A Bug Tag Provides Protection Against Medical Computer Tablet Theft

 

Tablet Theft-4                                                                                                 WC Blog 477
Bug Tag-4
A Bug Tag Provides Protection Against Medical Computer Tablet Theft
Tablet theft from hospitals is a concern that cannot be overstated. The issues that surround a stolen computer, tablet or iPad involve the compromise of patient information. We see in the news that corporate giants lose customer information and we worry about the personal information that is exposed to the hackers. I think about the Equifax data breach that put the information of nearly 14.5 million people at risk. This follows a long list of other businesses that were violated in recent years. When a hospital or medical facility loses patient data a lot more can be at stake. Personal information becomes available, medical history, patient billing information and payment information are just a few of the things that can be targeted by hackers. Desktop computers have been replaced with laptops and in many institutions laptops have been replaced with medical computer tablets and iPads. Trying to protect against tablet theft is much different than trying to protect a desktop computer from being stolen. There is a way to stop thieves and it requires protecting devices with a Bug Tag.
     A Bug Tag is a small anti-theft device that is stuck on a tablet or iPad by sticking the adhesive back of the tag to the device. Buildings that use electronic article surveillance pedestals at doors are able to detect protected devices if carried near the exits. In the event a tagged tablet or iPad is in the range of the pedestals a loud, beeping sound resonates through the building. Workers respond to the alarm and recover the computers before they leave the building. Concerned about someone tampering with the Bug Tag? No need to worry, the tags have tamper mechanisms that activate an internal alarm if someone tries to pry a tag off. Again, employees alerted to the noise respond and prevent a theft from taking place.
     
     Is there really a possibility that a tablet that a tablet theft could occur at a hospital? In a recent article in abc15.com, Aug 1, 2017, by Joe Enea, “PD: Man slept in Phoenix hospital basement, robs them of computers”, the article reports that, “A man was caught stealing multiple laptops and large televisions from a Phoenix hospital last month.” The story reported how the subject had been sleeping in the hospital basement and sneaking laptop computers out of the hospital and then selling them. http://www.abc15.com/news/crime/pd-man-sleeping-in-phoenix-hospital-basement-robs-them-of-computers  Something that stood out to me about the story is there was no mention about what happened to any information stored on those computers. What information was on those computers and could someone hack into them and obtain patient data? It also occurred to me that with the transition in many hospitals from laptops to computer tablets and tablets are so much smaller than laptops. How much easier a tablet theft would have been if they were used in this particular building?
     You may be thinking this is an isolated case and chances are that even if a computer or tablet were stolen from a medical provider the encryption or security measures would prevent loss of data. You might want to rethink that. In another recent story, dated March 3, 2017, in the Times of San Diego, by Cassia Pollock, “Data of 750 Patients Compromised by Computer Theft at Sharp Healthcare”, the article discusses the possibility that someone may have access to the records of 750 outpatients due to the theft of a computer. What kind of information could someone possibly gain from this computer? “Each study record may have included patient name, date of birth, age, current medications, family history and a summary of studies performed.”  https://timesofsandiego.com/crime/2017/03/03/data-of-750-patients-breached-in-computer-theft-at-sharp-healthcare/  it should give us cause for concern the next time we visit a healthcare provider.
     Obviously we have to give out our information in order to be seen by doctors, nurses and even pharmacists. We do have the right to expect they will take care of our personal information since they are requiring it of us. It is important then that medical centers, hospitals, clinics and any other facility with access to patient information takes necessary precautions to prevent the theft of portable and mobile devices such as iPads and tablets. Use the Bug Tag on each device and electronic article surveillance pedestals at all entrances/exits to keep hardware from leaving the building. The confidence instilled in your patients will keep them returning again and again.
For more information on Tablet Theft contact us or call 1.770.426.0547 today.
     

Tablet theft from hospitals is a concern that cannot be overstated. The issues that surround a stolen computer, tablet or iPad involve the compromise of patient information. We see in the news that corporate giants lose customer information and we worry about the personal information that is exposed to the hackers. I think about the Equifax data breach that put the information of nearly 14.5 million people at risk. This follows a long list of other businesses that were violated in recent years. When a hospital or medical facility loses patient data a lot more can be at stake. Personal information becomes available, medical history, patient billing information and payment information are just a few of the things that can be targeted by hackers. Desktop computers have been replaced with laptops and in many institutions laptops have been replaced with medical computer tablets and iPads. Trying to protect against tablet theft is much different than trying to protect a desktop computer from being stolen. There is a way to stop thieves and it requires protecting devices with a Bug Tag.

