Bugs In Hospitals Are Good When They Are Alpha Bug Tag 2’s Protecting Mobile Medical Devices

Alpha Bug Tag 2-5                                                                                                                      wc blog 289
I-pad theft-3
Tablet theft-3
Classic N10-3
Bugs In Hospitals Are Good When They Are Alpha Bug Tag 2’s Protecting Mobile Medical Devices 
       Having been a Boy Scout while growing up, I spent a lot of time outdoors so I don’t get too bothered by bugs. Of course, that means bugs should be outdoors not in our homes, hotels, restaurants and certainly not in hospitals. When I saw stories about bugs in hospitals it kind of bugged me (pun intended). One example was a story about a hospital in Pikeville, Kentucky that had a bedbug problem in June of 2016. The hospital closed down the infected areas and cleaned up the problem without further incident. http://www.wkyt.com/content/news/Pikeville-Medical-Center-working-to-eradicate-bed-bugs-382947921.html . There is one kind of bug that DOES have a place in a hospital and bedbugs are not it. You read that right, I am promoting one bug that hospitals SHOULD pursue bringing into the building. The Alpha Bug Tag 2 can be a welcome addition to hospitals that need to protect against tablet theft and i-pad theft if they use mobile medical devices to improve healthcare.
     The Alpha Bug Tag 2 is an electronic article surveillance (EAS) anti-theft device that prevents theft through deterrence and EAS antenna activation. The tag is comprised of a reusable module containing the radio frequency components, alarm and LED flashing light and a disposable adhesive sled. The adhesive sled allows the module to be attached directly to mobile medical devices without damaging an i-pad, tablet or even a laptop. The Alpha Bug Tag 2 is built to prevent tampering and unauthorized tag removal with an internal tamper alarm that sounds if a thief tries to take it off while attempting an i-pad theft or laptop theft. A built in LED light flashes as a deterrent to warn criminals the tag is present and active. If a protected mobile device is carried close to EAS antennas, such as a Checkpoint Classic N10 antenna, the antenna picks up the radio frequency signal emitting from the tag. The antenna then alarms and sounds a loud warning and flashes LED lights built into it. Medical staff can respond to the antenna alarm and prevent a device from being stolen from the facility. 3-alarm versions of the tag have an additional feature that causes the tag itself to alarm if it is carried past the EAS antennas, alerting personnel who it is that is trying to get away.
     I want to quickly follow up on my mention of the Checkpoint Classic N10 antenna. EAS antennas are necessary for the tags to fully function. While a tag itself may be a deterrent and will alarm if tampered with the EAS function is what prevents the actual tablet theft or i-pad theft. The Alpha Bug Tag 2 works hand in hand with the EAS antenna located at building entrances and other areas where the mobile device does not need to be carried; for example a public restroom. The Checkpoint Classic N10 antenna is a perfect antenna for medical facilities because of the small footprint they take up so they don’t interfere with gurneys, wheelchairs, crutches, walkers etc. that may need extra doorway space.
     What is the concern over the protection of mobile devices used in a medical facility? Aren’t these devices password protected to prevent access to stored information? While the medical tablet or i-pad may have protections, there is no guarantee the items are safe from hacking.  Thieves could obtain patient medical records including billing information, prescription information, medical history, addresses etc. Such breaches of patient information have resulted in large fines for medical providers by the Department of Health and Human Services.  Fines for improper handling of personal health information have been as high as 2.25 million dollars (CVS Pharmacy 2009, source; Healthcare IT News, “6 Biggest HIPPA Breach Fines”, Erin McCann, May 23, 2014. http://www.healthcareitnews.com/slideshow/6-biggest-hipaa-breach-fines?page=4 ). The use of anti-theft devices can keep medical mobile devices from being stolen and leaving a facility.
     In a nutshell, yes, while pests such as bedbugs can be a concern, most medical facilities do a great job of staying bug free. That said, the one bug that should be brought in is the Alpha Bug Tag 2 to protect mobile medical devices. Protect patient information as well as property and stay fine free.
Alpha Bug Tag 2 is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
     

