Alpha Thunder Tags-5 WC blog 40
N10-3
Tablet Theft-3
Tablet Theft Can Lead To Patient Data Breaches – Protect Your Client Information With Classic N10 Antennas And Thunder Tags.
In a September 2014 online article in Reuters, “Your medical record is worth more to hackers than your credit card” Caroline Humer and Jim Finkle report, “Your medical information is worth 10 times more than your credit card on the black market”. The report goes on to mention that “stolen health credentials can go for $10 each, about 10 to 20 times the value of a U.S. credit card number, according to Don Jackson at Phishlabs, a cyber crime protection company.” A recent headline in a “HIPAA Journal” September 7, 2015 article, “Recent Cases Of Portable Device Theft Highlight Need For Healthcare Data Encryption”, should be a warning to healthcare providers that mobile devices are vulnerable to theft. Data breaches can be due to remote hacking or they can be the result of mobile devices that are stolen and then the information contained in the device is accessed by criminals. Prevention of tablet theft, i-pad theft and even the theft of laptops from a medical provider facility is more important now than ever before. There are protections available in addition to ensuring encryption is in place, such as using Alpha Thunder Tags to deter the theft of mobile devices.
To prevent theft, medical research offices, medical providers, or any office that has access to patient information and uses laptops, i-pads, tablets or other mobile technology can install an electronic article surveillance system. Connecting Alpha Thunder Tags to their devices creates a defense to limit opportunities for loss or theft. In order to work, Electronic Article Surveillance (EAS) antennas must be installed at ALL points of entry and exit. If space is limited at some points, the Checkpoint Classic N10 antenna can be installed. This particular antenna is a compact design, originally created for use in small retail stores where every inch of floor space is valuable. The versatility of the N10 clearly makes it a smart choice for any location that may be limited space, particularly a service type entrance for employees. Antennas at entrances will alert staff with an audible tone and flashing LED lights if someone attempts to leave with a device that has been tagged with an Alpha Thunder Tag.
Keeping equipment tagged is important, but so is accountability. There must be training for employees so they understand the reasons why mobile device security is important for the office. People are more likely to take security seriously when they understand the reasons behind actions. I have seen sign out lists for keys, scanning devices, and radios. The consistency for using sign out sheets varied depending on how or if employees were held accountable for failing to sign out equipment. When we took the time to explain why signing for equipment was important, there tended to be more cooperative compliance. This is especially important in a busy work environment where people are rushing to take care of patients and emergencies. If someone knows they are going to be held responsible if they lose a device they are generally more careful in how they handle the equipment. This is not to say things won’t be misplaced if they are signed out, but the knowledge that others will know who lost or misplaced a laptop or tablet will create a sense of urgency in people to look for that item with a greater vigor. Alpha Thunder Tags should be looked at as a backup security measure to equipment security. To prevent tablet theft and i-pad theft, the primary security measure is control and accountability.
The Classic N10 and other Checkpoint EAS antennas along with the Alpha Thunder tag can assist you in preventing tablet theft and i-pad theft. Protect confidential client data from theft, and protect your company from potentially thousands of dollars in fines and penalties. Look into the benefits of electronic article surveillance; it isn’t just for retail stores anymore.
For more information on Checkpoint Classic N10 Antenna contact us or call 1.770.426.0547
In a September 2014 online article in Reuters, “Your medical record is worth more to hackers than your credit card” Caroline Humer and Jim Finkle report, “Your medical information is worth 10 times more than your credit card on the black market”. The report goes on to mention that “stolen health credentials can go for $10 each, about 10 to 20 times the value of a U.S. credit card number, according to Don Jackson at Phishlabs, a cyber crime protection company.” A recent headline in a “HIPAA Journal” September 7, 2015 article, “Recent Cases Of Portable Device Theft Highlight Need For Healthcare Data Encryption”, should be a warning to healthcare providers that mobile devices are vulnerable to theft. Data breaches can be due to remote hacking or they can be the result of mobile devices that are stolen and then the information contained in the device is accessed by criminals. Prevention of tablet theft, i-pad theft and even the theft of laptops from a medical provider facility is more important now than ever before. There are protections available in addition to ensuring encryption is in place, such as using Alpha Thunder Tags to deter the theft of mobile devices.
