Sometimes Compromise Is Good Except When It Is Patient Information That Is Compromised; Prevent Medical Ipad Theft With An Alpha Bug Tag

 

Ipad theft-3                                                                                                                             WC Blog 377
Bug Tag-3
Sometimes Compromise Is Good Except When It Is Patient Information That Is Compromised; Prevent Medical Ipad Theft With An Alpha Bug Tag
     April 22nd, 2017 in Fairfax County Virginia, a suspect was being sought in the theft of cash AND iPads from medical offices on the Inova Fair Oaks Medical Campus, according to an April 25th, 2017 report on the WJLA website, the story by Nancy Chen. The subject of the investigation is accused of 17 break-ins on the campus. A June 1, 2017 article on the website, laist, by Julia Wick, titled, “Massive Security Breach At Rodeo Drive Plastic Surgery Clinic Put Thousands Of Patient Files At Risk”, reported that “…an estimated 15,000 files containing medical and other personal information were stolen from their practice”. An Office Manager for the practice acting as spokesman said, “When we entered we saw that every bit of medical records had been taken including backup hard drives and iPads with patient information,…” The fact that patient information can be so easily compromised is disconcerting. Think about all of the information you provide to a doctor during a visit. Not long ago I made a visit to a doctor and I had to give them my name, address, social security number, place of employment, date of birth, medical insurance card and patient medical history. Interestingly enough I gave it via an iPad on a bracket at the sign in counter. That’s a lot of personal information for a criminal to get their hands on if there was an iPad theft at this location. The fact is, iPads were stolen at the two locations the articles mentioned. Granted these were break-ins versus thefts during operating hours but the devices are gone and with them any patient data that may have been stored on them. There is a device called a Bug Tag that can help prevent an iPad theft or medical tablet theft from a medical provider’s office.
     The concern with a tablet or iPad is that they can be so small that they are easy to conceal in a purse, under a shirt, or in a cargo pants pocket. If a medical mobile device is stolen it is quite easy for a thief to hide the item(s) and stroll out of the building unnoticed. A Bug Tag is attached directly to the mobile device with an adhesive and tamper protections prevent someone from removing the tag without setting off a built in alarm in the tag. Along with placing the tags on tablets and iPads facilities set up electronic article surveillance (EAS) towers at entrances and areas where such devices do not need to be taken, such as at a point in front of restroom doors. Should someone approach a tower the sensor in the tower detects the Bug Tag and alarms in the tower are set off. Facility, staff and employees can respond and recover the device before it can be removed from the building or taken into an off-limits area.
     I know that the stories I referenced were about break-ins and my point was to demonstrate that devices that have or potentially have patient information can be stolen and place patients at risk. But consider that on February 8, 2017 a criminal stole several iPads from the lobby of Leamington District Memorial Hospital. On March 23, 2016, two iPads were stolen from Hawke’s Bay Fallen Soldiers’ Memorial Hospital’s Children’s Ward according to OURHEALTH Hawke’s Bay’s website. The article states, “…the two stolen iPads – one belonging to the Hospital Play Specialist Service and the other the property of the Medical Team in the Children’s Ward.” These stories are reminders that iPad theft and medical tablet theft is a real problem and if not protected there is a good chance someone will try to steal them and the patient information they contain.
     The job of the medical providers is to care for their patients. Take care of their health and their patient information. Place a Bug Tag on each of your iPads and tablets and an EAS tower at all of your entrances and off-limit areas. 
Get more information on iPad Theft, contact us or call 1.770.426.0547 today.
        