Having been a Boy Scout while growing up, I spent a lot of time outdoors so I don’t get too bothered by bugs. Of course, that means bugs should be outdoors not in our homes, hotels, restaurants and certainly not in hospitals. When I saw stories about bugs in hospitals it kind of bugged me (pun intended). One example was a story about a hospital in Pikeville, Kentucky that had a bedbug problem in June of 2016. The hospital closed down the infected areas and cleaned up the problem without further incident. http://www.wkyt.com/content/news/Pikeville-Medical-Center-working-to-eradicate-bed-bugs-382947921.html. There is one kind of bug that DOES have a place in a hospital and bedbugs are not it. You read that right, I am promoting one bug that hospitals SHOULD pursue bringing into the building. The Alpha Bug Tag 2 can be a welcome addition to hospitals that need to protect against tablet theft and i-pad theft if they use mobile medical devices to improve healthcare.
     

The Alpha Bug Tag 2 is an electronic article surveillance (EAS) anti-theft device that prevents theft through deterrence and EAS antenna activation. The tag is comprised of a reusable module containing the radio frequency components, alarm and LED flashing light and a disposable adhesive sled. The adhesive sled allows the module to be attached directly to mobile medical devices without damaging an i-pad, tablet or even a laptop. The Alpha Bug Tag 2 is built to prevent tampering and unauthorized tag removal with an internal tamper alarm that sounds if a thief tries to take it off while attempting an i-pad theft or laptop theft. A built in LED light flashes as a deterrent to warn criminals the tag is present and active. If a protected mobile device is carried close to EAS antennas, such as a Checkpoint Classic N10 antenna, the antenna picks up the radio frequency signal emitting from the tag. The antenna then alarms and sounds a loud warning and flashes LED lights built into it. Medical staff can respond to the antenna alarm and prevent a device from being stolen from the facility. 3-alarm versions of the tag have an additional feature that causes the tag itself to alarm if it is carried past the EAS antennas, alerting personnel who it is that is trying to get away.
     

I want to quickly follow up on my mention of the Checkpoint Classic N10 antenna. EAS antennas are necessary for the tags to fully function. While a tag itself may be a deterrent and will alarm if tampered with the EAS function is what prevents the actual tablet theft or i-pad theft. The Alpha Bug Tag 2 works hand in hand with the EAS antenna located at building entrances and other areas where the mobile device does not need to be carried; for example a public restroom. The Checkpoint Classic N10 antenna is a perfect antenna for medical facilities because of the small footprint they take up so they don’t interfere with gurneys, wheelchairs, crutches, walkers etc. that may need extra doorway space.
     

What is the concern over the protection of mobile devices used in a medical facility? Aren’t these devices password protected to prevent access to stored information? While the medical tablet or i-pad may have protections, there is no guarantee the items are safe from hacking. Thieves could obtain patient medical records including billing information, prescription information, medical history, addresses etc. Such breaches of patient information have resulted in large fines for medical providers by the Department of Health and Human Services.  Fines for improper handling of personal health information have been as high as 2.25 million dollars (CVS Pharmacy 2009, source; Healthcare IT News, “6 Biggest HIPPA Breach Fines”, Erin McCann, May 23, 2014. http://www.healthcareitnews.com/slideshow/6-biggest-hipaa-breach-fines?page=4 ). The use of anti-theft devices can keep medical mobile devices from being stolen and leaving a facility.
     

In a nutshell, yes, while pests such as bedbugs can be a concern, most medical facilities do a great job of staying bug free. That said, the one bug that should be brought in is the Alpha Bug Tag 2 to protect mobile medical devices. Protect patient information as well as property and stay fine free.

 

Alpha Bug Tag 2 is important and we can help you with it. Call 1.770.426.0547 and let’s talk.

     

 

The Bug Tag 2 Is The Best Way To Prevent The Theft Of Your Computer Devices And The Sensitive Information They Contain

