Checkpoint Security Systems Are Key To Your Inventory Control: Part 2

Checkpoint Systems-3                                                                                                        WC Blog 264
Checkpoint Security System-5
Checkpoint Tags-5
Stop Shoplifting-3
Checkpoint Security Systems Are Key To Your Inventory Control: Part 2
     In Part 1 of this series on Inventory Control, I discussed my definition of what Inventory Control is and how it can be confused with the different strategies used by stores to keep control over inventory.  I examined how the use of Checkpoint Tags are a strategy to exert control as soon as merchandise is received by a store and can stop shoplifting and deter internal and vendor theft. In Part 2 I will be going over other parts of a Checkpoint Security System that play a role in retail theft prevention and inventory control.
     A Checkpoint Security System includes the Checkpoint Tags and labels as I mentioned, but aside from deterrence without the other components of the system, Checkpoint Tags are not extremely helpful.  A primary component of Checkpoint Systems is the electronic article surveillance (EAS) antennas.  Antennas are usually placed near the main entry and exit points of a store in order to detect merchandise that is protected with Checkpoint Tags that have not been deactivated or removed at a point of sale.  The tags and labels are structured so that they transmit a specific radio frequency.  When the antennas detect this radio frequency an alarm built into the antennas activates and warns staff that merchandise not yet paid for is leaving the store.  This means an item has a Checkpoint Tag that has not been detuned at the register or a hard tag that has not been removed by a cashier.  When employees are alerted by the alarm they respond to the doors to conduct a receipt check and determine the cause for the activation.  Usually the alarm will result in recovered merchandise as a result of the check, such as a customer carrying out merchandise they “forgot” they had with them.  An alarm may stop shoplifting when a criminal panics and drops the goods they were attempting to steal, a result I frequently witnessed as a Loss Prevention Manager.
     When a Checkpoint Security System is installed, there are a variety of EAS antennas that a store owner can choose from to stop shoplifting, internal theft and vendor theft.  Checkpoint systems include antennas that can be installed in the floor during store construction, antennas that can help showcase merchandise with advertising panels (the Evolve iRange P30) and smaller antennas that take up minimal space at doorways, like the Classic N10 antenna.  No matter which type of antenna is chosen, the inventory control strategy is making sure merchandise is accounted for through the point of sales or proper execution of vendor return processes or vendor credit/destroy processes.  
     If a store owner wants to be serious about inventory control and theft prevention, it would be wise to consider putting Checkpoint Security System antennas in other areas and not limited to just the front doors.  EAS antennas can be placed at employee entrances and vendor/receiving doors.  Antennas located at front doors stop shoplifting and may deter some employee theft and vendor theft, but if there are alternate exits employees and vendors may take advantage of those doors to avoid the detection of Checkpoint tags and labels.  In rare instances I have observed Checkpoint Systems antennas located at a hallway entrance leading to store restrooms.  I applaud this step.  I can recall several employee theft investigations I conducted that involved the employee taking concealed merchandise into a restroom and later I would find the empty packaging.  Again, I stress that inventory control is control over the movement of product in the building.  Well placed antennas can control the areas people are able to carry merchandise into. 
     Make inventory control a reality by implementing effective merchandise protection strategies that limit the ability of customer, employees or vendors to steal.  Control what happens within your building by installing a Checkpoint Security System.
Get more information on Checkpoint Security Systems, contact us or call 1.770.426.0547 today.
     

In Part 1 of this series on Inventory Control, I discussed my definition of what Inventory Control is and how it can be confused with the different strategies used by stores to keep control over inventory. I examined how the use of Checkpoint Tags are a strategy to exert control as soon as merchandise is received by a store and can stop shoplifting and deter internal and vendor theft. In Part 2 I will be going over other parts of a Checkpoint Security System that play a role in retail theft prevention and inventory control.
     