To prevent theft, medical research offices, medical providers, or any office that has access to patient information and uses laptops, i-pads, tablets or other mobile technology can install an electronic article surveillance system. Connecting Alpha Thunder Tags to their devices creates a defense to limit opportunities for loss or theft. In order to work, Electronic Article Surveillance (EAS) antennas must be installed at ALL points of entry and exit. If space is limited at some points, the Checkpoint Classic N10 antenna can be installed. This particular antenna is a compact design, originally created for use in small retail stores where every inch of floor space is valuable. The versatility of the N10 clearly makes it a smart choice for any location that may be limited space, particularly a service type entrance for employees. Antennas at entrances will alert staff with an audible tone and flashing LED lights if someone attempts to leave with a device that has been tagged with an Alpha Thunder Tag.
Keeping equipment tagged is important, but so is accountability. There must be training for employees so they understand the reasons why mobile device security is important for the office. People are more likely to take security seriously when they understand the reasons behind actions. I have seen sign out lists for keys, scanning devices, and radios. The consistency for using sign out sheets varied depending on how or if employees were held accountable for failing to sign out equipment. When we took the time to explain why signing for equipment was important, there tended to be more cooperative compliance. This is especially important in a busy work environment where people are rushing to take care of patients and emergencies. If someone knows they are going to be held responsible if they lose a device they are generally more careful in how they handle the equipment. This is not to say things won’t be misplaced if they are signed out, but the knowledge that others will know who lost or misplaced a laptop or tablet will create a sense of urgency in people to look for that item with a greater vigor. Alpha Thunder Tags should be looked at as an esstial part of your security plan. To prevent tablet theft and i-pad theft, the primary security measure is control and accountability.
The Classic N10 and other Checkpoint EAS antennas along with the Alpha Thunder tag can assist you in preventing tablet theft and i-pad theft. Protect confidential client data from theft, and protect your company from potentially thousands of dollars in fines and penalties. Look into the benefits of electronic article surveillance; it isn’t just for retail stores anymore.
For more information on Checkpoint Classic N10 Antenna contact us or call 1.770.426.0547
Alpha Thunder Tag-4 WC blog 37
Tablet Theft-3
ipad Theft-3
Alpha Thunder Tags Terminate Medical Tablet Theft Temptations
Working in a medical facility or hospital, staff regularly handle confidential information. Most data and personal information is now digitalized and accessed through computers, laptops and now handheld devices. With this increased use of mobile technology, information security is increasingly at risk. According to Kevin Page and Phillip Hampton consultants for the American Bar Association, “On October 21, 2013, Alhambra, California-based AHMC Healthcare Inc. reported the theft of two unencrypted laptops containing the protected health information (“PHI”) of approximately 729,000 patients.” ( ABA Health eSource, Protecting PHI on Mobile Devices
Vol. 10 No. 3 Kevin Page, Waller, Nashville, TN, Phillip Hampton, LogicForce Consulting, LLC, Nashville, TN.) As healthcare providers are moving away from paper records and increasing the use of portable devices to care for patients, it is important for data as well as the devices to be protected. These devices include laptops, i-pads, tablets and even smartphones. Technology has made it possible for medical professionals to access patient records with a few key strokes or a swipe of the finger. Trying to find methods to protect devices can be difficult, but the Alpha Thunder Tag can provide the security you need. Healthcare professionals have an obligation to protect the information of their patients and the tools they use to store and access that information.
The Alpha Thunder Tag has electronic article surveillance built into it and if it passes through an EAS antenna, the antenna alarm will sound and alert staff to a possible theft or a forgotten device. If someone attempts to remove a device there is a tamper alarm that will sound, again alerting staff to a possible theft of the unit. The Thunder Tag does come in a 3 alarm version that sounds not only the antenna alarm if someone tried to exit with it, the alarm built into the device will also sound an alert.
