED EMBODIMENTS

Description will now be given of the currently preferred embodiment ofthe invention with reference to the attached FIGS. 1-36 . It should beunderstood that these figures are exemplary in nature and in no wayserve to limit the scope of the invention as the invention will bedefined by claims, and the scope of the invention will be the scope ofthe claims, as interpreted by the Courts.

Introduction

Aspects of the present invention provide a system for managingdocumentation and other information from individuals under care amongmultiple security domains and caseloads. These individuals can includethose with cognitive disabilities, prisoners, children in school, andinfants ages birth to three. Embodiments of this invention may haveapplications for reporting proof of service delivery, proof of servicesatisfaction and other person centered documentation by people withcognitive disabilities in compliance with PHI across and withinorganizations in the cognitive disability field in compliance with HIPAAand other regulations and security procedures.

Embodiments of this system ensure that individual information issecurely stored, thus eliminating the risk of loss of information aswell as tampering or deleting information. It allows users to directlyrecord information from an individual with cognitive disabilities or anyother condition which renders the obtaining of accurate healthcareinformation difficult or impossible, directly into a database eitherunprompted or in response to prompts. This information may then bestored for audit integrity. It may also be compared with previousinformation from the individual to determine the accuracy of the answerreceived.

It can later be reviewed against future documentation to see if aresponse should be considered differently based on additionalinformation. Because the initial response is stored securely in thesystem, what is changing is not the actual response but theinterpretation of the response, so the documentation is still beingrecorded in real time as close to the point of delivery and occurrenceas possible.

Overview:

FIG. 1 illustrates an overview of the embodiments of the presentinvention system. Embodiments of the present invention require a numberof steps in order to fully grasp, obtain, and understand the informationsought. As shown in Determining Individual Goals 110, an individual hasgoals and objectives which are based on the individual's directive.Individuals' family, caregivers or the circle of support might helpindividuals in defining their goals and objectives.

In FIG. 1 , Person Centered Data Collection Approaches 180 shows thatthe system has to determine how to collect data in a person-centered(See FIG. 29 ) and cognitively appropriate manner. In cases of cognitivedisability or impairment different individuals may have differentperson-centered methods collecting data as shown by Determine Datafields to query on 160. The query includes asking questions, promptingfor information, gathering data and collecting information. Individualsmay express their responses in different manners and the systemtherefore needs to determine the appropriate method to collect data. Thesystem might require the use of one or more methods to collect data.

Comparing the level of cognitive impairments of an individual, thesystem can determine if a single method would be enough to generate datafrom the individual's responses. If the system realizes that theresponse is not clear from the single method of data collection then itmay suggest generating data in multiple manners. The system may alsorecognize that the same response from two different individuals mightactually have separate meanings depending on the cognitive capabilitiesand perception of each person. A goal of the aspects of the presentinvention is the ability of the system to do just that—analyze, in a waya human overseer may not be able to, responses from differentindividuals to determine the meaning behind each, since identicalresponses from two different individuals may have different meanings.The system might recognize the characteristics of the surroundings ofwhen the individuals may say the same thing with different meanings.

The system might also determine that there are different circumstancesthat even with the same answer from the same individual could havedifferent meanings. The system may also recognize that there is notenough information no matter what answer might be generated from asingle response and would therefore require data to be collected frommultiple sources or multiple modes. The system can look at the processand the information about the situation and the surroundings and willnot only focus on the apparent answer which may have different meaningsdepending on the situation and other factors.

This system of determining how to collect data in a person-centered orcognitively appropriate manner is based on a set of parameters andanalysis which include both the individual as well as other individuals.The system may need to generate questions which do not reflectinformation about other individuals in other caseloads but mightdisseminate information about other individuals' answers or conditionsor information. The system may also have the capability to ask questionswhich are relevant to improving the case or support related to theindividual whom the questions are being asked about. The system may alsohave the capability to generate additional information for comparisonpurposes to validate and improve the reliability of the questions andinformation. The system may use hypothetical situations to ask questionsin different manners. The different sets of questions may direct theindividuals to construct messages in response to those situations. Thesystem may then be able to compare the responses and determine theappropriate method to ask questions for each person.

Based on these individual directed goals and objectives, the system canadjust the types of information to be collected, queries to be generatedand the types of analysis to be performed.

This information may be expressed in various modes or methods. Based onthese individual goals, different information may need to be collected.

There may or may not be clearly understood information from anindividual regarding their goals and objectives and information requiredto be collected. Part of the system is a process for collectinginformation based on the various potential goals, needs and objectivesof an individual and then later adjusting reporting and analyticrequirements based on the future reinterpretation of the prescribedgoals and objectives.

It is possible that the system cannot identify the goals of anindividual with certainty. The system could decide that there is areasonable probability that the individual could have one or more of twoor more goals. For example if the system thought there was a reasonablelikelihood that the individual could have identified either goal orobjective A or goal or objective B the system could providedocumentation or tasks towards both objectives until it was clear whichwas the desired goal.

Requirements for Data Collection 120 shows that part of the requirementsfor data collection can be based on the Proof of Service Delivery 225and Proof for Billing 120. Data may be needed on service delivery suchas data for the person who asked questions to the individuals or thedetailed information about the approaches taken at the time of providingsupports to the individual. This information may be needed to prove thatthe appropriate services have been provided. The proof of servicedelivery may also be needed for the services that need to be billed.Using this information billing data is generated which is needed toprove that services have been appropriately administered and can besubmitted as claims to be billed for. These are government, insurancereimbursement, corporate reimbursement or other reimbursements that areissued based on proof of proper service delivery. Objectives for theproof of service delivery may include reduction in fraud, governmentfunding requirements and care and support requirements.

These data points can include audio, video, and other forms of data asshown on Data Obtained through Multiple Modes 911. Requirements caninclude having video or audio on certain activities. The activitiesrecorded for video may include walking, turning around, facialmovements, eye movements, running, raising of an arm, and eating. Theaudio recorded activities might include counting numbers, pronouncingnames, vocalizations, breath sounds and answering to questions. This canalso help create comparative points for data analysis.

Other Information Requirements 130 shows that part of the requirementsfor data collection may be based on requirements or objectives of theagency which provides services to an individual. The agency may havegoals which include staff oversight, proof of service delivery, orefficient use of resources. There may be certain forms with specificdata points for which information needs to be collected to maintaincompliance with the agency policies. In one embodiment, the forms anddata requirements can be established by various entities or people otherthan the individual but the data collected against these datarequirements may be directly from an individual.

Funding Agency Requirements 127 shows that a funding agency may haveinformation requirements. These can include proof of service delivery,outcomes, time, location, progress towards achieving a goal andindividual satisfaction. The funding agency might require proof that issimilar to or separate from billing requirements. In many cases thereare separate state, federal, governments, private, non-profit or otherorganizational agencies which can provide funding. There may be data andinformation required by these funding agencies. In one embodiment, theforms and data requirements can be established by funding agencies, butthe data collected against these requirements may be obtained directlyfrom an individual.

Forms:

System Forms and Templates 150 show that the system can havepre-existing forms and templates to assist in the development of datarequirements. These forms can include templates which would only beshared within an Entity Providing Support 250. Forms could also includeglobal templates available in the system which can be shared with otherindividuals or agencies outside the agency. They may include dropdownmenus with choices, radio buttons, and general checkboxes to ensure thatrequired or desired information is generated and received.

The system may also have preset forms or templates for other forms ofdata. For example, there could be preset picture formats which couldinclude limits on size of file, length of video clip, quality of videoclip, amount of movement of the camera or lens, color range, use offlash, distance from camera, number of people in a sequence, use ofdimensions (3D), aperture, camera lens, among other type of formats.

For each of the types of data collection identified in Determine Datafields to query on 160 there could be forms or templates.

System determined information requirements 117 shows that the system canbe designed to integrate with outside devices which could include healthdata capture devices, video devices 921, cameras 927, medical devices,audio devices 922, sensors 936, and other medical data captureequipment. These devices may have their own templates in the device. Thesystem could note these templates as it captures data and information.

Information before Providing Service 196 shows the information collectedwhich helps to make the initial assessments and determinations for whatdata to collect and how to collect. The system intakes an Individual,collects initial data and records any other observation. It is theinitial information about an individual provided by the family,guardians, state, placement office and other forms provided by outsideentities regarding that Individual 2940. There are diagnoses about theindividual that were made previously along with any initial observationsof the individual made by the people who are to be providing services.This is entered into the system to help make initial determinations.There may also be information provided directly by the individual. Thisinformation collectively helps create a starting point for the system tomake decisions on how to collect information, etc.

Determine Data fields to query on 160 shows that Determining IndividualGoals 110, Requirements for Data Collection 120, Other InformationRequirements 130, Funding Agency Requirements 127 and System determinedinformation requirements 117 together provides a set of data fields tocollect.

Data Collection System 170 determines the method of asking questions orprompting information to collect or generate the information.Traditionally information has been generated by asking staff, guardiansor other individuals' questions about the individual. The system isdesigned to determine which mix of a set of modes is to be used togather information directly from an individual, including, but notlimited to Video 921, Audio 922, Picture 923, Text 924, Real Time Video(925), Uploaded Video 926, Monitoring Cameras 927, Person AskingQuestions 928, Multiple People asking questions 929, over cell-phone orother wireless device 930, changing sounds in environment 931, changingvisuals in devices 932, previously generated data 933, Braille 934 toassist the visually impaired, tactile systems 935, electromechanicalsensors 936, body fluids, saliva testing devices, body temperature andchemical sensors 937, audio capture system 938 or other modes which maycapture information directly from an individual. The system may also useany combination of multiple items from this list. For example, audio andvideo can be used together to collect information from an individual.

The system can also combine multiple approaches to generate informationfor asking a question (Generation of Questions 190). There are a widevariety of approaches that the system can use for the people withintellectual and/or cognitive disabilities. For example, for thevisually impaired individuals the system may use a ‘Questions Reader’that would read out the questions generated by a device. In another casefor the individuals with cognitive disabilities who are unable to readtext, graphics can be combined to convey the message. Information can begenerated by systems, phone, audio, staff, case working, family, theindividual, volunteers, other manual or electronic devices or otherappropriate parties. The system can recognize that each of theseentities has a caseload and background. The same question posed bydifferent devices or people might generate different information orresponses. The system can both adjust the questions based on who isasking the questions and would also store information about how thequestion is being generated along with the responses to the question.Aspects of the present invention aim to maximize the ability of careproviders to understand the issues facing these individuals, as well asthe responses given as a result. By creating a question set tailored tothat individual's needs, the embodiment of the present invention canbest obtain and analyze given responses.

The system also allows for the interaction of external data into theprocess of question generation (191). This data could include weather,local traffic, ratings for movies or restaurants an individual mightattend, internet searches, ratings or information on activities anindividual might participate in, and any other relevant externalinformation 440. The system can use that information to tailor questionsin a person-centered manner. For example, the system can look intoweather.com website for the information about the weather and use thisinformation while generating queries for the individuals. This querymight be generated to understand the individual's likings or dislikingabout the weather. Some individual might get annoyed due to raining. Insuch cases, the system could get the information from the weather.comwhether it will be raining today or not. If there is possibility ofrain, the system can notify the staff to take special care of theindividuals who do not like rain.

As shown by reference 911 in U.S. Pat. No. 8,281,370, data may be storedin the system's storage array. Access to information is based oncaseload(s) and defined access roles (See FIG. 27 ). The documentationcan include the information on caseloads, tracking, storage, and taggingas discussed in U.S. Pat. No. 8,281,370, including but not limited tothe discussion Col. 5, line 21—col. 7, line 32.

Real Time data collection 135 shows that the goal or objective of thissystem is to collect person-centered data in as close to real time aspossible. With the collection of a broad based set of real time data,the access by caseload and super role can be significant. Theconventional approach has been for human beings to review data, videosand other information. This required giving access to staff or others tobroad caseloads of individuals. In this system by providing a systemwith a caseload and the ability to review information as if it hadcaseloads for different individuals and of different staff theninformation viewed can be treated as if viewed by a system with anappropriate caseload and marked as viewed as such in each individualsfile.

Generating Information through pre-existing method 145 which may besystem generated forms and templates shows that the system processes thedata. Initially the system stores the data. After the data is stored inthe storage array, the data can be processed, mapped and analyzed. Thesystem can create a query or series of queries to attempt to askquestions which will generate information. Based on the informationavailable in the system, the system attempts to appropriately providethe optimal combination of generating accurate person-centeredinformation while minimizing the cost and time required to answer thequestion. The system can generate the queries in any of the methodsdiscussed in Data Collection System 170 and Person Centered DataCollection Approaches 180.

Initial Inquiries:

When an individual is first in either the system or in an EntityProviding Service there is often a relatively limited amount ofPerson-Centered Data about an individual. In that case the system couldcreate initial queries or approaches to gathering information based onmore generic approaches to information based on typical information forother people with the same condition or set of displaying conditions ordiagnoses. As additional information is gathered through the process,the queries could be tailored more to Individual based on their specificinformation and data. There could be a continual process of reviewingthe analysis and queries which lead to more information and moreanalysis.

System Generated Inquiries 155 shows that the system then processes theanswers and attempts to generate the next query, intervention or nextrequest for information. In some cases there might be preset templateswhich generally walk through a set of inquiries or queries.

Mapping Information into Forms 165 shows that the system analyzes theinformation which has been collected using various methods and makes thebest match it can to fill out required forms. The system can still storeand maintain all of the pieces of data which went into trying to matchthe data requirements.

Notifying and Providing Access 172 shows that the system can notifystaff, guardian, government officials and other people with appropriateaccess privileges about the information on individuals generated onforms and data fields 1940. The system can also provide proper access onindividuals to staff authorized to view their information throughappropriate caseloads and super roles.

Monitoring and Analysis of Information 175 shows that the data storedinto the system is monitored and analyzed. The analysis of data receivedusing different methods (170) can be performed by the system or by humanbeings. In each case access is defined by caseload and role. Activity ismonitored and logged in an activity tracking log 2810.

The system can use algorithms and formulas to interpret the intent ofthe individual's information. This information can be checked againstprevious information provided by the individual and mapping can beperformed for consistency, errors, possible fraud, possible abuse andneglect, and other issues which might arise.

Once data has been viewed by the system as part of this analysis, it maybe recorded as ‘viewed’ or ‘read’ or with some other appropriateannotation in the database to indicate that the data or information hasbeen viewed.

The system may have multiple accounts based on different caseloads andsuper roles to indicate when it has viewed or acted on information atthe time of the viewing.

For example the set of caseloads and roles of the system might replicatethe roles that an individual staff, guardian or other human might have.Then the system can perform certain analysis to detect fraud, abuse andhealth assessments, or other issues. Since the system can view thesepieces of data or information, there is real time documentation that ananalysis had been performed according to a certain set of rules orprotocols. Only people with proper access to those caseloads and roleswould be able to see that the system accessed that information andperformed that analysis.

People with appropriate caseloads may be able to provide necessaryinformation which may differ from information provided by other staffunder different circumstances. The system can store this information forreference and analysis in order to generate answers and filling outforms. Stored data can be available for review with appropriatecaseloads and access. If information from multiple users for anindividual show a disagreement on a set of facts, the system can analyzethe data combined with other information it has from sources includingexternal sources and data collected in the system 185. The system canmake a determination on the most likely correct set of facts. The systemcan also reanalyze previous facts in the system in light of having tointerpret or remap data in this instance as multiple people may have haddisagreement on information. This could be an indication that other dataand information needs to be reanalyzed. If data is re-interpreted, thatcould mean that forms need to be changed or other processes andprocedures need to be revisited 195. The system can determine ifdecisions were based on a given set of information.

Many agencies are required under HIPAA, HITECH, funding requirements,state or federal laws or policies of the Entity Providing Support 250 toperform certain analyses within certain periods. Having these analysesperformed by system acting and documenting like a human being couldallow proof that these analyses were documented. The system can functionas an electronic staff member, robot, drone or other form of automatedmethod to carry out tasks and supplement or replace an individual staffmember or other person. It may not be sufficient to show that theinformation was in the system. It may be required to document that theanalysis was performed by an entity (in this case a system rather than aperson) with sufficient rights under roles and caseloads to do theanalysis.

Depending on caseload and role, the system also has the ability toreanalyze and reinterpret previous mapping and interpretations of pastdata and information as shown in Reanalyzing old data based on new data185. The system might have the option to take other individualsexperiences into account or if the system notices any inconsistencies orchanges required, the system can add a follow-up or changed commentbased on the new analysis. The system can also flag or providenotification to people who had a proper caseload and role for thechange.

Reinterpreting information and mapping 195 shows that after comparingand reanalyzing the responses of the individuals received underdifferent circumstances, the system might change the interpretation ofdata while the original raw data and past information still available inthe system. Since all the information is stored, the system canreanalyze the data collected using different methods and generate formswith the data having the best possible match.

The system can reanalyze the need for information 197 if there is amismatch after comparing old data based on new information. The systemcan also reanalyze the goals and objectives of the Individual and datacollected from the Individual or the surroundings of the Individual.

Currently and historically analysis may occur by individuals orcommittees (such as agency human rights committees, risk managementcommittees or incident review committees) which meet periodically toreview information. Under this system, the analysis could occur in realtime by the system directly from information provided by an individualas shown in FIG. 10 and the environment. This accomplishes severalobjectives. The information is gathered directly from the individualwith a cognitive disability; multiple types of information and data maybe used in the calculation; and information can be saved so the data isstored in a real time manner, so even if an interpretation is changedlater, the data was still created in real time. There is also theability to create caseloads which are theoretically possible but couldbe quite difficult to create in real time.

As indicated in Submitting information to government and other entities168, government and other entities might want the ability to view dataacross multiple agencies. A state director or state head of nursing orother senior positions which have access to data across organizationscould want the ability to have analysis done. This is historically timeconsuming and resource intensive. With this system, the analysis couldbe possible in a manner consistent with maintaining the privacy of dataand respect for the individuals. By the system performing the analysiswith caseloads and roles ranging from access to one individual to havingaccess to up to all individuals in the system, it is possible todetermine information including fraud, abuse and neglect, and othertypes of objectives. The system can generate forms based on the analysisof all the information stored in the database. It may then be able tosubmit these forms to governments and other entities.

In addition, because the system is aware of staff and others caseloads,the system has the ability to notify proper people who should be madeaware of the situation as shown in Notifying and Providing Access 172.When the analysis is done by staff, such notification of issues may onlyoccur when the care provider takes the time to do so. Even when staffhas time and effort to provide notification, there can also be otherissues such as confusion on who should be notified for a givensituation.

The system can also determine who should have known about a situation.Because of the access to caseload and role information in the system,the system may allow agencies to determine who might have had access toinformation to make a determination and also help prove who might nothave had the information. This allows for a higher level ofaccountability on the part of service providers than exists currently.

There are many cases where staff, guardians, administrators orgovernments is accused of knowing certain information and not acting oninformation that they were aware of. This system can enable an EntityProviding Support 250 to establish the system under proxy caseloads androles to see what information they might have known based on theinformation they could have had access to.

Oversight

FIG. 2 illustrates the data fields information can be collected on.Information is required for a number of objectives. Information can beused for a number of purposes and analyses. These include the need tocomply with Funding Agency Requirements 127 including Federal 261, State262, Local or County 263, and other government jurisdictions oragencies. The government or funding agencies may require thisinformation for a variety of purposes including funding reimbursement,awards of new contracts, maintenance of contracts, auditing ormonitoring of supports provided to the individuals. These requirementsmay be derived from regulations, laws, websites, policy announcements,accumulated domain knowledge or knowhow, published forms, speeches,meetings or other means of generating requirements.