      

On April 22nd, 2017 in Fairfax County Virginia, a suspect was being sought in the theft of cash AND iPads from medical offices on the Inova Fair Oaks Medical Campus, according to an April 25th, 2017 report on the WJLA website, the story by Nancy Chen. The subject of the investigation is accused of 17 break-ins on the campus. A June 1, 2017 article on the website, laist, by Julia Wick, titled, “Massive Security Breach At Rodeo Drive Plastic Surgery Clinic Put Thousands Of Patient Files At Risk”, reported that “…an estimated 15,000 files containing medical and other personal information were stolen from their practice”. An Office Manager for the practice acting as spokesman said, “When we entered we saw that every bit of medical records had been taken including backup hard drives and iPads with patient information,…” The fact that patient information can be so easily compromised is disconcerting. Think about all of the information you provide to a doctor during a visit. Not long ago I made a visit to a doctor and I had to give them my name, address, social security number, place of employment, date of birth, medical insurance card and patient medical history. Interestingly enough I gave it via an iPad on a bracket at the sign in counter. That’s a lot of personal information for a criminal to get their hands on if there was an iPad theft at this location. The fact is, iPads were stolen at the two locations the articles mentioned. Granted these were break-ins versus thefts during operating hours but the devices are gone and with them any patient data that may have been stored on them. There is a device called a Bug Tag that can help prevent an iPad theft or medical tablet theft from a medical provider’s office.

The concern with a tablet or iPad is that they can be so small that they are easy to conceal in a purse, under a shirt, or in a cargo pants pocket. If a medical mobile device is stolen it is quite easy for a thief to hide the item(s) and stroll out of the building unnoticed. A Bug Tag is attached directly to the mobile device with an adhesive and tamper protections prevent someone from removing the tag without setting off a built in alarm in the tag. Along with placing the tags on tablets and iPads facilities set up electronic article surveillance (EAS) towers at entrances and areas where such devices do not need to be taken, such as at a point in front of restroom doors. Should someone approach a tower the sensor in the tower detects the Bug Tag and alarms in the tower are set off. Facility, staff and employees can respond and recover the device before it can be removed from the building or taken into an off-limits area.

I know that the stories I referenced were about break-ins and my point was to demonstrate that devices that have or potentially have patient information can be stolen and place patients at risk. But consider that on February 8, 2017 a criminal stole several iPads from the lobby of Leamington District Memorial Hospital. On March 23, 2016, two iPads were stolen from Hawke’s Bay Fallen Soldiers’ Memorial Hospital’s Children’s Ward according to OURHEALTH Hawke’s Bay’s website. The article states, “…the two stolen iPads – one belonging to the Hospital Play Specialist Service and the other the property of the Medical Team in the Children’s Ward.” These stories are reminders that iPad theft and medical tablet theft is a real problem and if not protected there is a good chance someone will try to steal them and the patient information they contain.

The job of the medical providers is to care for their patients. Take care of their health and their patient information. Place a Bug Tag on each of your iPads and tablets and an EAS tower at all of your entrances and off-limit areas. 

 

Get more information on iPad Theft, contact us or call 1.770.426.0547 today.

        
      

 

 

Don’t Have A Heart Attack Over The Use Of Alpha Bug Tags To Protect Mobile Medical Devices From Theft, EAS Won’t Interfere With Pacemakers

