Electronics Theft In The Medical Field

I have spent way too much time in our local hospital. First my grandma, then my husband, and now my grandma is back in. I walk in the front door and know exactly where to go and what to do. I feel like I know everyone’s routine. The nurses and assistants come around on their schedules and depending on what cart they are pushing, I can usually guess what they came in the room for. Those carts are the focus for today though, and thankfully not my feeling sorry for myself. All of them have some sort of laptop or tablet because they have to verify medications they dispense, record vital signs and more. These types of electronics are more common than ever in the medical field now. Because of their expense and the information stored, laptop and tablet theft is a real threat.

 

There are many laws governing the use and availability of medical information. Privacy laws are very extensive and when there is a violation there is a lot of red tape and bureaucracy to wade through.  here is a lot of reporting involved and likely fines to be assessed.  In the medical field, the patient’s records security is paramount. If the electronics that are used to store this information are stolen, it can become a public relations nightmare. Birthdays, addresses, social security numbers and more could be compromised. A successful tablet theft could be priceless information for an identity thief. If they can figure out how to get into the system and bypass the passwords, they would have a goldmine of details on all the patients.

 

Additionally, a laptop or tablet theft could occur simply for the purpose of resale. They may have no interest in getting the information stored on the device; they could just want to run it over to the local pawn shop and get some quick cash. And some people just steal for the sake of getting away with something. Either way, in the medical field, there is a constant focus on saving money and streamlining expenses. Having to explain to the hospital administrator how you lost one of their laptops or tablets would not be a good day. 

 

Now let’s look at what can be done to stop this from happening. First, take a look at the Checkpoint N10 System. This is a compact version of what you see in many retail establishments. The pedestals don’t stand in the middle of the floor; they can be attached to the side of the door. And they still have the same detection capability as their larger counterparts.  Checkpoint N10 allows you to keep the professional atmosphere in place, while still deterring theft. The device that works best with this type of theft protection is the Alpha Thunder Tag. This is a tag that attaches directly to the laptop or tablet. The Alpha Thunder Tag works with the Checkpoint N10 by causing the alarm to activate if someone takes one of the devices too close to the detection system. So, if there is an attempted theft of one of your electronics, your staff will immediately be alerted by the Alpha Thunder Tag.  In the medical field, you have to always be on your toes and be ready for anything to happen. The theft of your devices won’t be one of those worries if you have a Checkpoint N10 System and the Alpha Thunder Tag on your team.

 

For more information on how to protect electronics in the medial field, contact us or call 1.770.426.0547

 

Imposters Steal Medical Devices – Eliminate The Threat With Alpha Thunder Tags

 