Federal agencies can include the Department of Health and Human Servicesunder which the Centers for Medicare and Medicaid Services (“CMS”)operates. The Office for Civil Rights which is responsible for HIPAAregulations operates under the Department of Health and Human Services.It can also include the Department of Education which is responsible forpolicies and procedures regarding Special Education.

In many cases data fields can be determined based on mapping orrequirements to specific forms required to be filled out. There are anumber forms or applications are available in the system for which thesystem can determine the data fields. These forms available for theentities that provide individual supports include T-Log or shiftingnotes, Individual Data, Emergency Data, Individual Home Page, GeneralEvent Report (GER), Witness Reports, Behavior Plan, Behavior EventRecord, Individual Service Plan (ISP), Global ISP Template Library,Individual Plan of Protective Oversight and Safeguards (IPOP), TimeTracking, Advance Directives, Secure Communications (SComm),Management/Event Summaries, Demographic Report, T-Note, Calendar,Activity Tracking, Notification 3010. The system has detailed electronichealth records of the individuals that include Appointments, Lab Tests,Vital Signs, Blood Glucose, Immunization Records, Infection Tracking,Height/Weight, Intake/Elimination, Menses Respiratory Treatment,Seizures, Skin/Wound, Medication History, Consultation Forms, HealthCare Reports, Monthly & Detailed Reports, Medication AdministrationRecords (MAR), Allergy Profiles, Advanced Directives, Diagnoses List,Health Passports, Care Plan (3040). The system has a number of formsthat have been designed to collect billing information, includingService Authorization, Billing Record Entry, Attendance and the claimsubmission through Electronic Billing 3060. The system also has theindividual's financial transaction form that records all the detailedinformation about the expenses and deposits 3050. Along with theindividual specific forms the system has the Staff Scheduling 3020 andTraining Management System 3030 applications that record detailedinformation about staff members on their work hours, trainingcertifications, due/overdue trainings and training requirements.

There are many required forms in order for agencies, governmententities, or jurisdictions to establish and document the goals. Theseforms record data about the Intake and Referral 3110, OversightDocumentation 3120, Multi Provider Reports 3130, Case Managements 3150and Individual Budgeting 3160. This data is available for analysis bythe funding agencies as shown in FIG. 24 , Data Available for Analysisfor Funding Agencies 2410.

Data may also be required based on the information found whiledetermining individual goals 110. The goals and objectives can bedetermined based on the person-centered information about the individualdiscovered during the planning process. For example, abilities, skills,preferences, relationships, health, cultural traditions, communityservice and valued roles, spirituality, career, challenges, needs,pertinent clinical information, or other information that affects howsupports and services can be provided. The Individual Goals andObjectives in ISP 210 include the individual's expected outcomes thatare derived from the person-centered information. The goals inIndividual Service Plan can also be based on the information found inother documents or plans including the Service Authorizations,Individual Plan of Protective Oversight, Risk Management Assessment andPlan.

Individuals may not be able to express themselves verbally to match theforms and questions in the goals. The system may allow an individual toprovide a variety of responses and information in helping an entityproviding support, staff, government entity or the system to create aperson-centered set of individual goals leading to targeted outcomes anda plan. Using the person-centered Approaches 180 and the Data CollectionSystem 170 the system can capture a set of information that allows anindividual more input into the creations of their person-centered orcognitively appropriate plan and person-centered documentation. Thesystem can directly store the individual input information and allowsreinterpretation and remapping of the data in the future while stillhaving the original data in the system at the same time.

Individuals can each help create and determine their own individualgoals so that the individual service plans reflects the person's needsand preferences. If the person is not satisfied with the services, theindividual may choose to modify the services according to his/her needsand preferences. Therefore, data may be required to help determine theProof of Positive or Negative Individual Satisfaction 215. Theinformation about the individual's satisfaction can be determined basedon the information about individual goals identified by the individualsand the records of service delivery. The system has the informationcollected by generating questions that are related to the servicesrequired to achieve the desired goals of the individuals. The system mayuse the person-centered Data Collection Approaches 180 to determine howto collect data that may help create person-centered documentation. Thesystem may compare these records to analyze the progress of theindividual towards the desired goals and interpret the informationreflecting the individual's level of satisfaction.

Accessing Data

Data may be needed as the Proof of Service Delivery 225. The system mayuse the information about the service delivery available within thesystem including audio, video, pictures and responses collected usingsystem generated queries. While generating the information about theservice delivery the system may require collecting information about theindividuals' identification information to ensure that data has beencollected for the correct individual. It also requires theidentification information about the staff involved in service deliveryand data collection. The system may use the information about each ofthe queries to determine if the appropriate service has been deliveredto the individual.

The proof of service delivery is needed to determine billing proofrequirements 120 and to comply with the determination of Funding AgencyRequirements 255. This information is also as the proof of performancevalidation for an Entity Providing Support 250, staff, or other entityrequirements 130 to proof an Entity Providing Support 250 has compliedwith their contract or oversight. Examples of data fields for whichqueries and information may be needed are shown in FIG. 30 . The fieldsinclude demographic data, electronic health records and other types ofinformation.

Data may be needed to prove the time of when something occurred as shownin the Proof of Time 230. The system may use the time of when the queryhas been generated, when service has been delivered and when the datahas been collected. If any service documentation requires a staff tosign off or review or if any staff makes any changes to the record, thesystem may also need the time of when the record has been reviewed orupdated. The proof of time is needed to determine requirements forBilling 120 or Funding Agency 255.

The Entity Providing Support 250 represents the agency or group orperson is providing support to an individual. This support may beprovided by the government. In many cases governments directly providesocial services. In other instance either non-profit agencies orfor-profit agencies can be established to provide various services andsupports. The for-profit or non-profit agencies can receive fundingthrough a mix of sources including government contracts, insurancereimbursement, family funding, individual funding, and other places thatcould pay for the services and supports provided. The Entity ProvidingSupport 250 can also be a family or family member. In many cases familymembers provide supports and help to other family members. In some casesthey are reimbursed by government agencies, insurance companies, otherfamily members, or other places outside the family, and in some casesthe family provides support or services at no cost or with noreimbursement. There are other volunteer groups, good Samaritans, churchor other religious organizations, or other types of organizations whichmay utilize the system as part of providing supports and achieving thegoals outlined. There could be instances where the Entity ProvidingSupport 250 is the individual himself or herself who may access thesystem. The Entity Providing Support 250 can be any grouping ororganization or one or more people who or which utilize the system. Thesystem may require data fields based on the requirements of one or moreEntities Providing Support which are determined by the system as shownin 245.

The location that something occurred at may be required as the Proof ofLocation 235. The information about the location where the service hasbeen delivered or the data has been collected can be determined usingGlobal Positioning System (GPS) or by generating queries. The proof oflocation is very useful to analyze any undesirable event that occurswithin the Entity Providing Support. In such cases, the specificlocation of where the event has occurred is useful to analyze the eventand report on these events. This information can be used to determinerequirements for Billing 120 or Funding Agency 255.

Data may be needed as the Proof of Outcomes 240. The outcomes are usedas part of the Individual Goals and Objectives in ISP 210. They can alsobe required as Proof for Billing 220 or performance of Entity ProvidingSupport 250 functions for Funding Agency Requirements 127. The proof ofoutcomes can also be used to measure and prove state Medicaid Assurancesto Federal Authorities such as the Centers for Medicare & MedicaidServices (CMS). The funding agency may require data to determine theindividual budget for a specific service. To do so, the system may havedata fields for creating service authorizations, defining services andthen determining individual budget amount for a specified budget period.

Data may also be needed to help determine the Staff Goals 246. Thesystem may record the details of the staff members' goals and objectivesas well as their training certifications, training requirements. Thisinformation can be useful for determining requirements for EntityProviding Support 250. The system may require the data fields asrequired by the Surveyor 236 who may review or monitor the supportsprovided to an individual need to be captured by the system. Thisinformation is needed to determine the requirements for billing 220 orFunding Agency Requirements 255.

The system has a number of templates, sample and information about thegovernment jurisdiction requirements and also for individual diagnoses297. For example, to report an incident the template state form needs tobe filled in as per the state requirements. To obtain data for theemergency fact sheet containing demographic, medical, contact behaviorand other information about an individual the system may have templateform that has been designed according to the government jurisdictionrequirements. As a result the system may need to determine appropriatedata fields to query on.

In some cases, there might be some undesirable outcomes for theindividuals. In such cases, the system may need to determine the Datafor Undesirable Outcomes 275. The system may determine this informationby analyzing the responses captured directly from the individual. Theinformation about the surroundings and the people involved with theevent may be needed along with the detailed information about theincident occurred. If any injury occurs, the system may need to reportthe event with the details of the injury including injury type, injuryseverity, a picture of the injured body part, the cause of the injuryand the treatment provided to the individual. In order to determine thecause of the event, the system may require to collect information inmultiple manners to report and also to analyze so that preventivemeasures can be determined for the future.

Data may also be needed for analysis to prevent undesirable outcomes285. The system could collect information about the individual thatmight cause negative impacts on the individual's health or welfare. Forexample, the individual might have allergies to nut flavor and thisinformation needs to be collected by the system as this may harm theindividual's health conditions. This information can be used foranalysis on determining steps to be taken to prevent harm to theindividual. Data to prevent undesirable outcomes could useful to preventa number of undesirable events. These include Abuse 291, Neglect 292,Incident 293, Injury 294, Rape 295, Client-Client Altercation 298,Molestation 299 and other Undesirable Outcomes 296 which may includeSuicide. This information about the undesirable incident may also beneeded to report the incident. It has been represented in the IncidentReport Data 290. The system may require the details of person who wereinvolved in each event including the person who reported the event, whowere notified about the event, who reviewed or sign off the report, whowitnesses the event. The system may record the video or audio clip ofthe event as a backup information which can be used for analysis.

Transfer of Information

FIG. 3 illustrates embodiments of the Information Flow Process.Referring to FIG. 3 , Information can be received from multiple places,people, modes and formats as shown by FIG. 9 . Once the data is in thesystem it can be viewed, analyzed, read, interpreted or used based oncaseloads, roles and objectives. Once data is stored, the system cananalyze the information using point scoring method, regression analysis,outcome or input based triggers or other forms of analysis (See FIG. 8). After analyzing the information the system may interpret the resultsto determine the possible outcomes. This information can be analyzedfurther and mapped with other information if reinterpretation is neededin the future.

The new data as in New Person-Centered Data 305 which is collected bygathering information from an individual under a particular set ofconditions. The system can also gather non person-centered data toanalyze individuals' responses. The Non Person-Centered Data 306 couldbe information on weather or a plot of a movie which an individualattended. For example, if an individual watched a movie where acharacter performed a certain action and then after the movie theindividual had a behavioral event record which included that similaraction or set of actions, the fact that they had just seen a movie mightlead to a different interpretation of the reaction by the staff oragency. If the individual had not exhibited this action previously,knowing that it was in the movie might cause the reaction to be to avoidfuture similar movies or take precautionary measures if similar movieswere attended, rather than treating this as an action which needs anescalated response. In addition, action could be taken to train staff ontypes of movies to take individuals to or how to prepare in advance forpossible reactions to movies. In this case the plot and actions of themovie could be considered as Non Person-Centered Data 306 and theinformation might be received from an online movie database. The systemcan combine the Non Person Centered Data with New Person Centered Dataand/or other person centered data that could provide a differentinterpretation and analysis. Non person-centered data 306, AgencySpecific Data 308 together with the old data shown in Access to Old data330 which was previously stored in the database can be combined to beinterpreted either by the system (System Interpreting Data 310) or byhuman beings (Human Interpreting Data 315). The system performsnecessary analysis of data, compares new data with previous data, andmakes reinterpretations if required. Reinterpretations might be neededfor several reasons. These could include a request for reinterpretationby a human being who performed an analysis, was in an oversightsituation, had new information or had other reasons to request areinterpretation. For certain events, there could be flags set to doreinterpretations after a predefined period of time after an event suchas death, abuse and neglect, after an individual goes missing, or othertriggers. For such cases, reinterpretation is done by the system afterthat period of time.

A reinterpretation could also occur as the system becomes aware thatthere is new information or new data related to this person orsituation. This could include new facts for the situation. Areinterpretation might be needed to analyze how to view these certainfacts. For example, the individual might be using an assisted technologydevice which broke and the assumption was the individual broke thedevice, which led to other conclusions. But then information is foundfrom other source that another person broke that device. That couldprompt a reinterpretation. There could be automated analysis going on bythe system looking for broader correlations and changes in assumptions,patterns, regressions and correlations. A reinterpretation could occurautomatically or randomly as the computer is processing large amounts ofdata. The reinterpretation could also be inaccurate or changed againlater. For example, there could be instances where all interpretationswould say there is a 52% chance that something meant X and 48% chance itmeant Y. After further analysis with new information, the system couldreinterpret the original raw data based on new information and come tonew conclusions. Additional reinterpretations might be needed in thefuture depending on the situations. As the original raw data remains,the documentation can be considered to have been done in real time orcontemporaneous with an event or activity even when an interpretation orreinterpretation occurs at a later point. The system then maps thisinformation into the predefined forms and templates and submits theseforms to government or other agencies for jurisdiction. Human beings mayaccess the system based on appropriate caseload and roles and allactivity can be tracked and logged. They can review and compare betweenthe new and old data and reinterpret information if there is anyinconsistency in data.

Abuse and Neglect

One significant issue with people having cognitive disabilities is abuseand neglect as well as exploitation and mistreatment. There have beenmany reported incidents and issues of staff members, guardians or otherscausing harm to an individual through abuse and/or neglect. This systemcan provide a means of automating the detection of abuse and neglect aswell as reducing the potential for future abuse by analyzinginformation. By using information directly from individuals (See FIG. 10) with cognitive disabilities in real time combined with access toreviewing data across multiple caseloads, the system could alert someonewith proper caseloads when an increased possibility of abuse and neglectarises. The system could also take certain actions to attempt to preventor minimize abuse and neglect based on the information in the system.

If the system determines a potential for abuse and neglect 340 thatreaches a determined threshold, a notification could be sent only tothose-staff that have the proper set of caseloads and roles as indicatedin the notification for abuse and neglect 345. The notification could bebased on who would have had access to the information to make thisdetermination. For example, if a staff member providing support at oneentity had been involved in an abuse and neglect allegation, and asituation was occurring at a separate entity providing support wheresimilar antecedents were occurring, the system might not be able to justnotify the staff at the second entity. Because in doing so, it couldcompromise privacy or information regarding the abuse and neglect whichis a possibility or allegation at the first entity providing support.However, a staff member of a third party entity or organization orProtection and Advocacy with proper caseloads such as a stategovernment, oversight agency, legal system, or other identified group ororganization, might be notified with this information and take actions.

There are certain items which could be set up to generate certainbroader reviews for abuse and neglect, positive or negative outcomes.This could include death, starvation, physical abuse, restraints,financial mismanagement, theft, fiduciary abuse, molestation and otheritems which could require protection and advocacy. Some of this listcould be generated from governmental regulations, policies of the entityproviding support or other external rules. This list can be generated bypeople (including individuals with disabilities, staff, family,caregivers, volunteers, guardians or others) or by the system. Itemsgenerated by people or the system would be those items which people,agencies, government regulators or others could determine require abroader review. In addition, the system would learn over time whichevents or situations might require either a broader review or a laterreview for possible reinterpretation. The review could involve factorssuch as the system doing a larger data review for reinterpretation oranalysis including a broader set of information to process as well asprocessing over a longer period of time. The review could also involve aprompt for human interaction on reassessing the facts andinterpretations in certain situations.

Checking data against other data 335 indicates that system may checkdata received using various modes and methods from individuals, staff,location and others. The system may not necessarily be limited to wordsto determine abuse and neglect. For example, if video was beingmaintained for an individual and the system determined an unexplainedchange in behavior or condition, such as, a person flinching or anoticeable change in the pace of walking from one day or within a periodto another, then that might trigger a review of information. Certainchanges in responses to questions regarding goals and objectives couldalso trigger a review. The system could also compare if there has been achange to the regular temperature of the individual, change of pulserate, change in stress level, hand movements or any other change inregular mannerisms. Depending on the analysis the system could proceedwith further investigation.

Because the system is maintaining a history of information and datadirectly from and about an individual with cognitive disabilities, thereare many instances where potential abuse and neglect might beconsidered. Because the system is caseload based and reviews andanalysis are logged and tracked, there is the ability to have either thesystem or appropriate people notified and flagged regarding a potentialproblem.

If the system determines that there are other issues regarding fraud,abuse, neglect and mistreatments, depression, health risk or suiciderisk, appropriate people can be notified based on caseload and roles. Byhaving the system document its analysis in real time, entities providingsupport can show that they are proactively looking at and reviewingtheir data to avoid fraud and other issues. Because the raw data and theinformation coming directly from an individual with cognitivedisabilities is in the system in real time, if the need to change aninterpretation of the data arises, based on future changes ininterpretation the original data might still be available with originaltime and date stamp and data can be reinterpreted within a significantlyreduced amount of time as indicated in System Reinterpreting Mapping350.

With new pieces of data the system can check for consistency withprevious mapping and interpretations as shown in Consistency Checking320. The system can be set to check for validations and consistency inreal time as questions are being asked. In this case, if there are nochanges in interpretation or mapping the system can continue generatingnew information or the next query as shown in Generating Next Query 360.

The system may have the ability to determine inconsistencies in answersgenerated by individuals, staff and external devices as indicated inDocument Perceived Inconsistency 365. The system is able to factor instaff answers. The system can look for inconsistencies of answers inseveral areas which includes between an individual staff or other personentering data, comparing data from a staff member and from an individualon whom the data is being entered, comparing the data being entered by astaff member in multiple organizations, comparing information entered bya staff member and that available through external data such as weather,traffic and general data available through the internet or other commonsocietal data. Biometric approaches could also be used on staff.

The system can also factor in entities providing support information.Multiple agencies may provide support and have documentation on the sameindividual or individuals. The data could be collected the same way anyother data is collected—and then data can be viewed or analyzed whencombined based on access roles and caseloads. The data can either begenerated automatically by the system directly from individuals or couldbe entered by people (staff, volunteers, family, government employees,etc). The data could be held in a system which allows analysis acrossmultiple entities either because it is in the same storage location orbecause the multiple storage locations have a way to communicate andexchange information and data. The system could have the informationabout all the service providers or locations where the individual wouldbe attending activity programs. The system could also collect and mapall the data concerning the individual who receives services frommultiple entities and analyze individual's progress under each entity.By utilizing caseloads across data from multiple entities there might bepatterns which provide a change in interpretation for certain fields andinformation.

To avoid inconsistencies 325 in mapping information, information iscross checked with that of the previous information stored in thedatabase. Determining the necessity of reinterpreting information 390,the goals and objectives of Individuals are reanalyzed 392, uncertaintyon possible goals 318 are re-determined and information is verifiedbased on perceived inconsistency 380.

System Assigned Caseload 370 shows that one flexible mechanism of thesystem is the ability to assign any possible combination of caseload andsuper roles. This can have many benefits. One use would be to see theinformation and data situation through the caseload and role of specificstaff. This allows the ability to know what they could have and shouldhave known at what point in time. There could be an instance where astaff member took action regarding an individual which resulted in anegative outcome. The system could simulate what alternate action thestaff member could have taken at that point based on informationavailable at the time. The system could also simulate to see if thatstaff member would have had different information to make that decisionhad they been given different caseloads and super roles. For example,Individual A, Individual B, and Individual C are in a location (whichfor example could be a home, a park, or a shopping center) and Staff Shas previously had access to information regarding Individual A andIndividual B because Staff S has access to their caseloads. Staff Smight have taken an action or engaged in an activity which triggered apredictable reaction from Individual C which caused a problem forIndividual A and/or Individual B. If Staff had previously had access tothe caseload of Individual C at the point that decision was made, theoutcome might have been prevented.