Alpha Bug Tag-3                                                                                                                   WC Blog 350
i-Pad theft-3
Don’t Have A Heart Attack Over The Use Of Alpha Bug Tags To Protect Mobile Medical Devices From Theft, EAS Won’t Interfere With Pacemakers
     When I worked as a Retail Loss Prevention Manager our store was located in a place where retirees would often move to for the winter in order to escape the cold.  One of the questions I was asked on a fairly regular basis was if our electronic article surveillance (EAS) system would interfere with pacemakers. Customers were concerned about the tags we used but they were really fearful of the EAS pedestals since they were located right at the doors to the building. I would try to reassure them that there was no health concerns associated with the system and after a few minutes that was usually enough to allay any trepidations the customers might have had. There were some though that no matter how much time I spent trying to reassure them they could not get over that hurdle. That is why the question was posed to me more often than it may have been to a peer somewhere else. Studies have been done that show there is minimal chance EAS could interfere with pacemakers and similar medical devices. Stores aren’t the only place the technology is used.  It is important for healthcare providers to understand this as they consider the need to protect mobile medical devices from tablet theft of i-Pad theft. 
     Many medical offices from general practitioners to dentists are realizing the advantages of using mobile technology to improve patient care, share information with patients and protect records. Loose papers and stray clipboards are slowly being replaced with an i-Pad or a tablet. Patients are now using these devices to register new accounts including all of their personal information but now it is quickly accessed at the touch of a button. The down side is that if one of these mobile devices is stolen there is a chance client information can be accessed by criminals. Many offices that have made the switch to technology over paper have taken steps to protect the mobile units with an Alpha Bug Tag attached to a device and set up EAS towers at the doors. When protected devices are carried into the detection field of the towers, alarms alert employees and who then prevent an i-Pad theft from taking place. The tags are also tamper proof which prevents a thief from being able to remove an anti-theft device and steal a tablet. Attempts to pry a tag off of a device sets off an alarm built into the Alpha Bug Tag again foiling efforts of someone trying to steal protected information.
     The safety of electronic article surveillance on pacemakers has been documented many times. For instance the American Heart Association on their website www.heart.org states, “Interactions with EAS systems are unlikely to cause clinically significant symptoms in most patients.” On the other hand, with regard to MP3 players the website says, “Most contain a magnetic substance and research has documented that placing the headphones too close to the pacemaker caused interference.”  Another concern is raised with power- generating equipment, arc welding equipment and powerful magnets. The site continues, “Such as found in some medical devices, heavy equipment or motors can inhibit pulse generators.” On their website, hopkinsmedicine.org, Johns Hopkins Hospital article for potential patients, “Implantable Cardioverter Defibrillator (ICD) Insertion” provides the caution, “Anti-Theft systems or electronic article surveillance (EAS) used in department stores may interact with an ICD. The American Heart Association recommends you should not lean on or stand in this equipment but should pass quickly through the detection system.” 
     There is potentially more risk involved in a visit to a doctor’s office or hospital from the medical equipment in those facilities than that associated with EAS. The American Heart Association warns of interference from MRI’s, Radio Frequency Ablation (a medical procedure that uses radio waves to manage a variety of arrhythmias) and Short-wave or microwave diathermy (a medical procedure that uses high-frequency, high-intensity signals for physical therapy). Each of these can disrupt or damage the pacemaker a patient is carrying. 
     The point I am making is that medical providers should adapt mobile devices in the practice to improve service and save time. Any concern over i-Pad theft or tablet theft and the compromise of protected patient information can be laid to rest with the use of Alpha Bug Tags and EAS technology. Patients who may have pacemakers need not worry about interference with their devices.
Need information on Alpha Bug Tags? Give us a call at 1.770.426.0547 now.

When I worked as a Retail Loss Prevention Manager our store was located in a place where retirees would often move to for the winter in order to escape the cold.  One of the questions I was asked on a fairly regular basis was if our electronic article surveillance (EAS) system would interfere with pacemakers. Customers were concerned about the tags we used but they were really fearful of the EAS pedestals since they were located right at the doors to the building. I would try to reassure them that there was no health concerns associated with the system and after a few minutes that was usually enough to allay any trepidations the customers might have had. There were some though that no matter how much time I spent trying to reassure them they could not get over that hurdle. That is why the question was posed to me more often than it may have been to a peer somewhere else. Studies have been done that show there is minimal chance EAS could interfere with pacemakers and similar medical devices. Stores aren’t the only place the technology is used.  It is important for healthcare providers to understand this as they consider the need to protect mobile medical devices from tablet theft of i-Pad theft. 
     

Many medical offices from general practitioners to dentists are realizing the advantages of using mobile technology to improve patient care, share information with patients and protect records. Loose papers and stray clipboards are slowly being replaced with an i-Pad or a tablet. Patients are now using these devices to register new accounts including all of their personal information but now it is quickly accessed at the touch of a button. The down side is that if one of these mobile devices is stolen there is a chance client information can be accessed by criminals. Many offices that have made the switch to technology over paper have taken steps to protect the mobile units with an Alpha Bug Tag attached to a device and set up EAS towers at the doors. When protected devices are carried into the detection field of the towers, alarms alert employees and who then prevent an i-Pad theft from taking place. The tags are also tamper proof which prevents a thief from being able to remove an anti-theft device and steal a tablet. Attempts to pry a tag off of a device sets off an alarm built into the Alpha Bug Tag again foiling efforts of someone trying to steal protected information.
     