Alpha Thunder Tags-4                                                                                                            WC blog 74
Tablet Theft – 3
i-pad Theft – 3
Classic N10-3
Imposters Steal Medical Devices – Eliminate The Threat With Alpha Thunder Tags 
     In April 2015, Phoenix police arrested a man for stealing more than $150,000 in medical equipment from Valley hospitals according to an azcentral.com article dated April 24, 2015 by Jerod Macdonald-Evoy.  The subject would dress in scrubs and pretend to be a doctor then steal IV pumps and resell them online.  In 2015 a woman was arrested by Roanoke Rapids Police on fraud charges; however she had a criminal record dating back to 2010 which investigated her for the theft of ultrasound transducers and an ultrasound machine from two different hospitals.  In at least one of the cases she was wearing hospital scrubs and carrying two black bags.  She claimed to be there to repair equipment.  The value of the transducers was $26,000 each and the value of the portable ultrasound machine stolen from the second facility was $90,000.  According to a CBSNewYork report on June 2, 2015, a man put on scrubs and stole a master key and an ID then entered several offices and stole money and an Amazon Kindle e-reader from a St. Frances Hospital.  In each of these instances, unauthorized persons used medical scrubs to gain access to equipment and offices that they had no business being able to get to.  The point I want to make is, in each instance the perpetrator was wearing scrubs and appeared to belong in the building.  In these cases expensive medical equipment was stolen or personal belongings were taken.  If these items were stolen, it is easy to see how vulnerable the facilities would be for a medical i-pad theft or a tablet theft to have taken place.  In fact, if you noticed, a Kindle e-reader was stolen, and this is no larger than an i-pad or tablet. While the theft of the medical equipment caused significant monetary losses, consider what the cost of a stolen mobile medical device would be.  Aside from the cost of the tablet or i-pad, there is the stolen patient information that is more valuable than any of the equipment listed above.  Preventing medical i-pad theft and tablet theft from criminals is possible with the use of Alpha Thunder Tags.
     Alpha Thunder Tags work with electronic article surveillance systems, activating alarm antennas and sounding an internal built in alarm when they are brought into close proximity to the antenna.  The tags are attached directly to the devices so the devices remain portable for medical staff to carry with them during their shifts.  Should someone forget they have a device in their possession as they leave, the EAS system and the Thunder Tag will alarm giving the employee a reminder they have to return the device to its designated location.  If a criminal attempts to pick up a device and steal it, they would be forced to try to remove the tag.  Attempts to remove the tag will result in a tamper alarm sounding and staff would be alerted to the attempt to steal a mobile device.  
     As I mentioned, the Alpha Thunder works in conjunction with EAS systems such as the Checkpoint Classic N10 antenna.  EAS antennas are available in different sizes and styles, but for office areas or buildings where patients may be wheeled around in wheelchairs or gurneys, the Classic N10 antenna is a perfect solution.  This particular antenna does not take up much space, but it provides the frequency range necessary to detect if a tagged item were being removed from a building.  Because it is a slim design, ample room in doorways remains for medical carts, gurneys, wheelchairs, etc. to be wheeled in without concern of space constriction.  
     Medical tablet theft and i-pad theft are very real risks for medical facilities, including doctor offices, medical schools, and any location that deals with patient information.  Alpha Thunder Tags and Classic N10 antennas are one step you can take towards ensuring the security of mobile technology and patient data. 
For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547
     

In April 2015, Phoenix police arrested a man for stealing more than $150,000 in medical equipment from Valley hospitals according to an azcentral.com article dated April 24, 2015 by Jerod Macdonald-Evoy. The subject would dress in scrubs and pretend to be a doctor then steal IV pumps and resell them online. In 2015 a woman was arrested by Roanoke Rapids Police on fraud charges; however she had a criminal record dating back to 2010 which investigated her for the theft of ultrasound transducers and an ultrasound machine from two different hospitals. In at least one of the cases she was wearing hospital scrubs and carrying two black bags. She claimed to be there to repair equipment. The value of the transducers was $26,000 each and the value of the portable ultrasound machine stolen from the second facility was $90,000. According to a CBSNewYork report on June 2, 2015, a man put on scrubs and stole a master key and an ID then entered several offices and stole money and an Amazon Kindle e-reader from a St. Frances Hospital. In each of these instances, unauthorized persons used medical scrubs to gain access to equipment and offices that they had no business being able to get to.  The point I want to make is, in each instance the perpetrator was wearing scrubs and appeared to belong in the building. In these cases expensive medical equipment was stolen or personal belongings were taken. If these items were stolen, it is easy to see how vulnerable the facilities would be for a medical i-pad theft or a tablet theft to have taken place.  In fact, if you noticed, a Kindle e-reader was stolen, and this is no larger than an i-pad or tablet. While the theft of the medical equipment caused significant monetary losses, consider what the cost of a stolen mobile medical device would be. Aside from the cost of the tablet or i-pad, there is the stolen patient information that is more valuable than any of the equipment listed above. Preventing medical i-pad theft and tablet theft from criminals is possible with the use of Alpha Thunder Tags.