In another use of the system, an entity providing support could simulatecaseloads to know what the optimal caseloads are to be assigned based onthe information in the system. Because the system has informationdirectly from the individuals receiving support and also has informationabout how the staff has reacted and functioned; the system can providesuch caseloads. The system can have the history, training and skillsetsof staff as well as information regarding individuals. Using thisinformation the system can predict in advance which mixes of staffmembers and individual caseloads could have positive outcomes.

Staff Assigned Caseload 375 shows that the system can assign caseloadsto staff members who are supporting and providing services toindividuals by providing them broader access. This can enable them todocument information received directly from individuals under differentsituations. Using the electronic documentation tools, the staff membersmay document the data received from an individual. The system can verifythe user's password and other credentials for proof that the person iswho he or she claims to be. The raw data or documentation coming fromthe individuals can also be generated using a variety of methods asidentified in FIG. 10 . Some of the data may not require password if thedata is from video or biometrics or internal devices for example. Evenknowing the source of data does not make the data factually correct.Data can be factually incorrect either intentionally or forunintentional reasons.

There could be issues with staff documenting individuals' responses. Thestaff might miss something while entering data or might not be good atwriting. Sometimes, staff members might try to cover something up andtherefore there exists the possibility of inaccurate data collection.The data recorded by the staff needs to be verified, and the system cando so by comparing other available information which the system gathereddirectly from the individual. If the system analyzes that one of thestaff member is not appropriately using the assigned caseload privilegesor is trying to violate the assigned caseloads, then the system coulddecide what information the user should access and may block access tocertain caseloads if needed. The system might need to reinterpret thedata to verify the accuracy of each documentation. For example,Individuals with varying cognitive conditions may enter data which couldbe considered inaccurate or wrong by other people or even by themselvesat a later time. As the raw data can be stored with date and timestamps, the system can help correlate that data against other facts andhelp determine what interpretation and weight should be given to eachpiece of data.

By using these tools, an Entity Providing Support 250 or governmententity could see the effectiveness of specific staff or an entire entityproviding support. There is an increased movement to outcomes basedfunding and outcomes based approaches. Without significant data it couldbe difficult to determine effectiveness towards outcomes. The system canprovide the government or funding agencies with analytics includingdetailed service logs and reports for the entity where the individual isreceiving services. Using these service logs, the system can alsoanalyze whether a particular entity is providing appropriate servicesthat the individual requires to achieve goals or objective. If theanalysis results in an increase in positive outcomes, the government orfunding agency may decide to continue services for the individual underthe existing entity and may provide funding for the next budget period.Otherwise, the government or funding agency may decide that the existingentity is not providing appropriate services and either suggest that theindividual should be referred to another entity or suggest improvementsin supports.

Data Storage

FIG. 4 illustrates the overview of the system including theinfrastructure and its user community. The Infrastructure 2510 consistsof the Customer 2520, External Interface 2530, Internet 2540, OperationsServer 2580, Application Server Pool 2590, Database Server Pool 2560,and Database Storage 2570. The system has another secondary site alongwith the primary site. All data is replicated in secondary site asbackup 410. The replicated information in the secondary site can be usedto recover data at time of any disaster.

The Public Cloud 440 represents that the system can interact with otherpublic cloud to get the public data. As shown in the figure, the systemmay use the public data from the YouTube, Twitter, TV Guide, Google,Facebook, Weather Channel, etc. This information can be useful inunderstanding the individuals better and knowing their preferences. Forexample, the system may use Twitter, YouTube, Facebook information whilegenerating different queries for the individuals. These queries might begenerated to learn about the individuals' preferences which may includefavorite celebrities, restaurants, food, movie ratings, TV Programs,etc. The information found from these queries can be useful indetermining the supports or teaching methods while preparing the serviceplans.

The User Community 430 represents the entities that can use the systemfor individual supports. These entities may include Family 431,State/County 432, Provider Admin 433, Care Provider 434, Doctor 435, andPharmacy 436. User community 430 may also include staff members,volunteers and anyone else, paid or unpaid, possibly providing private,non-governmental assistance. Data entered by the User Community 430typically can have time and date stamps and IP addresses for informationentered. There can be activity tracking and many other methods ofknowing specifically who and where the information is from. As shown inthe FIG. 4 , the system has compliance with the HIPAA 470, ARRA 471,HITECH 472, and ANSI X-12 5010 473. The system allows users to accessthe system as long as they have a browser installed which supports HTTPS480. As security features, the system has Access Control 481, PasswordEncryption 482 and Session Expiry 483. The users have unique logincredentials where the passwords are encrypted. Using these unique logincredentials users can access the system. The access control mechanismallows entities to setup the user accounts following the entitypreferences. For example, an entity providing support may create a useraccount for a family member with the view access on the documentation.Family member may be assigned with the view only roles which will notallow them to edit or enter new information. The entity administratormay limit their access to create new documentation. People withoutappropriate access privileges may now be able to view the ProtectedHealth Information (PHI) of the individuals that is stored in thedatabase, but they cannot edit or enter new data on the individual asthey do not have necessary roles to create or edit information. Theentities may define a Specific Set of Individual, Program and/orCaseloads 2730 and then assign user accounts with appropriateprivileges. The specific abilities to access a certain application foran individual are defined with roles to access such applications 2720.

The architecture of the system has been designed in such a way that itstores all the data permanently in the database 463 so that data is notlost. The Data Replication 462 shows that the system replicates all datato the secondary site as a measurement for Disaster Recovery 460. Thesystem can track each update made to the original data and archive allthese changes in the database 461. The system also has the ActivityTracking 450 feature that allows users to track each of the activitymade by the users in different applications. The wide varieties ofreports can be generated from the system that includes managementsummaries, multi provider reports, health care reports, and trainingmanagement reports 451. The system can archive the approveddocumentation so that it reflects the exact information as it was whileapproving the document 453. It also retains approver and updaters' namesas it was at the time of approving or updating the document 452. Thesystem may also ensure that there are no Third-party advertisements orpop-ups 490.

For the 24 hour/day, 7 day/week (24/7) Support 420 the system can allowsupport through Conferences 421, Onsite Training 422, Webinars 423,Online Training 424, Email 426, Phone 427 and Live Help 425. This is toprovide the User Community 430 with better experience of using thesystem. For example in the conferences or onsite training, the users mayhave hands-on experience of learning more about the system. They may geta demo user account for testing purposes so that they can know thedetails of the system before they pay for it. To provide better customersupport webinars or online trainings can be designed for the system asdemonstration tools. Users may get in touch with their questions andfeedback regarding the applications. The system can also have anautomated issue tracker tool that can be used to track users' feedback,complaints or other issues regarding the system.

Cognitive Conditions

FIG. 5 illustrates an overview of the cognitive conditions ofindividuals 510 that could be recognized by the system and analyzedfurther for interpreting the information conveyed directly by them or byother sources. The system could work for people with temporary andpermanent cognitive and intellectual disabilities and impairments, justas it can work for individuals in school, children ages birth to three,and for prisoners. Cognitive Disability 520 could include Intellectualdisabilities (including what was formerly called mental retardation)522, developmental disabilities 521, acquired brain injury/traumaticbrain injury 533, neurodegenerative diseases such as dementia 535,mental health 534, Alzheimer's disease, corticobasal degeneration, priondisorders, Parkinson's disease, and multiple system atrophy.

The system could also analyze based on recognition of temporarycognitive disabilities 540 such as from high level of alcohol 541,medical or recreational drugs 542, prescribed drugs 543, stress 544,depression, distraction, tiredness or other more transitory situations549. In these situations, the type of documentation that either a staffmember or an individual can create could be different than usual. Thesystem can determine the difference from the usual pattern since thedata on the Individual and staff is already present in the system. Thesystem could recognize this and interpret this information accordingly.

As shown by Limited Reporting and Cognitive Capabilities 560 the systemcould also be used during parts of Childhood 561 such as Birth to 1 year562, Birth to 3 years 563 and Preschool 564. The system could also beused for collecting data on individuals who are imprisoned 565 andothers 569 living in circumstances when the ability to respond toquestions could be limited and may benefit from the enhanced analysesand processes of this system.

As shown by Limited Reporting Capabilities 570, the system can also beused to document cases or allegations of abuse against students in theschool system 572 or against animals. It can recognize the limitedreporting capabilities of minors 573 and prisoners 571 and meets thedocumentation and reporting needs of such Individuals.

As shown by Verifying information based on perceived inconsistency 380the system may use a similar process to save the information and data inmultiple input formats and then match that information against previousinformation and interpretations generated. For example, if an individualhad certain indications of having impairment from too much alcohol andalso was involved in reporting that an accident or other event hadoccurred, the system can recognize that there were differences in thecondition and intellectual or mental state of the person providinginformation and may treat that information differently than if there wasno indication of heightened level of alcohol. One input to the systemcould be a breathalyzer or other device to provide data. Other inputscould be a camera providing a picture of how someone was walking and thesystem can compare with normal regular walking. Another input could be asound device which can capture differences in the speech patterns of anindividual. In these cases, the system (as indicated in System toReinterpret mapping 390) could compare the pattern with the previousdata collected from a single individual, a group or class of individualsor with the general data from the system. Then the system can performmapping of information as both the old and new information may beavailable in the system.

Data Reporting

FIG. 6 shows an example of a sample data flow for reporting theinformation that can be generated from multiple data sources. The Datafrom Multiple fields 650 shows that data collected can have informationfrom different fields as backup for a single data point. For example, ifthe individuals were asked if they were happy with the service they wereprovided, the response and stored data might include an audio recordingof their answers, a video of their facial muscles and facial expressionand also a simultaneous video of someone else in the room if there was aperception that their response could be influenced by others in theroom. The system might interpret that collection of data as a “yes” or“no” or other response, but the raw data would be available to later onchange the response from, for example, a “yes I was happy” to a “no Iwas not happy” while still having and utilizing the original real timedocumentation. These queries might be asked by a trusted person or staffmember on the video or audio.

Each piece of data is also identified in the database by how it wascreated or collected 610 and stored in the database which can beaccessed by the system and staff with necessary caseloads and accessprivileges on individuals. The system compares individual responsesgenerated from different data fields and analyzes data for mapping 620.While analyzing and mapping the information the system may use the OldData in Database 625. Old data that is stored in the database can beaccessed and compared with the newly gathered information to determinethe best possible match to interpret the individual responses. This mayhelp track the changes in responses from the same individual. If thereare any changes in the response the system may need to generate queriesto find out the reason behind these changes. The system may also useNon-Individual specific data 690 to analyze the information. Using thePublic Cloud 440 the system may get information from external sourceswhich can be used mapped to the individual responses. For example, ifthe system collects the individual response that the individual was nothappy then the system can look into the public data to search for theinformation that might be causing this negative response. The systemmight find from the internet that a plane has been crashed on the daywhen data has been collected. In such a case, the system can analyzethis information further to find out if this is the reason that hascaused this response. The system may generate more queries that might beneeded to analyze this information.

After the mapping and analysis is done, the system stores the all thebackup information and the interpreted information in the database 630.While analyzing the responses received from the individuals the systemalways stores the original responses as backup information. This backupinformation might be used if need arises for remapping and reanalyzingof the responses. The system has the Sample State Form 635 where thedata points have been designed according to the state requirements. Thesystem interpreted responses are also mapped to the appropriate datapoints on the sample state forms. These forms that are filled by thesystem can be submitted as per the requirements of funding agencies orgovernment jurisdictions 168. The system may reinterpret the mapping ofdata based on the information available while keeping access to theoriginal data 640.

A state director or state head of nursing or other senior positionswhich have access to data across organizations may want the ability toanalyze the data. With this system the analysis would be possible in areduced amount of time, utilizing resources in an efficient way and in amanner consistent with maintaining the privacy of data and respect forthe individuals. In the system, the caseloads and super roles can bedefined for each different type of users as identified in the UserCommunity 430. An example is that a caseload could have access toindividual A, or to individual A and Individual B, or everyone living ata home. A super role might be defined for a nurse to enter and editnursing information or an executive director to see all information or afamily member to view information about their family member. Therefore anurse with a caseload of individual A might only see and be able to editand enter medical information regarding Individual A, while an executivedirector might have a caseload for Individual A and Individual B andcould have a range of permissions, including everything the Nurse forIndividual A had.

By the system performing the analysis with caseloads and super roles, itis possible to determine information including fraud, abuse and neglect,and other types of objectives. As discussed in U.S. Pat. No. 8,281,370,Caseloads are the specific set of information that defines whatindividual or program a user can have access to. Super roles arereferred as the privilege that a user needs in order to access aparticular application within the system. The documentation can includethe information on caseloads and super roles, discussed in U.S. Pat. No.8,281,370, including but not limited to the discussion Col. 4, line64—col. 5, line 60, and Col. 12, line 62- Col. 15, line 3.

Analyzing the Caseloads, the system can identify the users who shouldhave access to which set of individuals and programs. Further analysison the roles for each set of Caseloads can be done by the system todetermine whether the users were documenting their services usingappropriate applications or not. This analysis can be useful forauditing to look for any fraud or missing date when data was not enteredby the staff. Since the system can gather information directly from theindividuals or by using non person-centered data specific to theindividual or the situation, the system can always run such analysis andprovide the state or funding agencies with appropriate interpretation.The state may require collecting data from individuals for verificationof proper service delivery, identification and prevention of fraud,abuse and neglect determination and to meet billing and fundingrequirements 660. This information can also be generated by the systemand provided to the state.

As shown in Reinterpreting Data 640, the system can reinterpret data ifneeded depending on the responses received from an individual. Thesystem gathers data specific to an individual from multiple datasources. If the system identifies that there is not enoughperson-centered data for analysis, then the system may analyze datareceived from the family, guardian or other staff providing services tothe individual or make some assumptions based on the Non Person-CenteredData 306. For example, while an individual is on a visit to his/herfamily, the system might not have the video recording or other type ofperson-centered data on whether the individual is taking his or hermedications at scheduled times. The system may look into other datasources for data on the individual's taking medications. The system mayhave the data collected from family saying that they gave medicine tothe individual and thus the system may analyze data from multiplesources and reinterpret if needed. As the initial interpretation can beinappropriate, the system may reinterpret when it becomes aware thatthere is a new information or new data related to the individual or theparticular situation. There could be automated analysis going on, wherethe system looks for broader correlations and changes in assumptions,patterns, regressions and correlations. A reinterpretation could occurautomatically or randomly as the computer is processing large amounts ofdata. The system then starts narrowing down information based on otherinformation and make necessary reinterpretations. The responses may varydepending on the responses directly from an individual or the responsesreceived from staff or provider agencies or from monitoring individualsthrough external devices. Previous responses are stored into the systemand matched with the new information collected and interpretation may bechanged on the basis of the mapping of information. The original rawdata stored in the database may be accessible to the system havingproper caseloads and to the staff with necessary privileges 670.

Information Collection

To determine the response for a single data point the system can use anumber of modes to get the information. Information can be collected inthe form of a question based approach and related response as shown inthe Question Generated Data 601. Examples of methods to ask questionscould be a person asking a question, a system or other device asking aquestion, multiple people asking a question or having a discussion toillicit information, asking a question using braille, tactile, video,system, telephone, voice, audio, pictures, and other approaches where adirect question-can be asked. Even though the system may determine thatthe answer may or may not match what it appears to be, the method ofcollecting data is considered to be a direct question and answer method.The system may document how the question is asked and answered inaddition to the answer and method of answering as shown in FIG. 9 .Another way that information can be obtained is through generalmonitoring of a situation or location. These modes may include video921, audio 922, pictures 923, text 924, real time video 925, uploadedvideo 926, monitoring cameras such as implanted, mobile and fixedmonitoring and sensitive devices 927, over cellphone or other wirelessdevice 930, braille 934 to assist the visually impaired, tactile systems935, electromechanical sensors 936, body temperature and chemicalsensors 937, audio capture system 938 or other modes which may captureinformation directly from an individual to be used as generalsurveillance. The system may also use any combination of multiple itemsfrom this list.

The system interfaces with external devices such as monitoring camerasto take photos of individuals on interval basis 1035. This may help inmonitoring the activities of an individual, behavior exhibited onregular intervals, expressions and attitude. System may also recordanswers of staff responsible for taking care of individuals usingdifferent approaches as shown in 1036. Answers from staff can begenerated using a question based approach or monitoring their activitiesthrough external devices. Staffs may be prompted to answer underdifferent situations and the same question may be asked to multiplestaff members. The responses can then be recorded by the system andcompared with the previous responses. Audio of an Individual can becaptured 1011 and analyzed by the system by comparing the responses withthe other audio from the same individual or other individuals in thesystem. This may record the voice of an individual, loudness of theirspeech, variation in tone or the tremble in their voice on intervalbasis. The system can interpret these voice recordings and providereinterpretation in mapping information.

Information from an individual can be received by capturing video. Thisvideo 921 may provide information to the system regarding the movementof the individuals and any other hidden information which the individualis unable to convey through direct communication. For example, therecould be a distinction between Real Time Video 925 and Uploaded Video926. Video which was uploaded after it was taken could have a higherprobability of being altered or manipulated. In addition uploaded videomight be one of a series of videos which were taken or only a subsetthat has been added to the database. This presents a differentrequirement for interpretation than video which was taken in real timewhen reviewing how to interpret a response from an individual withcognitive disabilities.

The information can also be generated from the Blood Pressure 1037 of anindividual. It can be collected by monitoring the individual on intervalbasis. The data can also be compared with the regular blood pressure ofthe individual to determine if there is any deviation.

Another method of generating information is creating changes in theenvironment and observing the response of an individual. For example,understanding how a particular individual is reacting to changes insounds 931, visuals 932, crowds, light, temperature and weather.Additional methods of capturing data or gathering information includeelectrochemical sensors 936, body worn sensors 937. These can monitorthe changes in body temperature and the presence of any toxic gases inthe environment. As the system can generate analysis in real time 135and adjust questions in real time 155 without human beings seeing dataand reviewing data. Thus, additional questions and information can becreated in a faster manner which can allow more useful real timeinformation generation.

FIG. 20 illustrates ways of collecting data from an Individual withdisabilities. Information can be collected from Individuals directly byimplanting various devices within an Individual or from the devices inthe surrounding of the Individual, all of which transmit informationwirelessly to the system. This helps in collecting information directlyfrom the Individual and where the information is free from any kind ofmanipulation. Information can be collected from devices such as smallchips implanted in the brain 2025 which collect information from theneurological responses. These are messages receiving “information” fromvarious body tissues via the sensory nerves, or those initiating thefunction of other tissues such as organs, muscles, etc. Information canalso be received by the system from the devices in the contact lens 2015and wearable glasses 2096 which enable the system to know what theindividual is viewing and can analyze the data in the surrounding of theindividual. There may also be multiple monitoring cameras in the room2010, 2011 to capture information from different angles. There may bedevices in the braces of the Individual 2080 to identify the food whichis being taken, measure the body temperature of the individual as wellas the temperature of the food being eaten, analyze the stress taken bythe individual while chewing the food and the breathe of the individual.There can be an Arm Implanted Device 2040 which provides informationregarding the movement of the arm of an individual. The system storesdata in the database, analyzes information regarding the intent orreaction of the individual during the occurrence of an event, anddetermines the health condition of the Individual.