A Bug Tag is a small anti-theft device that is stuck on a tablet or iPad by sticking the adhesive back of the tag to the device. Buildings that use electronic article surveillance pedestals at doors are able to detect protected devices if carried near the exits. In the event a tagged tablet or iPad is in the range of the pedestals a loud, beeping sound resonates through the building. Workers respond to the alarm and recover the computers before they leave the building. Concerned about someone tampering with the Bug Tag? No need to worry, the tags have tamper mechanisms that activate an internal alarm if someone tries to pry a tag off. Again, employees alerted to the noise respond and prevent a theft from taking place.          

 

Is there really a possibility that a tablet that a tablet theft could occur at a hospital? In a recent article in abc15.com, Aug 1, 2017, by Joe Enea, “PD: Man slept in Phoenix hospital basement, robs them of computers”, the article reports that, “A man was caught stealing multiple laptops and large televisions from a Phoenix hospital last month.” The story reported how the subject had been sleeping in the hospital basement and sneaking laptop computers out of the hospital and then selling them. http://www.abc15.com/news/crime/pd-man-sleeping-in-phoenix-hospital-basement-robs-them-of-computers.  Something that stood out to me about the story is there was no mention about what happened to any information stored on those computers. What information was on those computers and could someone hack into them and obtain patient data? It also occurred to me that with the transition in many hospitals from laptops to computer tablets and tablets are so much smaller than laptops. How much easier a tablet theft would have been if they were used in this particular building?

 

You may be thinking this is an isolated case and chances are that even if a computer or tablet were stolen from a medical provider the encryption or security measures would prevent loss of data. You might want to rethink that. In another recent story, dated March 3, 2017, in the Times of San Diego, by Cassia Pollock, “Data of 750 Patients Compromised by Computer Theft at Sharp Healthcare”, the article discusses the possibility that someone may have access to the records of 750 outpatients due to the theft of a computer. What kind of information could someone possibly gain from this computer? “Each study record may have included patient name, date of birth, age, current medications, family history and a summary of studies performed.”  https://timesofsandiego.com/crime/2017/03/03/data-of-750-patients-breached-in-computer-theft-at-sharp-healthcare/  it should give us cause for concern the next time we visit a healthcare provider.

Obviously we have to give out our information in order to be seen by doctors, nurses and even pharmacists. We do have the right to expect they will take care of our personal information since they are requiring it of us. It is important then that medical centers, hospitals, clinics and any other facility with access to patient information takes necessary precautions to prevent the theft of portable and mobile devices such as iPads and tablets. Use the Bug Tag on each device and electronic article surveillance pedestals at all entrances/exits to keep hardware from leaving the building. The confidence instilled in your patients will keep them returning again and again.

 

For more information on Tablet Theft, contact us or call 1.770.426.0547 today.

     

 

 

iPads For Aiding Wounded Veterans In Recovery Should Be Protected from Theft With A Bug Tag And Electronic Article Surveillance Tower

 