A Checkpoint Security System includes the Checkpoint Tags and labels as I mentioned, but aside from deterrence without the other components of the system, Checkpoint Tags are not extremely helpful. A primary component of Checkpoint Systems is the electronic article surveillance (EAS) antennas. Antennas are usually placed near the main entry and exit points of a store in order to detect merchandise that is protected with Checkpoint Tags that have not been deactivated or removed at a point of sale. The tags and labels are structured so that they transmit a specific radio frequency. When the antennas detect this radio frequency an alarm built into the antennas activates and warns staff that merchandise not yet paid for is leaving the store. This means an item has a Checkpoint Tag that has not been detuned at the register or a hard tag that has not been removed by a cashier. When employees are alerted by the alarm they respond to the doors to conduct a receipt check and determine the cause for the activation.  Usually the alarm will result in recovered merchandise as a result of the check, such as a customer carrying out merchandise they “forgot” they had with them. An alarm may stop shoplifting when a criminal panics and drops the goods they were attempting to steal, a result I frequently witnessed as a Loss Prevention Manager.
     

When a Checkpoint Security System is installed, there are a variety of EAS antennas that a store owner can choose from to stop shoplifting, internal theft and vendor theft. Checkpoint systems include antennas that can be installed in the floor during store construction, antennas that can help showcase merchandise with advertising panels (the Evolve iRange P30) and smaller antennas that take up minimal space at doorways, like the Classic N10 antenna. No matter which type of antenna is chosen, the inventory control strategy is making sure merchandise is accounted for through the point of sales or proper execution of vendor return processes or vendor credit/destroy processes.  
     

 If a store owner wants to be serious about inventory control and theft prevention, it would be wise to consider putting Checkpoint Security System antennas in other areas and not limited to just the front doors. EAS antennas can be placed at employee entrances and vendor/receiving doors. Antennas located at front doors stop shoplifting and may deter some employee theft and vendor theft, but if there are alternate exits employees and vendors may take advantage of those doors to avoid the detection of Checkpoint tags and labels. In rare instances I have observed Checkpoint Systems antennas located at a hallway entrance leading to store restrooms. I applaud this step. I can recall several employee theft investigations I conducted that involved the employee taking concealed merchandise into a restroom and later I would find the empty packaging. Again, I stress that inventory control is control over the movement of product in the building. Well placed antennas can control the areas people are able to carry merchandise into. 

     

Make inventory control a reality by implementing effective merchandise protection strategies that limit the ability of customer, employees or vendors to steal. Control what happens within your building by installing a Checkpoint Security System.

 

Get more information on Checkpoint Security Systems, contact us or call 1.770.426.0547 today.

     

 

Mobile Medical Devices Allow Doctors To Visit Patients Online – Those Devices Need To Be Protected With Alpha Thunder Tags Part 2

Alpha Thunder Tags-4                                                                                                                          WC blog 217
Checkpoint Classic N10-3
i-pad Theft-3
Tablet Theft-3
Mobile Medical Devices Allow Doctors To Visit Patients Online – Those Devices Need To Be Protected With Alpha Thunder Tags Part 2
     I stated this two-part series discussing my fascination with a doctor’s office visit the other day.  During the visit I found out this particular healthcare provider offers an online service to patients.  Doctors can conduct consultations with patients over the patient’s phone, tablet, i-pad or their computer.  The patient only needs to sign up for the service and set an appointment.  I will add that the consultation is for limited medical issues, as more serious ailments or conditions require the patient to be seen onsite. I did not know for certain how the doctor conducts the visit from their end, but I speculated they are probably using a mobile device as well. This would allow them flexibility to move about the office or clinic while visiting the patient.  From my recent research into the growing use of mobile medical devices in hospitals and how they are being used, this would only be a reasonable conclusion. I applauded the clinic for the creativity in reducing patient wait times and embracing technology in this way.  Then it dawned on me that while I applaud the clinic for using technology for visits, I was still in a waiting room doing what?  FILLING OUT PAPERWORK!  While I recognize that electronic health records (ehr) are still a relatively new concept and medical providers are slowly transitioning to them; it seems this provider should have patients using medical mobile devices to complete new patient information.  Clinics could protect against i-pad theft and tablet theft by attaching Alpha Thunder Tags to the mobile medical devices and installing Checkpoint Classic N10 antennas in doorways.
     Alpha Thunder Tags are anti-theft devices that work in conjunction with electronic article surveillance (EAS) antennas such as the Checkpoint Classic N10.  The Thunder Tag has radio frequency technology built into it that sends out a RF signal.  When that signal is picked up by the antenna an audible alarm is activated and flashing LED lights in the antenna are triggered.  By attaching the tags to medical mobile devices, hospitals or clinics can prevent their devices from being stolen.  This makes it feasible for a care center to allow patients to complete their medical forms online through a device without concern of a tablet theft or i-pad theft. I am sure the question is raised, couldn’t someone just remove the tag and steal the device anyways?  No, the Alpha Thunder Tag has a built in tamper alarm that sounds if someone were to try to remove it. 
     The question may also be asked, “Why should we allow the patient to hold the i-pad or tablet and take the chance that it may be stolen?  We just transfer the information to the computer after the patient fills out the paperwork, so we still comply with ehr requirements.”  My response is that this is double work.  I am not a proponent of wasted effort.  If the patient can do it once on a clinic supplied device there is no need for the receptionist to retype it.  You also have two chances for input errors, first by the patient then by the employee.  The receptionist can always assist a patient in inputting information if they are unable to do so themselves. In other words, if the technology is already in place, doesn’t it make more sense to
use it to the fullest potential?   One other thing about using paper, it is always possible for paperwork to get misplaced or lost.  I have even written on cases where paper medical records have been dumped in outdoor trash bins.  Why take the chance of patient information breaches because paperwork is mishandled? 
     Mobile medical devices offer many benefits from online patient visits to a variety of professional medical apps for doctors and nurses.  Clinics, hospitals and doctor offices can become more efficient and grow their practices by using these new technologies. Incorporate Alpha Thunder Tags and Checkpoint Classic N10 antennas to protect against tablet theft or i-pad theft and to prevent patient data breaches.
Alpha Thunder Tags are important and we can help it.  Call 1.770.426.0547 and let’s talk.
 