Data can also be collected from wireless devices carried or worn by anindividual. There can be cellphones 2020 carried by the individual whichrecord information regarding who contacted the individual, voice tone ofthe individual while communicating with different people over the phone,information on what was being said to the individual and the reaction ofthe individual to statements, all of which can be collected andtransmitted to the system. Medical devices can be worn on waist 2030,devices on shoes 2070 and belt 2075, all of which detail informationregarding the movement of the individual.

There can be other devices in the surroundings of the Individual such asRobot Staff member 2050, Robot Pet 2060, and Seeing eye dog 2090 withdevice on the collar 2095 that may continuously capture data on themovement, facial expression and activities performed by the individualand feed the information into the system. Robot staff or robot pet areexternal devices that collect data on Individuals and feeds theinformation into the system for further analysis.

FIG. 21 illustrates an example of a device implanted in braces togenerate information. The system may record the live video of when theIndividual A with a devices implanted on braces is eating 2105. Thesystem may use the monitoring camera to capture the video including theVideo Recording Time 1511, Video Recording Date 1512, Video RecordingLocation 1513 as dining room. The system may capture the informationabout the food items and also facial expression of the Individual at thetime of eating or chewing the food. To obtain the information about thefacial expression the system may automatically capture the Zoomed inview of Individual A 2120. This information can be useful to determinewhether the individual likes the food or not. The system can alsocompare the expressions of the Individual to determine the likes anddislikes of the Individual. While eating the food, the wireless deviceon braces 2080 can determine the Food Ingredients 2125, AllergicComponents 2130. System may analyze this information and compare thediet and allergy information of the individual already stored in thesystem with the food being eaten by the Individual. The device can alsoprovide the information about the changes in breathing 2135, bodytemperature and stress 2140. The system may provide notifications tostaff once it detects the allergy interaction of a certain food beingtaken by the Individual or take preventive measures immediately. Itmight also check the dietary requirements of the Individual and compareit with the ingredients of the food and notify staff or take possiblemeasures. It may also record the dietary information of the food beingtaken and store it in the Individual's file in the database.

In FIG. 21 a the Recording Live Video of the Individual A While Eating2105 shows that the system is recording the live video when theindividual was eating in the dining room. The system captures the rawview of the Individual A 1514, Video Recording Time 1511, VideoRecording Date 1512, Video Recording Location 1513, and the activity ofIndividual A as Eating 2110. The Zoomed in view of Individual A 2120 canbe used to determine the facial expressions. The sample screenshot ofthe Brace Device Determining Information 2115 represents that whileeating food the brace device can determine the Food Ingredients 2125,Allergic Components 2130, Breathing Changes 2135, Stress 2140.

Detected Undesirable Outcomes

FIG. 7 illustrate an overview on the detection and prevention ofundesirable outcomes. The system collects and analyzes information thatit receives from the current real time situation 730 as well as analyzesinformation already stored in the database 720. The Current real-timedata can be retrieved from individuals within a close reach (data fromnearby Individuals 710) of the individual who is being monitored, fromthe surroundings and location the individual was in (Data fromSurrounding 715), other information retrieved from external or internaldevices (Other Available Information 725) as well as from staff lookingafter the individual and staff surrounding the individual (Public data735) for further analysis and interpretation of data (Current Dataanalysis of Individual 705). In fact, if a system determines, as shownin analyzing and predicting undesirable outcomes 750 that a possibleabuse and neglect situation or a risk could be occurring or might occurbased on the data and analysis available to the system caseload, thesystem can take immediate actions. These actions might include bothalert appropriate persons through a notification system that a problemmight be occurring (Notifying people of undesirable action 760), as wellas cause them to take preventive actions 755 by changing the immediateenvironment of the individual who is at risk of being abused orneglected or in the environment of a person who might be creating asituation of abuse and neglect (Automatically Generated Measures 770).

The system could have a predetermined list of undesirable outcomes thathas to be prevented due to the occurrence of an undesirable event asshown in Data for Undesirable Outcomes 275. One list could be forGeneral or Societal Undesirable Outcomes 1110 which include Abuse 291,Neglect 292, Incident 293, Injury 294, Rape 295, Molestation 299, Clientto Client Altercation 298 or Other Undesirable Outcomes 296. Anothertype of undesirable outcome could be a Person-Centered UndesirableOutcome 1130 which can be determined by using the System InterpretingData 310 and Proof of Positive or Negative Individual Satisfaction 215.One example of a person-centered undesirable outcome would be if there astaff member who has a history of abusing people, there could be asocietal goal of stopping staff who are causing injury or neglect fromdealing with individuals in the future. A rape would also constitute aperson-centered undesirable outcome. A person-centered undesirableoutcome could also be going to a loud party with lots of noise. Manypeople might enjoy going to a loud party at a nightclub. But for someonewith Autism or other diagnosed conditions it could create otherpredictable problems—beyond just not enjoying the noise.

While collecting data directly from the individuals, the system maydetermine that the individual is not happy with a particular service orsomething around the individual was causing disturbance to theindividual at that time. In such cases, the individual might reactnegatively (could be self injurious also) or may cause negative impacton the individual. Such undesirable person-centered outcomes can bedetermined by the system. The list of Undesirable outcomes may alsoinclude Entity Providing Support Based Undesirable Outcome 1150, OtherIndividual 1190 or Property related 1170 undesirable outcomes. Forexample, an agency might be concerned that staff member was using moreexpensive materials for an arts and crafts project. There is no negativeeffect to the individual, but there are funds wasted which isundesirable for the Entity Providing Support 250. Other examples ofnon-person centered undesirable outcomes could involve misuse ofresources or wasting time of staff when there was no benefit to anindividual or person receiving services or funding.

If any change is observed in the regular activities of an individual bymonitoring external devices such as video 921, audio 922, pictures 923and monitoring cameras 927 then those changes can be analyzed andinterpreted by the system. These responses can be compared with theexisting data in the system to identify the changes which may lead tothe detection of undesirable actions.

Once an undesirable outcome is detected, the system can take necessarymeasures. The system could have access 770 to devices which could alertpeople of possible problems. This could include the ability to createnoise, sounds, smoke, alarms, fire alarm, smells, vibrations, anddifferent kinds of lights whose intensity is determined by the type ofabuse and neglect identified by the system. This could be visible ornoticeable to either just the people potentially involved or to theadditional people in the area. The system could also cause certaincontrols to change. For example, doors could automatically lock, accessto rooms or situations could change, water barriers could be created,and others. Many of these changes are part of smart homes, automatedhomes, robots and other security and remote accessing. An innovationhere is that the smart home or automation can be triggered by automatedobservances of an individual with cognitive disabilities even if theperson is giving a response which might indicate everything is alrightor which previously might have indicated that everything was alright.

Smart homes or automated assistive electrical home appliances andservices can be designed for the individuals. The smart home can haveintelligent communication network that can connect the key electricalappliances and allow the system to remotely control or manage appliancesor the ambiances based on different situations. For example, if there isany loud noise outside which may cause disturbance to the individuals,then the system can communicate with the sound system of the house toplay music to change the ambiance and to prevent any undesirable event.If the controller can be integrated with the caseloads based on theindividuals attending an event, Caseload Access 780, the controllermight be able to ascertain what environments or situations were leastlikely to trigger behavioral or other types of incidents or events fromindividuals in the room. In case of multiple individuals being in theplace and having the same stimuli, having a system with a caseload ofmultiple individuals who might be in the same situation could be useful.

Another method of transmitting data to and from individuals is either awearable device 2070, 2075 or an implanted device or chip 2025, 2040inside an individual's body. The appropriate regulations might need tobe followed for approval and ability to implant a device. The devicecould be designed to connect directly to a wireless device which couldthen access the system. This device could send information about how anindividual perceives a situation as well as changes to body chemistryand internal systems. The device could also have access to certainpsychological information. It is possible that the device could haveinformation which is either not able to be communicated by theindividual or which the individual could not be aware of.

In cases where the system can monitor data either internal to anindividual or external to an individual, the system could be aware ofthe heightened possibility of an individual to individual altercation orevent. The system might be able to attempt to stop such an event inseveral ways including sending impulses or other information to thewearable or implanted devices within an individual, notifyingindividuals working or in the vicinity of the individuals, sendinginformation and changing aspects of the environment such as lockingdoors, changing music, changing lighting, and other external stimuli asindicated in Automatically Generated Measures 770.

When requirements or data includes audio 922 or video 921 or monitoringcameras 927 or other modes other than words or numbers, there is apossibility that the audio or video may include information from morethan one individual. For example, if a picture is taken then there couldbe other individuals in the background or other parts of the picture. Ifa video is taken then there could be other individuals in the backgroundor other parts of all or part of the video. These pictures or videocould be of other individuals who could be subject to HIPAA, privacy, orother future regulatory or societal privacy restrictions.

The system could have the capability to redact, delete, change, morph,or otherwise adjust the information included in individual A's filewhile maintaining the original raw information in the system. As thesystem can know who has what caseloads as indicated in Caseload Access780, the system could permit staff and other appropriate people to seeinformation based on their caseloads.

The system may have the capability to limit access to the video with anappropriate note that information related to a particular individual wasbeing withheld to provide protection to another individual in the video.Appropriate staff or oversight agencies could be made aware of thisaction and determination. Information in audio or video files can alsobe shown after removing or blurring individual beyond recognition tostaff who do not have caseload access on them.

System may provide data access to auditors or surveyors as originalinformation is stored in the system. An example could be that a video oraudio is used for proof of service delivery or needed to show thatreimbursement should be made or a service was delivered for individualA. If that video had information regarding an individual other thanIndividual A, then the system could note that additional information isavailable to an auditor or surveyor.

Analyzing Information Collected from Individuals

FIG. 8 illustrates embodiments of the system that determines the methodsto analyze, map or use predictions for the information collected fromthe individuals. The Point Scoring System 820 is one of the methods thatcan be used for analysis, mapping or making predictions. Whilegenerating information for individuals' responses, the system determinesa score for each response following a scoring method. The system maygenerate the score for each responses or data received in various formatincluding Voice 1011, Facial Expressions 1012, Hand Movements 1013,Words 1014, Biometrics 1015, Typing/Keystrokes 1016, Individual Tics1017, Sounds 1018, Touch 1019, Typing Speed 1020, Typing Pattern 1021,Change in Stress Level 1022, Change in Blood Pressure 1023, Smell 1024,Change in Smell 1025, Sweat 1026, Change in Pulse 1027, Pulse 1028,Temperature 1029, Electrochemical Modification 1030, Other actions froman Individual 1031, Facial Movements 1032, Body Movements 1033, BodyChemistry 1034, Photo 1035, Staff Answers 1036, or Blood Pressure 1037.For example, interpreting the facial expressions, hand and bodymovements the system may determine that the individual is participatingin a task with full physical prompt. The system then may put theappropriate score for this response. If the individual is notparticipating in a task and is instead denying, then the system mightput a lower score than before. Analyzing these two different points fora same task the system could map to other data to find out what might bethe reason for lower points. The system may also automatically triggerresponses that the staff may follow while explaining the task next timefor better outcomes.

The Regression Analysis 830 may be used for analysis or mappingindividuals' responses. An individual's responses to the same questionsmay vary depending on the surroundings or the presence of the people. Insuch cases, regression analysis can be used to help the system predictor assume the outcomes from individuals' responses. Many controllers aredesigned to generate queries to learn about individuals' preferences.For example, individuals can be asked what music they prefer, whatcolors they prefer and so forth. However in cases of people withcognitive disabilities they might not be able to express theirpreferences. And they could be more likely to have some sort of event.By tracking different situations where an individual reacted todifferent stimuli including sound, noise, crowds, light, temperature andvisuals, the system may have data to predict how an individual mightreact. Combining that information with other information on separateindividuals might lead to better outcomes by basing activities, sounds,music, visuals and graphics used to generate the person-centeredinformation.

The same questions determined for a particular situation could be askedto a number of individuals. For example, the individuals can be askedquestions in the presence of loud noise and the system could monitortheir reactions. Some individuals might react in a similar way, someindividuals might not react at all and others might have variousnegative reactions due the loud noise. The system may store all theresponses collected from the individuals with a score assigned to each.Using predetermined algorithm the system could predict that there mighthave been a certain number of possible outcomes such as hearingimpairment, increase in stress, heart beat or the level of depression inthe presence of loud noise. Then the system may remap all individuals'responses to these possible outcomes and also compare with theirperson-centered information. This analysis could help the systemrecognize the possible incidents that may occur due to loud noise anddecide the preventive measures to be taken for individuals with variouskinds of intellectual and cognitive disabilities. This information canalso be helpful in times of future analysis.

The system may analyze information in a different manner when theindividuals are in declarative positions at the time of collectinginformation 840. The system collects the information from theindividuals' declarative statements and may use this information to mapwith previous records to analyze. Comparing the previous records thesystem may predict the individuals' preferences. The system candetermine if the declarative is coerced, distorted or otherwise not whatit seems to be. The individual might state that he/she would like tolearn cooking and the system can remap this statement with individual'sgoals and objective data present within the system. If the previoushistory does not match with the current declarative statement then thesystem may analyze the current situation and remap to determine thecause that if the declarative is forced or distorted. Sometimes, itmight be the case the statement means something different, not what itseems to be. In that case the system might reanalyze the information toget the actual information.

By having access to significant amounts of person-centered and personcreated data, the system can analyze and determine the outcomes basedapproaches that can be used to provide real time guidance andassistance. This system may use the method based on Outcome BasedTriggers 850. The possible example of outcome based triggers could befor the individuals with the objective to learn cooking. As soon as thesystem identifies the objective the system could analyze on theindividual's person-centered information to determine the data fields toget detailed information about the individual that might help theindividual learn cooking. For example, the individual might love to eatsandwiches and to have extra spices in the food. Using this informationthe system may send this message to the staff members who will besupporting the individual for learning cooking. This might assist thestaff to determine the teaching strategy that can be used to achievethis goal by increasing the individual's interest to learn cooking. Inthis way the system may analyze the information to trigger outcome basedresponses.

Another method that the system may use is the Input Based Triggers 860.While capturing information directly from the individual the systemmight analyze the information to recognize the possible outcomes thatthis input may lead to. If there is any potential negative orundesirable outcome detected, the system may trigger real time responsesthat could help the staff to prevent such undesirable outcomes.Likewise, if the system detects that a certain action or environmentalchange would be necessary to help an individual achieve their goals, asignal could be triggered for a response to help that individual. Forexample, an individual may express that he/she would like to havechocolate that would make him/her happy. Analyzing this inputinformation the system could identify that it could lead to a positiveoutcome that might increase the individual's level of satisfaction.However, the system might remap and reinterpret to determine if there isany other possible outcome that may affect the individual negativelybased on this input information. For example, eating chocolates maycause tooth decay and the system has previous information about theindividual's dental diagnosis. In such a case, the system could triggerresponses to notify the staff about the possible negative outcomes thathas been derived based on the input information. The staff might thendecide to not allow eating chocolates or take necessary steps likebrushing after eating chocolates as suggested by the dentist whodiagnosed the individual's dental conditions. Such input based analysiscould help staff to get real time guidance about handling undesirableoutcomes.

There might be some other forms of analysis as shown in 870. The abilityto combine information gathered by caseloads on different people in thesame situation combined with outside information might help reduceproblems in many situations. For example, two or more individuals werein a van and an external data source such as a traffic monitor, awireless device, a website, a person calling in data, or other sourcecan gather information on the individuals. The external data sourcemight recognize that there was unexpected traffic, the system coulddetermine who was in the van and notify the staff or the vehicledirectly based on an analysis of who was in the car. For example, if thesystem knew that a certain individual did not react well to over acertain amount of period in the car, it might notify someone to get theperson to a park or location off the road, while another person mightbenefit from a certain type of music being played.

The Point Scoring System 820, Regression Analysis 830, Method forIndividuals in Declarative Position 840, Outcome Based Triggers 850,Input Based Triggers 860 and other forms of analysis 870 form the set oftechniques for the system to analyze, map or use prediction as shown inMethods for Analysis and Mapping 810.

FIG. 9 illustrates how the system collects information by askingquestions or gathering information using a wide variety of modes. TheData Collection System 170 determines the methods to be used to generatequeries using multiple modes. The Data Obtained through Multiple Modes911 determines the methods to be used to obtain information frommultiple modes of the queries. The queries can be generated in differentmanners depending on who the individual was with, where the individualwas and what the current cognitive state was at the time of datacollection (912). The system may obtain data from multiple fields for asingle data point 650.

The system may use one or more modes as determined in thePerson-Centered Data Collection Approaches 180. The various modes thatcan be used for individuals with intellectual or cognitive disabilitiesinclude Video 921, Audio 922, Picture 923, Text 924, Real Time Video925, Uploaded Video 926, Monitoring Cameras 927, Person Asking Questions928, Multiple People Asking Questions 929, Over Cellphone or otherWireless Device 930, Changing Sounds in Environment 931, ChangingVisuals in Devices 932, Previously Generated Data 933, Braille 934,Tactile 935, Electromechanical Sensors 936, Body Worm sensors 937, AudioCapture system 938.

The Methods to Generate Information 940 represents that the systemreceives information either by prompting or asking questions 941,monitoring the individual continuously using any of the modes describedin 942. The information could also be found from previous records 943.For example, the system may record an event as video or audio clip andthen submit a report on this later. The system could map the report withthe original record and analyze as necessary to generate theinformation.

The system may also activate automatic monitoring based on triggeringparameters present in the surroundings 944. The possible example couldbe analyzing an individual's reaction in the presence of a crowd; thesystem may configure the triggers to capture video when there are morethan 5 people within the surroundings of the individual. The systemcould then analyze, based on the facial expression or body movements inthe presence of other people and could predict the steps the system maytake to support the individual in such cases.

Individual Service Plan (ISP) application can be used to define goalsand objectives for programs designed to help individuals and provideguidelines to be followed to achieve those objectives. The ISPapplication also provides the means to collect and record data to trackprogress of goals set in the Service/Program Plan as shown in FIG. 22 .Once necessary data has been collected, the application calculates theircorresponding scores according to the scoring method specified in theISP and compares them with the baseline scores. The system can getinformation directly from individuals and provide that information tofill in the ISP Data form. This direct method of collecting informationto track the progress of Individuals to achieve their goals removes thepossibilities of any fraud or false information being recorded into thesystem. Besides, the system allows staff to collect ISP data andcompares the information collected from Individuals directly andaccurately fill out the ISP data form. This method of data collectiongets the information to analyze, map, or predict the individual's goalsand also determine the support required to meet the goals 945. Using thescores or responses collected in the ISP data the system may analyze anindividual's preferences for each goal and could determine possibleoutcome for the future. This information might be used for modifying thesupports according to individuals' or funding agency preferences.

Wearable Devices 947 is another method to collect data which may be usedto get real time information remotely, as well as collect data fromindividuals directly and do further analysis. For example, an individualmay go outside the program for a family visit or a vacation or for someevent for an extended period of time. During this stay outside of theprogram, medication needs to be administered to individuals as per theschedule. Wearing an electronic device that can provide medication tothe Individual and feed in the feedback from the Individual into thesystem can ensure proper monitoring of administration of medication ofthe Individual even outside the program.

Another approach to collect information is to use Implantable Devices948. The appropriate regulation would have to be followed for approvaland ability to implant a device. The device could be designed to connectdirectly to a wireless device which could then access the system. Thisdevice could transmit information about how an individual reacts to aparticular situation as well as changes to body temperature, pressureand other symptoms. The device could also have access to certainpsychological information. It is possible that the device could haveinformation which is either not able to be communicated by theindividual or which the individual could not be aware of. The system canhave other data collected from the individual's family, guardian orinvolved staff members 946. This information might help the system foranalysis or mapping.