Alpha Thunder Tags work with electronic article surveillance systems, activating alarm antennas and sounding an internal built in alarm when they are brought into close proximity to the antenna. The tags are attached directly to the devices so the devices remain portable for medical staff to carry with them during their shifts. Should someone forget they have a device in their possession as they leave, the EAS system and the Alpha Thunder Tag will alarm giving the employee a reminder they have to return the device to its designated location. If a criminal attempts to pick up a device and steal it, they would be forced to try to remove the tag. Attempts to remove the tag will result in a tamper alarm sounding and staff would be alerted to the attempt to steal a mobile device.  

As I mentioned, the Alpha Thunder works in conjunction with EAS systems such as the Checkpoint Classic N10 antenna. EAS antennas are available in different sizes and styles, but for office areas or buildings where patients may be wheeled around in wheelchairs or gurneys, the Classic N10 antenna is a perfect solution. This particular antenna does not take up much space, but it provides the frequency range necessary to detect if a tagged item were being removed from a building. Because it is a slim design, ample room in doorways remains for medical carts, gurneys, wheelchairs, etc. to be wheeled in without concern of space constriction.  

Medical tablet theft and i-pad theft are very real risks for medical facilities, including doctor offices, medical schools, and any location that deals with patient information. Alpha Thunder Tags and Classic N10 antennas are one step you can take towards ensuring the security of mobile technology and patient data. 

For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547

     

 

 

Stolen Patient Information Creates Chaos – Protect Clients With Alpha Thunder Tags

 

i-pad theft – 3                                                                                                                    WC blog 73
tablet theft-3
Alpha Thunder Tags -5
Stolen Patient Information Creates Chaos – Protect Clients With Alpha Thunder Tags
     What happens to a patient in the event their medical record information is stolen?  Should a patient’s medical information be compromised due to a medical tablet theft or a medical i-pad theft, or through other meanst, here are a number of potential issues that can arise.  According to insurancefraud.org, patients whose information is stolen may become victims of scams.  The website reports that dishonest doctors and medical personnel file fraudulent claims using stolen patient information.  Organized theft rings will open fake clinics after purchasing patient information on the black market and then make bogus claims against health insurance policies.  Additionally, using stolen medical information, thieves will receive free treatment from medical providers. Aside from fraud, the website also lists the costs to patients when their information is stolen.  The results can be ruined credit; the potential loss of healthcare coverage, medical history can become inaccurate as criminals have posed as the patient.  False insurance claims can drive up the premiums of the victim’s insurance policy.  Medical record theft has a ripple effect that can go on for a significant length of time.  This is why it is so important that steps are taken to minimize the opportunities for medical record information to be stolen.  Preventing medical tablet theft and i-pad theft by using Alpha Thunder Tags is one way to start controlling your office devices.
       The Alpha Thunder Tag is simply secured to a mobile device with an adhesive backing.  It is designed to be tamper proof so it can’t be removed by unauthorized persons without activating an audible alarm built into the tag.  The protection afforded by the Alpha Thunder Tag is when it is used in conjunction with an electronic article surveillance system (EAS).  The way it works is when someone walks out of a door that is protected with an EAS antenna the antenna emits a loud alarm and built in lights flash.  These tags have their own built in alarm that will also activate if the protected device is carried within range of the antenna, giving another layer of protection.  With alarms sounding staff and employees are immediately made aware that a device is being removed from the building and they can respond accordingly.  The device can be recovered before any damage is done. 
       Some medical providers may be reluctant to install electronic article surveillance antennas out of concern that they may pose risks to patients with pacemakers.  According to the American Heart Association (heart.org) “Interactions with EAS systems are unlikely to cause significant symptoms in most patients.”  They do caution patients with heart pacemakers not to stay near an EAS system longer than necessary and not to lean against them.  Similar cautions are provided for interactions with metal detectors for these patients so there should be no cause for concern to invest in an EAS system.  In fact, it appears from the website there could be more concern with newer cell phones interrupting pacemakers than an EAS antenna.  With such a low risk of concern, installing EAS antennas and investing in Alpha Thunder Tags is a smart way to reduce the risk for patient information theft due to i-pad theft or tablet theft. 
      Protecting patient information is a high priority for the U.S. Department of Health and Human Services.  Enormous fines are being levied against medical providers and agencies that have had patient information stolen, either through hacking or from stolen medical devices.  It only makes sense that companies take practical steps to protect patients whenever possible.  Investing in Alpha Thunder Tags and electronic article surveillance antennas is one sound measure to ensure patient information is not compromised.
For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547