Bug Tag-5                                                                                                                         WC Blog 460
iPad Theft-3
iPads For Aiding Wounded Veterans In Recovery Should Be Protected from Theft With A Bug Tag And Electronic Article Surveillance Tower
     As a veteran I have a special fondness for programs that assist and aid our wounded and disabled veteran warriors. Whether it is physical therapy that is needed, medical care or mental health related our soldiers deserve to receive any help necessary to get them as healthy and functional as possible. I was interested when I found information on a place called The Western Blind Rehabilitation Center (WBRC) on the website with a link to the 2016 WBRC annual review to the right side of the page   https://www.paloalto.va.gov/services/wbrc/program.asp
   The WBRC mission statement states: “The Western Blind Rehabilitation Center serves Veterans and Active Duty Service Members with vision impairment through a comprehensive evidence-based rehabilitation program that promotes independence and community reintegration…” From my reading of their 2016 FY assessment I was impressed by the programs they offer to veterans and their families that include among other things an iProgram designed to coach these visually impaired men and women on the use of iPhones and iPads. I noticed in one section of the report that they do provide Technology Security and Safety Tips which is a common sense measure. One concern I have about this or any other clinic or rehab center that uses iPads in their programs is the security of the devices to prevent iPad theft or tablet theft if they use Android devices. It is my desire to see these locations use a Bug Tag to prevent criminals from stealing such a valuable asset.
     iPad theft is a very real problem for medical facilities. The devices are small enough to slip into a purse or a jacket pocket. There have been documented instances where thieves have removed devices mounted in hospital lounges for patron use and the devices have been stolen in spite of being in the open and under camera surveillance. At risk is the device and the cost it carries along with any potential client information that may be on a device. For public use devices people will log in to their Apple accounts or they sync up with their personal device and forget to log off. For those that are being used for a patient or client there is a good chance patient data is maintained in the device. It could be something that seems as innocuous as name, address or phone numbers or it could be HIPPA protected information that is stored in an iPad or computer tablet. Should a criminal get that information the patient is at risk and the facility faces possible fines and lawsuits from the Department of Health and Human Services. The good news is a Bug Tag can prevent such thefts from taking place. A Bug Tag uses electronic article surveillance (EAS) technology that can interact with EAS towers to initiate an alarm if a tagged device is carried near a door. An alarm elicits an immediate response from staff workers who can recover a device before it is removed from the building. This is the same type of technology that has been successfully employed for years by retailers to stop shoplifters.
     Getting back to the WBRC report it I noted that they found “96% of iProgram participants reported increased levels of satisfaction in iPad or iPhone training and use. 97% of iProgram participants reported a decrease in perceived levels of difficulty in using the iPhone or iPad.” If these veterans are becoming more comfortable in the use of these mobile devices it can be a gateway to greater independence and “normalization” in their lives. 
     Another program that I have found that aids our wounded soldiers with iPads and computers is Soldier’s Angels.  Their “Valor-IT” program provides voice controlled laptops that allow soldiers in V.A. Medical Centers to remain in contact with “the rest of the world while during recovery”.  The other part of this program provides iPads and personal GPS devices to soldiers to “build self-confidence and independence by compensating for short-term memory loss and organizational challenges related to severe TBI and severe PTSD.” Because I would hate to see an iPad theft from a person who has sacrificed so selflessly for our nation. I would like to see the units protected with a Bug Tag.
     Confidence gained from learning how to use new technologies and being able to become more independent is priceless for our injured veterans. We owe them our gratitude and a sense of security. Make sure that personal devices are protected with a Bug Tag and an EAS system so there is one less thing for them to be concerned about on their road to recovery.
Get more information on the Bug Tag, contact us or call 1.770.426.0547 today.
     

As a veteran I have a special fondness for programs that assist and aid our wounded and disabled veteran warriors. Whether it is physical therapy that is needed, medical care or mental health related our soldiers deserve to receive any help necessary to get them as healthy and functional as possible. I was interested when I found information on a place called The Western Blind Rehabilitation Center (WBRC) on the website with a link to the 2016 WBRC annual review to the right side of the page   https://www.paloalto.va.gov/services/wbrc/program.asp   

 

The WBRC mission statement states: “The Western Blind Rehabilitation Center serves Veterans and Active Duty Service Members with vision impairment through a comprehensive evidence-based rehabilitation program that promotes independence and community reintegration…” From my reading of their 2016 FY assessment I was impressed by the programs they offer to veterans and their families that include among other things an iProgram designed to coach these visually impaired men and women on the use of iPhones and iPads. I noticed in one section of the report that they do provide Technology Security and Safety Tips which is a common sense measure. One concern I have about this or any other clinic or rehab center that uses iPads in their programs is the security of the devices to prevent iPad theft or tablet theft if they use Android devices. It is my desire to see these locations use a Bug Tag to prevent criminals from stealing such a valuable asset.

 

iPad theft is a very real problem for medical facilities. The devices are small enough to slip into a purse or a jacket pocket. There have been documented instances where thieves have removed devices mounted in hospital lounges for patron use and the devices have been stolen in spite of being in the open and under camera surveillance. At risk is the device and the cost it carries along with any potential client information that may be on a device. For public use devices people will log in to their Apple accounts or they sync up with their personal device and forget to log off. For those that are being used for a patient or client there is a good chance patient data is maintained in the device. It could be something that seems as innocuous as name, address or phone numbers or it could be HIPPA protected information that is stored in an iPad or computer tablet. Should a criminal get that information the patient is at risk and the facility faces possible fines and lawsuits from the Department of Health and Human Services. The good news is a Bug Tag can prevent such thefts from taking place. A Bug Tag uses electronic article surveillance (EAS) technology that can interact with EAS towers to initiate an alarm if a tagged device is carried near a door. An alarm elicits an immediate response from staff workers who can recover a device before it is removed from the building. This is the same type of technology that has been successfully employed for years by retailers to stop shoplifters.

