SlideShare a Scribd company logo
Making Wireless Connections
       in the OR
          TEPR 2008
Beautiful Northwest 




•   The Oregon Coast about an hour from Portland, OR
Objectives
• The attendee will be able to identify two benefits of
  wireless networks for hospitals and other healthcare
  organizations.
• The attendee will be able to define authentication,
  authorization and encryption in relation to wireless
  networks.
• The attendee will understand why security of any network
  including a wireless network is essential and needs careful
  consideration when planning the network
• The attendee will be able to define the term wireless
  network.
Transition of Computer Use in the
            Operating Room
• Initiated with Billing Systems
• Gradually expanded into
  –Supply Management
  – Scheduling
• Now more and more see influx
  into
  – Clinical Documentation
Traditional Setup for OR Systems
               Network
• Hard wired (cat 5 cable)
• Computers-set Location
• Many OR room setups have been
  done in this manner as well.
What is Wireless ?
• Transmission of voice or data across
  a wireless network
  –Utilizes radio frequency transmission
   to transfer data or voice across a
   network
  –High or low frequency
  –Industry level modems
  –Standard signal formatting 802.11b
Mobility
• One of the main advantages of wireless
  networks
  – Allows clinician to Move Around as needed
  – If Combined with mobile
    Computer system
    • allows Documentation at P0C
Documentation at Point of Care
• Clinicians need immediate
  access to patient
  information and care
Wireless Selection
• Begins with Identification of facility Needs
  – Network architecture
     • facility wide
     • or OR only
  – Site Visit
     • Project manager, clinical Staff member, Technology
       team member, Clinical Engineering
  – Signal Antenna Placement
     • Outline area for Network
     • Identify Transmission Devices and antennas needed
Wireless Construction
          Installation Benefits


• Less physical area construction needed
• Less expensive install than hardwiring
Expense of Wireless Install
–Wireless Modems
  • More Expensive
  • Do Not Require Major construction
    Changes
  • Do Require-excellent Signal
Wireless workflow

• Current workflow Pattern
• Identification of wireless
  effects
• utilize Change Management
Operating Room nurse Workflows
• Workflows Demonstrate
• 1) Numerous Patient Care Activities
     • Preop Area
     • OR area
     • PACU area
• 2) Main patient care activities in the OR room
  – Moving around the OR room working with OR
   team and monitoring surgical patient’s status.
OR Nurse. Work Activity

• See Increased Use-wireless
  Connectivity in Operating Rooms
 – Decreased construction Cost
 – More Flexibility for clinician
 – allows Patient Documentation at
   POC
Wireless Network Security
• Amy Network has Potential Security Rush
• Wireless Security best Maintained by
  utilizing
  – Authentication
  – Authorization
  – Encryption
Computer Authentication
• Authentication
  – First Steps Protecting a Network
  – Uses a VPN
  – Used to identify user before they are
   allowed on network
    • Uses S. go on ID and individual password
  – Considered Best Method to Prevent
    Unauthorized access
Computer Authorization



• Define User Access:
  –Ex. OR Nurse
    • Access to Perioperative electronic
     documentation
    • View-only Access to Preop Doc
Computer Data Encryption
• Method to change or disguise data
  – most Common 128 bit
  – minimum standard
  – Requires Software on both Ends
    • data can still possibly be intercepted
    • But much harder to, decipher
Computer Security
• Stolen Computers
  –Laptop. Mobile devices
  – Variety protective measures available
   1. Software installed for Tracking
  –Activation codes
    • Send location.
      – Code can be sent to delete Sensitive files
The Cost of a Stolen Laptop Computer

• Estimated cost $6,000
 –Includes
   • Laptop
   • Software loss
   • Time to replace
   • Data stored on computer
The Cost of a Stolen Laptop Computer
• Cost of sensitive data if not protected by
  encryption or other measures
• Ex – news story awhile back about VA laptop
  stolen contained social security numbers of
  many who had served in military.
Potential Improvements
        Using wireless Connections
•   Patient Safely
•   Cost improvements
•   Quality
•   Staff Utilization
•   More Efficient Work Processes
Downtime

• Plan How this will be Handled
 –Paper Doc
    • Scanned
    • Or manually entered post surgical
      case
Objective Review
• Advantages of wireless Connections
  – Improved Patient Care
  – Mobility for Clinicians
• Necessary Aspects of Wireless
  Networks
  – Authentication
  – authorization
  – Encryption
Mobile workforce
• Wireless Networks Provide
  Alternative to Standard Hard-Wired
  Networks
• Many Benefits
  – Immediate access to Patient Data
  –Mobility provided for clinician

More Related Content

What's hot

Andy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility Solutions
Andy (Avraham) Blumenthal
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
Savvius, Inc
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
pavan penugonda
 
