Library Security-3 , N10 Antenna-3
Who Actually Steals Library Books?
There are many reasons people come up with to justify the theft of library books. Some will steal books simply for the challenge of the act. They just want to see if they can get away with it. That token of their theft is a constant reminder of their success and they feed off of it. Some people will steal books in protest. They feel they have been wronged by the government, or perhaps the university that runs the library and that is one way they can “get back at them.” Students may even steal books from their school’s collection due to academic pressure to keep their peers from getting the research information for an important assignment. Others may actually steal books for their own personal collections. Library security has become a serious issue and it doesn’t look like it’s going to be declining any time soon. There are valuable resources kept in libraries and even some out of print editions that people have actually tried to steal so they can sell them on an online auction site.
Seventy percent of all public libraries surveyed recently report theft as their biggest problem. That’s a big surprise considering all the usual talk about budget cuts. One of the newest issues regarding library security is specifically in the genealogy room. These are the books that are kept to record the births and deaths of the people in the county, property records, and much more about the people of the town. These books are priceless for family research. Many generations will come to look at them and use them to find out about their own bloodlines and possibly even medical history. Sadly, these books can also be used by identity thieves. Remember, these books hold a lot of valuable information, like names and birthdays, that could be very helpful in filling out bogus credit card applications.
Many major institutions have had to resort to adding security guards, limiting the building exits, and electronic devices. Security guards cost a lot of money over time, and many older buildings were built with multiple exits in case of fire. An investment in an electronic detection system can be a saving grace for a public library to protect its valuable inventory. One example of an excellent system is the Checkpoint N10 Antenna. This system is very similar to the classic Checkpoint pedestals you see in department stores and grocers. The N10 Antenna has the same detection capabilities as its larger retail counterparts, but it is smaller and more compact so it does not detract from the professional look and atmosphere of a library. This system provides the library security by monitoring the books coming and going. If the Checkpoint tag inside a book has not been deactivated at the checkout desk, the N10 Antenna will alert the staff if a patron attempts to go out the door. The addition of this system is not to deter people from using the library; it is just meant to deter dishonest people from removing resources that are meant to be available for everyone. From the genealogy room, with its priceless records, to even the simple first books for children, the library should be able to keep a clear inventory of its possessions, and the N10 Antenna system is a new option for them to consider.
For more information about Library Protection, contact us or call: 1.770.426.0547
There are many reasons people come up with to justify the theft of library books. Some will steal books simply for the challenge of the act. They just want to see if they can get away with it. That token of their theft is a constant reminder of their success and they feed off of it. Some people will steal books in protest. They feel they have been wronged by the government, or perhaps the university that runs the library and that is one way they can “get back at them.” Students may even steal books from their school’s collection due to academic pressure to keep their peers from getting the research information for an important assignment. Others may actually steal books for their own personal collections. Library security has become a serious issue and it doesn’t look like it’s going to be declining any time soon. There are valuable resources kept in libraries and even some out of print editions that people have actually tried to steal so they can sell them on an online auction site.
Seventy percent of all public libraries surveyed recently report theft as their biggest problem. That’s a big surprise considering all the usual talk about budget cuts. One of the newest issues regarding library security is specifically in the genealogy room. These are the books that are kept to record the births and deaths of the people in the county, property records, and much more about the people of the town. These books are priceless for family research. Many generations will come to look at them and use them to find out about their own bloodlines and possibly even medical history. Sadly, these books can also be used by identity thieves. Remember, these books hold a lot of valuable information, like names and birthdays, that could be very helpful in filling out bogus credit card applications.
Many major institutions have had to resort to adding security guards, limiting the building exits, and electronic devices. Security guards cost a lot of money over time, and many older buildings were built with multiple exits in case of fire. An investment in an electronic detection system can be a saving grace for a public library to protect its valuable inventory. One example of an excellent system is the Checkpoint N10 Antenna. This system is very similar to the classic Checkpoint pedestals you see in department stores and grocers. The N10 Antenna has the same detection capabilities as its larger retail counterparts, but it is smaller and more compact so it does not detract from the professional look and atmosphere of a library. This system provides the library security by monitoring the books coming and going. If the Checkpoint tag inside a book has not been deactivated at the checkout desk, the N10 Antenna will alert the staff if a patron attempts to go out the door. The addition of this system is not to deter people from using the library; it is just meant to deter dishonest people from removing resources that are meant to be available for everyone. From the genealogy room, with its priceless records, to even the simple first books for children, the library should be able to keep a clear inventory of its possessions, and the N10 Antenna system is a new option for them to consider.