The questions asked to an individual could be generated using Computer981 which is a processing unit that can determine the queries to beasked to the individuals. The Computer with a Caseload 982 representsthe processing unit with a certain set of abilities on a specific set ofindividuals and/or programs that can generate queries. The Wireless orMobile Devices 983 that are the mobile or wireless devices with theprocessing unit can be used to generate a question. Other modes forgenerating questions can be Staff 984, Family 985, Individual regardingthemselves 986, Other Device 987, Other Individuals 988, and MultipleIndividuals 989. Systems with caseloads or wireless or mobile devicescould generate questions based on predetermined methods orperson-centered approaches. Staff, family members or other individualsmight ask questions from their knowledge about the current state of theindividual. The system could collect all these information so that itcould be used for future analysis. The individual may generate questionsby themselves depending on the surroundings or the questions asked tothem. When multiple individuals are asked questions at the same time,the individuals might participate in generating questions. Thesequestions generated from individuals directly could be useful whileanalyzing their preferences and needs. Single or multiple modes ofasking questions can be used by the system of Generation of Questions190.

FIG. 10 shows how the system can determine individual responses usingthe information obtained from the individuals or the questions asked tothem. The system may generate queries in multiple modes or may obtaininformation directly from the individuals in multiple ways as describedin FIG. 9 . The individuals may respond to the questions or provide datain various modes 1010, all of which are capable of being recorded by anelectronic sensor. These include Voice 1011, Facial Expressions 1012,Hand Movements 1013, Words 1014, Biometrics 1015, Typing/Keystrokes1016, Individual Tics 1017, Sounds 1018, Touch 1019, Typing Speed 1020,Typing Pattern 1021, Change in Stress Level 1022, Change in BloodPressure 1023, Smell 1024, Change in Smell 1025, Sweat 1026, Change inPulse 1027, Pulse 1028, Temperature 1029, Electrochemical Modification1030, Other Actions from an Individual 1031, Facial Movements 1032, BodyMovements 1033, Body Chemistry 1034, Photo 1035, Staff Answers 1036, andBlood Pressure 1037, and any other mode that is utilized.

The system may use one or more format of the response obtained for thesame questions for further analysis. For example, the system may useboth the words said by the individual and information from the facialexpressions on a particular query. The individual may say “I am happy”but the information received from the facial expression might not showthe similar result. The facial expressions can be mapped with other dataavailable in the system to determine if this statement is coerced ornot.

FIG. 11 illustrates an overview on data collection to preventundesirable outcome. Data for Analysis to Prevent Undesirable Outcomes285 indicates that system requires data from individuals directly orfrom individuals in their vicinity or from staff taking care ofindividuals or from the surrounding of the individual to detect thepossibility of undesirable events. System then analyzes this data toprevent the outcomes of undesirable events. System generates variousresponses, compares new data with previous data stored in the databaseand then reinterprets the mapping of information if required.

There may be Entity Providing Support based Undesirable Outcomes 1150resulting due to staff problems or staff reactions or unpleasant staffbehavior and activities or violation of Entity Providing Supportpolicies and regulations 1112.

There may be Person-Centered Undesirable Outcomes 1130 generated on thebasis of the proof of negative satisfaction 215 of an individual forservices delivered to them or actions taken by the entity providingsupport or staff or family. The information about the individual'ssatisfaction can also be determined on the basis of information providedby individuals regarding their goals and analyzing the progress towardsachieving the desired goals of the individuals. The system may use thePerson-Centered Data Collection Approaches 180 to determine how tocollect data that may help create person-centered documentation. Thesystem may compare these records to analyze the progress of theindividual towards the desired goals and interpret the information toreflect the individual's level of satisfaction. System 310 interpretsindividual data by comparing new information with previous informationstored in the database and may generate an interpretation which may leadto Person-Centered Undesirable Outcome.

There may be undesirable outcomes regarding Property or costs 1170 whichmay occur due to damage in property or equipment or any other asset withmonetary value.

There may also be other individual undesirable outcomes 1190 resultingdue to other individuals attempting to cause harm or put others at risk1191. For example, there may be a situation where Individual B mightattempt to harm Individual A and perform certain actions such as gettinghold of a sharp object which may lead to an undesirable outcome forIndividual A. The system could be able to capture this informationthrough video or monitoring camera and map this information andautomatically take necessary measures to prevent the outcome.

The system could take feasible measures to reduce the possibility ofundesired action 770 by notifying appropriate people or staff havingcaseloads on the particular individual prone to the undesirable incidentor through alerting individuals or people surrounding the individual orchanging the aspects of the environment. The system might generate smokeor ring alarms or announce the possibility of the occurrence of suchincident through speakers or change the lighting of the room where theindividual is in or the entire program where there might be other staffand other individuals in order to aware them about the possibility of anundesirable incident.

FIG. 12 shows how the system could determine the information to preventundesirable incidents that may cause problems to an individual. As shownby the Determining Individual goals 110, the goals and objectives aredetermined based on individual's directive and from other entitiesinvolved with the individuals. The system gathers a wide range ofinformation about an individual using methods determined byPerson-Centered Approaches 180. As the system stores all data includingthe original backup of each record, it is possible to access anindividual's previous history through appropriate caseloads. The Currentdata and status of individual 1210 represents the individual informationobtained for the current state. Analysis or mapping on the current dataand status of the individuals with the previous history could be donewithin the system using Monitoring and Analysis of Information 175 andReanalyzing old data based on new data 185. Using the new informationfrom the reanalysis of the individual data the system could predict onlikelihood of problem for the individuals. For example, if an individualhas history of not reacting well to loud noises, the system could beable to predict how the individual may react in the presence of loudnoise. The system could then generate data for preventing undesirableoutcomes 285 which can be used to do future analysis. The system couldlook into the Public Cloud 440 to get information from the externalsources such as outside sensor devices, radio, internet, video, audio orpeople and use this public data to recognize that a neighbor or town hasconstruction permit for a specific date. As the system has previoushistory that noise could annoy the individual that might causeundesirable event, it could notify a staff. The system might sendmessage to the staff with the information to prevent such undesirableevent. The system might take measures such as playing music or lockingdoors or doing something so that the individual could not go near thenoise that could be annoying for the individual.

Varying Responses

FIG. 13 shows how the system could determine the information to preventundesirable incidents that may cause problems to more than oneindividual who is present at the current state.

As shown by FIG. 12 , the system has detailed history of an individualand is aware of such situations that may cause the individual to reactto the particular state. This reaction could have negative orcomparatively neutral impact on the individual's health and welfare. Inthe current environment, there might be two or more individuals whomight react to the same incident. However, the reactions from eachindividual are not necessarily to be same. Individuals' reaction mightbe different based on the situations where they are, how they arefeeling in the current environment or their cognitive state. The systemcould compare each individual's current data and reanalyze with theirprevious history to make prediction on likelihood of problems. If thesystem recognizes that the current situation might cause all individualsto react negatively the system take actions to mitigate the possibleannoyance using data to prevent undesirable outcomes 285. If the systempredicts that one individual could react negatively but other individualmight be neutral, then the system could use its caseload on theindividual to determine the actions to be taken to handle possibleproblems.

If there are two individuals in the current environment with IndividualGoal A Goals 1305 and another with Individual Goal B Goals 1310, thesystem could gather information for each individual for the currentstate as Current Data and Status of Individual A 1320 and Current Dataand Status of Individual B 1330. The system may analyze to determinewhat situation might cause disturbance to them using the Methods forAnalysis and Mapping 810. The system may use the public data for thisanalysis 440. For example, both individuals might be affected with thepresence of loud noise and the system determines that one individualgets annoyed by the loud noise which increases the level of stress. Thisnoise stress might result in migraines or increase risk of depression.The other individual might be disturbed with the noise but it might notcause any harm to health conditions. In such case, the system withcaseload on the individual having negative impacts could notify staff tomitigate noise or cause actions which could help the individual.

System can collect data directly from individuals with disabilities orfrom the responses of staff, family members, friends or otherIndividuals. System may observe an individual under differentcircumstances and may capture information as indicated in Collecting NewData 1401 through video 921, audio 922, pictures 923, cell-phones andwireless devices 930. Data generated from individuals under differentcircumstances are mapped with previous interpretations and arereinterpreted by the system if necessary. These data are stored in thesystem 1405 and the system analyzes these data for mapping andgenerating individual responses in predefined forms and templates.

A challenge is generating the data in a manner which is private, secure,HIPAA compliant and does not treat individuals as human experiments.Because the system can be designed both to focus on the goals andobjectives of individuals with cognitive disabilities as well as havingthe system process information based on unique caseloads, the goal is tohave a reduction in data points needed to create awareness of how tocategorize responses.

When requirements or data includes audio 922 or video 921 or monitoringcameras 927 or other modes other than words or numbers, there is apossibility that the audio or video may include information from morethan one individual. For example, if a picture is taken then there couldbe other individuals in the background or other parts of the picture. Ifa video is taken then there could be other individuals in the backgroundor other parts of all or part of the video. These pictures or videocould be of other individuals who could be subject to HIPAA, privacy, orother future regulatory or societal privacy restrictions. IdentifyIndividuals in data 1410 indicates that the system determines whichindividuals are present in that piece of information based on theinformation already available in the system such as physical traits,height, complexion, hair color, eye color of the individual that helpsto identify the individuals.

If the pictures, audio or the video taken does not include informationregarding other individuals then the system can allow regular access tostaff members with necessary caseloads on the individuals' data 1430.

If the data collected has information on multiple individuals asindicated in Identified Multiple Individuals 1420, then the system couldhave the capability to redact, delete, change, morph, or otherwiseadjust the information based on analysis 1440 included in individual'sfile while maintaining the original raw information in the system. Asthe system could know who has what caseloads as indicated in 780, thesystem could permit staff and other appropriate people to seeinformation based on their caseloads. The system could be capable ofcommunicating instructions to onsite or remote personnel to actintervene with or monitor an individual. This communication could bedetermined by data analysis and immediately occur via, wireless systems,fixed mechanical systems or via mobile, robotic, micro robotic andliving-micro robotic devices and systems. These devices can monitor,communicate data and be available to receive communications from thesystem. The information stored in the system could be made accessible toother staffs depending on the HIPAA, privacy and other constraints asindicated in 1450.

The system can also determine that even with attempts atdepersonalization, the viewer could figure out who the other individualsin a video or audio were. The system could have the capability to limitaccess to the video with an appropriate note that information related toa particular individual was being withheld to provide protection toanother individual in the video. Appropriate staff or oversight agenciescould be made aware of this action.

The system could determine that only staff with caseload access on bothindividuals could view the information 1480. The system could do thisafter an analysis of the relative importance of the information on bothindividuals.

For example, there might be a scenario where individual A is playing inthe park with an additional individual B. There is nothing particularlysignificant about how individual A is playing in the park other than toshow they are having a nice day in the park. In the background andforeground, individual C is also initially playing in the park withadditional individual D. After a short period individual D is seenthrowing a ball at individual C in an abusive manner. The video deviceis capturing the entire scene, and it could not be possible to separatethe video of individual A without including the potential abuse ofindividual C by individual D. The system can detect individuals from thevideo clip based on the information stored in the system, analyze theinformation received from the clip and decide on allowing/restrictingaccess to particular staff. The system could have the capability torestrict access to the video in the file for staff having caseloadaccess only on individual A or individual B. Since the individual C wasbeing hit by individual D, staff having access on individual C canaccess the file and the video clip will be added to individual C's file.The system keeps track of all the incidents happening with and aroundthe individual in each individual's file. In this manner the system canstore necessary information regarding an individual which the individualmight be unable to communicate with others.

The information can be used to analyze the behavior of an individual orhis/her reaction to a particular incident. There might be an incidentthat has occurred to an individual while he/she was playing in a parkwhich can make the individual upset. The reason for being upset may notbe communicated by the individual with other people but since theindividual was continuously monitored by external or internal devicesand the system was tracking all the information, the reason can betraced by the people monitoring the individual.

There might be an incident that occurred with an individual when theindividual was young which has resulted in his/her behavioral changes.There might not be staff present in the agency who witnessed such anincident occurring to an individual to communicate it with other staff.However, since the system can capture and store the information, it canalways be available for future reference. If there is a re-occurrence ofthe same event that once occurred to the individual with some otherindividual or to himself/herself, the reason behind the behavioralchanges of the individual might be traced even by newly recruited staff,as the information about the initial occurrence of the incident wasalready stored in the system. For example, Individual A might have hadsome incident of abuse or violence or any other terrible incidentoccurring to him in the past. One day while individual A is playing withindividual C and individual D, individual D might hit or abuseindividual C which can cause individual A to recollect a past incident.This data can go into the files of both individual A and individual C.System can redact the information on individual C and provide access tostaff having caseload on individual A to investigate the behavioralchanges of individual A by giving access to his/her file. Besides, thesystem stores raw data files, which can be accessed by staff withappropriate privileges if deemed necessary. Similarly, individual C'sfile can have redacted information on individual A so that staff canaccess data on individual C only. The system not only stores data onindividuals for further analysis but also determines the accessibilityto that information.

For example there might be another scenario where video captured on theIndividual A has in the background Individual B playing in the park orwalking. Since the captured information for Individual A cannot bepossibly separated from that of Individual B, so the system couldanalyze this scenario and determine whether to restrict or allow staffhaving caseload on Individual A only to access this information. Thesystem could analyze depending on HIPAA and other privacy constraints asindicated in 1450 and if there is no privacy violation in allowingaccess to the data on Individual B to the staff with caseload onIndividual A, then the information can go into the file of Individual A.Again, if the system analyzes that there is no privacy violation inreflecting the information on Individual A to staff having caseloadaccess on Individual B only, then the information can go into the filesof each of these Individuals and staff with caseload access on eitherIndividual A or Individual B can access this information. Staff havingcaseloads on both the individuals can also have access to thisinformation 1460. As the system is caseload based, it can be possible tofind someone with access to both Individuals' data which means it couldbe possible to ensure that someone with appropriate access can see theactual event without compromising security or privacy.

There could also be a scenario where Individual A is subjected to abusewhereas Individual B and Individual C are also in the video doingsomething of significantly less importance. The system could analyzethis data from the perspective of each Individual and if revealing thedata on Individual A to staff not having caseload access on thatIndividual subjects to privacy violation then the information can berestricted from being accessible to those staff. This information willnot go to the files of each of these Individuals who are part of theinformation captured in the video but can go only to the file ofIndividual A and accessible to those with caseload on Individual A.System could provide a note for informing staff having caseload onIndividual B and C that the information has been restricted from viewingin order to protect privacy policies 1470.

There may also be a case where data collected using video or audio hasinformation on Individual A, B and C. In this video or audioinformation, Individual A and B might be subjected to general abusewhereas Individual C has no significantly important data recorded inthat video or audio. In this case the system may analyze the informationand on the basis of importance could include this data to the files ofIndividual A and B and may restrict staff with access only on IndividualC to view this information. The audio or video footage can be redactedin order to abide by HIPAA and privacy policies and access can be givento staff on the video or audio clippings with redacted information onindividuals on whom they do not have necessary access privileges.

In case where both Individual A and Individual B are subjected topossible abuse, data captured by video can be processed by the systemand information can be added to the files of both these Individuals. Thesystem can provide access to these files to those having caseloads onboth Individual A and Individual B 1470 or by redacting information onIndividual A for staff with access on Individual B and vice versa.

The system could take this action if it was determined that there issufficient information to identify an additional person based on theinformation available in the system. For example, if parents orguardians of individual A saw a situation occurring in a video with adifferent individual who moved and/or acted and/or looked like ahousemate in a situation where only two individuals lived in a house,depending on the relatively sensitivity and importance to individual Aand individual B 1440 the system could disallow access to video or otherinformation on individual A if it provided certain information onindividual B 1470 which is subjected to privacy constraints. The datacould remain in the system if there was an audit or investigation or anysuch purposes.

System may provide data access to auditors or surveyors as the originaldata is available in the system. An example could be that a video oraudio is used for proof of service delivery or needed to show thatreimbursement should be made or a service was delivered for individualA. If that video had information regarding an individual or individualother than A, then the system could note that additional information isavailable to an auditor or surveyor.

FIG. 15 illustrates how the system could capture and store the videofootage for the individuals who are present in the current situation. InFIG. 15 , the Recording Live Video 1510 shows that the system may getinformation from video records on individuals' activities by the datafed into the system by video devices located at different places in anarea. This video recording can be used to record individuals' daily logsor shift notes. The Raw Footage 1520 may be available in the database.People with appropriate access privileges on the individual, whoseinformation has been captured by video recording, may access the videofrom the database. If no one has access privileges on those individuals,the raw footage may still be available in the database. The VideoRecording Time 1511 and Video Recording Date 1512 represent the time anddate of when the video has been captured. This information is fed intothe system which keeps a record of the individual activities. The systemalso has Video Recording Location 1513 that provides information aboutthe location where the individuals were present such as playing room,kitchen or activity room. The information about the date, time andlocation is available in both raw video or the video adjusted based onstaff members' access privileges.

The system can have processes and rules to protect ConstitutionalRights. There are issues both in terms of the right to video as well asaccess to the video. In fact, there may be situations where having thissystem will allow additional minimally invasive monitoring becauseindividuals or others can set outcomes based rules for what someoneshould look at a video (or other data). For example, a video can be setonly to be viewed when someone falls or is hit or certain events occur.An individual or society may then feel more comfortable knowing thatonly in the event of a predefined event can a person see a video. Therecould be an interpretation that having a machine viewing a video andonly reporting in certain events (someone was hit, fell, sound above acertain decibel, or other preset conditions) could mean that the absenceof an alert or absence of notification that something occurred couldstill provide information. Combinations of caseloads and super roles canallow the system to be configured to meet various legal, judicial andconstitutional interpretations. There are various locations where datacan be collected including both public and private locations. Forexample there are features in the system for blurring, redacting andremoving information to help comply with some of these potential issues.

At the time of video recording the system recognizes the identity of theindividual based on the previous information of the Individual in thesystem. As shown in FIG. 15 , the system might capture the videorecording of when the Individual A 1514 and Individual B 1515 are in theactivity room or some other location and playing chess or involved inany other activity. The system could identify the individuals bymatching their face and other physical traits with the previous recordsavailable in the system. Individuals' detailed activities while playingchess or any other game can be recorded live 1516. An individual mightbe present during the activity hour but might not participate in anyactivities. It might also be the case where the individual isparticipating in playing chess (1517) but the level of participation isnot satisfactory. Due to some emotional stress the individual was unableto concentrate in the activity. The live recording can then helpdetermine the individual's level of participation or reason that mightbe affecting the individual's performance. The system could alsorecognize the place where the video camera is located and thisinformation can be used to locate an individual's presence during theactivity hour which could be useful for daily logs or shift notes.