I decided to do a little investigating of my own to see what information was available on data breaches in the healthcare industry. I went to the U.S. Department of HHS to seek information. The Department of Health and Human Services Office for Civil Rights website has a report titled “Breaches Affecting 500 or More Individuals”; (https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf In order to get the most accurate information available for this article, I applied the following filters: Dates from 1/1/2015 – 11/1/2015, for “Types of Breach” I included ” Hacking IT Incidents”, “Theft”,” Loss” and “Unknown”, for “Location” I only included “ Laptop” and “Other Portable Devices”.) For “The Type of Covered Entity” I used “Health Provider”. With these filters I received a list of 39 reported incidents with a total of 464,166 “Individuals Affected”. Bear in mind, this report only included breaches where 500 or more individuals were affected. 499 individuals affected or less are not included in the report from the DHHS. If you don’t think that tablet theft or i-pad theft is a problem, it is my hope that these numbers may change your mind. Security of these devices cannot be taken lightly. The Alpha Thunder Tag used with an Electronic Article Surveillance System can help you protect your portable laptops and mobile devices.
Thieves do not necessarily consider whether a tablet theft will result in gaining useful information. The opportunist may take a laptop or i-pad simply because it is accessible. If a device is stolen and information is encrypted, sometimes the challenge to some criminals is to see if they can access information. If successful they then have to decide what type of information they have and if they can use any of it. Some hackers do what they do to see if it can be done and that’s all. Unfortunately, if your office or practice is the victim of a tablet theft or i-pad theft, you can’t know what is being done with the information lost. The liability risk for your practice is minimized when the Alpha Thunder Tag is used to protect against laptop, tablet, and i-pad theft.
Don’t allow your mobile devices to go unprotected. Limit the risk of losing your mobile devices and with them, patient information. Look into the protection afforded you by investing in Alpha Thunder Tags.
For more information on the Alpha Thunder Tag, contact us or call 1.770.426.0547
Working in a medical facility or hospital, staff regularly handle confidential information. Most data and personal information is now digitalized and accessed through computers, laptops and now handheld devices. With this increased use of mobile technology, information security is increasingly at risk. According to Kevin Page and Phillip Hampton consultants for the American Bar Association, “On October 21, 2013, Alhambra, California-based AHMC Healthcare Inc. reported the theft of two unencrypted laptops containing the protected health information (“PHI”) of approximately 729,000 patients.” ( ABA Health eSource, Protecting PHI on Mobile DevicesVol. 10 No. 3 Kevin Page, Waller, Nashville, TN, Phillip Hampton, LogicForce Consulting, LLC, Nashville, TN.) As healthcare providers are moving away from paper records and increasing the use of portable devices to care for patients, it is important for data as well as the devices to be protected. These devices include laptops, i-pads, tablets and even smartphones. Technology has made it possible for medical professionals to access patient records with a few key strokes or a swipe of the finger. Trying to find methods to protect devices can be difficult, but the Alpha Thunder Tag can provide the security you need. Healthcare professionals have an obligation to protect the information of their patients and the tools they use to store and access that information.
The Alpha Thunder Tag has electronic article surveillance built into it and if it passes through an EAS antenna, the antenna alarm will sound and alert staff to a possible theft or a forgotten device. If someone attempts to remove a device there is a tamper alarm that will sound, again alerting staff to a possible theft of the unit. The Thunder Tag does come in a 3 alarm version that sounds not only the antenna alarm if someone tried to exit with it, the alarm built into the device will also sound an alert.