For more information about Library Protection, contact us or call: 1.770.426.0547
OPPORTUNITIES FOR TABLET THEFT
There isn’t a place I go that I do not bring my tablet. Since these things hit the market, I have not found a better, more efficient way to get my work done. I have the power of the Internet, a camera, video camera, word processor and so much more, on one tiny, transportable device. It has truly revolutionized the way we use personal computers. It is also revolutionizing entire swaths of business and industries. Take the medical field for example. Just a few years ago, doctors and nurses were charting completely by hand. Doctors would take notes on a tape recorder. There were services that a doctor could call and dictate his charting to and a skilled typist would record them for him. With the prevalence of tablets, those things are but a distant memory. One thing that has also risen from this rush of new technology is the growing trend of tablet theft, and the use of Alpha Thunder Tags to stop this trend.
Walk into any hospital today and you will see almost every doctor, nurse and support staff carrying a tablet. Patient records are becoming more and more centralized, which makes it easier to treat the patient and more efficient for the hospital. With all that technology in place, what types of risks are there when looking at this from a risk/loss perspective? Plenty.
Some people are opportunistic thieves, meaning that given the right set of circumstances and the idea that they will get away with the crime, they will commit it. Most shoplifters see theft as a victimless crime, although there is much to be said on that, but I’ll leave that for another time. So what if a shoplifter breaks their arm and has to go to the hospital? What if they see an unattended tablet, left in the hallways by a naive nurse? Chances are, they will steal it. That is, unless your equipment is protected with an Alpha Thunder Tag.
When combined with an N10 Antenna system, Thunder Tags can be a simple, effective and cost efficient solution to what could be a costly problem. Not only can a thief get their hands on a tablet, think of the confidential patient data that it most likely contains, and the resulting lawsuits that could arise, should you fail to protect this data.
What are Alpha Thunder Tags?
These tags are well known in the retail industry. In fact, they are the standard in companies that want to protect their assets. These small tags can be directly attached a tablet. Think of them as the same as those little tags you see in almost every store. You couple these tags with the N10 antenna and what you have is a system that will just about eliminate the potential of tablet theft.
The N10 antenna is smaller version of the towers you see when you walk into any retail store. If the alpha thunder tag passes through this gateway, an audible and visual alert sounds; meaning someone can not simply walk out with a tablet without being caught, just as someone can’t walk out of a retail store with merchandise without being caught. This can almost eliminate the possibility of tablet theft in your hospital.
The biggest difference here is that the N10 antenna is incredibly small. In fact, once it is deployed, it is almost impossible to see, unless you are looking for it. These were designed for small convenience type stores, with space constraints in mind.
Are they other solutions?
Of course there are, but why spend thousands of dollars when you can literally spend a tiny fraction of that using Alpha Thunder Tags? If they are good enough for some of the world’s leading retailers, why wouldn’t they be good for you? Tablet theft is an ever growing concern for hospitals and doctor’s offices nationwide, and I’ve seen a plethora of tactics used to combat it. So far, I’ve not seen a system as user friendly, easy to set up and maintain, and as cost effective as this one. Even the largest firms have budgets to maintain, and this solution allows you to do just that, all while protecting your equipment and your patients’ peace of mind.