I stated this two-part series discussing my fascination with a doctor’s office visit the other day. During the visit I found out this particular healthcare provider offers an online service to patients. Doctors can conduct consultations with patients over the patient’s phone, tablet, i-pad or their computer. The patient only needs to sign up for the service and set an appointment. I will add that the consultation is for limited medical issues, as more serious ailments or conditions require the patient to be seen onsite. I did not know for certain how the doctor conducts the visit from their end, but I speculated they are probably using a mobile device as well. This would allow them flexibility to move about the office or clinic while visiting the patient. From my recent research into the growing use of mobile medical devices in hospitals and how they are being used, this would only be a reasonable conclusion. I applauded the clinic for the creativity in reducing patient wait times and embracing technology in this way. Then it dawned on me that while I applaud the clinic for using technology for visits, I was still in a waiting room doing what? FILLING OUT PAPERWORK! While I recognize that electronic health records (ehr) are still a relatively new concept and medical providers are slowly transitioning to them; it seems this provider should have patients using medical mobile devices to complete new patient information. Clinics could protect against i-pad theft and tablet theft by attaching Alpha Thunder Tags to the mobile medical devices and installing Checkpoint Classic N10 antennas in doorways.
     

Alpha Thunder Tags are anti-theft devices that work in conjunction with electronic article surveillance (EAS) antennas such as the Checkpoint Classic N10. The Thunder Tag has radio frequency technology built into it that sends out a RF signal. When that signal is picked up by the antenna an audible alarm is activated and flashing LED lights in the antenna are triggered. By attaching the tags to medical mobile devices, hospitals or clinics can prevent their devices from being stolen. This makes it feasible for a care center to allow patients to complete their medical forms online through a device without concern of a tablet theft or i-pad theft. I am sure the question is raised, couldn’t someone just remove the tag and steal the device anyways? No, the Alpha Thunder Tag has a built in tamper alarm that sounds if someone were to try to remove it.      

 

The question may also be asked, “Why should we allow the patient to hold the i-pad or tablet and take the chance that it may be stolen? We just transfer the information to the computer after the patient fills out the paperwork, so we still comply with ehr requirements.” My response is that this is double work. I am not a proponent of wasted effort. If the patient can do it once on a clinic supplied device there is no need for the receptionist to retype it. You also have two chances for input errors, first by the patient then by the employee. The receptionist can always assist a patient in inputting information if they are unable to do so themselves. In other words, if the technology is already in place, doesn’t it make more sense touse it to the fullest potential?  One other thing about using paper, it is always possible for paperwork to get misplaced or lost. I have even written on cases where paper medical records have been dumped in outdoor trash bins. Why take the chance of patient information breaches because paperwork is mishandled? 
     