The raw footage of the video recording could be stored under eachindividual's files in the database. Access to the video footage dependson people's caseload privileges on the individual. If no one hascaseloads on the individuals, the system could still store this in thedatabase for the needs that may arise in the future and for people whomight have access to them in the future and need to analyze previoushistory. The video format might be displayed differently for people whodo not have access privileges on both Individual A 1514 and Individual B1515. People with caseload access to only Individual A 1514 and not toIndividual B 1515, might be given access to the video where there isinformation on Individual A only 1530 with Blur Individual B 1535. Inthe video footage the image of the Individual B may be blurred beyondrecognition so that the person who is viewing the footage cannotidentify who the individual is. This is to ensure that HIPAA is notviolated. Similarly, for the people who do not have access to IndividualA 1514 but need to access video footage for the Individual B 1515 theyhave access privileges on, the system could display the footage wherethere is information on Individual B 1540 with the Blur Individual A1545. In the video footage the image of the Individual A may be blurredbeyond recognition so that the person who is viewing the footage cannotidentify who the individual is. The system can edit any recordedinformation. This editing can include blurring (1530), redacting (1560),animating or adjusting access to the information of individuals. Thiscan be done prior to any human seeing the video. All data can still besaved in the raw form if further investigation or audit needs it to berequired. The system can detect the individual to be blurred dependingon the information about the Individual stored in the database. Theinformation may contain the physical traits of an Individual as well asbiometrics, retina recognition, voice recognition.

The system might also remove Individual B rather than just blurring fromthe video footage that needs to be viewed by people with access toIndividual A and not to Individual B. Individual B can be removed fromthe video footage 1555 and there can be data on Individual A only asshown in Video for people with access to Individual A only (RemovedIndividual B) 1550 and people may therefore be unable to locate thepresence of the Individual B. Similar, people with access to IndividualB but not to Individual A cannot see Individual A as Individual A can beremoved from the footage 1565 and could see the footage with informationon Individual B only as shown in Video for people with access toIndividual B only (Removed Individual A) 1560.

In the recorded videos, the system has different combinations of videoand audio depending on what an individual says during the recordingtime. The system has the capability to know the entire transcript (RawTranscript 1590) and to determine who should get access on whichcombination of the video and audio based on caseloads. The system mighthave the option of Video Only where information on either Individual Aor Individual B is redacted 1570, 1580 with written transcript becausesomething is said which might be a problem. These video only modes canhave redacted information on Individual A 1570 or Individual B 1580 toprovide access to people with appropriate caseloads. For example, thevideo record with Blur Individual A 1540 that needs to be viewed bystaff with access to Individual B 1515 and not to Individual A 1514,might not have the audio for the Individual A so that people could notidentify the individual with audio voice. The system has the entiretranscript and if it identifies any statement that the staff needs toknow about Individual B then the system might include the transcript forIndividual B 1585 redacted from the Raw Transcript 1590. Similarly forstaff having access on Individual A can have the video only option withthe transcript for Individual A 1575 only and a redacted transcript forIndividual B from the raw transcript. As shown in FIG. 15 , there mighthave been conversation between Individual A and Individual B whileplaying chess or some other activity having the statement thatIndividual A had hit Individual B. Based on this statement the systemcould determine that there might have an injury incident which the staffshould know about. The system can therefore decide to include thetranscript to the video recording in the file of the particularIndividual so that the staff could investigate this incident further andreport to supervisors or others with necessary privileges.

Incident Reporting

FIG. 16 illustrates the example of how the video recording of anincident can be analyzed for incident reporting. As shown in 16 a, thesystem gets information from the video footage of camera A 1610 andcamera B 1620 which are located at different positions in a room andcaptures information regarding all the details 1516 of that locationincluding furniture in the room such as sofa 1615 and table 1616. Itcaptures data when the Staff S 1614 hits the Individual A 1514 in frontof the Individual B 1515. Since cameras are located at differentlocations to monitor the Individuals, the system may analyze the datacaptured by different cameras and consider data from the camera whichprovides precise information. Using the video recording, the system cansubmit an incident report with the details of the time of when theincident occurred 1621, the person who hit the individual 1660, the typeof abuse 1650, where the individual was abused 1513 and date 1622 of theincident which is required for submitting an incident report. The systemcan determine the notification level based on the type of incident thathas occurred. Staff could also notify the persons who should be aware ofthis incident. The staff might have access to Individual A but not toIndividual B. In this case, the staff may be able to view the videowhere there is information on Individual A only 1550 and the informationon Individual B redacted or removed 1555. The system can take theinformation captured by the video for the Individual A from camera A andcamera B 1635, 1645, analyze the information, submit an incident reportand notify appropriate people with necessary caseloads. The staff couldinform this to the Supervisor who has caseload privileges to access theraw video footage and ask the Supervisor to investigate this incidentthoroughly. The Supervisor might then use the raw video footage 1630,1640 obtained for both the cameras to identify the details of theincident, investigate further and review the incident report filled inby the system.

The system might be able to convert the incident captured in the videoto text description 1670. For this incident, the system might convertthis incident into text stating “Individual A, Individual ***, StaffMember S are present in the video. Individual *** is standing in frontof the Individual A. Staff member S is hitting Individual A. The name ofthe other Individual has been withheld for privacy reasons.” This textcan be used to notify the staff about the incident briefly that hascaseload access on Individual A.

FIG. 17 illustrates an example of how the video recording of an activityprogram can be used for collecting data on Individual Service Planning(ISP) and incident reporting. The Recording Live Video of theToothbrushing Program 1705 represents that the system is recording thelive video of the Toothbrushing program. This recording of activityprogram is not limited to the Toothbrushing Program only. It could beother activity programs such as cooking program, bed making program,hygienic program, laundry program, grocery program etc. Agencies havethese programs to document on and collect data to track the progress ofthe Individuals in achieving their goals. The Live Recording 1516 inFIG. 16 a shows that the system is in the recording mode and capturinginformation from the surroundings. While recording the live video thesystem captures the Video Recording Time 1511, Video Recording Date1512, and also the location where the camera is located as the VideoRecording Location 1513, the system captures the presence of a person inthe location by matching their biometrics and other physical traits. InFIG. 17 , while recording the live video the system captures the rawview of Individual A 1514, Individual B 1514 and Staff S 1614. Thesystem can analyze the raw view of the persons and map with the previousidentification records such as biometrics, retina recognition, and voicerecognition available within the system to identify who the person is.

At the time of Toothbrushing Program the system recognizes all theactivities done by the individuals. In the Toothbrushing Program theindividual may do different tasks as required by the programs. Othertype of activity program may include different set of task andrespective actions. In the Toothbrushing program the actions may includepicking up toothpaste, unscrewing the cap, putting the cap down, pickingup the toothbrush, squeezing toothpaste onto toothbrush, puttingtoothbrush into mouth, brushing teeth, rinsing mouth, putting thetoothbrush down and so on. In FIG. 17 the system captures the action ofBrushing Teeth 1710 while the Individual B was brushing. The system cancollect data for filling in the the ISP Data form from the actionscaptured in the live recording. For example, if the Individual was ableto brush teeth independently then the system could put this informationin the ISP Data form and score this task according to the scoring methoddefined in the ISP Program form. The system can store the Raw Footage ofthe Toothbrushing Program 1715 which can be accessed by people withappropriate access privileges on the individuals who were present at theToothbrushing program.

During the program, the Staff S may hit Individual A due to misbehavingor expressing unwillingness to do a particular task. Since the systemcaptures the live video of the event, it can recognize this staff actionas Hitting 1650 and record the incident as the Staff S HittingIndividual A 1660. The system can also submit an incident report usingthe information about the incident captured in the video recording. Inthis example, in addition to documenting the incident report regardingindividual A, documentation may be required regarding Individual B andthe tooth brushing program. It may be possible to zoom in on IndividualB (1720) to show them brushing teeth and their face without showingStaff S hitting Individual A. That could help achieve the goal ofminimizing access to the knowledge and video of Staff S hittingindividual A to only those people who have the roles and caseloads tosee that. However, the fact that Individual B may associate actions andfeelings from the incident of Staff S hitting Individual A with thetoothbrushing program might or might not affect how they act in thefuture regarding their toothbrushing program.

The system can deal with the incident of staff S hitting individual Afrom a few perspectives. The system could determine which combinationsseem most appropriate based on the analysis performed by the systemwhich may include point scoring method (820), regression analysis (830),method for Individuals in Declarative position (840), Outcome basedtriggers (850), Iput based triggers (860) or other forms of analysis(870). The system can document in Individual B's program a Zoomed inView of the Individual B (1720) which shows Individuals B's reaction andface. The system can also include in the documentation either ananimated, redacted (1560) or blurred piece of video (1540). The systemhas information on multiple individuals and based on caseloads and rolesthe system can determine what future actions may occur.

The system may be aware of which staff have access to both individual Aand individual B and could be in a position to see the full clip fromthe perspective of either individual A or individual B. The system maycontinue to monitor in the future the impact on Individual B. Forexample if the system notices certain behavioral changes in Individual Bregarding their ISP program or other programs or in acting around StaffS, the system can initiate a reinterpretation. The system might look atadditional information to determine a possible cause or explanation forindividual B's future actions.

The results of this could include training for Staff S, criminal actionagainst Staff S, removal of Staff S from Individual B's home whiledetermining that nothing wrong was done, additional therapy or work withIndividual B on specific issues raised by the situation, changes inrecommendations of how to permit Individual B to do their tooth brushingprogram, recommendations that no changes are needed or other possiblerecommendations.

If there is a certain behavioral change in Individual B after Staff Shit Individual A, the reason for that may be detected from the videoclip by itself or in combination with other data and information. Thesystem may allow staff having access to Individual B to view this clipand may provide them with some guidelines on what measures to take. Theactivity of staff C hitting individual A while Individual B was doingits Toothbrushing ISP program may cause changes in outcomes and actionsof Individual B and the system can use this data to analyze andunderstand what happened and then make recommendations on future action.

To understand the individual's′ reaction in such cases the system mayuse the Depersonalized Animated Video 1730. The system may create adepersonalized animated version of the incident reflecting that a staffis hitting an individual during Tooth brushing program. This animatedvideo can be used to analyze the changes in facial expressions anddetermine the individual's reactions in such cases.

FIG. 17 a is the sample of the video footages of the Tooth brushingProgram. The sample footage of the Zoomed in View of the Individual B1720 represents that facial expressions in such zoomed in view can beused to understand the individual's reactions.

FIG. 22 illustrates the process of an automated ISP Data Collection formusing the live video recording of an activity program. In FIG. 22 ,different fields on the ISP Data Collection form has been filled in bythe system using information captured in the video recording. As shownby FIG. 17 , the system can capture the raw view of the persons who werepresent at the Toothbrushing Program as Individual B 1515, Staff S 1614and also the location where the camera is located as the Video RecordingLocation 1513. For the Toothbrushing Program this location is theactivity room. This information can be mapped with previous records toidentify the individual within the system and to locate the ProviderProgram under which Individual B is attending the Toothbrushing Program.Using this information the system can open a new ISP Data form with theSystem Generated Time Data Entered on 2205, System Generated Date DataEntered on 2210, Program Name Determined By System 2215, Time ZoneDetermined By System 2220, ISP Program Name Determined By System 2225.The information about the Data Collection Date, Begin Time and End Timecan be found from the Video Recording Date 1512, Video Recording Time1511. The information about the location can be found from the VideoRecording Location 1513. The system can put the score for each taskdefined in the ISP Program by analyzing the actions in the videorecording. As shown in FIG. 17 , the Brushing Teeth 1710 action can bemapped to the ‘Brushing Teeth’ task of the ISP Program. The system mayanalyze the video to determine the level of the individual'sindependence while brushing teeth and put score accordingly. Forexample, the system has put Full Partial Prompt for the ‘Brushing Teeth’task using the information from the Raw Footage of the ToothbrushingProgram 1715. FIG. 18 illustrates an example of client to clientaltercations by means of a video and audio recording.

As shown in FIG. 18 , the system can record the live video of theclient-client altercation 1801. The Live Recording 1516 represents thatthe system is capturing the information from the surroundings thatinclude the raw view of the Individual A 1514 and Individual B 1515, theVideo Recording Time 1511 and Video Recording Date 1512. The system canstore the Raw Footage of the Client-Client Altercation 1802 in thedatabase which can be accessed by the people with appropriate accessprivileges on the individuals. The system may redact the raw footage1803 depending on people's caseload and access privileges onindividuals. For example, if a staff who has access to the Individual B,not to Individual A may view the Video of Client-Client Altercation forthe people with access to Individual B only (Removed Individual A) 1803where the raw view of the Individual A could be removed or redacted1565. Similarly, the system can adjust the raw footage for the staffmember who has access to Individual A, not to Individual B. In the Videoof Client-Client Altercation for the people with access to Individual Aonly (Removed Individual B) 1804 the system may remove or redact theinformation on Individual B 1555. However, staff having access on bothIndividual A and Individual B can access the raw video footage wherethere is no redacted information. The system can also determine who hasviewed Individual files and the caseloads of those people. The systemcan provide an animated video to hide the real identity of theIndividual but to convey the information at the same time.

Access to the video is determined by caseload and roles. The system cantrack who has seen the data and information. The system may determinethat someone should look at the data and suggest that someone with anappropriate caseload look at the information. The system can look at theinformation and make recommendations and take action. The system mayalso suggest a change in caseload based on its information of people'sroles.

The system may report this incident using the video recording and mayalso use the audio recording to collect more details from thesurrounding which might be needed to report this incident. As shown inFIG. 18 , the Recording Live Audio 1810 represents that the system canrecord the conversation between individuals. The Audio Recording 1813shows that the system is recording the sounds present in thesurroundings. The system can store the recorded audio in the database asthe Raw Audio Clip 1820 which can be accessed by the people withappropriate access privileges on the individuals. While recording theaudio, the system can capture the Audio Recording Time 1811, AudioRecording Date 1812 and store this information along with the raw audioclip. If a staff member with access to Individual A, but not toIndividual B, wants to access the audio clip for Individual A, then thesystem can remove or redact the audio for Individual B.

Therefore, the Audio Clip for Individual A 1830 can be adjusted so thatthe staff could not identify who the Individual B is from audio clip.Similarly, the system can adjust the Audio Clip for Individual B 1840for the people who have access to Individual B but not to Individual A.Depending on the goals and objectives of the analysis the system can usedifferent tools to determine relevant information. In Audio Clip forIndividual A 1830 even with only a portion of the dialog, for examplethe listener can determine that Individual A stated “Don't hit me” and“That hurts.” The system could compare that to previous instances whereIndividual A made similar comments. Perhaps the individual was havingprevious issues with working on speaking up for themselves, and eventhough they were hit it might be significant they spoke up and said“Don't hit me.” It also could be that the staff was trained to step inthe middle after hearing that Individual A said “Don't hit me.” In thatcase there could be issues with staff training. The system can havemultiple methods of analyzing, collecting and reviewing data and it isnot expected that every method will work in every situation.

In FIG. 18 a , the Recording Live Video of Client-Client Altercation1801 shows that the system is capturing the video when the Individual A1514 was hitting Individual B 1515. The system captures the VideoRecording Time 1511 and Video Recording Date 1512 and Video RecordingLocation 1513 as Kitchen. The system also can identify the action ofhitting and store this information in the database as Hitting 1650. TheRaw Footage of the Client-Client Altercation 1802 can be accessed by theperson who has access privileges on both the Individual A and IndividualB. For t people who has access to the Individual B but not to IndividualA, the system may remove or redact the view of the Individual A from thevideo as shown in the Video of Client-Client Altercation for the peoplewith access to Individual B only (Removed Individual A) 1803. Similarly,the system may adjust the video for the people who have access toIndividual A but not to Individual B as shown in the Video ofClient-Client Altercation for people with access to Individual A only(Removed Individual B) 1804.

The system can use multiple methods to keep records of such incidentswhich can be used to investigate the incident. As shown in FIG. 18 b ,the system can record the audio of when the individuals were fighting1810 and store this recording as the Raw Audio Clip 1820 in thedatabase. The audio clip may contain the voice of the persons who werenot captured by the system as they were present outside the range of thecamera. This audio recording can be useful to identify the persons inoff camera. For the people who has access to Individual A but not toIndividual B, the system can remove or redact the audio of theIndividual B from the raw audio clip and store in the files of theIndividual A as the Audio Clip for Individual A 1830. Similarly, thesystem may adjust the Audio Clip for Individual B 1840 for the peoplewith access to Individual B but not to Individual A.

FIG. 19 illustrates the process of creating a form using videorecording. The Incident Report also known as the General Event Reports(GER) can be used to track and record on multiple related events such asinjury, medication error, death, and restraint among others. Otherimportant information such as people notified, corrective action takenand plan of corrective actions can be entered in details. Discovered orobserved incidents can be flagged, notification levels can be specifiedand events can be classified as it should or should not be reported tothe state The system can generate an incident reporting form on anIndividual on the basis of the data collected from video device whichwas located at the place of the incident 1513. There might be differentvideo cameras located at different positions in the room where theIndividuals are in. The system can analyze the position of the videocamera which captures the best view of the incident that occurs. Itperforms the analysis and the mapping of information based on the dataprovided by that particular angle of the video camera. The video devicecan capture live data 1610, 1620 which is received by the system alongwith the recording date 1622, time 1621 and location 1513. The systemcan determine when there is a potential abuse on an Individual from thevideo footage 1930. The system then generates an incident report basedon the information extracted from the video footage with no time delayand notifies people with appropriate caseloads to an immediate effect1940. The System maintains files for Individuals. Data collected fromdevices both external and internal are stored in the system, analyzedand interpreted. The System identifies an individual from video or audioclips using biometrics, retina recognition, voice recognition and otherdemographic identifying techniques. Depending on the type of technologydeployed, the system might be able to send information to the camera ordevice to focus or zoom in on specific individuals. For example theSystem could analyze the most likely cause of a negative outcome orability to create a positive outcome and change the camera focus to bestachieve or document that result. The System could record data and ifthere are multiple people in the video or picture provide access to thesame raw data to each person's files.

For example, there might be a scenario where Individual A 1514 andIndividual B 1515 are present in the living room along with Staff S1614. There might be two video cameras in the living room at differentangles, Camera A 1610 and Camera B 1620 which are recording live. StaffS then starts hitting Individual A which is recorded by both the videocameras. The system can determine which view is clearer 1620 from thevideo footage and records information in the system. The video feeds inthe time 1621, date 1622 and location 1513 information into the system.The system has an incident reporting form where it maps necessaryinformation regarding an incident. The system can generate a timestamp1905 as a security feature to prevent any error or fraud. It can map theProfile information, Event Information, Injury Information as anincident, General and Notification information into the GER form for theIndividual.

In the Profile Information section of the form, the system maps theIndividual name, Program and Site information, Time Zone from the datain Database 1915. System also generates the ‘Report Date’ (SystemGenerated Report Date 1910) in this section of the form.

In the Event Information section, system provides information previouslystored in database 1920 to describe what happened before the event,location address and maps information into the ‘Event Date’ from thedate information on Camera B 1622 and ‘If not at responsible program’field from the Video Recording location 1513 information.

In the Injury Information section, the ‘Injury Type’ data is mapped intothe form from the hitting action 1650 which is captured by the video andanalyzed by the system. The system maps data into the ‘Injury Cause’field by analyzing the data for the undesirable outcome 1930. The systemalso fills in other necessary information in the form from the dataprovided by the video footage.

The system analyzes the severity of the event and generates anotification level accordingly. The system can generate the notificationlevel depending on the seriousness of the incident. That is when thereis a possible abuse the report has to be considered of significantlyhigh importance, necessary actions can be taken by the system andappropriate people can be notified. The system can generate the incidentreport and notify people with appropriate caseload access on theindividual 1940 via mediums such as email, fax, voice message etc. Thesystem may know which staff uses which device and informs the staffthrough that media.

The incident report form generated by the system can be submitted to theState by filling in additional information in a state specificinformation section. This data can be stored in the database which mightbe necessary for auditing purposes as well as for tracking goals andoutcomes and progress of Individuals. Repeat occurrences of a similarevent could show up as additional occurrences using the same templatebut being separate events. The system can have the ability to linkmultiple reports or events which could be tied together. But each eventcould be considered as a separate event as the system could analyze thesimilarities and differences as well as the repetitive nature of therepeat occurrence to determine recommendations.