Trådlös mätning av fukt med sensorer, även efter påförande av tätskikt - Stef...
Trådlös mätning av fukt med sensorer, även efter påförande av tätskikt - Stef...Trådlös mätning av fukt med sensorer, även efter påförande av tätskikt - Stef...
Trådlös mätning av fukt med sensorer, även efter påförande av tätskikt - Stef...
Svenska Betongföreningen
 
The Premise Platform.pdf
The Premise Platform.pdfThe Premise Platform.pdf
The Premise Platform.pdf
Kishor Kelkar
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Eric Vanderburg
 
wireless systems
wireless systemswireless systems
wireless systems
Rashmi Deoli
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
Karthikeyan Dhayalan
 
Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002
Data Center Consultores
 
IoT Security
IoT SecurityIoT Security
IoT Security
Tim Groenwals
 
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
Golars Networks
 
Secured Communication Infrastructure for Substation Automation
Secured Communication Infrastructure for Substation AutomationSecured Communication Infrastructure for Substation Automation
Secured Communication Infrastructure for Substation Automation
Nirmal Thaliyil
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
PREMKUMAR
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
chris odle
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...
Adam Doyle
 
Classification cyber security threats of modern substation
Classification cyber security threats of modern substationClassification cyber security threats of modern substation
Classification cyber security threats of modern substation
Nikandrov Maxim
 
Internet of things v1.2
Internet of things v1.2Internet of things v1.2
Internet of things v1.2
Nicky Eichmann
 
Chris Lisasi -NETWORK PRESENTATION
Chris Lisasi -NETWORK PRESENTATIONChris Lisasi -NETWORK PRESENTATION
Chris Lisasi -NETWORK PRESENTATION
Christopher Lisasi
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
Ctc rick ryan prezi 3 2016
Ctc rick ryan prezi 3 2016Ctc rick ryan prezi 3 2016
Ctc rick ryan prezi 3 2016
Courtney King
 

What's hot (20)

Andy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility Solutions
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Trådlös mätning av fukt med sensorer, även efter påförande av tätskikt - Stef...
Trådlös mätning av fukt med sensorer, även efter påförande av tätskikt - Stef...Trådlös mätning av fukt med sensorer, även efter påförande av tätskikt - Stef...
Trådlös mätning av fukt med sensorer, även efter påförande av tätskikt - Stef...
 
The Premise Platform.pdf
The Premise Platform.pdfThe Premise Platform.pdf
The Premise Platform.pdf
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
 
wireless systems
wireless systemswireless systems
wireless systems
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
Networking Tools Training in Hyderabad | Networking Courses Online | Golars N...
 
Secured Communication Infrastructure for Substation Automation
Secured Communication Infrastructure for Substation AutomationSecured Communication Infrastructure for Substation Automation
Secured Communication Infrastructure for Substation Automation
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...
 
Classification cyber security threats of modern substation
Classification cyber security threats of modern substationClassification cyber security threats of modern substation
Classification cyber security threats of modern substation
 
Internet of things v1.2
Internet of things v1.2Internet of things v1.2
Internet of things v1.2
 
Chris Lisasi -NETWORK PRESENTATION
Chris Lisasi -NETWORK PRESENTATIONChris Lisasi -NETWORK PRESENTATION
Chris Lisasi -NETWORK PRESENTATION
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Ctc rick ryan prezi 3 2016
Ctc rick ryan prezi 3 2016Ctc rick ryan prezi 3 2016
Ctc rick ryan prezi 3 2016
 

Viewers also liked

Wi fi bestpractice
Wi fi bestpracticeWi fi bestpractice
Wi fi bestpractice
bospl
 
wireless overview
wireless overviewwireless overview
wireless overview
Aniruddha Chandra
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
Md. Mashiur Rahman
 
Wireless network doc
Wireless network docWireless network doc
Wireless network doc
Basil John
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
Kapil Dev
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
ruledbyrobotics2080
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
Ryma Chohan
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
Roshni Ayappan
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
mrtheodisthorne2
 
Networking
NetworkingNetworking
Networking
Sean Chia
 

Viewers also liked (11)

Wi fi bestpractice
Wi fi bestpracticeWi fi bestpractice
Wi fi bestpractice
 
wireless overview
wireless overviewwireless overview
wireless overview
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Wireless network doc
Wireless network docWireless network doc
Wireless network doc
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Networking
NetworkingNetworking
Networking
 

Similar to Wireless Connections In The Or Display

Well_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfWell_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdf
Hari Prasetyo Utomo
 
Trapeze Medical customer presentation 10 14-09
Trapeze Medical customer presentation 10 14-09Trapeze Medical customer presentation 10 14-09
Trapeze Medical customer presentation 10 14-09
Mark Cowtan
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
balasubramani p
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
Samit Singh
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
ArunaSekar1
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 Revision
Snowfairy007
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
RahulJain989779
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
rocky781582
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
Kishor Satpathy
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
Yogesh Fulara
 