I decided to do a little investigating of my own to see what information was available on data breaches in the healthcare industry. I went to the U.S. Department of HHS to seek information. The Department of Health and Human Services Office for Civil Rights website has a report titled “Breaches Affecting 500 or More Individuals” (https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf In order to get the most accurate information available for this article, I applied the following filters: Dates from 1/1/2015 – 11/1/2015, for “Types of Breach” I included ” Hacking IT Incidents”, “Theft”,” Loss” and “Unknown”, for “Location” I only included “ Laptop” and “Other Portable Devices”.) For “The Type of Covered Entity” I used “Health Provider”. With these filters I received a list of 39 reported incidents with a total of 464,166 “Individuals Affected”. Bear in mind, this report only included breaches where 500 or more individuals were affected. 499 individuals affected or less are not included in the report from the DHHS. If you don’t think that tablet theft or i-pad theft is a problem, it is my hope that these numbers may change your mind. Security of these devices cannot be taken lightly. The Alpha Thunder Tag used with an Electronic Article Surveillance System can help you protect your portable laptops and mobile devices.
Thieves do not necessarily consider whether a tablet theft will result in gaining useful information. The opportunist may take a laptop or i-pad simply because it is accessible. If a device is stolen and information is encrypted, sometimes the challenge to some criminals is to see if they can access information. If successful they then have to decide what type of information they have and if they can use any of it. Some hackers do what they do to see if it can be done and that’s all. Unfortunately, if your office or practice is the victim of a tablet theft or i-pad theft, you can’t know what is being done with the information lost. The liability risk for your practice is minimized when the Alpha Thunder Tag is used to protect against laptop, tablet, and i-pad theft.
Don’t allow your mobile devices to go unprotected. Limit the risk of losing your mobile devices and with them, patient information. Look into the protection afforded you by investing in Alpha Thunder Tags.
For more information on the Alpha Thunder Tag, contact us or call 1.770.426.0547
N10 Antenna-3 , Alpha Thunder Tag-3 , Tablet Theft-2 , Medical Field-2
A Whole New Type Of Tablet Theft
When I think of what people typically steal from a doctor’s office, many different items come to mind. Latex gloves, magazines, bandages, and even facial tissues are often liberated from exam rooms and waiting areas across the country every day. Patients often feel entitled to those items, considering the costs associated with the office visit or the time they spent waiting to be seen. While those are minor infractions, those items do add more and more to the overall costs to the medical field in general. Of course, there are much more serious cases of theft in many doctor’s offices too. People steal from the supply of medication samples. There is also a very alarming rate of thefts of identities and medical records. These are problems all employees of the medical field must face and battle every day.
Tablet theft is a whole new problem that doctor’s offices could be dealing with, and I don’t mean the type you swallow. I’m talking about those new tablets that the front desk hands the patient to register for their appointments. Many offices are steering away from the traditional clipboard, with paper and pen, to update contacts, insurance and gather information for the purpose of the visit. They are going with a more technological and paperless approach with tablets and digital notebooks for patients to use instead. The patient is typically given the tablet and allowed to go sit in the lobby to fill in all the pertinent information. They may fill that in and hand it right back or they may keep the device throughout their appointment and hand it back in at the checkout desk. Either way, these are major investments and they must be protected. Since they have access to medical records, and because they are expensive pieces of equipment, this type of tablet theft must not be allowed to happen. It won’t if the office has the right tools.
The N10 Antenna offered by Checkpoint Systems is a key player in this game plan. Pair that with the Alpha Thunder Tag and you have a team that can’t be beat. The N10 Antenna is a sleek and compact detection system designed for small spaces. It is meant to blend in with its surroundings. However, it will not just sit quietly if one of the patients attempts to steal a tablet if said device has an Alpha Thunder Tag. It’s a simple plan: Attach the tag and turn it on. If the patient walks to close to the N10 Antenna (usually placed close to the exit to minimize false alarms) the alarm will sound from the detection system. If there is an attempt to remove or tamper with the Alpha Thunder Tag, an alarm will sound directly from the tag itself. On top of that, if the person was to successfully get out the door, once they were beyond the selected perimeter, the tag would self-alarm as well. Most patients would never even think to try and commit this type of tablet theft, but for those that think they can, this pair of tools will put a very fast and loud stop to it.