For more information about Alpha Thunder Tags, contact us or call 1.770.426.0547
There isn’t a place I go that I do not bring my tablet. Since these things hit the market, I have not found a better, more efficient way to get my work done. I have the power of the Internet, a camera, video camera, word processor and so much more, on one tiny, transportable device. It has truly revolutionized the way we use personal computers. It is also revolutionizing entire swaths of business and industries. Take the medical field for example. Just a few years ago, doctors and nurses were charting completely by hand. Doctors would take notes on a tape recorder. There were services that a doctor could call and dictate his charting to and a skilled typist would record them for him. With the prevalence of tablets, those things are but a distant memory. One thing that has also risen from this rush of new technology is the growing trend of tablet theft, and the use of Alpha Thunder Tags to stop this trend.
Walk into any hospital today and you will see almost every doctor, nurse and support staff carrying a tablet. Patient records are becoming more and more centralized, which makes it easier to treat the patient and more efficient for the hospital. With all that technology in place, what types of risks are there when looking at this from a risk/loss perspective? Plenty.
Some people are opportunistic thieves, meaning that given the right set of circumstances and the idea that they will get away with the crime, they will commit it. Most shoplifters see theft as a victimless crime, although there is much to be said on that, but I’ll leave that for another time. So what if a shoplifter breaks their arm and has to go to the hospital? What if they see an unattended tablet, left in the hallways by a naive nurse? Chances are, they will steal it. That is, unless your equipment is protected with an Alpha Thunder Tag.
When combined with an N10 antenna, Thunder Tags can be a simple, effective and cost efficient solution to what could be a costly problem. Not only can a thief get their hands on a tablet, think of the confidential patient data that it most likely contains, and the resulting lawsuits that could arise, should you fail to protect this data.
What are Alpha Thunder Tags?
These tags are well known in the retail industry. In fact, they are the standard in companies that want to protect their assets. These small tags can be directly attached a tablet. Think of them as the same as those little tags you see in almost every store. You couple these tags with the N10 antenna and what you have is a system that will just about eliminate the potential of tablet theft.
The N10 antenna is smaller version of the towers you see when you walk into any retail store. If the Alpha Thunder Tag passes through this gateway, an audible and visual alert sounds; meaning someone can not simply walk out with a tablet without being caught, just as someone can’t walk out of a retail store with merchandise without being caught. This can almost eliminate the possibility of tablet theft in your hospital.
The biggest difference here is that the N10 antenna is incredibly small. In fact, once it is deployed, it is almost impossible to see, unless you are looking for it. These were designed for small convenience type stores, with space constraints in mind.
Are there other solutions?
Of course there are, but why spend thousands of dollars when you can literally spend a tiny fraction of that using Alpha Thunder Tags? If they are good enough for some of the world’s leading retailers, why wouldn’t they be good for you? Tablet theft is an ever growing concern for hospitals and doctor’s offices nationwide, and I’ve seen a plethora of tactics used to combat it. So far, I’ve not seen a system as user friendly, easy to set up and maintain, and as cost effective as this one. Even the largest firms have budgets to maintain, and this solution allows you to do just that, all while protecting your equipment and your patients’ peace of mind.
For more information about Alpha Thunder Tags, contact us or call 1.770.426.0547
Library Security-3 , N10 Antenna-3
Library Book Theft Is Not A New Problem
As early as the twelfth century, it was recorded that libraries had to start chaining books to the walls to protect them from theft. The issue then was that there were so few copies available and when the library received a new edition, the whole town wanted access to it. Library security has remained a priority throughout our history. Even in our current century, 70% of all public libraries report their biggest problem is theft, not lack of resources and public money.
My daughter has always had an affinity for our public library. Before she was even in school, I would take her regularly to the weekly story hour. As she got older she started checking out books for herself and really got to know the library staff. She knew them all by name and they knew her as well. Around the time she turned ten, her favorite place was the genealogy room. There are all kinds of county and state history books housed in there, along with many records of the local family histories. There are birth and death records, property records, and much more. When I asked her about the library security for that room, she said there was none. There was only the lady that specialized in the upkeep of the books in there. Otherwise, there were only signs warning the patrons of the rules for those books. They cannot be checked out, of course. But, people are not supposed to remove more than two books from the shelves at a time. They must remain in the genealogy room and replace the books in the correct place before they leave. For all the value these books hold, more sentimental than monetary, they are really not protected from theft. It can get expensive to do family history research, especially using an online service, but it’s free to do it at the library. And it’s not that complicated if you’re in the genealogy room to simply conceal the book you want and just walk out the door with it.
