Remember the cute children’s song, “Where, O Where Has My Little Dog Gone?” What a fun little ditty about a lost dog and a search to find him. But what if we change the words just a bit and make it, “Where, O Where Has My Mobile Device Gone?” That’s not quite so cute (and it doesn’t really rhyme so well either). It is especially not so funny if it involves a medical i-pad theft or medical tablet theft. The little dog in the song may very well find his way home, but will the mobile device make it back to where it belongs? Probably not. Medical providers have to be on guard to ensure that if they are using mobile devices in their practices they are keeping both the information on the device and the device itself secure. What is the best way to do this? Encryption of a device is imperative to protect patient/client data. Using an Alpha Thunder Tag is critical to prevent an i-pad theft or tablet theft.
Mobile devices can be protected by attaching an Alpha Thunder Tag to them and installing Checkpoint Classic N10 Antennas at building exits. The tag is built so that when it is within a certain distance from an antenna, it will cause the alarm in the antennas to activate. Alarms consist of flashing LED lights and a very loud alert sound. These alerts ensure that staff and employees will hear when someone is trying to carry a device out of the building. Alerts also provide staff an opportunity to get to the door where the alarm is sounding and retrieve the item being stolen. The Thunder Tag is also designed to be tamper proof, so if someone should try to remove the tag in order to steal a device, the tag has a built in alarm that is set off and warn staff that an attempted theft is taking place.
If you have a smaller office area and are concerned about the space a Checkpoint Classic N10 Antenna would take up, you can rest assured that the space requirements are minimal. This antenna was designed with small spaces in mind, so the footprint it requires is very small, and yet it performs as well as larger electronic article surveillance (EAS) antennas. Should a person, attempt an i-pad theft or tablet theft, the antenna will detect the Alpha Thunder Tag.
So the question becomes does it really matter if a mobile medical device is stolen if it is encrypted? It does matter. While encryption does make it more difficult for a thief to get information from a device such as a laptop or tablet, it is not impossible. In an article in techopedia.com , https://www.techopedia.com/definition/25054/health-care-data-encryption titled, “Health Care Data Encryption” the author discusses what data encryption is and why health care providers should use it. The article states, “Consideration of EHR( electronic health reporting, my clarification in parentheses) data encryption is wise for health care providers, administrators, IT personnel and health facilities. Although encryption is not foolproof, it’s better than plain text records (emphasis mine)”. Mobile medical devices could be stolen and the information stored on them compromised. Not only does this put patient information at risk, it could result in significant fines and penalties for the practice or care unit.
Can someone gain access to medical devices and steal them? Absolutely. Handheld devices like anything else can get in the way when a patient is being treated or if a care provider becomes distracted. It isn’t difficult to imagine a scenario where someone may put down a device to take a phone call or consult with a partner or patient and then forget to pick the tablet or i-pad up. How about just laying the device on a counter where patients check in and out? Once the device is out of a person’s immediate control, it is subject to being picked up or simply lost. Once a device cannot be accounted for, it should be reported to the Department of Health and Human Services. It should not be assumed that a Mobile Medical Device will find its’ way home again.
Medical tablet theft and/or i-pad theft must be treated as very real possibilities. Using an Alpha Thunder Tag and Checkpoint Classic N10 antennas along with data encryption on your devices can help to ensure your practice does not experience a damaging loss.
Get more information on Alpha Thunder Tags, contact us or call 1.770.426.0547 today.
Some people will go to extremes to get a full refund, even if it means committing return fraud. Returns cost retailers billions of dollars every year and the number continues to rise. Wardrobing is one of the most common problems that many stores face. Lots of companies have policies that allow returns as long as the customer has the proof of purchase, either from in the store or online. This is where the criminal customer takes advantage of the store and basically”rents” what they want for free. There is a simple solution to this problem: Alpha Shark Tags.
First, let me tell you about some horror stories I found about some of the craziest customer returns that employees had to deal with. One young lady worked in a small independent clothing store. Every week she had a regular customer that would come in and she would help her put together outfits. They would get it all picked out together, even the accessories. This customer would always make such a big deal about how great she felt when she wore these outfits out, and how many compliments she received. The clerk felt great because she thought she was helping this woman. Truthfully the poor clerk was just being scammed, and this loyal customer was actually engaging in wardrobing. The customer had figured out this clerk’s weekly schedule and on her days off the woman would come back to return everything she had previously purchased. The clothing was clearly worn when she brought it back, but she would insist that the clerk had told her it was fine to bring it back if she wasn’t completely satisfied.