What happens to a patient in the event their medical record information is stolen? Should a patient’s medical information be compromised due to a medical tablet theft or a medical i-pad theft, or through other meanst, here are a number of potential issues that can arise. According to insurancefraud.org, patients whose information is stolen may become victims of scams. The website reports that dishonest doctors and medical personnel file fraudulent claims using stolen patient information. Organized theft rings will open fake clinics after purchasing patient information on the black market and then make bogus claims against health insurance policies. Additionally, using stolen medical information, thieves will receive free treatment from medical providers. Aside from fraud, the website also lists the costs to patients when their information is stolen. The results can be ruined credit; the potential loss of healthcare coverage, medical history can become inaccurate as criminals have posed as the patient. False insurance claims can drive up the premiums of the victim’s insurance policy. Medical record theft has a ripple effect that can go on for a significant length of time. This is why it is so important that steps are taken to minimize the opportunities for medical record information to be stolen. Preventing medical tablet theft and i-pad theft by using Alpha Thunder Tags is one way to start controlling your office devices.

The Alpha Thunder Tag is simply secured to a mobile device with an adhesive backing. It is designed to be tamper proof so it can’t be removed by unauthorized persons without activating an audible alarm built into the tag. The protection afforded by the Alpha Thunder Tag is when it is used in conjunction with an electronic article surveillance system (EAS). The way it works is when someone walks out of a door that is protected with an EAS antenna the antenna emits a loud alarm and built in lights flash. These tags have their own built in alarm that will also activate if the protected device is carried within range of the antenna, giving another layer of protection. With alarms sounding staff and employees are immediately made aware that a device is being removed from the building and they can respond accordingly. The device can be recovered before any damage is done. 

Some medical providers may be reluctant to install electronic article surveillance antennas out of concern that they may pose risks to patients with pacemakers. According to the American Heart Association (heart.org) “Interactions with EAS systems are unlikely to cause significant symptoms in most patients.” They do caution patients with heart pacemakers not to stay near an EAS system longer than necessary and not to lean against them. Similar cautions are provided for interactions with metal detectors for these patients so there should be no cause for concern to invest in an EAS system. In fact, it appears from the website there could be more concern with newer cell phones interrupting pacemakers than an EAS antenna. With such a low risk of concern, installing EAS antennas and investing in Alpha Thunder Tags is a smart way to reduce the risk for patient information theft due to i-pad theft or tablet theft. 

 

Protecting patient information is a high priority for the U.S. Department of Health and Human Services. Enormous fines are being levied against medical providers and agencies that have had patient information stolen, either through hacking or from stolen medical devices. It only makes sense that companies take practical steps to protect patients whenever possible. Investing in Alpha Thunder Tags and electronic article surveillance antennas is one sound measure to ensure patient information is not compromised.


For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547

 

 