The safety of electronic article surveillance on pacemakers has been documented many times. For instance the American Heart Association on their website www.heart.org states, “Interactions with EAS systems are unlikely to cause clinically significant symptoms in most patients.” On the other hand, with regard to MP3 players the website says, “Most contain a magnetic substance and research has documented that placing the headphones too close to the pacemaker caused interference.”  Another concern is raised with power- generating equipment, arc welding equipment and powerful magnets. The site continues, “Such as found in some medical devices, heavy equipment or motors can inhibit pulse generators.” On their website, hopkinsmedicine.org, Johns Hopkins Hospital article for potential patients, “Implantable Cardioverter Defibrillator (ICD) Insertion” provides the caution, “Anti-Theft systems or electronic article surveillance (EAS) used in department stores may interact with an ICD. The American Heart Association recommends you should not lean on or stand in this equipment but should pass quickly through the detection system.” 
     

There is potentially more risk involved in a visit to a doctor’s office or hospital from the medical equipment in those facilities than that associated with EAS. The American Heart Association warns of interference from MRI’s, Radio Frequency Ablation (a medical procedure that uses radio waves to manage a variety of arrhythmias) and Short-wave or microwave diathermy (a medical procedure that uses high-frequency, high-intensity signals for physical therapy). Each of these can disrupt or damage the pacemaker a patient is carrying. 
     

The point I am making is that medical providers should adapt mobile devices in the practice to improve service and save time. Any concern over i-Pad theft or tablet theft and the compromise of protected patient information can be laid to rest with the use of Alpha Bug Tags and EAS technology. Patients who may have pacemakers need not worry about interference with their devices.

 

Need information on Alpha Bug Tags? Give us a call at 1.770.426.0547 now.

 

The Growth Of First-Responders And Their Communications Has Improved Patient Care But i-Pad Theft Is A New Concern For The Hospitals That Serve Them

As a child I grew up watching the television series Emergency! The show was about firemen and what we would call today, paramedics. The main characters would respond to fires, vehicle crashes, all of the incidents you would expect fire fighters to respond to. The thing that was unique back in those years was that the firefighters/paramedics were administering first aid and life support service to keep patients/victims alive. The main characters, John and Roy would evaluate a patient and call Rampart General Hospital and give a description of their patient’s condition. Emergency room staff doctors and nurses would then provide guidance over the radio on treatments. Today, paramedics and emergency medical technicians can use i-Pads and Tablets to consult with doctors and doctors can see the condition of the patient, as well as get the first-hand description from the care giver on scene. This does bring up one concern and that is the potential of i-Pad theft or medical tablet theft at the hospital.

    

The issue of medical i-Pad theft or tablet theft is very real. When such devices are stolen there is a risk of patient information compromise, placing in jeopardy patient health information, billing information (including insurance provider account and group numbers), prescription medication information and more. There is a black market where such information is sold and the information is then used for fraudulent purposes and identity theft. A facility that experiences a breach or potential breach of patient information is subject to investigations and fines levied by the Department of Health and Human Services. So how can theft be prevented? By using a Bug Tag on mobile medical devices that are maintained in hospitals, clinics and medical facilities. The Bug Tag is an anti-theft device that uses radio frequency (rf) waves to interact with Checkpoint electronic article surveillance pedestals. The Bug Tag is attached directly to the mobile device and if the device is carried too close to the pedestals, located next to the entry/exit doors, alarm with lights and a loud beeping noise. Staffs respond to the alarms and recover the device before it is removed from the building thereby averting the potential stolen patient data.