Implementation

FIG. 23 illustrates a method and system for the implementation andmonitoring of Health Care Plans for individuals. The population ofdevelopmental disability has a higher rate of death from health events,and more serious conditions of disease because they are unable tocommunicate their symptoms. These individuals have ever changingassigned staff who is merely guessing at symptoms most of the time. Theservice employee or workers cannot ask if the individual is in pain,perhaps have a blocked bowel or chest pain or experiencing numbness intheir legs or hands. The facts of constant change in staffing,communication issues, health issues going untreated and misdiagnosed foryears, place these individuals at greater risk. The fact that thesedisabled individuals are frequently seen by doctors however do notappear to necessarily improve their general health care. It is evidentthat there is a need for an automated health monitoring and care systemwhich can reduce need to physician visits, psychiatric visits, which candrive the health care cost to go down and which can administermedications based on pre-set orders and pharmacodynamic guidelines, bothby saving staff, nursing and doctors time and reducing health events.

The Individual 2300 who is the focus of the health care plan is theperson identified in the data, record and subject of analysis. Thisindividual may be a part of a caseload of several people or a singleperson in a caseload. Individual Monitored by the system 2302 indicatesthat the Individual can have transmittal devices, such as: Transmittaldevices 2306, Implanted Devices 2301, Implanted Sensors 2303, ExternalSensors 2304 and other devices to collect and transmit data 2305.

Interactive monitoring devices 2305 shows that the system may use anumber of monitoring devices to both collect information and data forthe individuals health plan: such as Living-Micro Robotic Sensors andDevices 2301, Electro Mechanical Devices, Body Implant Sensors 2303,internal, external and mobile Auto Pumps for fluids, medications,electromagnetic and chemical stimulators, External Sensors 2304, fixedand mobile sensors and monitors, which can both retrieve data anddeliver treatments, medications and stimulate physical, sensory andbiological systems. The health care plan may have services delivered,treatments applied by service providing entities and health careemployees directly or by these interactive monitoring devices based ondata analysis, provide prescriptive plans and standard health carerecommendations. The individual may have data provided by thesemonitoring devices which indicates an alert of a health crisis: such asa heart event, diabetic event, depression, suicide, anxiety, panicattack, trauma, blood loss, infections, seizures or immediate need fortreatment, intervention or evaluation.

As indicated in Monitoring of the Individual 2307, the system canprovide both live ongoing monitoring, periodic, scheduled or per episodemonitoring, based upon the established health care plan and physiciansorders for medications, treatments and other care, however themonitoring schedule may change based on analysis of data and reanalysisof data by the system and the health monitoring may change based onchanges in health status as determined by the system.

The monitoring devices and sensors can collect data on the healthconditions of an Individual and feed this data into the system. Thesedevices can feed data wirelessly to the system using internet, PDAs,cellphones, mobile devices, computers, receivers and transmittal devicesand other forms of wireless devices with the help of a secured format2308. Devices transmit data into the system. The system will analyze thedata and make logical interpretations based on the data stored in thesystem.

The System with Firewalls, Servers and Data Storage 2309 can haveFirewall 2545 to help keep the network secure, Operations servers 2580,Application Server Pool 2590, Database Server Pool 2560 to avoid theoverhead of making a new database connection every time an applicationrequires access to a database and Database Storage 2570. All thesecomponents together can compose the System 2505 which interfaces withthe Health Care Plan system 2326.

The system can manage the individual's data in a secure, HIPAA compliantsystem and the Health Care Plan may use data for the individual that isboth current, historic, based on live system data, for the individual,which may be analyzed against earlier data 2315. In addition the systemcan have access to and it could be possible for data collected fromother individuals with similar: ethnic and racial background, age, sex,diagnosis, environmental living, DNA features, and health history data,any current medications, to assist in the health care plan analysis andfor that data to be used to determine the appropriate method oftreatment. Data received from Monitors, Sensors, Implanted MedicalDevices, Videos, Audio Data, Mobile Sensors, Live-Micro Robotic Devicesand Electromechanical Sensors, and service provider observations areentered in the Health Care Plan system. There are preset rules,standards and clinical guidelines 2316 defined in the system.Pharmacodynamic Systems 2317 within the Health Care plan system candetermine the biochemical and physiological effects of drugs on thebody. It might also detect the undesirable effects of a drug which mightinclude increased probability of cell mutation, induced physiologicaldamage, or abnormal chronic conditions. The Physician and PsychiatricReview 2318 and Dental, Physician's orders, Pharmacy standards 2319could be preset based upon predetermined data sets, which may requirechanges in the individual's readings by perhaps several sensors ormonitors. Opinions and reviews of the Individual's Health team 2320which may include Case Managers, OT, PT, Speech, Wound Therapist,Immune, and Respiratory Therapist can be recorded in the system.

System can analyze data received from the individuals, external devices,internal sensors and service personnel 2321 and once the preset healthconditions and standards are met, the device could be activated to makethat change to their health care plan and treatment, medications or care2322.

For example if an individual has chemical traits for a heart attack, thesystem may administer medications according to the pre-set orders orpharmacodynamic guidelines. If they have signs of suicide, the systemcould call 911 emergency systems. The system can give medicationsdirectly in preset orders or contact the physician, stimulate musclesand systems directly. The individual can have brain stimulator or stentsimplanted to provide for either medication or decrease blood flows etc.The system can get data from many sources, monitor large numbers of datasources for the individual and is not driven by the physician ortherapist, but their preset orders, as data changes. The individual mayhave implanted medication devices or pumps on the belt worn on waist orarm to have the system administer directly the correct dosage to theindividual and monitor the results. The system may stimulate the braindirectly for depression or provide medication for anxiety or othermental health, but without asking a physician for a new order. Thesystem can replace the need for physician visits and physician orderchanges by analyzing the information received from monitors and sensorsand then taking appropriate measures.

The system might notify people with approved Super Role (defined below)access via a Secure HIPAA compliant wireless internet or communicationsystem 2323 about the data changes, urgent notifications, new clinicaland medical analysis, health events, crisis, positive outcomes andprogress for the individual's health care plan and status. Notificationsmay be received on mobile devices, PDA's, Laptops, tablets, computers,cell phones, data messaging or other forms of communication devices toauthorized person's for the individual.

The system might notify regarding the data changes, results ofreanalysis of data including new orders, interventions, stimulations,directives, administration of required treatments or medications andother actions over a HIPAA Compliant and Secure Wireless Internet systemto Service Personnel, Health Care Plan team, physicians, pharmacy,guardians, family and the clinical team 2324. The System can be capableof making decisions to notify people with appropriate caseloads andprovide them with a set of guidelines. The System can makerecommendations to the staff after comparing the data which has beenreceived from external and internal devices to the data which waspreviously stored in the database. The System may notify staff regardinga previous medical condition of the individual and may provide them withrecommendations on what future actions can be taken. The system canidentify the changes in the treatment that was being received by theindividual after analyzing the data received from the external andinternal devices and comparing with the current data and can providestaff with a new set of orders and guidelines depending on the healthcondition of the individual.

Observations made by the system after analyzing data received fromindividuals, external devices, internal sensors and service personnelregarding the health condition of an Individual are stored in the systemwhich can be used for future reference. The system makes changes to anindividual's health care plan and treatment, medications or caredepending on the pre-set orders, predetermined data sets orpharmacodynamic guidelines eliminating the necessity for physicianvisits and physician order changes. The system can conduct an analysisafter comparing data received from implanted devices (2301) and sensors(2303) as well as from external devices (2304) continuously monitoringthe individual with the data received from the Health Care Plan System(2326). This comparison can help in making necessary recommendations bythe system regarding the health care plan of the individual. Treatment,medications and care plan can be modified depending on the analysis ofthe system. Since the system can have individual's medical historystored in the database along with other health related information suchas dietary restrictions, allergy and feeding guidelines, the system canperform a detailed analysis of the individual's current health conditionand make necessary altercations to the existing health plan. Besides thesystem can immediately respond to the emergency health condition of anindividual when there is no staff around or the individual is unable totake any precautions himself. This can prevent any health hazard thatmight be occurring to an individual. The system can also notifyappropriate staff and provide them with necessary guidelines regardingthe present health condition of the individual. The staff may be unawareof the steps to be undertaken for being not physically present when theindividual was experiencing critical health deteriorating symptom. Theinformation provided by the system can assist staff to understand thescenario and take necessary measures.

FIG. 24 shows the data available in the system that can be used foranalysis by the funding agencies. The system has a wide range ofapplications for which the data fields for the template forms have beendetermined according to the requirements of the funding agencies.Funding agencies may access this data and use the information foranalysis 2410. The Intake Records 2420 contain the information on theoversight agency that referred an individual, the oversight ID that canuniquely identify an individual within the system, the admission date,program enrollment information and other information. The Referralprocess 2425 shows that data is available of when the referral was sent,when the referral was accepted and which services were mentioned duringreferral process of an individual. The Demographics 2421 represents thatthe system has detailed demographic information about each individualincluding the individual's medical information, contact information,insurance information. The Case Management 2422, Progress AssessmentReview 2423, Lifestyle Assessment 2424, Functional Eligibility 2426,Case Planning 2427, Individual Family Service Plan (IFSP) 2430, QualityEnhancement Review (QER) 2431, Review Schedule 2432, Child PAR 2433,Case Action History 2434 represent the applications designed for thestates to determine case plans, eligibility, case action, family serviceplan and also to assess lifestyle, progress, etc. The Outcomes,Objectives & Activities 2428, Individual Service Plan 2429 representsthat the system has detailed information about an individual's goals,objective, outcomes and activities that can used for analysis and todetermine the appropriate service plans. This data can also be used fordetermining individual budget amounts and service authorizations. Forthe states to investigate the incidents occurring at the entitiesproviding supports, the system can provide the states with detailedinformation about the incidents that has been represented as IncidentReporting 2435. For overseeing functionalities of the states or fundingagencies, data is available on Client Documentation 2436, ServicesAuthorizations 2437, Electronic Medication Administration Record (eMAR)2438, Billing Support 2439, System Administrative Functions 2440. TheAlerts 2441 represents the information available about both the systemgenerated and staff generated alerts. Funding agencies may use this datafor analysis that may help manage individual supports and oversee theindividual's′ electronic documentation.

FIG. 25 illustrates the overall system and its infrastructure. TheInfrastructure 2510 of the system 2505 is composed of Firewall 2545 tokeep the network secure, Operations Server 2580, Application Server Pool2590, Database Server Pool 2560 to avoid the overhead of making a newdatabase connection every time an application requires access to adatabase and Database Storage 2570. The system might have also interfaceexternally with other devices 2530. In the preferred embodiment, thesystem uses a local traffic manager for load balancing. Each site isequipped with multiple servers or nodes to handle an increasingprocessing load. The local traffic manager automatically detects when aserver is loaded or a failure takes place at one site or equipmentwithin a site, and can reroute traffic to the appropriate fail overserver node, making sure users have access to the system and all itsfunctionality. It preferably uses storage arrays. Within the storagearray, individual or even multiple component failures of the diskdrives, disk controllers, power supplies, and other elements may notcause the storage array to stop providing service or to lose any data.Further, failed components are all hot swappable so that they can bereplaced while the system remains operational. It uses a databasemanagement system that runs on computers. The database technologyincludes many features to utilize a redundant, distributed architecture,to provide high availability and high reliability data services.Sophisticated software may be used to automatically backup allinformation and to maintain synchronization between sites. Datamirroring technology is used between no less than two locations.Hardware and software are used for firewalls, routing, and othersecurity measures to prevent fraud and other invasive techniques (a.k.a.“hacking”). The system is powered by uninterrupted power supplies backedup by generators. The system preferably replicates all data in twoservers in real time. In each site, data is synchronized to databasebackup servers and saved in offline mode to secondary storage. Thecustomer base 2520 can communicate with the system using internet 2540or other forms of wireless media.

FIG. 26 illustrates the security mechanism of the system. Themulti-level access control and unique login mechanisms of the systemensure security 2601 and authenticity of information 2602 entered intothe system. Users may be assigned with Caseloads and Roles according tothe agency's policy. These access privileges define the permissions thatusers are granted for documentation and reporting on individuals. Rolesare grouped to form Super Roles that are then assigned to the users withCaseloads designed for different levels of staff.

The system also ensures data security and user accountability as allforms in the system carry the users' electronic signature 2603 alongwith electronic time and date stamps 2605, and other identifyinginformation. Thus any sort of error or fraud can be traced back to theoriginator. The other security features of the system, like threedifferent levels of login information 2604, password expiry feature,sign-up agreement for the users feature, etc. also ensure that data isentered into the system in a secure, HIPAA compliant manner.

FIG. 27 illustrates the access control mechanism of the system. TheSecurity Access Control 2710 mechanism of the system is defined with aspecific set of abilities 2720 and a specific set of caseloads 2730. Theaccess control feature of the system allows administrators to configurethe access privileges of different user accounts according to theState's preferences and user job responsibilities. These features canalso be used to define users' Caseloads. A Caseload defines whichIndividual records a given user can access (and within which settings).For example, direct support staff logging into the system can only seethe Individuals that they support and a State Director might have accessto all Individuals receiving support within the state. This flexibilityalong with the real-time availability allows a wide variety of users toaccess the system with appropriate rights. The system might have userswho are self-advocates, families, provider staff members ranging fromdirect support professionals to executive directors, and a full range ofstate staff including service coordinators, clinicians, administrators,and surveyors. The Caseload is combined of Individual, Program,Individual-Program and Other Caseloads 2735.

The second element within defining user access is a Super Role 2721. ASuper Role is a collection of capabilities or roles composed of Agencywide and Administrative roles 2722 that define what a given user orgroup of users can do with the data associated with their Caseloads. Forexample, some users may only view data and not record information,others may be allowed to enter and update data as needed. Users canaccess the tasks and different modules depending on the accessprivileges assigned to their user accounts. The access control featurescan be used to allow/restrict access to different applications fordifferent user accounts.

FIG. 28 illustrates the Activity Tracking feature of the system. TheActivity Tracking 2810 application keeps record of all operationsperformed by people using the system. This security option lets you findout who have been using the system as the IP Address 2820 is recorded,when they were using it by the Date and Time 2830 provided and for whatpurposes from the actions listed. It helps in auditing and monitoring ofthe services provided to individuals and all data entered into thesystem. All updates are also time and date stamped. It specifies theparticular module of the system that the staff is using, activitiesperformed 2860, name of the program and Form ID 2850. The Softwarespecifics 2840 can also be viewed from the comments section of theActivity Tracking record. This ensures efficient auditing, enhances thesecurity of the system and provides data necessary for verifying theactivities of the staff.

FIG. 29 illustrates the entire person-centered data process of theIndividual in the system. The system has different set of applicationsfor providing support to Individuals. The Individual SupportApplications can consist of General Event Reports 2950 to documentincidents, Behavior 2952 to track behavioral changes, Personal Finance2953 to track financial transaction of individuals, Individual Data 2960to record individual information, Emergency Data 2961, T-Logs 2962 todocument day to day information, Employment Tracking 2963, ISP 2966, ISPLibrary 2965 and Global Libraries 2964. The system recognizes that theCommunity group 2940 of the Individual can consist of Family 2942,Friends 2943, Other Individuals 2941, Volunteer 2944, Employer 2945,Emergency contacts 2946 and Pharmacy 2947. Among the Generalapplications which are available irrespective of any roles or privilegesare Dashboard 2990 from which users can access the modules, Calendar2991, SComm 2992 to communicate with other staff inside the agency andT-Notes 2993 or electronic sticky notes. The Individual is provided withfunding reimbursements 2910 from Funding agencies 2912 and Oversight2911 supporting Individuals to achieve their goals and objectives.

Billing Support application has been designed to help providers trackservices given to individuals and the amount that is to be billed foreach service. It supports Electronic Billing 2916 which allows fordirect submission of claims to Medicaid. Using the Billing 2917 modulesusers can create Service Authorizations, record Attendance 2915, trackbillable and non-billable service units, send single or multipleprofessional claims with Electronic Billing and view claim status. TheReferral module 2914 is used by Oversight Agencies in order to refer anIndividual for services to other linked Provider Agencies. At the end ofa successful Referral process, the Individual referred is admitted bythe linked Provider Agency. Besides, there is a Multi-Provider Reporting2913 feature which provides the Oversight Agency users option togenerate multiple reports on Individuals they are overseeing. Thesereports have been designed to meet the requirements of states andfunding agencies. The Management 2920 of the agencies supporting peoplewith disabilities is carried out by Support Coordination 2921, Executive2922, Manager 2923, Administrator 2924 and Support Professionals 2932.The Staff Support application provides tools that facilitate themonitoring and management of information regarding staff training andcertification 2954. It allows agencies to manage total work hours ofemployees by setting up weekly and monthly schedules 2955. Managementsummaries 2951 are available to generate summaries on events reported onincident forms and behavioral forms as well as Provider Administration2956. Support and Care 2930 of the Individuals are ensured by Health andSupport Professionals and the health conditions of an Individual aremonitored and medications are recorded and administered by HealthProfessionals 2931 using the Health Tracking 2971 and MedicationAdministration Records 2972 applications under Electronic Health Records2970.

Training and Support 2985 is provided to staff to help improve theirefficiency in using the system as well as ideas 2980 are taken andimplemented while designing further enhancements to the system.

The Person-Centered Data is securely stored in the system database andthe system maintains the entire documentation process of an Individualwith disabilities ensuring security and data integrity. Initially datais collected on individuals who are entered into the system based on theIndividual 2300 in FIG. 4 . There could be additional people withinformation in the system that provide support or are staff or family tothe Individual 2300.

FIG. 30 shows the suite of applications of the system for Entitiesproviding support to individuals. The Suite of applications of thesystem for Entities providing support to individuals 3005 can be dividedinto 6 major groups. Among these 6 major groups is Individual Supports3010 consisting of basic set of applications such as T-Log, IndividualData, Emergency Data form, General Event Report, Individual Data,Individual Home Page, Witness Reports, Behavior Plan, Behavior EventRecord, Individual Service Plan (ISP), Global ISP Template Library,Individual Plan of Protective Oversight and Safeguards (IPOP), TimeTracking, Advance Directives, Secure Communications (SComm),Management/Event Summaries, Demographic Report, T-Note, Calendar,Activity Tracking and Notification etc.

Then comes Staff Scheduling 3020 which helps in managing total workhours of employees by setting up weekly and monthly schedules. TheTraining Management System 3030 facilitates the monitoring andmanagement of information regarding staff training and certification.The Electronic Health Records 3040 comprises of applications to trackand document on Appointments, Lab Tests, Vital Signs, Blood Glucose,Height/Weight, Intake/Elimination, Medication History, ImmunizationRecords, Infection Tracking, Menses Respiratory Treatment, Seizures,Skin/Wound, Consultation Forms and Seizures. It allows users to generatedifferent kinds of reports including monthly, detailed and health carereports to meet the health care needs of the individual. Besides, theadministration of medications can be recorded and tracked on a regularbasis using the Medication Administration Records module. There are alsoapplications documenting the allergies of an individual using theallergy Profile and recording the diagnoses, treatment preferences andcare plan of an Individual. A comprehensive report on the healthcondition of an Individual can be generated using the Health passport ofthat Individual. The Personal Finance module 3050 can be used to trackfinancial transactions such as Expenses, Deposits and Account Balancesfor an individual. The Billing module 3060 keeps information aboutfunding sources, billable services provided by programs at the agencyand service authorizations and attendance for different individuals. Theapplication includes the option to prepare bills for services providedto individuals. It also gives users the option to view the billinginformation in a summarized form of choice. The Billing Supportapplication also supports Electronic Billing which allows for directsubmission of claims to Medicaid.