Mobile medical devices offer many benefits from online patient visits to a variety of professional medical apps for doctors and nurses. Clinics, hospitals and doctor offices can become more efficient and grow their practices by using these new technologies. Incorporate Alpha Thunder Tags and Checkpoint Classic N10 antennas to protect against tablet theft or i-pad theft and to prevent patient data breaches.

 

Alpha Thunder Tags are important and we can help it.  Call 1.770.426.0547 and let’s talk.
 

 

Mobile Medical Devices Allow Doctors To Visit Patients Online – Those Devices Need To Be Protected With Alpha Thunder Tags Part 1

Alpha Thunder Tag-4                                                                                                                 WC Blog 216
Checkpoint Classic N10-3
i-pad theft-4
Tablet Theft-4
 Mobile Medical Devices Allow Doctors To Visit Patients Online – Those Devices Need To Be Protected With Alpha Thunder Tags Part 1 
     Have you ever had to go to a doctor’s office and then wait to be seen?  It isn’t much fun, especially when it’s your first visit and you have to complete all of the background information, medical history, insurance information, etc.  The other day I had to make such a visit to a doctor’s office/clinic for a family member.  The one upside was that this was a new facility so we were the only people waiting to be seen except, the television monitor indicated one other patient was being seen “online”.  Online?!  It was interesting that someone not at the clinic was being seen before us.  We finished our paperwork and my family member was called in to see the doctor.   The wait wasn’t as long as I am used to from other experiences so I was pleasantly surprised.  While I waited in the lobby I was reading some of the literature about this particular medical provider chain.  I found that they have on online consultation they can provide to their patients.  That would explain the online patient that was ahead of us. The picture they showed on the advertisement had a patient with a tablet and their website information.  Now, since I write about mobile medical devices and protecting against i-pad theft and tablet theft using Alpha Thunder Tags, I couldn’t help but have my curiosity piqued.  Does this provider use medical tablets or i-pads on their end to conduct online visits?  If they do, are they taking precautions to protect those devices from theft?
     Facilities that are using mobile medical devices must be careful to protect those devices or they risk compromising patient information.  Medical i-pad theft or tablet theft can be prevented if a facility uses an Alpha Thunder Tag on a device and installs Checkpoint Classic N10 antennas on their entrances/exits.  The Alpha Thunder Tag is attached to each mobile device with an adhesive backing.  The tags are electronic article surveillance ready, and emit a radio frequency signal that can be read by the Checkpoint Classic N10 antenna.  If someone tries to steal one of the devices protected with a tag, an alarm in the antenna activates an audible signal and the built in flashing LED lights are set off.  Employees from the clinic or hospital can respond to the alarm and recover the stolen goods.  The Thunder Tag has a tamper alarm so that if someone decides to try to be clever and remove the tag, the alarm built into the tag activates.  
     If space for an electronic article surveillance antenna (EAS) in your doorways is a concern, the Checkpoint Classic N10 is the perfect solution.  It is designed to take up very little room, fitting comfortably in standard entry ways.  Though they do not take up the area that the antennas in large retail stores do, they still provide the same high level detection capabilities.  If a tablet theft or i-pad theft is taking place and the device is concealed in a briefcase, purse or in a pocket, the antenna will still detect the Thunder Tag.
     So, getting back to my clinic visit, I was intrigued by the advertisement and when I got home, I looked up information on the company’s website.  According to their information, a patient only needs to set up an account and they can see a doctor using their phone, tablet or computer.  The information did not specify how the doctor “sees” the patient.  My inkling is that with a computer, the doctor is somewhat locked into one place for consultations.  With a mobile device, they could be moving within the clinic and multitasking.  It is even possible that an i-pad or tablet would be the better solution so they can do the consultation and still have the ability to look up medical information using medical apps that are now available to healthcare providers.  Of course, this is speculation on my part, but with the growing use of mobile medical devices and the fact this provider seems to be on the cutting edge of technology, I would be surprised if they were not using mobile devices for their service.
     It is great that healthcare providers are using the power of technology to improve patient services and cutting down the length of time required to see a doctor.  Mobile devices are helping to make great strides in medicine, even to the point that doctors can consult with each other in remote locations.  With all these advances, it only makes sense to protect against medical i-pad theft and tablet theft with Alpha Thunder Tags and Classic N10 antennas.  Why risk losing a device when security is a phone call away!
Need information on Alpha Thunder Tags?  Give us a call at 1.770.426.0547 now.
     