The medical field is always in need of improvements that can help streamline the ability to share medical records and make things easier for the patient. These new paperless check in systems fit right in with the reduction of redundant and seemingly ceaseless paperwork. Taking a glove or two won’t break the bank, but there needs to be a plan in place to prevent tablet theft. (And that means the electronic or medication type!)
For more information on how to prevent theft in the medical field, contact us or call: 1.770.426.0547
When I think of what people typically steal from a doctor’s office, many different items come to mind. Latex gloves, magazines, bandages, and even facial tissues are often liberated from exam rooms and waiting areas across the country every day. Patients often feel entitled to those items, considering the costs associated with the office visit or the time they spent waiting to be seen. While those are minor infractions, those items do add more and more to the overall costs to the medical field in general. Of course, there are much more serious cases of theft in many doctor’s offices too. People steal from the supply of medication samples. There is also a very alarming rate of thefts of identities and medical records. These are problems all employees of the medical field must face and battle every day.
Tablet theft is a whole new problem that doctor’s offices could be dealing with, and I don’t mean the type you swallow. I’m talking about those new tablets that the front desk hands the patient to register for their appointments. Many offices are steering away from the traditional clipboard, with paper and pen, to update contacts, insurance and gather information for the purpose of the visit. They are going with a more technological and paperless approach with tablets and digital notebooks for patients to use instead. The patient is typically given the tablet and allowed to go sit in the lobby to fill in all the pertinent information. They may fill that in and hand it right back or they may keep the device throughout their appointment and hand it back in at the checkout desk. Either way, these are major investments and they must be protected. Since they have access to medical records, and because they are expensive pieces of equipment, this type of tablet theft must not be allowed to happen. It won’t if the office has the right tools.
The N10 Antenna offered by Checkpoint Systems is a key player in this game plan. Pair that with the Alpha Thunder Tag and you have a team that can’t be beat. The N10 Antenna is a sleek and compact detection system designed for small spaces. It is meant to blend in with its surroundings. However, it will not just sit quietly if one of the patients attempts to steal a tablet if said device has an Alpha Thunder Tag. It’s a simple plan: Attach the tag and turn it on. If the patient walks to close to the N10 Antenna (usually placed close to the exit to minimize false alarms) the alarm will sound from the detection system. If there is an attempt to remove or tamper with the Alpha Thunder Tag, an alarm will sound directly from the tag itself. On top of that, if the person was to successfully get out the door, once they were beyond the selected perimeter, the tag would self-alarm as well. Most patients would never even think to try and commit this type of tablet theft, but for those that think they can, this pair of tools will put a very fast and loud stop to it.
The medical field is always in need of improvements that can help streamline the ability to share medical records and make things easier for the patient. These new paperless check in systems fit right in with the reduction of redundant and seemingly ceaseless paperwork. Taking a glove or two won’t break the bank, but there needs to be a plan in place to prevent tablet theft. (And that means the electronic or medication type!)
For more information on how to prevent theft in the medical field, contact us or call: 1.770.426.0547
Alpha Thunder Tag-4 WC blog 39
Classic N10-3
The High Price Of Health Care Mobile Device Theft
What is the cost to a medical facility for having a mobile device or portable laptop with patient information lost or stolen? Can a price tag be placed on privacy? The United States Department of Health and Human Services can and does put a price tag on security breaches. According to DHHS documents on their website, on October 11, 2011, Lahey Clinical Hospital, Inc. reported a breach of its unsecured electronic protected health information (“ePHI”) when a laptop containing information of 599 patients was stolen from their radiology department. According to the website, this breach cost Lahey $850,000 in fines. In a separate incident, a stolen laptop from the car of an employee who worked for Cancer Care Group resulted in a $750,000 fine for the company. The stolen laptop reportedly did not contain “ePHI” data, but a “computer server backup media”, apparently in the same laptop bag contained the “ePHI” of approximately 55,000 individuals. In both of these cases, the complaints stated the companies failed to conduct thorough risk assessment for vulnerabilities in relation to “ePHI”. Two incidents cost over 1.5 Million dollars in fines. Could these fines have been avoided? It is very possible they could have, had the companies had a comprehensive security plan in place that included Alpha Thunder Tags and the Classic N10 antenna.