 

Getting back to the WBRC report it I noted that they found “96% of iProgram participants reported increased levels of satisfaction in iPad or iPhone training and use. 97% of iProgram participants reported a decrease in perceived levels of difficulty in using the iPhone or iPad.” If these veterans are becoming more comfortable in the use of these mobile devices it can be a gateway to greater independence and “normalization” in their lives. 

Another program that I have found that aids our wounded soldiers with iPads and computers is Soldier’s Angels.  Their “Valor-IT” program provides voice controlled laptops that allow soldiers in V.A. Medical Centers to remain in contact with “the rest of the world while during recovery”.  The other part of this program provides iPads and personal GPS devices to soldiers to “build self-confidence and independence by compensating for short-term memory loss and organizational challenges related to severe TBI and severe PTSD.” Because I would hate to see an iPad theft from a person who has sacrificed so selflessly for our nation. I would like to see the units protected with a Bug Tag.

Confidence gained from learning how to use new technologies and being able to become more independent is priceless for our injured veterans. We owe them our gratitude and a sense of security. Make sure that personal devices are protected with a Bug Tag and an EAS system so there is one less thing for them to be concerned about on their road to recovery.

 

Get more information on the Bug Tag, contact us or call 1.770.426.0547 today.

     

 

 

Emergency Room Revolution From Paper To Computer Tablets; Protection Of Patient Information Must Be A Priority By Using A Bug Tag

Bug Tag-3                                                                                                                          WC Blog 431
Tablet theft -5


Emergency Room Revolution From Paper To Computer Tablets; Protection Of Patient Information Must Be A Priority By Using A Bug Tag

     It is remarkable to me how things have changed within the medical care industry. I remember a time when I had to take our son to the emergency room because he got a styrofoam pellet from a bean bag chair lodged in his ear. Before I could have an emergency room doctor examine him I had to complete several pages worth of paperwork just to admit him. I had to do the same thing a few years later when he cut open his chin after a spill he took in our double baby stroller. In both instances it bothered me that it seemed there was more concern over getting the paperwork filled out than to see the patient and get him taken care of. A few days ago I had my own visit to the emergency room of the same hospital. There was a stark difference in how I was served some 20+ years later than when we took our son. The paper was one sheet and I was soon taken in to see a doctor. Only a few minutes after that a nurse came by with a computer tablet on a rolling cart and a keyboard and screen and completed my admission paperwork! I didn’t have to sit and fill out all of that cumbersome information myself. Of course, as I looked at the set up I did wonder what would prevent a tablet theft by a dishonest person. I could not see anything that secured the tablet or iPad to the cart.

     How can medical tablet theft or iPad theft be prevented in a hospital or clinic? Is it truly a problem to be concerned about? Let’s address the second question first. Medical tablet theft is a concern as it can lead to compromised patient data. To prevent it from occurring a Bug Tag can be attached to a mobile device and an electronic article surveillance (EAS) pedestal set up at doorways to those areas you don’t want a tablet to be carried out of. The tag has an adhesive that holds it to the device and a tamper alarm that ensures no one can pry it off and steal the device. The Bug Tag also emits a radio frequency wave that acts in conjunction with the EAS pedestal. When a tagged unit is carried too close to a pedestal an alarm built into the pedestal is set off and personnel can respond and recover the iPad or tablet.

     As for the question as to whether a medical tablet theft would be a major concern, it certainly would be. Any stored patient data could be used for fraudulent purposes. Personal information including names, addresses and so on could be on a device and accessible by a hacker. It is possible that extracted information could then be sold or used to create fraudulent identification. If enough patients have their identity stolen a report has to be filed with DHHS and potentially large fines may be levied against the institution. This isn’t strictly a matter of cost to the institution it is a matter of loss of trust on the part of clients.