 

This leads me back to the beginning of this article and how i-Pads came to be prevalent among first responders today. What was happening in the world of first responders that led to the creation of paramedics and emergency medical technicians in the first place? Before the 1960’s, ambulance services varied between states and even within the states themselves. Some of the responders had no medical training making the ambulance service a transportation unit only and others had highly trained staffs to treat injuries. According to Legislative Intent Service, Inc. in an article titled, “Origins of California’s Paramedics”, a 3 year study was completed by the National Academy of Sciences, National Research Council, on accidental deaths in the United States. Titled, “Accidental Death and Disability: The Neglected Disease of Modern Society.” “The study noted another striking find: Statistically, soldiers in a warzone were faring better than the American civilian public regarding emergency care.” As a result of the study, In 1970 the, “Wedworth-Townsend Paramedic Act” was sent to the desk of then California Governor Ronald Reagan. One of the interesting points of the bill included, the ability of the paramedics to administer a number of intravenous drugs or agents, “Where voice contact or a telemetered electrocardiogram is monitored by a physician or a certified mobile intensive care nurse where authorized by a physician, and direct communication is maintained, may upon order of such physician or such nurse do any of the following:…” In other words, in Emergency!, when the paramedics were calling “Rampart” and talking to the emergency room doctor on duty, this was in line with the 1970 California bill. Today, paramedics have even more training and better tools at their disposal. The improvement in communications using i-Pads and tablets over radios has dramatically changed initial diagnosis and stabilization until a patient can reach a medical facility.  Doctors can be virtually in the field with the EMT and the patient through Skype and the cameras built into i-Pads.

 

While guarding against i-Pad Theft or Tablet Theft in the field may be difficult. In the hospital setting it is possible when the Bug Tag is attached to each hospital owned mobile device. Doing so ensures patients will continue to receive the best treatment possible from first responders.

 

Get more information on a Bug Tag, contact us or call 1.770.426.0547 today.

 

Don’t Trust In Encryption Alone To Protect Your Mobile Medical Devices; Use The Alpha Bug Tag 2 To Boost Security

 

i-pad Theft-3                                                                                                                WC Blog 328
Bug Tag-3
Classic N10-3
Don’t Trust In Encryption Alone To Protect Your Mobile Medical Devices; Use The Alpha Bug Tag 2 To Boost Security 
     I don’t like to cry wolf and I don’t like to unnecessarily scare people. On the flip side of that, I do believe being too nonchalant about some things, like data security on computer devices can lead to harmful situations. Take for instance mobile medical devices, some web sites seem to suggest that encryption protects computing devices from hacking so there is not a lot to be concerned with in terms of protecting patient’s personal information.  I will grant you that encryption is a powerful tool, but I would not be confident in it as my only defense should an ipad theft take place in my hospital, clinic or practice. Medical facilities MUST protect all patient data even if it only seems to be harmless on the surface, like an address. There are thieves trying to gain access to patient information be it addresses, credit billing information, names, prescription drug data, etc. They use the information to obtain prescription medications, file fraudulent medical bills with insurers, obtain credit information and so on. Medical providers must do more to protect mobile devices than depend on encryption.  One effective method is to physically protect devices with the Alpha Bug Tag 2.
     The Bug Tag is an electronic article surveillance (EAS) anti-theft device that works using a radio frequency (rf) signal in concert with an EAS pedestal, such as the Checkpoint Classic N10 unit. It has rounded edges that give it a flush fit with a device such as a tablet computer or i-pad. The design of the tag makes it nearly impossible for a criminal to pry it off of whatever item it is attached to. The built in tamper alarm ensures that even if it were pried off, the tag will sound a 95 decibel squealing alarm alerting employees to an attempted i-pad theft or tablet theft. With Classic N10 pedestals set in place at entrances and exits to a building, any attempt to smuggle a protected item out the door will result in an alarm from the tower. Again, staffs are alerted and can respond to the event and recover the item before a thief gets away.
     Why would someone completely trust in encryption to protect their devices? For starters on their iOS security white paper, March 2017, Apple includes the statement on page 10, “iOS has additional encryption and data protection features to safeguard user data even in cases where other parts of the security infrastructure have been compromised…This provides benefits for both users and IT administrators protecting personal and corporate information at all times and providing methods for instant and complete remote wipe in the case of device theft or loss.” https://www.apple.com/business/docs/iOS_Security_Guide.pdf I am not an expert in encryption and I know that the people at Apple are great at what they do. I only point out that one is left with the impression that there is no need to worry should a device be stolen. I would like to suggest that IF a breach were to take place, fines from the Department of Health and Human Services (HHS) can be hefty. On top of the fines that could be levied, there is also the loss of public confidence in the facility where the breach has occurred and that can impact profitability.
     Do portable devices get stolen from facilities?  According to the hhs.gov website, in 2017 alone there have been four reported thefts or losses of “other portable electronic devices” and four “thefts of laptops” https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf This does not include all the breaches due to paper losses or thefts, network server hackings, unauthorized email disclosures and so on. In one case of theft, “A computer and storage device have been discovered to have been stolen from San Diego-based healthcare provider Sharp Healthcare. The devices were taken from a locked cabinet in an access-controlled patient treatment area of the Sharp Memorial Outpatient Pavilion in Kearney Mesa in San Diego, CA.” (emphasis mine). The article goes on to report that, “750 current and former patients are understood to have been impacted by the incident.” http://www.hipaajournal.com/sharp-healthcare-says-stolen-devices-contained-phi-of-patients-8718/ The story does not indicate the type of storage device or computer and it may or may not have been an i-pad theft but with the increased use of mobile devices in medicine the necessary precautions are the same.
     Using the Bug Tag 2 on mobile medical devices and having Classic N10 pedestals installed in doorways is an additional security step you can take to protect your business and clients. Don’t allow i-pad theft or tablet theft to take your reputation or result in astronomical fines. 
Get more information on the Bug Tag, contact us or call 1.770.426.0547today.