It is important to be proactive and create a plan before an i-pad, tablet theft, or laptop theft occurs. What are some steps your company can take to protect information?
• Ensure you have secure areas inaccessible to the public. You may even want to use pass code enabled door locks to prevent unauthorized entry. It is in these areas your mobile devices should be secured when not in use.
• Be sure all of your mobile devices are encrypted. While a hacker may be able to eventually get through encryption, it is difficult and time consuming.
• Number all laptops and devices and require an audit of the devices at the end of the day to ensure they are accounted for.
• Require all devices be signed for before being checked out for use. Signing for something tends to make people feel more accountable for something and it does make it easier to track if a device is out when an audit is conducted.
• Secure all devices with an Alpha Thunder Tag. The Thunder Tag will set off an electronic article surveillance system if someone were to attempt to exit the building with it.
• Install the Classic N10 antenna at ALL entrance and exit points. Even if it is a staff only entrance/exit, it will help detect if someone accidentally attempts to leave with a device.
• If External hard drives are used for data storage, be sure these are protected and accounted for in the same manner as your laptops and mobile devices.
• Use the S3 Locking Counter Key for removing the Alpha Thunder Tag if it has to leave the building for some reason, such as a repair. The counter key can be secured to a counter and the key locked to the base when not in use, preventing someone from removing an Alpha Thunder Tag from a mobile device.
Concerned your office space is too small for an EAS antenna? The Classic N10 is designed specifically for smaller entrances or lobby areas. The space requirement for this antenna is far less than the traditional models and will not detract from the small practice that has minimal waiting room space. This antenna will provide the same protection afforded by the larger models so you won’t have to be concerned about whether or not it would detect a device being removed from the office.
Mobile devices and laptops are leading to major improvements in providing improved patient healthcare. Better accuracy in data entry, faster access to medical records, the ability for real-time patient consultations between healthcare providers are some of the benefits to the industry. The opportunity for security compromise is the flip side of the equation. Don’t allow your practice to be the object of a huge DHHS fine. Consult with Checkpoint experts to see what protections including Alpha Thunder Tags they may have that can secure your mobile devices from theft and loss.
For more information on Alpha Thunder Tags contact us or call 1.770.426.0547
What is the cost to a medical facility for having a mobile device or portable laptop with patient information lost or stolen? Can a price tag be placed on privacy? The United States Department of Health and Human Services can and does put a price tag on security breaches. According to DHHS documents on their website, on October 11, 2011, Lahey Clinical Hospital, Inc. reported a breach of its unsecured electronic protected health information (“ePHI”) when a laptop containing information of 599 patients was stolen from their radiology department. According to the website, this breach cost Lahey $850,000 in fines. In a separate incident, a stolen laptop from the car of an employee who worked for Cancer Care Group resulted in a $750,000 fine for the company. The stolen laptop reportedly did not contain “ePHI” data, but a “computer server backup media”, apparently in the same laptop bag contained the “ePHI” of approximately 55,000 individuals. In both of these cases, the complaints stated the companies failed to conduct thorough risk assessment for vulnerabilities in relation to “ePHI”. Two incidents cost over 1.5 Million dollars in fines. Could these fines have been avoided? It is very possible they could have, had the companies had a comprehensive security plan in place that included Alpha Thunder Tags and the Classic N10 antenna.
It is important to be proactive and create a plan before an i-pad, tablet theft, or laptop theft occurs. What are some steps your company can take to protect information?
• Ensure you have secure areas inaccessible to the public. You may even want to use pass code enabled door locks to prevent unauthorized entry. It is in these areas your mobile devices should be secured when not in use.
• Be sure all of your mobile devices are encrypted. While a hacker may be able to eventually get through encryption, it is difficult and time consuming.
• Number all laptops and devices and require an audit of the devices at the end of the day to ensure they are accounted for.