Library Special Collections Can Be Secure With The Classic N10 Antenna

 N10 antenna -5
Library Security-3                                                                                                                                   WC blog 71
Library Special Collections Can Be Secure With The Classic N10 Antenna
In retail loss prevention, electronic article surveillance, EAS antennas, security tags, all involved product protection.  I never really thought about those applications being useful in other sectors and I never would have thought about it in a library.  In fact, had I been asked if I thought anyone would steal from a library I probably would have scratched my head and assumed that person was off their rocker.  The ironic thing is that I have been working in an academic library at our local university for nearly five years.  I have learned that YES, people do steal from libraries and YES, electronic article surveillance (EAS) and radio frequency identification (RFID) technologies are in use in libraries.  In case you are wondering what people might steal from a library, let’s see if I can help shed some light.  People will steal compact discs, DVDs, magazines, newspapers and books.  Why would someone steal from a library?  The same reasons they would steal from anywhere else, they see something they want and they decide to take it.  Since people do steal, some libraries have a special area of concern. There are libraries that have rooms dedicated to “special collections” and some libraries have genealogy rooms.  The library I work in has a special collection room with rare books dedicated to the history of the local area, some going back pre-Civil War era.  Libraries with these types of collections will not check out these books and in most cases handling of the books is monitored and copying is not permitted.  These collections are not allowed to even leave the room due to how rare they are and in many cases how valuable they are, especially to a collector.  Library security can be a difficult proposition in these cases, balancing the public’s desire to view the materials against the need to prevent damage and theft.  I will also tell you that as many public libraries face tightening budgets, it can be difficult to find the funding to devote a staff member or librarian to just provide coverage for one room.  This is where the Checkpoint N10 Antenna can come into play.
     Often special collection rooms are not very big compared to other areas of a library.  How convenient would it be if, instead of keeping these rooms locked and having to monitor the patrons by keeping a staff member tied to that one room, the doorway was protected with an EAS antenna?  The Classic N10 antenna is a small, compact EAS antenna that was designed with small convenience stores in mind.  It was found that convenience store owners desired a system to protect their merchandise, but standard EAS systems took up too much room.  The N10 antenna was made to provide a high detection area like its bigger counterparts, but has a much smaller footprint.   With tight budgets, library security may not be high on a priority list. But, how much more convenient would it be for a public library to be able to protect a special collection, such as a genealogy room, with an EAS antenna and not be required to dedicate a staff member to that one space.  Should a patron attempt to walk out of the room with material protected with an EAS tag the Classic N10 antenna will alarm with sound and lights.  Library staff could respond to the alarm and resolve the issue.  To optimize personnel, a service point or reference desk can be located near the room to allow the staff member to render library assistance at the desk while also being close to the special collection and able to provide immediate response to an EAS alarm activation. 
     Library security is important.  Many of the books and documents in special collection rooms are one of a kind and irreplaceable.  It is possible to balance tight budgets and a small space with a secure environment if your library were to install the N10 antenna.
For more information on the N10 antenna, contact us or call 1.770.426.0547 

In retail loss prevention, electronic article surveillance, EAS antennas, security tags, all involved product protection. I never really thought about those applications being useful in other sectors and I never would have thought about it in a library. In fact, had I been asked if I thought anyone would steal from a library I probably would have scratched my head and assumed that person was off their rocker. The ironic thing is that I have been working in an academic library at our local university for nearly five years. I have learned that YES, people do steal from libraries and YES, electronic article surveillance (EAS) and radio frequency identification (RFID) technologies are in use in libraries. In case you are wondering what people might steal from a library, let’s see if I can help shed some light. People will steal compact discs, DVDs, magazines, newspapers and books. Why would someone steal from a library? The same reasons they would steal from anywhere else, they see something they want and they decide to take it. Since people do steal, some libraries have a special area of concern. There are libraries that have rooms dedicated to “special collections” and some libraries have genealogy rooms. The library I work in has a special collection room with rare books dedicated to the history of the local area, some going back pre-Civil War era. Libraries with these types of collections will not check out these books and in most cases handling of the books is monitored and copying is not permitted. These collections are not allowed to even leave the room due to how rare they are and in many cases how valuable they are, especially to a collector. Library security can be a difficult proposition in these cases, balancing the public’s desire to view the materials against the need to prevent damage and theft. I will also tell you that as many public libraries face tightening budgets, it can be difficult to find the funding to devote a staff member or librarian to just provide coverage for one room. This is where the Checkpoint N10 Antenna can come into play.