I don’t like to cry wolf and I don’t like to unnecessarily scare people. On the flip side of that, I do believe being too nonchalant about some things, like data security on computer devices can lead to harmful situations. Take for instance mobile medical devices, some web sites seem to suggest that encryption protects computing devices from hacking so there is not a lot to be concerned with in terms of protecting patient’s personal information.  I will grant you that encryption is a powerful tool, but I would not be confident in it as my only defense should an ipad theft take place in my hospital, clinic or practice. Medical facilities MUST protect all patient data even if it only seems to be harmless on the surface, like an address. There are thieves trying to gain access to patient information be it addresses, credit billing information, names, prescription drug data, etc. They use the information to obtain prescription medications, file fraudulent medical bills with insurers, obtain credit information and so on. Medical providers must do more to protect mobile devices than depend on encryption.  One effective method is to physically protect devices with the Alpha Bug Tag 2.

The Bug Tag is an electronic article surveillance (EAS) anti-theft device that works using a radio frequency (rf) signal in concert with an EAS pedestal, such as the Checkpoint Classic N10 unit. It has rounded edges that give it a flush fit with a device such as a tablet computer or i-pad. The design of the tag makes it nearly impossible for a criminal to pry it off of whatever item it is attached to. The built in tamper alarm ensures that even if it were pried off, the tag will sound a 95 decibel squealing alarm alerting employees to an attempted i-pad theft or tablet theft. With Classic N10 pedestals set in place at entrances and exits to a building, any attempt to smuggle a protected item out the door will result in an alarm from the tower. Again, staffs are alerted and can respond to the event and recover the item before a thief gets away.

Why would someone completely trust in encryption to protect their devices? For starters on their iOS security white paper, March 2017, Apple includes the statement on page 10, “iOS has additional encryption and data protection features to safeguard user data even in cases where other parts of the security infrastructure have been compromised…This provides benefits for both users and IT administrators protecting personal and corporate information at all times and providing methods for instant and complete remote wipe in the case of device theft or loss.” https://www.apple.com/business/docs/iOS_Security_Guide.pdf I am not an expert in encryption and I know that the people at Apple are great at what they do. I only point out that one is left with the impression that there is no need to worry should a device be stolen. I would like to suggest that IF a breach were to take place, fines from the Department of Health and Human Services (HHS) can be hefty. On top of the fines that could be levied, there is also the loss of public confidence in the facility where the breach has occurred and that can impact profitability.