FIG. 31 shows the applications available for the States and Counties orFunding Agencies. In FIG. 31 , The Intake and Referral 3110 representsthe Individual Intake, Referral and Linking Individuals applicationsthat have been designed according to the requirements of the States andCounties or Funding Agencies. These applications allows to intakeindividuals into the system and refer them to other Entities ProvidingSupport 250. Once the referral is sent to the other entries the systemcreates an instance under each entity file in the database. The systemassigns unique Oversight ID to link each instance. The OversightDocumentation 3120 represents that the system allows the State, Countiesor other Funding Agencies to oversee the T-Logs or shift logs createdfor the individuals, Individual Service Plans, Incident Reports,Electronic Medication Administration Records and other health carereports. The system may provide a number of Multi Provider Reports 3130that include MMIS Report, Obligation Report, Login Details, New CountReport, Provider Summary Report, GER Interval Report/Statistics, UserPrivilege Report, and Active Individual Count Report. The system alsoallows Multi Provider Secure Communications 3140 that can be useful forcommunication between the Entity Providing Support 250 and the States,Counties or other Funding agencies in a secure and HIPAA compliant way.The Case Management 3150 represents the management tools that includePerson Centered Service Plan, Individual Family Service Plan (IFSP),Overall Service Plan (OSP), Progress Assessment Review, Progress Notes,Quality Enhancement Review (QER), Risk Assessment, Slot Management,Eligibility, Case Action, Admin Notes, Alerts, Letter. The IndividualBudgeting 3160 represents the application that may help the States andCounties or Funding Agencies create the budget amount and respectiveservice authorizations for the individuals.

FIG. 32 shows the demographic data available in the system that can beused for analysis. While entering data for an individual into thesystem, it captures the detailed demographic information about theindividual either directly from the individual or from family or staffmember or other available sources. The Demographic Data Available forAnalysis 3210 contains First Name 3220, Last Name 3221, Social SecurityNumber 3222, Medicaid Number 3223, ID Type/Number 3224, Hair Color 3225,Eye Color 3226, Characteristics 3227, Interpreter Need 3228, Height3229, Weight 3230, Language 3231, Gender 3232, Citizenship 3233, Age3234, Location 3235, Mobility 3236, Communication Modality 3237,Ethnicity 3238, Religion 3239, Race 3240, Residential Address 3241,Living Arrangement 3242, Marital Status 3243, Adaptive Equipment 3244,Blood Type 3245, Dietary Guidelines 3246, Feeding Guidelines 3247,Contacts 3248, Active Programs and Sites 3249, Birth Place 3250, ActiveDiagnoses 3251, Developmental Disability 3252, Intellectual Disability3253, Primary Care Physician 3254, Emergency Orders 3255, Allergies3256, Mealtime Status 3257, Behavior 3258, Management, Medicare 3259.

FIG. 33 shows the Incident Reporting Data available in the system foranalysis. The incident reporting form can precisely document informationregarding an incident occurred to an Individual. It has been designed totrack multiple related incidents for an individual. The incidentreporting tool referred to as the General Event Reporting tool alsoknown as GER, can be used by users to report and follow-up on a widerange of incidents that include injuries, behavioral concerns andaccidents among others.

GER also lets users track the comments of witnesses for each event. Bysimply entering the names of witnesses in a GER, users may get links towitness reports which can let them review detailed comments on what waswitnessed during an incident. Other important information such as peoplenotified, corrective action taken, and plan of corrective actions can beentered in details. Users can review the information prior to approvaland follow up later once a GER has been approved. The GER has also beenintegrated with the Behavior module to facilitate the reporting ofincidents that involve restraint as a result of behavior. Many of theseincidents often need to be reported to the state in state-specifiedformats. The GER module has been made flexible to allow users tocomplete state specific incident reports.

Among the various sections of the GER form, the Profile Informationsection 3310 lists the Individual name, Program Information, Time Zoneand Report Date. Then in the Event Information 3330, section users canrecord information regarding details of the incident that has occurred.There are options for recording different types of events such as Injury3331, Medication Error 3333, Restraint related to behavior 3335,Restraint Other 3332 and Death 3334.

In the Injury event information page 3331, information can be filled outregarding the injury type, injury cause, time of injury, specificlocation where the event occurred and whether the event was discoveredor observed. Details regarding the size of the injury, severity, bodyparts and summary can also be entered into the form. Injury photo canalso be attached with this form.

While entering the medication error information 3333, users can specifythe type, severity, error discovered date, total errors, time of initialerror, total errors and reason for errors. The system can notifyappropriate users regarding the incident and can keep a record of thename of the person who was notified, date and time of notification.

Users can mention the restraint related to behavior event status,restraint duration, and person in charge during the event and if therewas any injury caused due to restraint in the Restraint related toBehavior section 3335.

In the Restraint Other Information section 3332, user can specifyrestraint type, duration, specific location and summarize the entireincident.

Users can also specify a death event 3334 by mentioning specifics suchas cause, time, location, date of last medical exam, autopsy date,consent and other comments. Users can also enter the details ofincidents that do not come under the above mentioned categories in theOther event information section.

In the General Information section 3320 users can identify whether anincident is of abuse/neglect type, whether the data should be madeinternal/external to the agency, the notification level of the report.

Users are able to notify appropriate people using the Notificationsection 3325 and can fill out state specific information required byparticular states from the State specific information section. Users canalso specify the actions taken/planned, add review and follow-upcomments and add any external attachments using the GER form. If abuseand neglect is suspected, certain notifications are required to be madeby law or policy. According to the agency or oversight or governmentrules, there might be preset limits to who can access and see the dataon individuals. The system can also have the ability to preset limits onwho can access these data. Certain reinterpretations can be triggered bythe system relating to data regarding the staff or the individualinvolved. For example staff can be reassigned, policies can be adjusted,additional training can be mandated, staff can be placed on leave, andthe individual might be taken to a specialist, all depending on the dataand analysis performed by the system. As the system has data about theindividual and staff member and can also analyze across multiplecaseloads, the system can provide interpretations and analysis forrecommendations or can take certain actions.

FIG. 34 shows the referral and waiting list management data available inthe system that can be used for analysis. Using the system the states,counties or funding agencies may send electronic referrals for theindividuals to other entities. The system has detailed information onthe referral process which can be used for analysis. The Referral andWaiting List Management Data Available for Analysis 3410 shows the dataobtained from the Applications for States and Counties 3105. This datacan be used to analyze the referral and admission status of individualsunder Entity Providing Support 250. The data available for the analysisof the referral process includes Anticipated Admission Date 3420,Recipient Type 3421, Region/Group 3422, Recipient Provider 3423,Oversight Agency 3424, Service Description 3425, Created on 3426,Submitted on 3427, Oversight Accepted on 3428, Recipient ProviderAccepted on 3429, Admitted on 3430, and Denied on 3431. The system alsohas the details of the services that were mentioned at the time ofsending referral and also the documents on the individual's previoushistory that were sent along with the referral. If any entity denies areferral, the system collects the information about the reason fordenial. Using all this information the system can determine ifindividual has been referred to, which entity can be providing supportto the individuals and what the status of the referral is. If anindividual's referral is denied by an entity then the state, counties orfunding agencies may analyze the denial reasons to determine the entityto be chosen for the next referral. This analysis may help the states,counties or funding Agencies manage their referral process.

FIG. 35 illustrates the process of creating an automated Attendance formusing the live video recording of an activity program. In FIG. 35 ,different fields on the Attendance Data form has been filled in by thesystem using information captured in the video recording of the activityprogram. As shown by FIG. 17 , the system can capture the raw view ofthe individual as Individual B 1515, Staff S 1614 and the location wherethe camera is located as Video Recording Location 1513. For theToothbrushing Program this location is the activity room. Thisinformation can be mapped with previous records to identify theindividual within the system and to locate the Provider Program andService Description Code for which Individual B 1515 is attending theToothbrushing Program. Using this information the system can enter theAttendance Data for the Individual B. In FIG. 35 the AutomatedAttendance Data 3520 shows that the system can determine the attendanceinput data using the presence of the Individual B in the videorecording. The system can enter the information that the individual waspresent during the Toothbrushing Program. The Attendance Time determinedby System 3115 represents the time of when the Individual B's presencewas detected by the system, till the time of when Individual B left theactivity room.

FIG. 36 illustrates the process of creating an automated Hab Checklistform using the video recordings of the activity program. In FIG. 36 ,the Hab Checklist data can be generated by the system using both theautomated ISP Data and Attendance Data. Using the data captured in thelive video recording the system can automatically generate the ISP Dataand Attendance as shown by FIG. 22 and FIG. 35 . The sample screenshotsof the automated Hab Checklist shown in FIG. 36 represents that aftergenerating the automated ISP Data and Attendance Data the system maygenerate the Hab Checklist data for the System Generated Month and YearData 3610. For example, if it is the end of the month of August thenafter generating the ISP and Attendance Data for August 30 the systemcan generate the Hab Checklist for the month of August using all theprevious ISP and Attendance data and also the newly generated ISP andAttendance Data. The Data Generation using ISP Data 3620 represents thatthe system maps all the ISP Data saved for the Toothbrush Program forthe month of August and analyze the data to determine if services havebeen provided to the individuals following staff actions defined in thehabilitation plan form. Then the system generates the Hab Checklist datafor the person who had entered the ISP Data for each of the staffactions. The Data Generation using Attendance Data 3630 represents thatthe system can map Attendance Data with the ISP Data and do furtheranalysis to determine Hab Checklist data for the duration of servicedelivery.

It will be understood by those of ordinary skill in the art that variouschanges may be made and equivalents may be substituted for elementswithout departing from the scope of the invention. In addition, manymodifications may be made to adapt a particular feature or material tothe teachings of the invention without departing from the scope thereof.Therefore, it is intended that the invention not be limited to theparticular embodiments disclosed, but that the invention will includeall embodiments falling within the scope of the claims.

What is claimed: 1-99. (canceled)
 100. An improvement to the way thatcomputer systems operate to provide HIPAA-compliant access of a user toelectronic personal health information of an individual under care, theimprovement comprising a HIPAA-compliant computer security method ofrecording visual personal health information in an electronic formatrelating to at least two individuals, at least one of whom is theindividual under care, from a video camera, preventing unauthorizedaccess of the user to the information, formatting the information, andpopulating data fields of an information request with the information,comprising: storing records of physical attributes of the individualunder care and the one or more individuals other than the individualunder care; recording electronic video signal personal healthinformation, via a video camera, including physical attributes of theindividuals; transmitting at least a portion of said video informationto a computer system with a memory and a processor; storing, by saidcomputer system, at least a portion of said transmitted videoinformation; storing, by said computer system, at least oneauthorization profile associated with the user, wherein the user isassociated with one or more roles and one or more caseloads and thecaseloads include access privilege information for the individual undercare, wherein said user access privilege information included in saiduser's caseload includes the identities of individuals under care towhich the user has access; determining, by said computer system, whethersaid user is permitted to view said information pertaining to a caseloadof the individual under care, wherein the determination is based on saidauthorization profile and the one or more caseloads and the one or moreroles associated with the user, wherein said determining includes:comparing the stored records, of physical attributes of the individualunder care and the one or more individuals other than the individualunder care, to the stored video information, identifying a portion ofsaid stored video information pertaining to the one or more individualsother than the individual under care by matching at least one of a face,eye color, and/or hair color in the stored records of physicalattributes of an individual other than the individual under care withthe face, eye color, and/or hair color of an individual other than theindividual under care in the stored video information, identifying aportion of said stored video information pertaining to the individualunder care by matching at least one of a face, eye color, and/or haircolor in the stored records of physical attributes of the individualunder care with the face, eye color, and/or hair color of the individualunder care in the stored video information; and comparing the identityof the individual under care to the user's authorization profileinformation, including comparing the identity of the individual undercare to the user's caseload, and granting access to the user to saidportion of said stored video information pertaining to the individualunder care if the identity of the individual under care is stored in theuser's caseload; and blurring, by said computer system, said portion ofsaid stored video information pertaining to the one or more individualsother than the individual under care, wherein the entire image of theone or more individuals other than the individual under care is blurred,and wherein said blurring is done prior to any human viewing said storedvideo information; transmitting, by said computer system, said portionof said stored video information pertaining to the individual undercare, and said blurred portion of said stored video informationpertaining to the one or more individuals other than the individualunder care, to said caseload of said individual under care forHIPAA-compliant viewing by said user authorized to view said portion ofsaid stored video information pertaining to the individual under care;receiving, by said computer, an information request in electronic formhaving data fields; receiving, by said computer system, an informationrequest in electronic form having data fields; wherein said stored videoinformation includes data corresponding to said data fields; formattingsaid video information data, by said computer system, based on saidinformation request; and populating, by said computer system, said datafields of said information request using said formatted videoinformation data.
 101. A computer security method according to claim100, wherein: said storing records step further includes storinginformation regarding the identity of at least one program in which theindividual under care is enrolled; said stored user access privilegeinformation included in said user's caseload includes the identities ofat least one program to which the user has access; said determining stepfurther includes the steps further includes the step of comparing theidentity of the programs in which the individual under care is enrolledto the user's authorization profile information, including comparing theidentity of the individual under care to the user's caseload, andgranting access to the user to the portion of said stored videoinformation pertaining to the individual under care if the identity ofthe program in which the individual under care is enrolled is stored inthe user's caseload.
 102. A computer security method according to claim100, further comprising recording information pertaining to one or moreindividuals, wherein at least a portion of said information pertains toan initial inquiry relating to one or more goals of the individual undercare.
 103. A computer security method according to claim 102, whereinsaid recorded information includes one or more of said one or more ofthe thoughts, feelings, or responses to questions of the individualunder care.
 104. A computer security method according to claim 100,wherein said information request relates to satisfaction of servicesreceived by the individual under care.
 105. A computer security methodaccording to claim 100, wherein said information request relates togoals of the individual under care.
 106. A computer security methodaccording to claim 100, wherein said information request relates tonegative outcomes of the individual under care.
 107. A computer securitymethod according to claim 106, wherein said negative outcomes includeinstances of abuse and neglect.
 108. A computer security methodaccording to claim 106, wherein said negative outcomes includeperson-centered activities.
 109. A computer security method according toclaim 106, wherein said information request relates to incidentreporting.
 110. A computer security method according to claim 106,wherein said information request relates to proof of service delivery.111. A computer security method according to claim 102, wherein said atleast a portion of said first information is recorded via an electronicsensor.
 112. A computer security method according to claim 111, whereinsaid electronic sensor is capable of recording one or more of voice,facial expressions, hand movements, words, biometrics,typing/keystrokes, individual tics, sounds, touch, typing speed, typingpattern, change in stress level, change in blood pressure, smell, changein smell, sweat, change in pulse, pulse, temperature, electrochemicalmodification, facial movements, body movements, body chemistry, photo,staff answers, and blood pressure.
 113. A computer security methodaccording to claim 100, wherein the individual under care has acognitive disability.
 114. A computer security method according to claim113, wherein the individual under care has a temporary cognitivedisability.
 115. A computer security method according to claim 100,wherein the recording takes place in a school.
 116. A computer securitymethod according to claim 100, wherein the recording takes place in aprison.
 117. A computer security method according to claim 100, whereinthe individual under care is a child age birth-to-three years old. 118.A computer security method according to claim 102, wherein said recordedinformation is stored as contemporaneous data.
 119. An improved computersystem providing HIPAA-compliant access of a user to electronic personalhealth information of an individual under care, the improvementcomprising a HIPAA-compliant computer security system for recordingvisual personal health information in an electronic format relating toat least two individuals, at least one of whom is an individual undercare, from a video camera, preventing unauthorized access of a user tosaid information, formatting the information, and populating data fieldsof an information request with the information, comprising: a computersystem having a memory and a processor; a video camera for recordingpersonal health information including physical attributes of theindividuals; a transmission link for sending at least a portion of saidrecorded video information to said computer system; a computer programstored in said memory and adapted to run on said processor, configuredto: store records of physical attributes of the individual under careand the one or more individuals other than the individual under care;store at least a portion of said transmitted information; store at leastone authorization profile associated with the user, wherein the user isassociated with one or more roles and one or more caseloads and thecaseloads include access privilege information for the individual undercare, wherein said user access privilege information included in saiduser's caseload includes the identities of individuals under care towhich the user has access; determine whether the user is permitted toview said information pertaining to a caseload of the individual undercare wherein the determination is based on said authorization profileand the one or more caseloads and the one or more roles associated withthe user, and said computer program is further configured to, as part ofsaid determination: compare the stored records, of physical attributesof the individual under care and the one or more individuals other thanthe individual under care, to the stored video information, identify aportion of said stored video information pertaining to the one or moreindividuals other than the individual under care by matching at leastone of a face, eye color, and/or hair color in the stored records ofphysical attributes of an individual other than the individual undercare with the face, eye color, and/or hair color of an individual otherthan the individual under care in the stored video information, identifya portion of said stored video information pertaining to the individualunder care by matching at least one of a face, eye color, and/or haircolor in the stored records of physical attributes of the individualunder care with the face, eye color, and/or hair color of the individualunder care in the stored video information; and compare the identity ofthe individual under care to the user's authorization profileinformation, including comparing the identity of the individual undercare to the user's caseload, and granting access to the user to saidportion of said stored video information pertaining to the individualunder care if the identity of the individual under care is stored in theuser's caseload; and blur said portion of said stored video informationpertaining to the one or more individuals other than the individualunder care, wherein the entire image of the one or more individualsother than the individual under care is blurred, and wherein saidblurring is done prior to any human viewing said stored videoinformation; transmit said portion of said stored video informationpertaining to the individual under care, and said blurred portion ofsaid stored video information pertaining to the one or more individualsother than the individual under care, to said caseload of saidindividual under care for HIPAA-compliant viewing by said userauthorized to view said portion of said stored video informationpertaining said the individual under care; receive an informationrequest in electronic form having data fields; wherein said stored videoinformation includes data corresponding to said data fields; format saidvideo information data, based on said information request; and populatesaid data fields of said information request using said formatted videoinformation data.
 120. A computer security system according to claim119, wherein: said stored user access privilege information included insaid user's caseload includes the identities at least one program towhich the user has access; said computer program is further configuredto store records of the identity of at least one program in which theindividual under care is enrolled; said computer program is furtherconfigured to, as part of said determination, compare the identity ofthe programs in which the individual under care is enrolled to theuser's authorization profile information, including a comparison of theidentity of the individual under care to the user's caseload, and grantaccess to the user to the portion of said stored video informationpertaining to the individual under care if the identity of the programin which the individual under care is enrolled is stored in the user'scaseload.
 121. A computer security system according to claim 119,further comprising a device for recording information pertaining to oneor more individuals, wherein at least a portion of said informationpertains to an initial inquiry relating to one or more goals of saidindividual.
 122. A computer security system according to claim 121,wherein said device is an electronic sensor.
 123. A computer securitysystem according to claim 122, wherein said electronic sensor is capableof recording one or more of voice, facial expressions, hand movements,words, biometrics, typing/keystrokes, individual tics, sounds, touch,typing speed, typing pattern, change in stress level, change in bloodpressure, smell, change in smell, sweat, change in pulse, pulse,temperature, electrochemical modification, facial movements, bodymovements, body chemistry, photo, staff answers, and blood pressure.