Have you ever had to go to a doctor’s office and then wait to be seen?  It isn’t much fun, especially when it’s your first visit and you have to complete all of the background information, medical history, insurance information, etc. The other day I had to make such a visit to a doctor’s office/clinic for a family member. The one upside was that this was a new facility so we were the only people waiting to be seen except, the television monitor indicated one other patient was being seen “online”. Online?!  It was interesting that someone not at the clinic was being seen before us. We finished our paperwork and my family member was called in to see the doctor. The wait wasn’t as long as I am used to from other experiences so I was pleasantly surprised. While I waited in the lobby I was reading some of the literature about this particular medical provider chain. I found that they have on online consultation they can provide to their patients. That would explain the online patient that was ahead of us. The picture they showed on the advertisement had a patient with a tablet and their website information. Now, since I write about mobile medical devices and protecting against i-pad theft and tablet theft using Alpha Thunder Tags, I couldn’t help but have my curiosity piqued. Does this provider use medical tablets or i-pads on their end to conduct online visits? If they do, are they taking precautions to protect those devices from theft?
     

Facilities that are using mobile medical devices must be careful to protect those devices or they risk compromising patient information. Medical i-pad theft or tablet theft can be prevented if a facility uses an Alpha Thunder Tag on a device and installs Checkpoint Classic N10 antennas on their entrances/exits. The Alpha Thunder Tag is attached to each mobile device with an adhesive backing. The tags are electronic article surveillance ready, and emit a radio frequency signal that can be read by the Checkpoint Classic N10 antenna. If someone tries to steal one of the devices protected with a tag, an alarm in the antenna activates an audible signal and the built in flashing LED lights are set off. Employees from the clinic or hospital can respond to the alarm and recover the stolen goods. The Thunder Tag has a tamper alarm so that if someone decides to try to be clever and remove the tag, the alarm built into the tag activates.       

 

If space for an electronic article surveillance antenna (EAS) in your doorways is a concern, the Checkpoint Classic N10 is the perfect solution. It is designed to take up very little room, fitting comfortably in standard entry ways. Though they do not take up the area that the antennas in large retail stores do, they still provide the same high level detection capabilities. If a tablet theft or i-pad theft is taking place and the device is concealed in a briefcase, purse or in a pocket, the antenna will still detect the Thunder Tag.
     

So, getting back to my clinic visit, I was intrigued by the advertisement and when I got home, I looked up information on the company’s website. According to their information, a patient only needs to set up an account and they can see a doctor using their phone, tablet or computer. The information did not specify how the doctor “sees” the patient. My inkling is that with a computer, the doctor is somewhat locked into one place for consultations. With a mobile device, they could be moving within the clinic and multitasking. It is even possible that an i-pad or tablet would be the better solution so they can do the consultation and still have the ability to look up medical information using medical apps that are now available to healthcare providers. Of course, this is speculation on my part, but with the growing use of mobile medical devices and the fact this provider seems to be on the cutting edge of technology, I would be surprised if they were not using mobile devices for their service.
     

It is great that healthcare providers are using the power of technology to improve patient services and cutting down the length of time required to see a doctor. Mobile devices are helping to make great strides in medicine, even to the point that doctors can consult with each other in remote locations. With all these advances, it only makes sense to protect against medical i-pad theft and tablet theft with Alpha Thunder Tags and Classic N10 antennas. Why risk losing a device when security is a phone call away!

 

Need information on Alpha Thunder Tags?  Give us a call at 1.770.426.0547 now.