• Require all devices be signed for before being checked out for use. Signing for something tends to make people feel more accountable for something and it does make it easier to track if a device is out when an audit is conducted.
• Secure all devices with an Alpha Thunder Tag. The Thunder Tag will set off an electronic article surveillance system if someone were to attempt to exit the building with it.
• Install the Classic N10 antenna at ALL entrance and exit points. Even if it is a staff only entrance/exit, it will help detect if someone accidentally attempts to leave with a device.
• If External hard drives are used for data storage, be sure these are protected and accounted for in the same manner as your laptops and mobile devices.
• Use the S3 Locking Counter Key for removing the Alpha Thunder Tag if it has to leave the building for some reason, such as a repair. The counter key can be secured to a counter and the key locked to the base when not in use, preventing someone from removing an Alpha Thunder Tag from a mobile device.
Concerned your office space is too small for an EAS antenna? The Classic N10 is designed specifically for smaller entrances or lobby areas. The space requirement for this antenna is far less than the traditional models and will not detract from the small practice that has minimal waiting room space. This antenna will provide the same protection afforded by the larger models so you won’t have to be concerned about whether or not it would detect a device being removed from the office.
Mobile devices and laptops are leading to major improvements in providing improved patient healthcare. Better accuracy in data entry, faster access to medical records, the ability for real-time patient consultations between healthcare providers are some of the benefits to the industry. The opportunity for security compromise is the flip side of the equation. Don’t allow your practice to be the object of a huge DHHS fine. Consult with Checkpoint experts to see what protections including Alpha Thunder Tags they may have that can secure your mobile devices from theft and loss.
For more information on Alpha Thunder Tags contact us or call 1.770.426.0547
Classic N10-5 WC Blog 38
S3 key-5
Alpha Thunder Tag-5
The Classic N10 Antenna: Protecting Patient Privacy One i-Pad At A Time
If you work in or around a physician’s office or a medical practice you are surrounded by private medical files and patient information that has to remain secure. You are keenly aware of HIPAA Laws and the privacy rules that apply to the handling of client information. Not long ago I made a trip to a local minute clinic and had to electronically submit answers to a questionnaire before the visit with the nurse practitioner could take place. This was a change from the method of filling out what seemed like reams of paperwork in the past. In many practices, the use of laptops and even portable devices such as tablet’s and i-pads are becoming common place, removing the need for traditional patient charts and paper records. One of the benefits of the move towards mobile technology is the reduced risk of paper records getting lost, or misplaced. Let’s face it, some of the hand written notes are difficult to decipher and can be cause for misunderstanding or human error in transcribing those notes. The other side of the coin is the risk of theft of an i-pad or tablet from a medical office. The amount of information carried in a laptop of mobile device makes the loss or theft of one of these units far more risky than losing a single patient’s medical file. Electronic Article Surveillance technology is available to medical offices in order to secure their devices, among which is the Alpha Thunder Tag used in conjunction with the Classic N10 EAS antenna.
Some practices may be reluctant to invest in the EAS technology due to the size often associated with EAS antennas. Office space is not always large, and entry ways are sometimes just large enough to meet the requirements for wheelchairs to access the building. The concerns of staff are that the antennas may impede the access of patients trying to enter who may have to use some type of assistance to maneuver. The Classic N10 antenna is a slim, smaller, profile antenna that can provide the same level of security as their larger counterparts.
The Classic N10 antenna is more compact that the models normally seen when entering a retail business. They still provide the same benefits of the larger antennas, flashing LED lights for visual alerting staff and deterring theft. Audible signaling occurs when a breach takes place in the event someone were to attempt the theft of a tablet or i-pad secured with an Alpha Thunder Tag, in the case of a doctor’s office . An advantage the Classic N10 has over some previous models, is that it also has jammer detection, alerting staff if a jamming device may be in use to try to circumvent the EAS antenna.
