Assessment Builder FAQ

Created by Margeaux Anderson, Modified on Wed, 11 Jun at 11:42 AM by Kristina Shearon

Table of Contents


Using the System 

What languages are supported for the intake interview? 

Currently, we support English, Spanish and Hindi. You will select the language from the drop down menu and then upload your recording to the tool. 




How do I record the intake interview to upload into the system? 

We recommend using a HIPAA compliant tool which may already be configured for your organization such as Zoom, Google Meets, Webex etc.  Use the existing record meeting function to record the audio for your intake interviews. Additionally, you are able to upload any typed notes to the intake interview section. 


What assessments does the tool support? 

The tool currently supports the following assessments:


Assessment Name

Digital

Frontera Template

ABAS

X


ABAS-3

X


ABLLS-R

X

X

ADOS-2


X

AFLS

X

X

APSI


X

Behavioral Observations (Custom)

X

X

BHTIA (Custom)

X

X

BRIEF-2 (Parent)

X


BRIEF-2 (Teacher)

X


CFQL


X

ESDM


X

Essential for Living Quick

X

X

FAST


X

Hanley Open-Ended Interview FBA


X

MAS


X

PEAK


X

PDDBI (Parent)

X


PDDBI (Teacher)

X


PSI-4

X


QABF


X

Skill Streaming


X

Socially-Savvy

X

X

SRS-2 (Adult)

X


SRS-2 (Preschool)

X


SRS-2 (School)

X


VBMAPP

X

X

Vineland-3

X



More assessments are coming soon! If there is a particular assessment you are interested in, please contact our support team at support@frontera.health and make the request. 


What is the Frontera Template? How do I access and make my own copy?

The Frontera Templates can be accessed by clicking on the Assessment Templates on the left hand side of your screen. This will allow you to see all the Frontera Health Templates. You can make your own copy of this, however, please do not make edits to the formatting or structure of the template as this may cause issues when you attempt to upload the assessment. Best practice would be to download a new template for each new user to use the latest version available.




Can I create a report without uploading certain fields?

Yes, the intake call, diagnosis report, and clinical notes are optional for assessment builder.


After generating the report, can I go back and add new files? 

Yes, you can! You will need to click the “next” button to regenerate the report after uploading the files. If you’ve edited fields of the report already there is a chance these will be overwritten.



About AI

What are some best practices to consider when using AI? 

To get the most out of your interactions with AI, we recommend focusing on these four key principles:

  1. Ensure compliance and security

  2. Individualize and customize inputs 

  3. Use evidence-based language

  4. Validate clinical components


At Frontera, we’ve integrated these best practices into every step of our process:

  1. Compliance Security:

We are HIPAA compliant and securely store all de-identified patient information.

  1. Individualization:

Our reports are tailored to each client, avoiding templatized language.

  1. Evidence-Based Approach: 

Our team of BCBAs and clinicians create the foundation for our report outputs.

  1. Clinical Validation:

As a user, your role is to review and edit reports, ensuring all information is accurate for your client.


Which AI model(s) do you use? 

We utilize an open-source AI model as the foundation of our application, enhanced with advanced prompting infrastructure. Our in-house team of BCBAs fine-tunes the tool to ensure accurate reporting for your needs.


How do you ensure the AI is accurate? 

We employ a multi-step process to maintain accuracy:

  1. Robust testing with sample data and clinicians before release

  2. Ongoing review and curation by our BCBA team

  3. User validation, where clinicians review and confirm the accuracy of outputs


How does the AI learn from the changes that I make? 

We track all modifications made within the Frontera Health tool. This feedback is carefully analyzed and incorporated into future improvements, allowing our AI to continuously evolve and better serve your needs.


How long does it take to incorporate a new assessment tool into your platform?

Typically, it takes about two weeks to integrate a new assessment tool. This timeframe allows us to ensure proper implementation, testing, and quality assurance.


How do you protect my clients’ data?

We take data privacy and security seriously. All client data is de-identified and encrypted. Our platform is HIPAA compliant, and we employ industry-standard security measures to protect all information stored in our system.



General Help 

The file I am uploading is generating an error message. How do I move forward? 

If the assessment is either the official download from the assessment website or the Frontera template, there should not be an issue. If you remove the file and attempt to upload again and receive the same error message, check to see that you are using the latest version of the Frontera templates. If this does not resolve the issue, please contact us at support@frontera.health 


I received an error message when uploading a file, who do I contact for help? 

You can reach us via email at support@frontera.health. We will provide a response within the same business day to help you resolve the issue. 


I have feedback on the tool, who can I inform? 

We are happy to receive your feedback! Please email it directly to support@frontera.health. We may reach out to you for more information or to set up a time to review. 



Security and Privacy

What measures are in place to ensure the product is secure?

  • Bot Detection and Mitigation
    Leveraging AI and machine learning to detect and block malicious bots in real time while allowing legitimate traffic through. This prevents credential stuffing, scraping, and other automated attacks that could compromise security or affect system performance.
  • Role-Based Access Control (RBAC)
    Only authorized personnel can access specific systems or data based on their job responsibilities, ensuring sensitive data is not accessible to unauthorized users.
  • Regular Security Audits and Penetration Testing
    Ongoing assessments of systems to identify and mitigate vulnerabilities before they can be exploited.
  • Multi-Tenancy Architecture with Data Isolation
    Each client operates within a securely isolated environment in the system. Even in a shared infrastructure, data is logically segregated to ensure no overlap or unauthorized access between tenants.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article