AA Blog 48
Bug Tag 2:  5
Tablet theft:  3
I-Pad theft:  3
The Bug Tag 2 Is The Best Way To Prevent The Theft Of Your Computer Devices And The Sensitive Information They Contain.  
My daughter was recently in the hospital to do some testing for some stomach issues she has been having.  It was her first time ever getting blood work done and her very first ultrasound.  She was pretty excited about the ultrasound.  She got to see mine when I was pregnant so she was excited to have one of her own.  The doctor was really nice and pointed out all of her organs and stuff while she was looking around.  My daughter was pretty into it, asking questions and getting an anatomy lesson.  Mom wasn’t very excited because I was worried, but luckily they found no issues.  While we were there I couldn’t help but notice that all of the nurses and technicians were using tablets to document patient information and testing procedures.  I have noticed that this has become common place in today’s society.  Our reliance on technology to manage information, increase convenience, and reduce waste has increased exponentially, and in such a short period of time.  I remember when I was a kid we didn’t even have cell phones or computers in my home.  I don’t think I even really used a computer in school until high school, and yet here we are a couple decades later and they are everywhere.  Kids as early as elementary school are using computers on a regular basis and the average 10 year old has the newest smart phone.  I do think this has created some negative impacts on society, but I also think it has improved certain areas as well.  In the medical field it has streamlined some of the processes, reduced paper use and filing issues and it makes the information readily accessible.  There is no delay waiting for the records clerk to push patient files down to the exam room or for retrieving files from other practitioners anymore.   Although, it does on the other hand pose a significant security risk.  The use of technology requires that the medical office take certain security precautions to protect sensitive patient information, including personal information and health records, in order to avoid litigation.  There are various options available to prevent tablet theft and i-Pad theft, this facility was using the Bug tag 2 on their devices.  
The Bug tag 2 is a great way to prevent tablet theft.  Whether it is in the medical field or a retail setting, this tag offers a convenient and cost-efficient means to protect your property and sensitive information.  These tags are easily applied to the computer device with an adhesive, which prevents the tag from being removed.  These tags come with a replaceable adhesive sled, which allows you to re-use the tag on multiple devices.  The Bug tag 2 is equipped with 2 &3 Alarm technology, which incorporates EAS notification in the event of tampering or theft.  These compact tags are very easy to apply and can be placed on any computer device to help prevent tablet theft and i-Pad theft.  These devices are an excellent way to protect sensitive patient information in the medical field, but can also be used by any company that has sensitive work product information they need to protect.  
I was impressed with the protective measures utilized by this medical facility to ensure my daughter’s health information was secure.  As a customer it gave me a real sense of security, and also suggested to me a high level of professionalism and care, which I look for in a hospital.  Choosing a health care provider isn’t always a simple task, but knowing they are making a viable effort to prevent i-Pad theft containing my families’ personal information, is reassuring.  Regardless of what industry you are in the Bug tag 2 can protect your entire computer related devices and equipment.
The Bug tag 2 is important and we can help you with it.  Call 1.770.426.0547 and let’s talk.                 

My daughter was recently in the hospital to do some testing for some stomach issues she has been having. It was her first time ever getting blood work done and her very first ultrasound. She was pretty excited about the ultrasound. She got to see mine when I was pregnant so she was excited to have one of her own. The doctor was really nice and pointed out all of her organs and stuff while she was looking around. My daughter was pretty into it, asking questions and getting an anatomy lesson. Mom wasn’t very excited because I was worried, but luckily they found no issues. While we were there I couldn’t help but notice that all of the nurses and technicians were using tablets to document patient information and testing procedures. I have noticed that this has become common place in today’s society. Our reliance on technology to manage information, increase convenience, and reduce waste has increased exponentially, and in such a short period of time. I remember when I was a kid we didn’t even have cell phones or computers in my home. I don’t think I even really used a computer in school until high school, and yet here we are a couple decades later and they are everywhere. Kids as early as elementary school are using computers on a regular basis and the average 10 year old has the newest smart phone. I do think this has created some negative impacts on society, but I also think it has improved certain areas as well. In the medical field it has streamlined some of the processes, reduced paper use and filing issues and it makes the information readily accessible. There is no delay waiting for the records clerk to push patient files down to the exam room or for retrieving files from other practitioners anymore.   Although, it does on the other hand pose a significant security risk. The use of technology requires that the medical office take certain security precautions to protect sensitive patient information, including personal information and health records, in order to avoid litigation. There are various options available to prevent tablet theft and i-Pad theft, this facility was using the Bug tag 2 on their devices.  