     So back to the medical tablet that was in the emergency room where I had to visit. I provided my information as requested by the nurse. I gave my name, address, age, social security number and date of birth (all of the information a criminal could want, right?). Additionally, I was asked about past surgeries, allergies to medications I might have, any prescriptions or medications I was currently taking and who my family doctor is, if I have one. I thought about the questions and wondered to myself what someone with bad intentions could do with all of that information if they were to get their hands on that tablet. My wondering was cut short when the doctor came in to treat my ailment.

     Is my information safe and secure? I have to hope so. From what I observed in that E.R., at first glance it appeared there could be a tablet theft by someone brazen enough to try it. I could be wrong but if a Bug Tag had been on that tablet I would have felt much better about the security of that device and my information. 
Get more information on the Bug Tag, contact us or call 1.770.426.0547 today.

It is remarkable to me how things have changed within the medical care industry. I remember a time when I had to take our son to the emergency room because he got a styrofoam pellet from a bean bag chair lodged in his ear. Before I could have an emergency room doctor examine him I had to complete several pages worth of paperwork just to admit him. I had to do the same thing a few years later when he cut open his chin after a spill he took in our double baby stroller. In both instances it bothered me that it seemed there was more concern over getting the paperwork filled out than to see the patient and get him taken care of. A few days ago I had my own visit to the emergency room of the same hospital. There was a stark difference in how I was served some 20+ years later than when we took our son. The paper was one sheet and I was soon taken in to see a doctor. Only a few minutes after that a nurse came by with a computer tablet on a rolling cart and a keyboard and screen and completed my admission paperwork! I didn’t have to sit and fill out all of that cumbersome information myself. Of course, as I looked at the set up I did wonder what would prevent a tablet theft by a dishonest person. I could not see anything that secured the tablet or iPad to the cart.
     

How can medical tablet theft or iPad theft be prevented in a hospital or clinic? Is it truly a problem to be concerned about? Let’s address the second question first. Medical tablet theft is a concern as it can lead to compromised patient data. To prevent it from occurring a Bug Tag can be attached to a mobile device and an electronic article surveillance (EAS) pedestal set up at doorways to those areas you don’t want a tablet to be carried out of. The tag has an adhesive that holds it to the device and a tamper alarm that ensures no one can pry it off and steal the device. The Bug Tag also emits a radio frequency wave that acts in conjunction with the EAS pedestal. When a tagged unit is carried too close to a pedestal an alarm built into the pedestal is set off and personnel can respond and recover the iPad or tablet.
     

As for the question as to whether a medical tablet theft would be a major concern, it certainly would be. Any stored patient data could be used for fraudulent purposes. Personal information including names, addresses and so on could be on a device and accessible by a hacker. It is possible that extracted information could then be sold or used to create fraudulent identification. If enough patients have their identity stolen a report has to be filed with DHHS and potentially large fines may be levied against the institution. This isn’t strictly a matter of cost to the institution it is a matter of loss of trust on the part of clients.
     

So back to the medical tablet that was in the emergency room where I had to visit. I provided my information as requested by the nurse. I gave my name, address, age, social security number and date of birth (all of the information a criminal could want, right?). Additionally, I was asked about past surgeries, allergies to medications I might have, any prescriptions or medications I was currently taking and who my family doctor is, if I have one. I thought about the questions and wondered to myself what someone with bad intentions could do with all of that information if they were to get their hands on that tablet. My wondering was cut short when the doctor came in to treat my ailment.
     

Is my information safe and secure? I have to hope so. From what I observed in that E.R., at first glance it appeared there could be a tablet theft by someone brazen enough to try it. I could be wrong but if a Bug Tag had been on that tablet I would have felt much better about the security of that device and my information. 

 

Get more information on the Bug Tag, contact us or call 1.770.426.0547 today.

 

Maintaining Space In Medical Facility Halls And Doorways Does Not Mean Electronic Article Surveillance Protection Is Out Of The Question; The Classic N10 Tower Is A Perfect Solution

Classic N10 – 5                                                                                                                     WC Blog 401
Bug Tag -4


Maintaining Space In Medical Facility Halls And Doorways Does Not Mean Electronic Article Surveillance Protection Is Out Of The Question; The Classic N10 Tower Is A Perfect Solution