 

Often special collection rooms are not very big compared to other areas of a library. How convenient would it be if, instead of keeping these rooms locked and having to monitor the patrons by keeping a staff member tied to that one room, the doorway was protected with an EAS antenna? The Classic N10 antenna is a small, compact EAS antenna that was designed with small convenience stores in mind. It was found that convenience store owners desired a system to protect their merchandise, but standard EAS systems took up too much room. The N10 antenna was made to provide a high detection area like its bigger counterparts, but has a much smaller footprint. With tight budgets, library security may not be high on a priority list. But, how much more convenient would it be for a public library to be able to protect a special collection, such as a genealogy room, with an EAS antenna and not be required to dedicate a staff member to that one space. Should a patron attempt to walk out of the room with material protected with an EAS tag the Classic N10 antenna will alarm with sound and lights. Library staff could respond to the alarm and resolve the issue. To optimize personnel, a service point or reference desk can be located near the room to allow the staff member to render library assistance at the desk while also being close to the special collection and able to provide immediate response to an EAS alarm activation. 
     

Library security is important.  Many of the books and documents in special collection rooms are one of a kind and irreplaceable.  It is possible to balance tight budgets and a small space with a secure environment if your library were to install the N10 antenna.

 

For more information on the N10 antenna, contact us or call 1.770.426.0547 

 

Alpha Thunder Tags And Classic N10 Antennas Keep Medical Mobile Devices From Walking Out The Door

Alpha Thunder Tags-3                                                                                                          WC blog 68
i-pad theft-4
tablet theft-4
Classic N10 -4
Alpha Thunder Tags And Classic N10 Antennas Keep Medical Mobile Devices From Walking Out The Door.
     As I get older I find I am regularly amazed at the rate technology changes.  I remember when (don’t you cringe when you hear “I remember when”?) portable phones were in big carrying bags that you took with you in your car. Pagers came out and it was great to be able to get a page from my loss prevention team telling me they needed me to call the store.  Now I experience the friendly banter of co-workers making fun of my flip phone.   Two-way wrist communicators were the stuff of imagination when I watched Dick Tracy cartoons as a child.  Now there are Fitbits that are worn on the wrist providing health information, activity, nutritional information, weight and even sleep activity.  Polaroid cameras were awesome, providing instant pictures with no need to wait to take in film for development.  Digital cameras came along and now I can upload pictures straight to my desktop computer!  I know what you’re thinking, “how cool is that?”  What you’re really saying is, I can take a picture or video on my i-phone or tablet, and upload to the cloud and access it on my laptop from anywhere I happen to be at the time, what is this guy talking about?   Yes, I do really use a desktop computer and I do have a flip phone.  On the other hand, I also work in an academic library where we do work with students and the newer technologies.  The main point I am making is technology is growing at amazing rates and with it the applications for those technologies.  This is true for almost every field of endeavor, including the medical field.  Today Doctors, nurses, medical students and pharmacists are becoming more reliant on mobile medical devices, including i-pads and tablets.  The use of these devices does warrant some cause for concern, such as, what happens if there is an i-pad theft or tablet theft from a medical provider?  Can the loss of these devices be prevented?  An electronic article surveillance system and the use of Alpha Thunder Tags can protect mobile medical devices and with them the information they carry.
     Today doctors can access patient electronic medical records (EMRs), and there are apps that can allow them to view MRIs and CAT scans.  The physician can pull up the scans and view them on the device with the patient.   Through devices doctors can ask staff to change I.V. settings or change or request record orders.  Despite assurances that data is “secure”, there is always the potential for someone to gain access to records should an i-pad theft or tablet theft occur. In prior articles I have listed numerous known breaches of medical information and losses of medical devices.  Medical facilities can prevent such theft by installing Checkpoint Classic N10 electronic article surveillance antennas at entrances and exits and having Alpha Thunder Tags attached to mobile medical devices.  The Classic N10 antenna does not take up much doorway space so it won’t hinder patients or staff entering or exiting the building.  What it will do is activate a loud alarm and flashing LED lights if there is an attempted i-pad theft.  The alarm alerts staff that a tablet theft is taking place and they can respond to get the device back.  The alarm will only be activated however, if the device has the Alpha Thunder Tag on it.  The Thunder Tag is designed to both set off the Classic N10 antenna alarm if it is carried within the range of the antenna and it has a built in alarm that also activates providing a double layer of protection.   I should also mention the tamper alarm on the Thunder Tag prevents someone from trying to remove it and then leaving with the mobile device.  
     Mobile technology in the medical field is a powerful tool and continues to improve the delivery of medical services and streamlines processes.  Be aware that there are criminals who engage in tablet theft and i-pad theft in order to steal patient records and prescription information.  Protect your patients and your practice with the Classic N10 antenna and Alpha Thunder Tags.
For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547
     