 

The Bug tag 2 is a great way to prevent tablet theft. Whether it is in the medical field or a retail setting, this tag offers a convenient and cost-efficient means to protect your property and sensitive information. These tags are easily applied to the computer device with an adhesive, which prevents the tag from being removed. These tags come with a replaceable adhesive sled, which allows you to re-use the tag on multiple devices. The Bug tag 2 is equipped with 2 &3 Alarm technology, which incorporates EAS notification in the event of tampering or theft. These compact tags are very easy to apply and can be placed on any computer device to help prevent tablet theft and i-Pad theft. These devices are an excellent way to protect sensitive patient information in the medical field, but can also be used by any company that has sensitive work product information they need to protect.  

 

I was impressed with the protective measures utilized by this medical facility to ensure my daughter’s health information was secure. As a customer it gave me a real sense of security, and also suggested to me a high level of professionalism and care, which I look for in a hospital. Choosing a health care provider isn’t always a simple task, but knowing they are making a viable effort to prevent i-Pad theft containing my families’ personal information, is reassuring. Regardless of what industry you are in the Bug tag 2 can protect your entire computer related devices and equipment.

 

The Bug tag 2 is important and we can help you with it. Call 1.770.426.0547 and let’s talk.                 

 

Protect Your Sensitive Information With The Bug Tag 2 Tag

AA Blog 38
Alpha Thunder Tag:  5
Tablet theft:  4
Protect Your Sensitive Information With The Bug Tag 2 Tag
I served in the Air Force for 8 years, and looking back on that time I realize how antiquated our processes were.  I have been out of the service for about 11 years now, so maybe things have changed since then, or at least I hope so.  When it came to current technology and utilizing computer systems to manage our day to day operations, we were definitely behind the power curve.  I remember using an old outdated alarm system for our intrusion that was probably 50 years old.  We had old computers that didn’t really serve our needs efficiently, and a lot of paper filing.  Our processes were outdated and made tracking information very tedious, to say the least.  When it came to tracking employee training, certifications, education records, employment records etc., everything was in paper form, in a file somewhere.  We did not have any electronic records and had to store records in various locations.  This held true for many agencies within the Air Force.  With the current storage options like clouds, external hard drives, and thumb drives and other information management resources, it is very easy to retain information and have it readily available.  Obviously with that being said, new technology also creates concerns about protecting sensitive information.  This is a very valid concern in specific industries, like the medical field, where they maintain people’s personal health information.  Most Hospitals and doctor’s offices are using technology to maintain health records and to update patient information.  No longer are we seeing medical record carts being pushed around between departments.  Now we are seeing an increase in computers, tablets and i-Pads being used for record keeping and documentation.  So how are these facilities protecting themselves from tablet theft?   I would recommend the Alpha Bug Tag 2 to protect yourself from tablet theft, especially if the liability of losing the information is high.  
Alpha Thunder Tags provide an added level of security that can notify personnel when information is being removed from the premises.  The tags are applied to the computer, tablet or I-pad, with an adhesive.  The tags are equipped with EAS technology that will sound an audible alarm in the event the item is removed from the premises.  It also has a tamper alarm in the event someone tries to remove the tag from the device.  EAS antennas are simply added to the entry/exit locations, or in between departments, to prevent tablet theft.  These tags are re-useable and can be activated or deactivated by authorized personnel.  The Alpha Bug Tag 2 is the perfect way to reduce your liability and to protect sensitive information.  
As with anything, the personnel within a medical facility have many tasks to perform.  As emergencies crop up and patients need medical care, being aware of patient information security, is not always at the top of the list.  Distractions and inattention are not valid excuses for data leaks, and will not reduce a companies’ liability.  That is why the Alpha Bug Tag 2 is a great resource for combatting tablet theft.  Whether you are in the medical field or some other industry in which data security is a concern this is a great way to protect your information.  Simply activating the tag will deter someone from removing the equipment and data from the location and will alert staff in the event a breach occurs.  These devices are a cost-efficient means to protect client information, maintain customer trust, and reduce liability.  Breaches in trust can severely impact a company and its reputation, so don’t let your guard down, get the security you need today.
Get more information on the Alpha Bug Tag 2, contact us or call 1.770.426.0547 today.  