     In the past year I have been in hospitals and doctors offices far more than I would like. In some of those cases the hallways had ample room for gurneys and staff to rush by me as I walked to the rooms I was visiting. Admittedly when I heard the quick pace of feet and clatter of wheels, whether there was enough room or not, I found myself stepping against the wall. Instinctively I knew that if that was my loved one I would want them to get through to surgery as quickly as possible. Sometimes I would pass groups of doctors who were on their rounds reviewing notes on their i-Pads and tablets and discussing the patients they were ready to see or had just seen. In some cases this took place in the area of the nurse’s station and space was a little tighter. Again, being aware that they were busy I would make efforts to stay out of their way. As I reflect on those hospital and office visits I think about the activities that went on around me. Medical personnel with new technology in hand, life-saving equipment lining hallways, professional medical care givers moving patients in and out of rooms and down those same halls. It can start to feel a bit claustrophobic. Putting on my Loss Prevention hat I thought about all of these factors and what if questions. What if there is Tablet theft of those medical tablets? What if an electronic article surveillance (EAS) system could be installed to prevent i-Pad theft? Would there be room for the necessary EAS towers like the Checkpoint Classic N10?

     In order to proceed with the answers to my questions it is only proper to explain what the Bug Tag and the Classic N10 are. The Tag is simply an anti-theft device that is stuck to a computer tablet and it interacts with an EAS tower. If a tagged mobile medical device is carried too close to a tower the tower alarm sounds a loud beeping noise and lights in the tower flash, alerting nearby employees someone is trying to walk out with a mobile device. If someone is trying to steal a medical tablet by tampering with a Bug Tag, an internal tag alarm sounds also alerting personnel of an attempted theft. The Classic N10 is an EAS tower specifically designed to fit smaller entryways and hallways. They don’t take up the same amount of space a traditional tower takes up. This allows ease of access even if something is being rushed through a hall or doorway such as a patient on a gurney or nurse rushing through a door with a crash cart. These towers won’t interfere with personnel or equipment.

     It was only recently that I learned there is an organization that focuses on hospital space standards. The American Society for Healthcare Engineering looks at hospitals and issues related to effective building designs. In an article on their website, “ICC Considers Changing Corridor Width Rules to Reflect Shift from Life Safety Concerns”, by Deanna Martin, ASHE senior communications specialist, discussed the rules and regulations regarding hospital hallway widths. She mentions diverse views on whether the width requirements take into consideration equipment such as crash carts and whether they count against those measurements. Regardless of what the regulations may or may not say concerning medical facility halls, you can easily see how setting up a Classic N10 tower would take up a smaller amount of space and still accommodate the needs of complying with ICC codes. 

     Medical tablets and i-Pads would be protected from theft and the potential for compromised patient information since they would have a Bug Tag. Doorways and Hallways where you would want to keep mobile devices restricted to could be protected with EAS.

     Keep patient data safe on mobile devices and keep lives safe with open corridors at the same time. Use a Bug Tag on tablets and Classic N10 towers in halls and doors. See how effective an EAS system can be for your medical facility.
For more information about Classic N10 contact us or call 1.770.426.0547.

In the past year I have been in hospitals and doctors offices far more than I would like. In some of those cases the hallways had ample room for gurneys and staff to rush by me as I walked to the rooms I was visiting. Admittedly when I heard the quick pace of feet and clatter of wheels, whether there was enough room or not, I found myself stepping against the wall. Instinctively I knew that if that was my loved one I would want them to get through to surgery as quickly as possible. Sometimes I would pass groups of doctors who were on their rounds reviewing notes on their i-Pads and tablets and discussing the patients they were ready to see or had just seen. In some cases this took place in the area of the nurse’s station and space was a little tighter. Again, being aware that they were busy I would make efforts to stay out of their way. As I reflect on those hospital and office visits I think about the activities that went on around me. Medical personnel with new technology in hand, life-saving equipment lining hallways, professional medical care givers moving patients in and out of rooms and down those same halls. It can start to feel a bit claustrophobic. Putting on my Loss Prevention hat I thought about all of these factors and what if questions. What if there is Tablet theft of those medical tablets? What if an electronic article surveillance (EAS) system could be installed to prevent i-Pad theft? Would there be room for the necessary EAS towers like the Checkpoint Classic N10?
     