     

 

Mobile Medical Device Theft Can Lead To Damaged Reputation; Alpha Thunder Tags Provide Protection Part 1

 

Alpha Thunder Tags -3                                                                                                         WC blog 209 
Checkpoint Classic N10-3
i-pad theft-3
Tablet theft-3
Mobile Medical Device Theft Can Lead To Damaged Reputation; Alpha Thunder Tags Provide Protection Part 1
     In my retail job and my library job, I have to occassionally take online training modules reminding me of the importance of information security.  The trainings remind me that I need to be careful when creating passwords, because when they are too easy, hackers can figure them out.  I am also reminded that I should not open emails and especially the attachments if I don’t recognize the sender.  Viruses and malware may be slipped into my computer if I am careless.  One warning I recently came across in a training and I had not considered before is that when a company suffers a security breach, they risk damage to their brand and reputation.  I realized how true that statement is.  Think about the major retailers that have had data breaches and customer credit card information has been compromised.  Consumer confidence begins to wane and stock prices drop.  Customers start to question whether it is wise to shop at those locations.  A company’s reputation is tied to a lot of different factors, but trust is near the top of that list.  The same can be said for medical care facilities.  When a cyber attack takes place or patient information is mis-handled, it makes the news and patients become fearful that their information is vulnerable.  With the increased use of medical mobile devices,concerns over i-pad theft, tablet theft and medical laptop theft have become the source of government concern.  Medical providers are expected to protect patient information and Alpha Thunder Tags can help with that.
     Alpha Thunder Tags used with electronic article surveillance antennas (EAS) like the Checkpoint Classic N10, provide extreme protection against tablet theft, i-pad theft or theft of any other mobile medical device.  The tags are attached with an adhesive backing to a mobile device and once in place, can only be removed with a detachment tool.  Anyone else attempting to pull it off will activate a tamper alarm built into the tag.  The Alpha Thunder tag is designed to operate on a specific radio frequency and when it is carried into the receiving range of the Checkpoint Classic N10 antenna, the antenna senses the tag and sounds an alarm.  Along with the audible alarm, lights built into the antenna begin to flash when the protected i-pad or tablet is being carried out.  The commotion alerts nearby employees that a tagged device is being removed from the building.  They can then respond to the alarm and recover the item that the person had in their possession.
     Is all this security necessary for your facility?  Whether you have a small office or are in charge of a large hospital, the government is pushing for medical providers to transition to electronic health records (EHRs).  The idea is that the electronic records make it easier health care providers to keep accurate records on patients and to access information. The concern that healthcare providers must consider is the possibility of hacking or technology theft.  In the event it is believed patient information is at risk, it is the responsibility of the medical facility where the loss took place to report it to the United States Department of Health and Human Services.   According to the HHS.gov website http://www.hhs.gov/hipaa/for-professionals/breach-notification/ “Following a breach of unsecured protected health information, covered entities must provide notification of the breach to affected individuals, the Secretary, and, in certain circumstances, to the media.” (emphasis on media mine).   Once information on a breach is in the media what does that mean for your reputation?  In part two of this series we will take a closer look at what it can mean for any business when negative information gets in the media.
   Patient privacy and security are of paramount importance for health care professionals. Tablet theft or i-pad theft from a facility can have severe ramifications if someone was able to hack into patient information stored on a device.  Alpha Thunder Tags and Checkpoint Classic N10 antennas can give you the protection you need to help keep your company’s reputation in tact.
Need information on Alpha Thunder Tags?  Give us a call at 1.770.426.0547 now.

In my retail job and my library job, I have to occassionally take online training modules reminding me of the importance of information security. The trainings remind me that I need to be careful when creating passwords, because when they are too easy, hackers can figure them out. I am also reminded that I should not open emails and especially the attachments if I don’t recognize the sender. Viruses and malware may be slipped into my computer if I am careless. One warning I recently came across in a training and I had not considered before is that when a company suffers a security breach, they risk damage to their brand and reputation. I realized how true that statement is. Think about the major retailers that have had data breaches and customer credit card information has been compromised. Consumer confidence begins to wane and stock prices drop. Customers start to question whether it is wise to shop at those locations. A company’s reputation is tied to a lot of different factors, but trust is near the top of that list. The same can be said for medical care facilities. When a cyber attack takes place or patient information is mis-handled, it makes the news and patients become fearful that their information is vulnerable. With the increased use of medical mobile devices,concerns over i-pad theft, tablet theft and medical laptop theft have become the source of government concern. Medical providers are expected to protect patient information and Alpha Thunder Tags can help with that.