I served in the Air Force for 8 years, and looking back on that time I realize how antiquated our processes were. I have been out of the service for about 11 years now, so maybe things have changed since then, or at least I hope so. When it came to current technology and utilizing computer systems to manage our day to day operations, we were definitely behind the power curve. I remember using an old outdated alarm system for our intrusion that was probably 50 years old. We had old computers that didn’t really serve our needs efficiently, and a lot of paper filing. Our processes were outdated and made tracking information very tedious, to say the least. When it came to tracking employee training, certifications, education records, employment records etc., everything was in paper form, in a file somewhere. We did not have any electronic records and had to store records in various locations. This held true for many agencies within the Air Force. With the current storage options like clouds, external hard drives, and thumb drives and other information management resources, it is very easy to retain information and have it readily available. Obviously with that being said, new technology also creates concerns about protecting sensitive information. This is a very valid concern in specific industries, like the medical field, where they maintain people’s personal health information. Most Hospitals and doctor’s offices are using technology to maintain health records and to update patient information. No longer are we seeing medical record carts being pushed around between departments. Now we are seeing an increase in computers, tablets and i-Pads being used for record keeping and documentation. So how are these facilities protecting themselves from tablet theft? I would recommend the Alpha Bug Tag 2 to protect yourself from tablet theft, especially if the liability of losing the information is high.  

 

Alpha Bug Tag 2 provides an added level of security that can notify personnel when information is being removed from the premises. The tags are applied to the computer, tablet or I-pad, with an adhesive. The tags are equipped with EAS technology that will sound an audible alarm in the event the item is removed from the premises. It also has a tamper alarm in the event someone tries to remove the tag from the device. EAS antennas are simply added to the entry/exit locations, or in between departments, to prevent tablet theft. These tags are re-useable and can be activated or deactivated by authorized personnel. The Alpha Bug Tag 2 is the perfect way to reduce your liability and to protect sensitive information.  

 

As with anything, the personnel within a medical facility have many tasks to perform. As emergencies crop up and patients need medical care, being aware of patient information security, is not always at the top of the list.  Distractions and inattention are not valid excuses for data leaks, and will not reduce a companies’ liability. That is why the Alpha Bug Tag 2 is a great resource for combatting tablet theft. Whether you are in the medical field or some other industry in which data security is a concern this is a great way to protect your information. Simply activating the tag will deter someone from removing the equipment and data from the location and will alert staff in the event a breach occurs. These devices are a cost-efficient means to protect client information, maintain customer trust, and reduce liability. Breaches in trust can severely impact a company and its reputation, so don’t let your guard down, get the security you need today.

 

Get more information on the Alpha Bug Tag 2, contact us or call 1.770.426.0547 today.  

 

Complacency Can Carry Consequences; Emphasize Theft Daily And Use Retail Anti-Theft Devices On All Merchandise

 