In order to proceed with the answers to my questions it is only proper to explain what the Bug Tag and the Classic N10 are. The Tag is simply an anti-theft device that is stuck to a computer tablet and it interacts with an EAS tower. If a tagged mobile medical device is carried too close to a tower the tower alarm sounds a loud beeping noise and lights in the tower flash, alerting nearby employees someone is trying to walk out with a mobile device. If someone is trying to steal a medical tablet by tampering with a Bug Tag, an internal tag alarm sounds also alerting personnel of an attempted theft. The Classic N10 is an EAS tower specifically designed to fit smaller entryways and hallways. They don’t take up the same amount of space a traditional tower takes up. This allows ease of access even if something is being rushed through a hall or doorway such as a patient on a gurney or nurse rushing through a door with a crash cart. These towers won’t interfere with personnel or equipment.
     

It was only recently that I learned there is an organization that focuses on hospital space standards. The American Society for Healthcare Engineering looks at hospitals and issues related to effective building designs. In an article on their website, “ICC Considers Changing Corridor Width Rules to Reflect Shift from Life Safety Concerns”, by Deanna Martin, ASHE senior communications specialist, discussed the rules and regulations regarding hospital hallway widths. She mentions diverse views on whether the width requirements take into consideration equipment such as crash carts and whether they count against those measurements. Regardless of what the regulations may or may not say concerning medical facility halls, you can easily see how setting up a Classic N10 tower would take up a smaller amount of space and still accommodate the needs of complying with ICC codes. 
     

Medical tablets and i-Pads would be protected from theft and the potential for compromised patient information since they would have a Bug Tag. Doorways and Hallways where you would want to keep mobile devices restricted to could be protected with EAS towers.

 

 Keep patient data safe on mobile devices and keep lives safe with open corridors at the same time. Use a Bug Tag on tablets and Classic N10 towers in halls and doors. See how effective an EAS system can be for your medical facility.

 

For more information about Classic N10 contact us or call 1.770.426.0547.

 

Could Increasing Use Of Mobile Medical Devices Lead To Stolen Patient Information? Not If A Bug Tag Is On A Tablet

iPad Theft-4                                                                                                                           WC Blog 378
Tablet theft-4
Bug Tag-4
Could Increasing Use Of Mobile Medical Devices Lead To Stolen Patient Information? Not If A Bug Tag Is On A Tablet
     We all know that mobile medical devices such as iPads and computer tablets are getting more and more use in hospitals, clinics, doctor’s offices and the medical field in general. We register as new patients on mobile devices at the front desk of a clinic, or we may be asked to complete medical histories on a nurse’s iPad. I was curious to know what the top uses of mobile devices actually is for doctors. According to a Wolters-Kluwer 2013 Physician Outlook Survey, the following were the mobile device uses by physicians (pg. 6):
Access to drug information (dosage calculators, side effects, interactions, etc.):
72% smartphone (e.g. iPhone, Droid) 55% tablets (e.g. iPad, Kindle Fire)
Communication with nurses and other staff:
44% smartphone 20% tablets
Access to medical research:
43% smartphone 63% tablets
Access to evidence based clinical reference tools at the point of care with patients:
42% smartphone 50% tablets
Communication with patients:
33% smartphone 17% tablets
Access to medical records/other patient data:
17% smartphone 43% tablets
Access to information for reimbursement/billing purposes:
12% smartphone 24% tablets
Other:
9% smartphone 13% tablets
Did you notice the “access to medical records/other patient data” and “access to information for reimbursement/billing” categories? Tablets and iPads are used significantly for looking at information specific to patients. What happens in the event of a Tablet theft or iPad theft? What information may be accessible by a thief? 
     The answer is, you don’t know how much of a patient’s information may be stolen and used for stealing identities, credit information, addresses, prescriptions, etc. Medical tablet theft and Ipad theft are very real problems and put patients and their medical providers at risk. Using a Bug Tag on each device owned by the medical facility can prevent theft and potential HIPPA violations. The tag is an electronic article surveillance (EAS) anti-theft device. It is placed directly on a table or other device and can’t be removed without activating a built in alarm that screeches at 95 decibels, alerting staff to an attempted theft. Facilities also install EAS pedestals at entrances that can detect a Bug Tag. If a criminal tries to walk out with a device that is tagged (or if an employee forgets they have a device with them and they try to leave the building) the tag sets off the EAS pedestal alarm. Again, employees respond and can recover it before a tablet theft or iPad theft can take place. It is also important to know that the Bug Tag does come in a “3 alarm” version that activates a built in alarm in the tag if a person were to continue walking past the pedestals into a parking lot. This alarm prevents a thief from blending into a crowd and getting away unnoticed.
     Going back to the 2013 Physician Outlook Survey, consider the information we are looking at, this data is four years old or more. As the popularity of the devices has increased with more apps available to doctors and nurses and the time and paperwork they save is realized, the numbers of devices in use are greater. This means the opportunity for iPad theft and Tablet theft is greater as well, making the security of them even more important today than it was in 2013. I know from my own recent visits to two local hospitals and a clinic in my area that mobile device use has become the norm in the medical profession. A close family member of mine was in an ICU unit and when doctors made their rounds individually and as a group most of the members had iPads or tablets. When I recently was at a local clinic I signed in on an iPad. My wife has signed in at a minute clinic on a mounted iPad. It is clear that the wave of the future is the move from paper to electronic records. Protecting this data is critical.
     Improving efficiency in the medical field ultimately improves patient care and can drive down costs. In doing so, it is imperative that patient information is protected in the process by preventing iPad theft through the use of a Bug Tag.
Need information on iPad theft? Give us a call at 1.770.426.0547 now.