Do portable devices get stolen from facilities? According to the hhs.gov website, in 2017 alone there have been four reported thefts or losses of “other portable electronic devices” and four “thefts of laptops” https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf This does not include all the breaches due to paper losses or thefts, network server hackings, unauthorized email disclosures and so on. In one case of theft, “A computer and storage device have been discovered to have been stolen from San Diego-based healthcare provider Sharp Healthcare. The devices were taken from a locked cabinet in an access-controlled patient treatment area of the Sharp Memorial Outpatient Pavilion in Kearney Mesa in San Diego, CA.” (emphasis mine). The article goes on to report that, “750 current and former patients are understood to have been impacted by the incident.” http://www.hipaajournal.com/sharp-healthcare-says-stolen-devices-contained-phi-of-patients-8718/ The story does not indicate the type of storage device or computer and it may or may not have been an i-pad theft but with the increased use of mobile devices in medicine the necessary precautions are the same.

Using the Bug Tag 2 on mobile medical devices and having Classic N10 pedestals installed in doorways is an additional security step you can take to protect your business and clients. Don’t allow i-pad theft or tablet theft to take your reputation or result in astronomical fines. 

 

Get more information on the Bug Tag, contact us or call 1.770.426.0547today.

 

 

Examining The Ability Of The Bug Tag To Protect Mobile Devices Used For Autopsies

 

Bug Tag -4                                                                                                                            WC Blog 303
Classic N10 -4
Tablet Theft -3
i-pad theft -3
Examining The Ability Of The Bug Tag To Protect Mobile Devices Used For Autopsies
     The use of computer tablets and i-pads in healthcare has been growing rapidly. They have been used for entertaining children and alleviating their fear of being in an exam room. They are used by experts to meet with veterans who may be dealing with PTSD and don’t want to go into a hospital setting. They are being used to view x-rays and CT scans with patients. One use for i-pads and computer tablets I recently learned of is for conducting autopsies. As with any medical facility there still needs to be concern for the protection of patient information and privacy. Any patient information stored on a device is going to be potentially vulnerable to hacking and theft and could be used for fraudulent purposes. It is imperative that medical facilities take appropriate steps to prevent i-pad theft and tablet theft to protect patient privacy. The Alpha Bug Tag 2 and Classic N10 electronic article surveillance (EAS) tower are powerful tools to keep mobile medical devices safe from theft and potential patient information compromise.
     How do the Bug Tag and Classic N10 tower work together to prevent theft? They operate as a radio frequency transmitter and receiver. The tag has a built in coil that is designed to send a signal out on a specific frequency. The tower is designed to pick up this radio frequency wave when the tag is carried into the receiver detection field. When a tag is detected alarms in the tower are activated and a loud, constant beeping noise sounds. LED lights in the antenna also flash and together they warn the employees of a facility that a tagged item is about to be carried out of the building. Staff then responds to the alarm and stop the person trying to walk out and prevent the tablet theft or i-pad theft from taking place. If a doctor or nurse has placed the device in a lab coat pocket and forgotten they have it as they are ready to leave, the alert reminds them to return it.
     The next question you may be asking yourself is, “Couldn’t a thief simply remove the Bug Tag from the unit and then walk through the Classic N10 pedestal?” The tags can only be removed from a device with a special removal tool only available from Alpha Security. Any tampering or forced removal of a tag causes an internal alarm in the tag to be set off. The alert is loud enough to scare a thief and cause him/her to panic and leave the device.
     So, how are mobile devices being used in autopsies? According to one website, they posted an article, “Sheffield Opens UK’s First Digital Autopsy Facility”, “Digital autopsy involves a scan of the body using a GE CT scanner, before iGene’s revolutionary, proprietary, software ‘INFOPSY®’ creates a 3D image of the body, enabling the pathologist to conduct a full, non-invasive digital post mortem using a large, touchscreen tablet computer.”   http://digitalautopsy.co.uk/sheffield-opens-uks-first-digital-autopsy-facility/
The article goes on to list some of the benefits of the digital autopsy as, almost immediate results, less stress on the family since it is non-invasive, faster investigation so the body can be released for final disposition more quickly, and accuracy of results since traditional methods may miss some things during the procedure. 
     In addition to the digital autopsy, there are a number of coroner apps that are now available for mobile devices. Some of these apps are an ‘Autopsy Checklist’, ‘Autopsy Consent and Authorization Form’, and ‘Elder Care When Someone Dies Checklist’.  The list of apps goes on, but the point is the apps exist and if they are in a digital format, private patient information is being stored that should be protected from possible breach. 
     Mobile devices and innovative, new applications can improve many aspects of the medical field. As the use of these personal handheld computers are used more it is imperative that steps are taken to prevent i-pad theft, tablet theft and the loss of patient data. The bug tag and Classic N10 pedestal are the protections you need to maintain that security.
The Bug Tag is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
     