As I get older I find I am regularly amazed at the rate technology changes. I remember when (don’t you cringe when you hear “I remember when”?) portable phones were in big carrying bags that you took with you in your car. Pagers came out and it was great to be able to get a page from my loss prevention team telling me they needed me to call the store. Now I experience the friendly banter of co-workers making fun of my flip phone. Two-way wrist communicators were the stuff of imagination when I watched Dick Tracy cartoons as a child. Now there are Fitbits that are worn on the wrist providing health information, activity, nutritional information, weight and even sleep activity. Polaroid cameras were awesome, providing instant pictures with no need to wait to take in film for development. Digital cameras came along and now I can upload pictures straight to my desktop computer! I know what you’re thinking, “how cool is that?” What you’re really saying is, I can take a picture or video on my i-phone or tablet, and upload to the cloud and access it on my laptop from anywhere I happen to be at the time, what is this guy talking about?  Yes, I do really use a desktop computer and I do have a flip phone. On the other hand, I also work in an academic library where we do work with students and the newer technologies. The main point I am making is technology is growing at amazing rates and with it the applications for those technologies. This is true for almost every field of endeavor, including the medical field. Today Doctors, nurses, medical students and pharmacists are becoming more reliant on mobile medical devices, including i-pads and tablets. The use of these devices does warrant some cause for concern, such as, what happens if there is an i-pad theft or tablet theft from a medical provider? Can the loss of these devices be prevented? An electronic article surveillance system and the use of Alpha Thunder Tags can protect mobile medical devices and with them the information they carry.

 

Today doctors can access patient electronic medical records (EMRs), and there are apps that can allow them to view MRIs and CAT scans. The physician can pull up the scans and view them on the device with the patient. Through devices doctors can ask staff to change I.V. settings or change or request record orders. Despite assurances that data is “secure”, there is always the potential for someone to gain access to records should an i-pad theft or tablet theft occur. In prior articles I have listed numerous known breaches of medical information and losses of medical devices. Medical facilities can prevent such theft by installing Checkpoint Classic N10 electronic article surveillance antennas at entrances and exits and having Alpha Thunder Tags attached to mobile medical devices. The Classic N10 antenna does not take up much doorway space so it won’t hinder patients or staff entering or exiting the building.  What it will do is activate a loud alarm and flashing LED lights if there is an attempted i-pad theft. The alarm alerts staff that a tablet theft is taking place and they can respond to get the device back. The alarm will only be activated however, if the device has the Alpha Thunder Tag on it. The Thunder Tag is designed to both set off the Classic N10 antenna alarm if it is carried within the range of the antenna and it has a built in alarm that also activates providing a double layer of protection. I should also mention the tamper alarm on the Thunder Tag prevents someone from trying to remove it and then leaving with the mobile device.  

 

Mobile technology in the medical field is a powerful tool and continues to improve the delivery of medical services and streamlines processes. Be aware that there are criminals who engage in tablet theft and i-pad theft in order to steal patient records and prescription information. Protect your patients and your practice with the Classic N10 antenna and Alpha Thunder Tags.

 

For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547