Alpha Thunder Tags used with electronic article surveillance antennas (EAS) like the Checkpoint Classic N10, provide extreme protection against tablet theft, i-pad theft or theft of any other mobile medical device. The tags are attached with an adhesive backing to a mobile device and once in place, can only be removed with a detachment tool. Anyone else attempting to pull it off will activate a tamper alarm built into the tag. The Alpha Thunder tag is designed to operate on a specific radio frequency and when it is carried into the receiving range of the Checkpoint Classic N10 antenna, the antenna senses the tag and sounds an alarm. Along with the audible alarm, lights built into the antenna begin to flash when the protected i-pad or tablet is being carried out. The commotion alerts nearby employees that a tagged device is being removed from the building. They can then respond to the alarm and recover the item that the person had in their possession.

Is all this security necessary for your facility? Whether you have a small office or are in charge of a large hospital, the government is pushing for medical providers to transition to electronic health records (EHRs). The idea is that the electronic records make it easier for health care providers to keep accurate records on patients and to access information. The concern that healthcare providers must consider is the possibility of hacking or technology theft. In the event it is believed patient information is at risk, it is the responsibility of the medical facility where the loss took place to report it to the United States Department of Health and Human Services. According to the HHS.gov website http://www.hhs.gov/hipaa/for-professionals/breach-notification/ “Following a breach of unsecured protected health information, covered entities must provide notification of the breach to affected individuals, the Secretary, and, in certain circumstances, to the media.” (emphasis on media mine). Once information on a breach is in the media what does that mean for your reputation? In part two of this series we will take a closer look at what it can mean for any business when negative information gets in the media.

Patient privacy and security are of paramount importance for health care professionals. Tablet theft or i-pad theft from a facility can have severe ramifications if someone was able to hack into patient information stored on a device. Alpha Thunder Tags and Checkpoint Classic N10 antennas can give you the protection you need to help keep your company’s reputation in tact.

 

Need information on Alpha Thunder Tags? Give us a call at 1.770.426.0547 now.

 

 

21st Century Hospital, 21st Century Risk; Tablet theft, Use And Security In Modern Medicine

 

JM Blog 01 Medical 
Key words Tablet theft 4 Classic N10 3
Alpha Thunder Tag
21st Century Hospital, 21st Century Risk; Tablet theft, Use And Security In Modern Medicine
With the volume of medical care needed in today’s hospitals and the limited staff of nurses and doctors available to provide it there is precious little time to waste. Patients need treatment and medical professionals need access to that patient’s information, records and history fast. Modern technology has made this a reality with powerful WIFI and the introduction of iPad and tablets to replace the old handwritten patient charts and massive physical files. Modern technology though is a double edged sword. Data, iPad and, tablet theft have become issues that plague hospital administration, medical staff and security alike. 
What can be done?  In my life as a retail LP professional the solution to merchandise theft is merchandise protection devices. Items like Checkpoint Classic N10 paired with an Alpha Thunder Tag are used as part of an overall strategy to prevent losses. I’ll wager that it isn’t often that you hear of areas where retail and healthcare overlap but this is one.
I worked security in a large hospital for several years dealing with a host of issues, things I never would have imagined. Violent patients and disruptive visitors were a primary concern for our public safety department. The physical security and safety of a facility are vital to its operation but aren’t its only concerns. Sadly, theft was a fairly common occurrence. Visitors, patients and, staff stealing from the facility are realities. I learned people are opportunists and an environment with valuable goods and information paired with a supply of distracted victims unable to protect themselves is too tempting to pass up. 
Tablet technology has improved the speed and accuracy of patient care with the added benefit of making HIPAA compliance easier. Security often deals with a “curious” visitors caught snooping at patient’s charts. Patient data is now stored securely, safe from prying eyes and protected from data thieves who would remotely hack these devices. 
Physical tablet theft remains a major concern. On the surface it seems unlikely that a device which is carried by staff would be susceptible to being stolen but, it happens. Watching your iPad is not a priority when the alert is raised and a patient is coding. It is in those moments that the opportunists strike. A few seconds of shifted focus and that tablet ends up in a purse or backpack. Not only does that represent a financial loss to the facility but also a massive HIPAA issue as well. Beyond the hospitals exposure is the loss of the patient’s personal information. 
Given the nature of the hospital setting it isn’t practical to anchor every device to a person or secure it to an apparatus. Here the medical field can take a lesson from retail and look for a more elegant and portable solution. Companies like Alpha have developed small security tags, like the Alpha Thunder tag, that attach to a tablet or iPad and do not interfere with its portability or use. These sensors work with EAS devices like Classic N10 to provide both a deterrent for would be thieves as well as a means to notify staff and security if someone tries to exit with a secured device. 
Tablet theft will remain an issue so long as staff use them and thieves see hospitals and the technology in them as a viable revenue source. The benefits to patient care and service outweigh the risks so the task of protecting these devices falls to security professionals. With vigilance and the implementation of sound security strategies, like an Alpha Thunder Tag and Checkpoint Systems Classic N10 we can allow staff to focus on patient care and give security a chance to prevent these losses. In the end everyone can win, well except the bad guys of course.  
 
