Deadly tech hazards include patient-handling device errors

With the increasing use of advanced technology in hospitals comes an increasing risk of harm from misuse, according to a blog on the Forbes website


With the increasing use of advanced technology in hospitals comes an increasing risk of harm from misuse, according to a blog on the Forbes website.

The ECRI Institute lists the following among the top 10 technology hazards for 2015.

• Patient-handling device use errors and device failures  

Devices, such as lifts, sliding boards and specially designed chairs, toilets, mattresses and stretchers can reduce the strain on workers. But they carry their own risks in cases of improper use or mechanical failure. Regular maintenance of the equipment, training in its proper use and paying attention to weight-bearing limits are among the best solutions.

•  Insufficient protections for medical devices and systems  

Electronic medical equipment is vulnerable to malicious hacks, malware or invasions of privacy. These risks can be mitigated through IT best practices such as network firewalls, strong passwords and software patches.

Read the article.

 



February 19, 2015


Topic Area: Maintenance and Operations


Recent Posts

Biofilm 'Life Raft' Changes C. Auris Risk

Microscopic survival structure protects fungal pathogen from disinfectants and help it survive for long periods.


How Healthcare Restrooms Are Rethinking Water Efficiency

Manufacturers discuss strategies, technologies and design approaches that help healthcare facilities meet their sustainability goals.


Northwell Health Finds Energy Savings in Steam Systems

Case study: A proactive steam trap maintenance program is delivering millions in savings, fast payback and measurable carbon reductions across one of the nation’s largest health systems.


The Difference Between Cleaning, Sanitizing and Disinfecting

Cleaning methods and products have various purposes in reducing the spread of germs.


Jupiter Medical Center Falls Victim to Third-Party Data Breach

The third party has determined through an investigation that, at least as early as January 22, 2025, an unauthorized third party gained access to personal health information on legacy systems.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.