It would be a shame for any county library to lose these precious resources. They are priceless and many times cannot be replaced. They are useful for students and for anyone trying to piece together their family tree. Libraries have obviously stopped the practice of chaining books to the walls, but they have added security guards and have limited the exits of the building. Many have also added electronic protection for more advanced library security. I have seen that many branches are utilizing Checkpoint Labels to monitor the books going in and out. Of course, that means they have to have a Checkpoint system installed. One of the many systems available for this type of environment is the N10 Antenna System. The N10 Antenna is perfect for the library because the pedestals are smaller, they can be wall mounted, and they do not detract from the classic look that library patrons expect. They are just as powerful and have the same detection capability of the other larger pedestals that you see in many department stores. They also offer the theft deterrence that libraries are looking for. Preventing the loss of books is the number one job of the N10 Antenna System. Library staff can now save the time they lose searching for lost and stolen books and use that time to help people with research.
For more information on Library Protection, contact us or call: 1.770.426.0547
As early as the twelfth century, it was recorded that libraries had to start chaining books to the walls to protect them from theft. The issue then was that there were so few copies available and when the library received a new edition, the whole town wanted access to it. Library security has remained a priority throughout our history. Even in our current century, 70% of all public libraries report their biggest problem is theft, not lack of resources and public money.
My daughter has always had an affinity for our public library. Before she was even in school, I would take her regularly to the weekly story hour. As she got older she started checking out books for herself and really got to know the library staff. She knew them all by name and they knew her as well. Around the time she turned ten, her favorite place was the genealogy room. There are all kinds of county and state history books housed in there, along with many records of the local family histories. There are birth and death records, property records, and much more. When I asked her about the library security for that room, she said there was none. There was only the lady that specialized in the upkeep of the books in there. Otherwise, there were only signs warning the patrons of the rules for those books. They cannot be checked out, of course. But, people are not supposed to remove more than two books from the shelves at a time. They must remain in the genealogy room and replace the books in the correct place before they leave. For all the value these books hold, more sentimental than monetary, they are really not protected from theft. It can get expensive to do family history research, especially using an online service, but it’s free to do it at the library. And it’s not that complicated if you’re in the genealogy room to simply conceal the book you want and just walk out the door with it.
It would be a shame for any county library to lose these precious resources. They are priceless and many times cannot be replaced. They are useful for students and for anyone trying to piece together their family tree. Libraries have obviously stopped the practice of chaining books to the walls, but they have added security guards and have limited the exits of the building. Many have also added electronic protection for more advanced library security. I have seen that many branches are utilizing Checkpoint Labels to monitor the books going in and out. Of course, that means they have to have a Checkpoint system installed. One of the many systems available for this type of environment is the N10 Antenna System. The N10 Antenna is perfect for the library because the pedestals are smaller, they can be wall mounted, and they do not detract from the classic look that library patrons expect. They are just as powerful and have the same detection capability of the other larger pedestals that you see in many department stores. They also offer the theft deterrence that libraries are looking for. Preventing the loss of books is the number one job of the N10 Antenna System. Library staff can now save the time they lose searching for lost and stolen books and use that time to help people with research.
