Bug Tag -4                                                                                                                            WC Blog 303
Classic N10 -4
Tablet Theft -3
i-pad theft -3
Examining The Ability Of The Bug Tag To Protect Mobile Devices Used For Autopsies
     The use of computer tablets and i-pads in healthcare has been growing rapidly. They have been used for entertaining children and alleviating their fear of being in an exam room. They are used by experts to meet with veterans who may be dealing with PTSD and don’t want to go into a hospital setting. They are being used to view x-rays and CT scans with patients. One use for i-pads and computer tablets I recently learned of is for conducting autopsies. As with any medical facility there still needs to be concern for the protection of patient information and privacy. Any patient information stored on a device is going to be potentially vulnerable to hacking and theft and could be used for fraudulent purposes. It is imperative that medical facilities take appropriate steps to prevent i-pad theft and tablet theft to protect patient privacy. The Alpha Bug Tag 2 and Classic N10 electronic article surveillance (EAS) tower are powerful tools to keep mobile medical devices safe from theft and potential patient information compromise.
     How do the Bug Tag and Classic N10 tower work together to prevent theft? They operate as a radio frequency transmitter and receiver. The tag has a built in coil that is designed to send a signal out on a specific frequency. The tower is designed to pick up this radio frequency wave when the tag is carried into the receiver detection field. When a tag is detected alarms in the tower are activated and a loud, constant beeping noise sounds. LED lights in the antenna also flash and together they warn the employees of a facility that a tagged item is about to be carried out of the building. Staff then responds to the alarm and stop the person trying to walk out and prevent the tablet theft or i-pad theft from taking place. If a doctor or nurse has placed the device in a lab coat pocket and forgotten they have it as they are ready to leave, the alert reminds them to return it.
     The next question you may be asking yourself is, “Couldn’t a thief simply remove the Bug Tag from the unit and then walk through the Classic N10 pedestal?” The tags can only be removed from a device with a special removal tool only available from Alpha Security. Any tampering or forced removal of a tag causes an internal alarm in the tag to be set off. The alert is loud enough to scare a thief and cause him/her to panic and leave the device.
     So, how are mobile devices being used in autopsies? According to one website, they posted an article, “Sheffield Opens UK’s First Digital Autopsy Facility”, “Digital autopsy involves a scan of the body using a GE CT scanner, before iGene’s revolutionary, proprietary, software ‘INFOPSY®’ creates a 3D image of the body, enabling the pathologist to conduct a full, non-invasive digital post mortem using a large, touchscreen tablet computer.”   http://digitalautopsy.co.uk/sheffield-opens-uks-first-digital-autopsy-facility/
The article goes on to list some of the benefits of the digital autopsy as, almost immediate results, less stress on the family since it is non-invasive, faster investigation so the body can be released for final disposition more quickly, and accuracy of results since traditional methods may miss some things during the procedure. 
     In addition to the digital autopsy, there are a number of coroner apps that are now available for mobile devices. Some of these apps are an ‘Autopsy Checklist’, ‘Autopsy Consent and Authorization Form’, and ‘Elder Care When Someone Dies Checklist’.  The list of apps goes on, but the point is the apps exist and if they are in a digital format, private patient information is being stored that should be protected from possible breach. 
     Mobile devices and innovative, new applications can improve many aspects of the medical field. As the use of these personal handheld computers are used more it is imperative that steps are taken to prevent i-pad theft, tablet theft and the loss of patient data. The bug tag and Classic N10 pedestal are the protections you need to maintain that security.
The Bug Tag is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
     

The use of computer tablets and i-pads in healthcare has been growing rapidly. They have been used for entertaining children and alleviating their fear of being in an exam room. They are used by experts to meet with veterans who may be dealing with PTSD and don’t want to go into a hospital setting. They are being used to view x-rays and CT scans with patients. One use for i-pads and computer tablets I recently learned of is for conducting autopsies. As with any medical facility there still needs to be concern for the protection of patient information and privacy. Any patient information stored on a device is going to be potentially vulnerable to hacking and theft and could be used for fraudulent purposes. It is imperative that medical facilities take appropriate steps to prevent i-pad theft and tablet theft to protect patient privacy. The Alpha Bug Tag 2 and Classic N10 electronic article surveillance (EAS) tower are powerful tools to keep mobile medical devices safe from theft and potential patient information compromise.

How do the Bug Tag and Classic N10 tower work together to prevent theft? They operate as a radio frequency transmitter and receiver. The tag has a built in coil that is designed to send a signal out on a specific frequency. The tower is designed to pick up this radio frequency wave when the tag is carried into the receiver detection field. When a tag is detected alarms in the tower are activated and a loud, constant beeping noise sounds. LED lights in the antenna also flash and together they warn the employees of a facility that a tagged item is about to be carried out of the building. Staff then responds to the alarm and stop the person trying to walk out and prevent the tablet theft or i-pad theft from taking place. If a doctor or nurse has placed the device in a lab coat pocket and forgotten they have it as they are ready to leave, the alert reminds them to return it.

The next question you may be asking yourself is, “Couldn’t a thief simply remove the Bug Tag from the unit and then walk through the Classic N10 pedestal?” The tags can only be removed from a device with a special removal tool only available from Alpha Security. Any tampering or forced removal of a tag causes an internal alarm in the tag to be set off. The alert is loud enough to scare a thief and cause him/her to panic and leave the device.

So, how are mobile devices being used in autopsies? According to one website, they posted an article, “Sheffield Opens UK’s First Digital Autopsy Facility”, “Digital autopsy involves a scan of the body using a GE CT scanner, before iGene’s revolutionary, proprietary, software ‘INFOPSY®’ creates a 3D image of the body, enabling the pathologist to conduct a full, non-invasive digital post mortem using a large, touchscreen tablet computer.”   http://digitalautopsy.co.uk/sheffield-opens-uks-first-digital-autopsy-facility/

The article goes on to list some of the benefits of the digital autopsy as, almost immediate results, less stress on the family since it is non-invasive, faster investigation so the body can be released for final disposition more quickly, and accuracy of results since traditional methods may miss some things during the procedure. 

In addition to the digital autopsy, there are a number of coroner apps that are now available for mobile devices. Some of these apps are an ‘Autopsy Checklist’, ‘Autopsy Consent and Authorization Form’, and ‘Elder Care When Someone Dies Checklist’.  The list of apps goes on, but the point is the apps exist and if they are in a digital format, private patient information is being stored that should be protected from possible breach. 

 Mobile devices and innovative, new applications can improve many aspects of the medical field. As the use of these personal handheld computers are used more it is imperative that steps are taken to prevent i-pad theft, tablet theft and the loss of patient data. The bug tag and Classic N10 pedestal are the protections you need to maintain that security.

 

The Bug Tag is important and we can help you with it. Call 1.770.426.0547 and let’s talk.