Retail Theft Prevention-4                                                                                                            WC Blog 280
Checkpoint security systems-4
Checkpoint Tags-3
Stop shoplifting-3
Complacency Can Carry Consequences; Emphasize Theft Daily And Use Retail Anti-Theft Devices On All Merchandise
     How secure is your merchandise?  Do you feel like you have strong controls in place to prevent and deter theft?  It can be easy for store employees, including managers and supervisors to become complacent when it comes to retail theft prevention.  Whether it is merchandise theft, cash theft or fraud of various types, we can all fall victim to complacency. I bring this up because recently at the store I work for a cashier had two computer tablets stolen from him.  Were the tablets secured? While they were locked up in the stockroom they were. The theft took place when the employee took the tablets to the register to ring up. The tablets were left on the counter in front of the customer. A credit card was presented as payment but when the card was declined the thief grabbed his credit card and the two tablets and ran out the door. 
     Retail theft prevention requires a multi-faceted approach to stop shoplifting and other retail crimes.  It should start with installing Checkpoint security systems and all the components necessary to operate the system effectively. Electronic Article Surveillance (EAS) antennas should be set up at entrances and exits and deactivation units for each checkout stand. Detachment tools secured to the register stands will ensure hard Checkpoint tags can be removed upon customer checkout. Protecting every piece of merchandise with hard or soft Checkpoint tags will stop shoplifting through deterrence and/or EAS antenna alarm activations. Theft prevention also includes controlling keys to registers and doors, employee awareness of possible signs of credit card fraud, counterfeit money schemes, short change artists and methods of shoplifting and return fraud. A Checkpoint security system can prevent the majority of shoplifting but it still requires employee education and training for proper deactivation and alarm response. It also does not prevent all the theft related crimes retailers contend with daily.
     So, what could have the employee done differently with the tablet theft? He had to take the merchandise out of a locked stockroom in order to even get it for the customer. In this case, the tablets should have been kept out of reach of the customer until the transaction had completely gone through. He should have also been suspicious when the customer wanted two of the same tablets, valued around $500 a piece. Transactions that are not common should be viewed with a suspicion.  
      I am not trying to play Monday morning quarterback, I had a recent incident in which I was a little suspicious of a transaction and even got another employee with supervisor responsibilities to double check me. A customer was making a purchase of $3 and some change total and paying with a $100 bill. I marked the bill with a counterfeit pen and it marked properly.  I had the second employee look at the bill and he agreed it felt odd but agreed with the marking pen.  I completed the transaction and the customer left. I should have called for the Manager on Duty but did not until it was all done and I later learned the bill was actually counterfeit. Lesson learned.  By the way, my background? About 15 years of Loss Prevention Management, 20 years of Retail Loss Prevention experience total and 26 years of total retail background. 
     One more example, our store uses EAS retail theft prevention devices to stop shoplifting. Recently the company Loss Prevention department revised a company theft protection strategy which gives stores direction on items to be protected with anti-shoplifting tags.  Within a week of the change, a high ticket piece of merchandise (over a hundred dollars) that used to be secured with an anti-shoplifting device was stolen. Prior to the removal of the protective device there had not been a theft issue with the item in question. A Checkpoint Security System is generally as effective as the amount of merchandise protected with Checkpoint tags or other EAS anti-shoplifting devices. The removal of tags and protective devices puts products at risk.
     If you don’t have one, invest in a Checkpoint Security System to prevent merchandise theft. If you DO have a system, don’t allow complacency to set in. Protect as much merchandise as you possibly can and make sure theft and fraud are regular topics of discussion with your employees. Employees make the difference in how effective your retail theft prevention strategies truly are.  
Need information on Checkpoint Security Systems? Give us a call at 1.770.426.0547 now.

How secure is your merchandise? Do you feel like you have strong controls in place to prevent and deter theft? It can be easy for store employees, including managers and supervisors to become complacent when it comes to retail theft prevention. Whether it is merchandise theft, cash theft or fraud of various types, we can all fall victim to complacency. I bring this up because recently at the store I work for a cashier had two computer tablets stolen from him. Were the tablets secured? While they were locked up in the stockroom they were. The theft took place when the employee took the tablets to the register to ring up. The tablets were left on the counter in front of the customer. A credit card was presented as payment but when the card was declined the thief grabbed his credit card and the two tablets and ran out the door. 

Retail theft prevention requires a multi-faceted approach to stop shoplifting and other retail crimes. It should start with installing Checkpoint security systems and all the components necessary to operate the system effectively. Electronic Article Surveillance (EAS) antennas should be set up at entrances and exits and deactivation units for each checkout stand. Detachment tools secured to the register stands will ensure hard Checkpoint tags can be removed upon customer checkout. Protecting every piece of merchandise with hard or soft Checkpoint tags will stop shoplifting through deterrence and/or EAS antenna alarm activations. Theft prevention also includes controlling keys to registers and doors, employee awareness of possible signs of credit card fraud, counterfeit money schemes, short change artists and methods of shoplifting and return fraud. A Checkpoint security system can prevent the majority of shoplifting but it still requires employee education and training for proper deactivation and alarm response. It also does not prevent all the theft related crimes retailers contend with daily.

So, what could have the employee done differently with the tablet theft? He had to take the merchandise out of a locked stockroom in order to even get it for the customer. In this case, the tablets should have been kept out of reach of the customer until the transaction had completely gone through. He should have also been suspicious when the customer wanted two of the same tablets, valued around $500 a piece. Transactions that are not common should be viewed with a suspicion.  

I am not trying to play Monday morning quarterback, I had a recent incident in which I was a little suspicious of a transaction and even got another employee with supervisor responsibilities to double check me. A customer was making a purchase of $3 and some change total and paying with a $100 bill. I marked the bill with a counterfeit pen and it marked properly. I had the second employee look at the bill and he agreed it felt odd but agreed with the marking pen. I completed the transaction and the customer left. I should have called for the Manager on Duty but did not until it was all done and I later learned the bill was actually counterfeit. Lesson learned.  By the way, my background? About 15 years of Loss Prevention Management, 20 years of Retail Loss Prevention experience total and 26 years of total retail background. 