For more information on Library Protection, contact us or call: 1.770.426.0547
Alpha Thunder Tags-5 WC blog 58
i-pad theft-4
Tablet theft-4
Alpha Thunder Tags Minimize Opportunity For Medical Mobile Device Theft
• 2012 – 6 laptops and tablet devices stolen from Northwestern Memorial Hospital’s Home Hospice offices. (Reported in Healthcare- Informatics.com, July 27, 2012 article by Gabriel Perna)
• 2013 – Four computers stolen in a July 15 burglary of an administrative building of Advocate Medical Group (Chicago Tribune, August 24, 2013, Peter Frost and Julie Wernau)
• 2014 – Nearly 20 tablet computers reported stolen from Medical Transporter of Georgia (wmcactionnews5.com Dec 02, 2014)
• 2014 – Laptop reported missing from Riverside County Regional Medical Center contained information on 563 patients (scmagazine.com, June 25, 2014, Adam Greenberg, Senior Reporter)
• 2015 – “Laptop stolen from a member of the faculty of LSU Health New Orleans School of Medicine has potentially exposed the protected health information of approximately 5,000 minor patients…” (The Clarion-Ledger, September 15, 2015)
Tablet theft, i-pad theft and even laptop theft is a real issue for medical providers. You may operate a medical transport company, doctor’s office or dental clinic it doesn’t matter, if you use mobile devices you have a risk of theft. Some of the cases I have listed were due to break-ins, but others were incidents of theft. This article is about how the use of Alpha Thunder Tags and common sense steps on a daily basis can prevent your devices from leaving the building and creating a security risk.
Many businesses and offices associated with medicine and patient information are becoming more reliant on mobile devices for conducting business. Doctors and nurses are accessing patient information, looking up prescription information even consulting with other medical providers on treatments and procedures. The concern that needs to be addressed is what happens to the device during a consultation or patient interaction. How do you prevent in i-pad theft or laptop theft from taking place when someone has put down a device for a consultation or client interaction? If the office devices are secured with Alpha Thunder Tags a thief who picks one up and attempts to leave the building will trigger an alarm. The tag works with acoustic magnetic (AM) or radio frequency (RF) technology that will activate electronic article surveillance (EAS) antennas placed in doorways or entrance/exits to buildings. This assumes that a facility has EAS antennas installed in the building. If EAS antennas are not set up, a company, such as Checkpoint, offers a number of different antenna solutions that can be installed in office areas to provide a secure environment. If someone were to try to exit with a device and a Thunder Tag is on it, the tag has a built in annunciator that will sound and the antenna will also sound. The antennas also have built in LED lights that flash and alert staff of an unauthorized breach. To further protect against tablet theft, the Alpha Thunder Tag also has a tamper alarm that will sound if someone were to try to remove the tag from the mobile device.
If you are wondering whether the investment in an EAS system is worth the expense simply to install Alpha Thunder Tags to prevent i-pad theft or tablet theft, I would like to pose this question to you, what will the cost be to your business or practice if one of your devices is stolen? Not only will your business be liable to all the potential clients who had their information compromised, you will also be subject to enormous fines from the Department of Health and Human Services. Depending on the findings and number of patient records stolen, I have seen fines range from hundreds of thousands of dollars into the millions of dollars.
I mentioned at the beginning of this article I would share a few other ideas that can be implemented to help prevent i-pad theft or tablet theft. Devices that are not being used should be stored in a room that is inaccessible to the public. Devices need to charge, so this is the place where the charging station should be located. If the business has an after- hours cleaning service, a locking cabinet should be used for storing devices. Engrave all devices with a serial number or identification number. Labels with serial numbers can be removed, engraved markings are much more difficult and leave visible signs indicating information was covered over or erased. Require a user to sign in with a name or employee number and individual password so you know who last had a device.
Mobile technology offers so many advantages over the old paper files and even over the desktop computer. Faster access to information, accuracy and even improved patient care are some of the improvements mobile devices offer. They also have risks. Minimize those risks with Alpha Thunder Tags.
For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547
• 2012 – 6 laptops and tablet devices stolen from Northwestern Memorial Hospital’s Home Hospice offices. (Reported in Healthcare- Informatics.com, July 27, 2012 article by Gabriel Perna)
• 2013 – Four computers stolen in a July 15 burglary of an administrative building of Advocate Medical Group (Chicago Tribune, August 24, 2013, Peter Frost and Julie Wernau)
• 2014 – Nearly 20 tablet computers reported stolen from Medical Transporter of Georgia (wmcactionnews5.com Dec 02, 2014)
• 2014 – Laptop reported missing from Riverside County Regional Medical Center contained information on 563 patients (scmagazine.com, June 25, 2014, Adam Greenberg, Senior Reporter)
• 2015 – “Laptop stolen from a member of the faculty of LSU Health New Orleans School of Medicine has potentially exposed the protected health information of approximately 5,000 minor patients…” (The Clarion-Ledger, September 15, 2015)
Tablet theft, i-pad theft and even laptop theft is a real issue for medical providers. You may operate a medical transport company, doctor’s office or dental clinic it doesn’t matter, if you use mobile devices you have a risk of theft. Some of the cases I have listed were due to break-ins, but others were incidents of theft. This article is about how the use of Alpha Thunder Tags and common sense steps on a daily basis can prevent your devices from leaving the building and creating a security risk.