We all know that mobile medical devices such as iPads and computer tablets are getting more and more use in hospitals, clinics, doctor’s offices and the medical field in general. We register as new patients on mobile devices at the front desk of a clinic, or we may be asked to complete medical histories on a nurse’s iPad. I was curious to know what the top uses of mobile devices actually is for doctors. According to a Wolters-Kluwer 2013 Physician Outlook Survey, the following were the mobile device uses by physicians (pg. 6):

Access to drug information (dosage calculators, side effects, interactions, etc.):72% smartphone (e.g. iPhone, Droid) 55% tablets (e.g. iPad, Kindle Fire)

Communication with nurses and other staff:44% smartphone 20% tablets

Access to medical research:43% smartphone 63% tablets

Access to evidence based clinical reference tools at the point of care with patients:42% smartphone 50% tablets

Communication with patients:33% smartphone 17% tabletsAccess to medical records/other patient data:17% smartphone 43% tablets

Access to information for reimbursement/billing purposes:12% smartphone 24% tablets

Other:9% smartphone 13% tablets

Did you notice the “access to medical records/other patient data” and “access to information for reimbursement/billing” categories? Tablets and iPads are used significantly for looking at information specific to patients. What happens in the event of a Tablet theft or iPad theft? What information may be accessible by a thief? 
     

 

The answer is, you don’t know how much of a patient’s information may be stolen and used for stealing identities, credit information, addresses, prescriptions, etc. Medical tablet theft and Ipad theft are very real problems and put patients and their medical providers at risk. Using a Bug Tag on each device owned by the medical facility can prevent theft and potential HIPPA violations. The tag is an electronic article surveillance (EAS) anti-theft device. It is placed directly on a table or other device and can’t be removed without activating a built in alarm that screeches at 95 decibels, alerting staff to an attempted theft. Facilities also install EAS pedestals at entrances that can detect a Bug Tag. If a criminal tries to walk out with a device that is tagged (or if an employee forgets they have a device with them and they try to leave the building) the tag sets off the EAS pedestal alarm. Again, employees respond and can recover it before a tablet theft or iPad theft can take place. It is also important to know that the Bug Tag does come in a “3 alarm” version that activates a built in alarm in the tag if a person were to continue walking past the pedestals into a parking lot. This alarm prevents a thief from blending into a crowd and getting away unnoticed.
     

Going back to the 2013 Physician Outlook Survey, consider the information we are looking at, this data is four years old or more. As the popularity of the devices has increased with more apps available to doctors and nurses and the time and paperwork they save is realized, the numbers of devices in use are greater. This means the opportunity for iPad theft and Tablet theft is greater as well, making the security of them even more important today than it was in 2013. I know from my own recent visits to two local hospitals and a clinic in my area that mobile device use has become the norm in the medical profession. A close family member of mine was in an ICU unit and when doctors made their rounds individually and as a group most of the members had iPads or tablets. When I recently was at a local clinic I signed in on an iPad. My wife has signed in at a minute clinic on a mounted iPad. It is clear that the wave of the future is the move from paper to electronic records. Protecting this data is critical.
     

Improving efficiency in the medical field ultimately improves patient care and can drive down costs. In doing so, it is imperative that patient information is protected in the process by preventing iPad theft through the use of a Bug Tag.

 

Need information on iPad theft? Give us a call at 1.770.426.0547 now.