One more example, our store uses EAS retail theft prevention devices to stop shoplifting. Recently the company Loss Prevention department revised a company theft protection strategy which gives stores direction on items to be protected with anti-shoplifting tags. Within a week of the change, a high ticket piece of merchandise (over a hundred dollars) that used to be secured with an anti-shoplifting device was stolen. Prior to the removal of the protective device there had not been a theft issue with the item in question. A Checkpoint Security System is generally as effective as the amount of merchandise protected with Checkpoint tags or other EAS anti-shoplifting devices. The removal of tags and protective devices puts products at risk.

If you don’t have one, invest in a Checkpoint Security System to prevent merchandise theft. If you DO have a system, don’t allow complacency to set in. Protect as much merchandise as you possibly can and make sure theft and fraud are regular topics of discussion with your employees. Employees make the difference in how effective your retail theft prevention strategies truly are.  

 

Need information on Checkpoint Security Systems? Give us a call at 1.770.426.0547 now.

 

 

Mobile Device Apps Can Improve Chiropractic Care And Alpha Thunder Tags Protect The Devices That Improve The Care

Don’t get your nose out of joint over this article. I’m going to bend over backwards to help you understand what fantastic uses there are for i-pads and computer tablets in the world of chiropractic medicine. Of course I won’t be twisting your arm to read any further if you are tired of bad puns, on the other hand I hope I caught your attention and you will continue on, even if I seem to be a pain in the neck. Prior to writing this article I have never thought about the possibility there could be a use for mobile devices in chiropractic practices. However, there are apps available to chiropractic doctors that can be downloaded to help improve patient care. I will discuss some of these apps but it is important to remember that whenever mobile devices are used in a medical practice there is a chance of i-pad theft of tablet theft. Doctors and their staffs must be careful to ensure that when they do use mobile medical devices they take care of them and prevent sensitive information from getting into the hands of strangers. One way to do this is to use an Alpha Thunder Tag on a device.

 

An Alpha Thunder Tag is an anti-theft device that is attached to a mobile device with an adhesive and because of an anti-tamper alarm it cannot be removed without the proper tool. The tag works with an electronic article surveillance antenna, sending out a radio frequency signal that can be received by an antenna if a tagged device is carried too close to the antenna. In the event of an attempted i-pad theft or tablet theft the Alpha Thunder Tag would cause the antenna to activate its’ alarms. The alarms are a loud, audible beeping noise and a flashing LED light that alert staff a breach is about to take place. There is third protection built into the tags, a self-alarm that sounds in the device if a thief gets it out a door, past an EAS antenna. This alarm makes it easy to identify the person who has the i-pad or tablet in their possession, especially if several people are in the area. 

 

Earlier I mentioned that I had not considered there could be apps for i-pads or tablets in chiropractic care. I was surprised to find there are actually quite a few. Starting off there is “Clipboard” that “streamlines patient registration and reduces the risk of data entry errors”, “Patient Check-In” which allows patients to check in for their appointment and “iEHR”. This last application allows doctors to “edit patient data, view clinical history, or create patient iEHR forms” (information is from macpractice.com). How convenient would it be to have all of this information readily available on a portable mobile device rather than sorting through a paper record chart? Another app I located that I found interesting is “CT Outcomes 6.5”. This app, part of a suite of applications from this developer, “…offers patients the ability to fill out their outcome assessments on a portable device…”  (chirotouch.com). The “ChiroCloser” app uses 3D animations and a “white boarding” feature to assist doctors in explaining a patient diagnosis or procedure. Spin Tech Pro offers X-ray analysis software and generates reports for chiropractors (http://spinetech.us/app/spinetech-pro/ ). 

 

With the availability of so much information on patients, their treatment, care, billing records, etc. it is easier to keep the records in electronic format and mobile devices for a care center are a great way to do it. It is important that the information on the devices not be compromised due to tablet theft or i-pad theft. Patient data breaches can be costly to a medical practice so it is important to secure i-pads and tablets, ensuring they don’t leave the building. Placing an Alpha Thunder Tag on each device and setting up EAS antennas at every entrance can prevent the theft of these items and keep patient information secure. 

 

 

Get more information on Alpha Thunder Tags, contact us or call 1.770.426.0547 today.