Many businesses and offices associated with medicine and patient information are becoming more reliant on mobile devices for conducting business. Doctors and nurses are accessing patient information, looking up prescription information even consulting with other medical providers on treatments and procedures. The concern that needs to be addressed is what happens to the device during a consultation or patient interaction. How do you prevent i-pad theft or laptop theft from taking place when someone has put down a device for a consultation or client interaction? If the office devices are secured with Alpha Thunder Tags a thief who picks one up and attempts to leave the building will trigger an alarm. The tag works with acoustic magnetic (AM) or radio frequency (RF) technology that will activate electronic article surveillance (EAS) antennas placed in doorways or entrance/exits to buildings. This assumes that a facility has EAS antennas installed in the building. If EAS antennas are not set up, a company, such as Checkpoint, offers a number of different antenna solutions that can be installed in office areas to provide a secure environment. If someone were to try to exit with a device and a Thunder Tag is on it, the tag has a built in annunciator that will sound and the antenna will also sound. The antennas also have built in LED lights that flash and alert staff of an unauthorized breach. To further protect against tablet theft, the Alpha Thunder Tag also has a tamper alarm that will sound if someone were to try to remove the tag from the mobile device.
If you are wondering whether the investment in an EAS system is worth the expense simply to install Alpha Thunder Tags to prevent i-pad theft or tablet theft, I would like to pose this question to you, what will the cost be to your business or practice if one of your devices is stolen? Not only will your business be liable to all the potential clients who had their information compromised, you will also be subject to enormous fines from the Department of Health and Human Services. Depending on the findings and number of patient records stolen, I have seen fines range from hundreds of thousands of dollars into the millions of dollars.
I mentioned at the beginning of this article I would share a few other ideas that can be implemented to help prevent i-pad theft or tablet theft. Devices that are not being used should be stored in a room that is inaccessible to the public. Devices need to charge, so this is the place where the charging station should be located. If the business has an after- hours cleaning service, a locking cabinet should be used for storing devices. Engrave all devices with a serial number or identification number. Labels with serial numbers can be removed, engraved markings are much more difficult and leave visible signs indicating information was covered over or erased. Require a user to sign in with a name or employee number and individual password so you know who last had a device.
Mobile technology offers so many advantages over the old paper files and even over the desktop computer. Faster access to information, accuracy and even improved patient care are some of the improvements mobile devices offer. They also have risks. Minimize those risks with Alpha Thunder Tags.
For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547
Medical Field-4 , Checkpoint N10-1 , Alpha Thunder Tag-1 , Checkpoint Systems-1
Protect Techno Tools For The Medical Field
Many doctor’s offices are upgrading their facilities and adding technology to help streamline the process of visits. It makes the patients’ check in process better and can make the whole visit quicker. Purchasing these devices, however, can be a big investment for the practice. Many in the medical field are looking at what they need, but they may not be looking into how to protect those gadgets from theft. In the retail business, we have dealt with our mobile scanners being stolen by our customers, so it should come as no surprise that patients at a doctor’s office would be willing to steal their tools. And this is a much more costly loss than a few tongue depressors and rubber gloves.