Need information on Alpha Thunder Tags or Checkpoint Systems Classic N10?  Give us a call at 1.770.426.0547 now  

With the volume of medical care needed in today’s hospitals and the limited staff of nurses and doctors available to provide it there is precious little time to waste. Patients need treatment and medical professionals need access to that patient’s information, records and history fast. Modern technology has made this a reality with powerful WIFI and the introduction of iPad and tablets to replace the old handwritten patient charts and massive physical files. Modern technology though is a double edged sword. Data, iPad and, tablet theft have become issues that plague hospital administration, medical staff and security alike. 

 

What can be done?  In my life as a retail LP professional the solution to merchandise theft is merchandise protection devices. Items like Checkpoint Classic N10 paired with an Alpha Thunder Tag are used as part of an overall strategy to prevent losses. I’ll wager that it isn’t often that you hear of areas where retail and healthcare overlap but this is one.

 

I worked security in a large hospital for several years dealing with a host of issues, things I never would have imagined. Violent patients and disruptive visitors were a primary concern for our public safety department. The physical security and safety of a facility are vital to its operation but aren’t its only concerns. Sadly, theft was a fairly common occurrence. Visitors, patients and, staff stealing from the facility are realities. I learned people are opportunists and an environment with valuable goods and information paired with a supply of distracted victims unable to protect themselves is too tempting to pass up. 

 

Tablet technology has improved the speed and accuracy of patient care with the added benefit of making HIPAA compliance easier. Security often deals with a “curious” visitors caught snooping at patient’s charts. Patient data is now stored securely, safe from prying eyes and protected from data thieves who would remotely hack these devices. 

 

Physical tablet theft remains a major concern. On the surface it seems unlikely that a device which is carried by staff would be susceptible to being stolen but, it happens. Watching your iPad is not a priority when the alert is raised and a patient is coding. It is in those moments that the opportunists strike. A few seconds of shifted focus and that tablet ends up in a purse or backpack. Not only does that represent a financial loss to the facility but also a massive HIPAA issue as well. Beyond the hospitals exposure is the loss of the patient’s personal information. 

 

Given the nature of the hospital setting it isn’t practical to anchor every device to a person or secure it to an apparatus. Here the medical field can take a lesson from retail and look for a more elegant and portable solution. Companies like Alpha have developed small security tags, like the Alpha Thunder tag, that attach to a tablet or iPad and do not interfere with its portability or use. These sensors work with EAS devices like Classic N10 to provide both a deterrent for would be thieves as well as a means to notify staff and security if someone tries to exit with a secured device. 
T

 

ablet theft will remain an issue so long as staff use them and thieves see hospitals and the technology in them as a viable revenue source. The benefits to patient care and service outweigh the risks so the task of protecting these devices falls to security professionals. With vigilance and the implementation of sound security strategies, like an Alpha Thunder Tag and Checkpoint Systems Classic N10 we can allow staff to focus on patient care and give security a chance to prevent these losses. In the end everyone can win, well except the bad guys of course.   

 

Need information on Checkpoint Systems Classic N10?  Give us a call at 1.770.426.0547 now