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Intermountain Clinical Instrumentation Society
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
SylCotter
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
Fathima Rahaman
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
Shradha Maheshwari
 
Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2
Dr Geetha Mohan
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
primeteacher32
 

Similar to Wireless Connections In The Or Display (20)

Well_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfWell_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdf
 
Trapeze Medical customer presentation 10 14-09
Trapeze Medical customer presentation 10 14-09Trapeze Medical customer presentation 10 14-09
Trapeze Medical customer presentation 10 14-09
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 Revision
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 

Wireless Connections In The Or Display

  • 1. Making Wireless Connections in the OR TEPR 2008
  • 2. Beautiful Northwest  • The Oregon Coast about an hour from Portland, OR
  • 3. Objectives • The attendee will be able to identify two benefits of wireless networks for hospitals and other healthcare organizations. • The attendee will be able to define authentication, authorization and encryption in relation to wireless networks. • The attendee will understand why security of any network including a wireless network is essential and needs careful consideration when planning the network • The attendee will be able to define the term wireless network.
  • 4. Transition of Computer Use in the Operating Room • Initiated with Billing Systems • Gradually expanded into –Supply Management – Scheduling • Now more and more see influx into – Clinical Documentation
  • 5. Traditional Setup for OR Systems Network • Hard wired (cat 5 cable) • Computers-set Location • Many OR room setups have been done in this manner as well.
  • 6. What is Wireless ? • Transmission of voice or data across a wireless network –Utilizes radio frequency transmission to transfer data or voice across a network –High or low frequency –Industry level modems –Standard signal formatting 802.11b
  • 7. Mobility • One of the main advantages of wireless networks – Allows clinician to Move Around as needed – If Combined with mobile Computer system • allows Documentation at P0C
  • 8. Documentation at Point of Care • Clinicians need immediate access to patient information and care
  • 9. Wireless Selection • Begins with Identification of facility Needs – Network architecture • facility wide • or OR only – Site Visit • Project manager, clinical Staff member, Technology team member, Clinical Engineering – Signal Antenna Placement • Outline area for Network • Identify Transmission Devices and antennas needed
  • 10. Wireless Construction Installation Benefits • Less physical area construction needed • Less expensive install than hardwiring
  • 11. Expense of Wireless Install –Wireless Modems • More Expensive • Do Not Require Major construction Changes • Do Require-excellent Signal
  • 12. Wireless workflow • Current workflow Pattern • Identification of wireless effects • utilize Change Management
  • 13. Operating Room nurse Workflows • Workflows Demonstrate • 1) Numerous Patient Care Activities • Preop Area • OR area • PACU area • 2) Main patient care activities in the OR room – Moving around the OR room working with OR team and monitoring surgical patient’s status.
  • 14. OR Nurse. Work Activity • See Increased Use-wireless Connectivity in Operating Rooms – Decreased construction Cost – More Flexibility for clinician – allows Patient Documentation at POC
  • 15. Wireless Network Security • Amy Network has Potential Security Rush • Wireless Security best Maintained by utilizing – Authentication – Authorization – Encryption
  • 16. Computer Authentication • Authentication – First Steps Protecting a Network – Uses a VPN – Used to identify user before they are allowed on network • Uses S. go on ID and individual password – Considered Best Method to Prevent Unauthorized access
  • 17. Computer Authorization • Define User Access: –Ex. OR Nurse • Access to Perioperative electronic documentation • View-only Access to Preop Doc
  • 18. Computer Data Encryption • Method to change or disguise data – most Common 128 bit – minimum standard – Requires Software on both Ends • data can still possibly be intercepted • But much harder to, decipher
  • 19. Computer Security • Stolen Computers –Laptop. Mobile devices – Variety protective measures available 1. Software installed for Tracking –Activation codes • Send location. – Code can be sent to delete Sensitive files
  • 20. The Cost of a Stolen Laptop Computer • Estimated cost $6,000 –Includes • Laptop • Software loss • Time to replace • Data stored on computer
  • 21. The Cost of a Stolen Laptop Computer • Cost of sensitive data if not protected by encryption or other measures • Ex – news story awhile back about VA laptop stolen contained social security numbers of many who had served in military.
  • 22. Potential Improvements Using wireless Connections • Patient Safely • Cost improvements • Quality • Staff Utilization • More Efficient Work Processes
  • 23. Downtime • Plan How this will be Handled –Paper Doc • Scanned • Or manually entered post surgical case
  • 24. Objective Review • Advantages of wireless Connections – Improved Patient Care – Mobility for Clinicians • Necessary Aspects of Wireless Networks – Authentication – authorization – Encryption
  • 25. Mobile workforce • Wireless Networks Provide Alternative to Standard Hard-Wired Networks • Many Benefits – Immediate access to Patient Data –Mobility provided for clinician