The use of computer tablets and i-pads in healthcare has been growing rapidly. They have been used for entertaining children and alleviating their fear of being in an exam room. They are used by experts to meet with veterans who may be dealing with PTSD and don’t want to go into a hospital setting. They are being used to view x-rays and CT scans with patients. One use for i-pads and computer tablets I recently learned of is for conducting autopsies. As with any medical facility there still needs to be concern for the protection of patient information and privacy. Any patient information stored on a device is going to be potentially vulnerable to hacking and theft and could be used for fraudulent purposes. It is imperative that medical facilities take appropriate steps to prevent i-pad theft and tablet theft to protect patient privacy. The Alpha Bug Tag 2 and Classic N10 electronic article surveillance (EAS) tower are powerful tools to keep mobile medical devices safe from theft and potential patient information compromise.

How do the Bug Tag and Classic N10 tower work together to prevent theft? They operate as a radio frequency transmitter and receiver. The tag has a built in coil that is designed to send a signal out on a specific frequency. The tower is designed to pick up this radio frequency wave when the tag is carried into the receiver detection field. When a tag is detected alarms in the tower are activated and a loud, constant beeping noise sounds. LED lights in the antenna also flash and together they warn the employees of a facility that a tagged item is about to be carried out of the building. Staff then responds to the alarm and stop the person trying to walk out and prevent the tablet theft or i-pad theft from taking place. If a doctor or nurse has placed the device in a lab coat pocket and forgotten they have it as they are ready to leave, the alert reminds them to return it.

The next question you may be asking yourself is, “Couldn’t a thief simply remove the Bug Tag from the unit and then walk through the Classic N10 pedestal?” The tags can only be removed from a device with a special removal tool only available from Alpha Security. Any tampering or forced removal of a tag causes an internal alarm in the tag to be set off. The alert is loud enough to scare a thief and cause him/her to panic and leave the device.

So, how are mobile devices being used in autopsies? According to one website, they posted an article, “Sheffield Opens UK’s First Digital Autopsy Facility”, “Digital autopsy involves a scan of the body using a GE CT scanner, before iGene’s revolutionary, proprietary, software ‘INFOPSY®’ creates a 3D image of the body, enabling the pathologist to conduct a full, non-invasive digital post mortem using a large, touchscreen tablet computer.”   http://digitalautopsy.co.uk/sheffield-opens-uks-first-digital-autopsy-facility/

The article goes on to list some of the benefits of the digital autopsy as, almost immediate results, less stress on the family since it is non-invasive, faster investigation so the body can be released for final disposition more quickly, and accuracy of results since traditional methods may miss some things during the procedure. 

In addition to the digital autopsy, there are a number of coroner apps that are now available for mobile devices. Some of these apps are an ‘Autopsy Checklist’, ‘Autopsy Consent and Authorization Form’, and ‘Elder Care When Someone Dies Checklist’.  The list of apps goes on, but the point is the apps exist and if they are in a digital format, private patient information is being stored that should be protected from possible breach. 

 Mobile devices and innovative, new applications can improve many aspects of the medical field. As the use of these personal handheld computers are used more it is imperative that steps are taken to prevent i-pad theft, tablet theft and the loss of patient data. The bug tag and Classic N10 pedestal are the protections you need to maintain that security.

 

The Bug Tag is important and we can help you with it. Call 1.770.426.0547 and let’s talk.