Return fraud doesn’t just happen in your basic clothing retailers. Imagine working for a formal wear dealer. Those employees dread prom season. Moms and daughters will come in and buy the most expensive dress in the store and then come back the day after prom to get their money back. They claim they were not happy with the quality of the dress.They come back with their credit card receipts and expect full refunds. Of course the garments reek of cigarette smoke and beer. And that’s not to mention the nasty sweat stains.
Alpha Shark Tags can help retailers stop this free renting phenomenon in it’s tracks. Simply attach the tags to the clothing. It is recommended that you put them in very obvious areas so they cannot be hidden or tucked in. They stop wardrobing because they are part of the return policy. They are not like price tags that can just fall off. Alpha Shark Tags are intended to be removed at home with a simple pair of household scissors. So, once the customer cuts the tag off, the item can no longer be returned to the store. Some stores even attach copies of their new return policy right to the garment so there can be no confusion. These are great, easy to use, tools that will save your staff from arguing with customers about refunds.
For more information on Alpha Shark Tags, contact us or call: 1.770.426.0547
In this second part of a two-part discussion on clothing security tag usage in stores not traditionally thought of as clothing suppliers, I asked readers to think about stores that could benefit from using security tags on clothes. While there are many clothing retailers that obviously would use Checkpoint tags to prevent theft, what other businesses carry clothing that we may not associate with traditional clothing sales? I came up with a brief list of my own:
Lingerie stores
Auto Parts stores
College book stores
Gift Shops
Hardware stores
Swimwear shops
Department stores
Movie/video/music stores
Handbag stores
Men’s suit/tuxedo rental stores
Even pet stores sell clothing items for our furry little friends, such as sweaters and jackets. If you own a business that falls into one of these categories, you may want to consider the benefits you could derive from using clothing security tags.
Not everyone is familiar with what clothing security tags are so I want to take a few moments to describe them and what they do. These tags come in two designs, soft tags that peel off a roll and stick to some type of backing, usually cardboard, cellophane, plastic and non-metal surfaces. The tags are difficult to remove from an item and even when the paper is peeled off, the wire coil that activates an electronic article surveillance antenna (EAS) often remains on the surface. The second style of tag is the hard tag, usually a two-piece device with a pin on one part and a “cap” for the reverse side. This type of tag pins on the clothing item and is not removed until the clothing is brought to the register and purchased.
The soft tag is best to be placed on a hanging manufacturer tag of a garment and the hard tag can be pinned in a seam or in a highly visible location on an item. Visibility is important since it acts as a deterrent to thieves who may be deciding whether or not to shoplift from your store. Both tags will activate EAS antenna alarms when brought into range of the doors where the antennas are located. Most shoplifters know what EAS antennas are and prefer to avoid setting them off so they tend to go to locations where EAS is not in use. Checkpoint tags come in both styles and Checkpoint systems can make recommendations for EAS antennas.
Although the list I have made does include stores that specialize in certain “types” of garments, such as a bridal store or lingerie shop, they are limited in what they carry. In a big box retail store, you find nearly every kind of clothing item and for every person, children to teenagers to adults, everyone can be accommodated. We should not overlook the stores that carry a limited number of softlines merchandise. Video and music stores I visit carry character and novelty t-shirts for the customer. Hardware stores often have ball caps, gardening aprons, gloves and tool belts that can be protected with Checkpoint tags. Gift shops often carry hats and even purses and wallets that can be protected with clothing security tags.
You may be thinking that your store only carries a few clothing items so it isn’t worth the investment in EAS antennas and even the soft Checkpoint tags. I would like to remind the readers that EAS antennas will detect Checkpoint tags that are on clothing and other items. You can use clothing security tags on clothing and enjoy the same level of protection by tagging all of your other merchandise as well.
Clothing security tags aren’t just for clothing stores. Take a look at the merchandise you sell and see if you may carry some items you hadn’t thought about tagging before. If you don’t carry clothes, hats or softlines merchandise now may be a great time to consider expanding your product line and increase sales. Use security tags on clothes in the process and keep theft down and profits up.
Clothing Security Tags are important and we can help you with it. Call 1.770.426.0547 and let’s talk.