Perhaps your office has a need to take a mobile device out of the office at some time. The Alpha Thunder Tag can be removed with the S3 key and XT detachers. These detachment keys can be ordered in counter locking versions that can prevent the keys themselves from being stolen. The base is secured to a countertop or under a counter out of view and the key is attached with a lanyard. The S3 locking counter key locks the detacher to the base until it is needed to remove an Alpha Thunder Tag from a laptop or mobile device. The alarmed S3 locking counter key has the same protection as the S3 locking counter key but the security of the device is taken a step further. If someone were to tamper with the lanyard on this version it will sound an alarm and alert staff to the potential attempted theft of the key. Maintaining the keys in a secure office space, off limits to visitors and non-staff personnel will provide additional safety measures to protect your devices and patient information.
A complete Electronic Article Surveillance system which includes the Classic N10 antenna, Alpha Thunder tags and an S3 key will protect your office the from laptop, i-pad and tablet thefts. Reduce your concerns over potential stolen patient information, look into how you can protect office mobile devices.
For more information on the Classic N10 antenna contact us or call 1.770.426.0547
If you work in or around a physician’s office or a medical practice you are surrounded by private medical files and patient information that has to remain secure. You are keenly aware of HIPAA Laws and the privacy rules that apply to the handling of client information. Not long ago I made a trip to a local minute clinic and had to electronically submit answers to a questionnaire before the visit with the nurse practitioner could take place. This was a change from the method of filling out what seemed like reams of paperwork in the past. In many practices, the use of laptops and even portable devices such as tablet’s and i-pads are becoming common place, removing the need for traditional patient charts and paper records. One of the benefits of the move towards mobile technology is the reduced risk of paper records getting lost, or misplaced. Let’s face it, some of the hand written notes are difficult to decipher and can be cause for misunderstanding or human error in transcribing those notes. The other side of the coin is the risk of theft of an i-pad or tablet from a medical office. The amount of information carried in a laptop of mobile device makes the loss or theft of one of these units far more risky than losing a single patient’s medical file. Electronic Article Surveillance technology is available to medical offices in order to secure their devices, among which is the Alpha Thunder Tag used in conjunction with the Classic N10 EAS antenna.
Some practices may be reluctant to invest in the EAS technology due to the size often associated with EAS antennas. Office space is not always large, and entry ways are sometimes just large enough to meet the requirements for wheelchairs to access the building. The concerns of staff are that the antennas may impede the access of patients trying to enter who may have to use some type of assistance to maneuver. The Classic N10 antenna is a slim, smaller, profile antenna that can provide the same level of security as their larger counterparts.
The Classic N10 antenna is more compact that the models normally seen when entering a retail business. They still provide the same benefits of the larger antennas, flashing LED lights for visual alerting staff and deterring theft. Audible signaling occurs when a breach takes place in the event someone were to attempt the theft of a tablet or i-pad secured with an Alpha Thunder Tag, in the case of a doctor’s office. An advantage the Classic N10 has over some previous models, is that it also has jammer detection, alerting staff if a jamming device may be in use to try to circumvent the EAS antenna.
Perhaps your office has a need to take a mobile device out of the office at some time. The Alpha Thunder Tag can be removed with the S3 key and XT detachers. These detachment keys can be ordered in counter locking versions that can prevent the keys themselves from being stolen. The base is secured to a countertop or under a counter out of view and the key is attached with a lanyard. The S3 locking counter key locks the detacher to the base until it is needed to remove an Alpha Thunder Tag from a laptop or mobile device. The alarmed S3 locking counter key has the same protection as the S3 locking counter key but the security of the device is taken a step further. If someone were to tamper with the lanyard on this version it will sound an alarm and alert staff to the potential attempted theft of the key. Maintaining the keys in a secure office space, off limits to visitors and non-staff personnel will provide additional safety measures to protect your devices and patient information.
A complete Electronic Article Surveillance system which includes the Classic N10 antenna, Alpha Thunder tags and an S3 key will protect your office the from laptop, i-pad and tablet thefts. Reduce your concerns over potential stolen patient information; look into how you can protect office mobile devices.
For more information on the Classic N10 antenna contact us or call 1.770.426.0547