My doctor is in an old building, with ancient equipment and old furniture in the waiting room. It’s a pretty standard process in there; it’s only the clipboards and other basics. I still like it because it’s comfortable. But I went with my husband today for a visit to his doctor. It wasn’t just fancy and very modern; the whole place had a new and futuristic look. It was like college meets medical field. Everything was digital. I was pretty impressed with the setup. When people check in at the front desk, they scan their palms to identify themselves. Then, after they verify everything, the patient is handed a paging type of device. We were instructed to sit in the main waiting room and remain until the device alerted us to the exam room. After a period of time, this device activates and displays a room number. We got on the elevator and went to the upper floor. When we got off, we saw a blinking light outside the room he had been assigned to. No one really interacted with us, but we knew exactly what to do and where to go. When we got in the room, after a short wait, the nurse came in and took the device. I couldn’t help but wonder what happens if she forgets to take it from the patient. A day at the office is not always relaxing and routine, especially when you’re dealing with sick people. I imagine there have been cases of these devices being stolen.
Like I said, I’m in retail, so theft of equipment does happen. Our scanners would show up on online auction sites on a regular basis, so it wouldn’t be a big surprise to find these things on there as well. Fortunately there are tools to combat this type of theft. Just like in retail, Checkpoint Systems has a solution for the medical field. There is a combination of tools offered that will secure those devices and keep them on the premises where they belong, even if a patient were to accidentally attempt to remove one. First there is the Checkpoint N10, a compact detection system that’s just as effective as the ones we use in our retail stores. This almost invisible monitoring choice can be attached to the door so they are not in the way or detract from the professional look of the office. Add another tool, the Alpha Thunder Tag, and the circle is complete. These tags attach to the device that needs to be protected and they are the trigger for the alarm if someone tries to remove it from the premises. They will also self-alarm if they are tampered with, or if the patient would try to remove them from the device. It’s a win-win package for the security needed in the new age of the medical field.
For more information on these devices and more, contact us or call 1.770.426.0547
Many doctor’s offices are upgrading their facilities and adding technology to help streamline the process of visits. It makes the patients’ check in process better and can make the whole visit quicker. Purchasing these devices, however, can be a big investment for the practice. Many in the medical field are looking at what they need, but they may not be looking into how to protect those gadgets from theft. In the retail business, we have dealt with our mobile scanners being stolen by our customers, so it should come as no surprise that patients at a doctor’s office would be willing to steal their tools. And this is a much more costly loss than a few tongue depressors and rubber gloves.
My doctor is in an old building, with ancient equipment and old furniture in the waiting room. It’s a pretty standard process in there; it’s only the clipboards and other basics. I still like it because it’s comfortable. But I went with my husband today for a visit to his doctor. It wasn’t just fancy and very modern; the whole place had a new and futuristic look. It was like college meets medical field. Everything was digital. I was pretty impressed with the setup. When people check in at the front desk, they scan their palms to identify themselves. Then, after they verify everything, the patient is handed a paging type of device. We were instructed to sit in the main waiting room and remain until the device alerted us to the exam room. After a period of time, this device activates and displays a room number. We got on the elevator and went to the upper floor. When we got off, we saw a blinking light outside the room he had been assigned to. No one really interacted with us, but we knew exactly what to do and where to go. When we got in the room, after a short wait, the nurse came in and took the device. I couldn’t help but wonder what happens if she forgets to take it from the patient. A day at the office is not always relaxing and routine, especially when you’re dealing with sick people. I imagine there have been cases of these devices being stolen.
Like I said, I’m in retail, so theft of equipment does happen. Our scanners would show up on online auction sites on a regular basis, so it wouldn’t be a big surprise to find these things on there as well. Fortunately there are tools to combat this type of theft. Just like in retail, Checkpoint Systems has a solution for the medical field. There is a combination of tools offered that will secure those devices and keep them on the premises where they belong, even if a patient were to accidentally attempt to remove one. First there is the Checkpoint N10, a compact detection system that’s just as effective as the ones we use in our retail stores. This almost invisible monitoring choice can be attached to the door so they are not in the way or detract from the professional look of the office. Add another tool, the Alpha Thunder Tag, and the circle is complete. These tags attach to the device that needs to be protected and they are the trigger for the alarm if someone tries to remove it from the premises. They will also self-alarm if they are tampered with, or if the patient would try to remove them from the device. It’s a win-win package for the security needed in the new age of the medical field.
For more information on these devices and more, contact us or call 1.770.426.0547