1 Basic Operation
13
Alarms
WARNING
• Do not rely exclusively on the audible alarm system for patient monitoring. Adjustment of alarm
volume to a low level or off during patient monitoring may result in patient danger. Remember
that the most reliable method of patient monitoring combines close personal surveillance with
correct operation of monitoring equipment.
• Be aware that the monitors in your care area may each have different alarm settings, to suit
different patients. Always check that the alarm settings are appropriate for your patient before you
start monitoring.
Accessories
WARNING
Philips' approval: Use only Philips-approved accessories. Using other accessories may compromise
device functionality and system performance and cause a potential hazard.
Reuse: Never reuse disposable transducers, sensors, accessories and so forth that are intended for
single use, or single patient use only. Reuse may compromise device functionality and system
performance and cause a potential cross-infection hazard.
Electromagnetic compatibility: Using accessories other than those specified may result in increased
electromagnetic emission or decreased electromagnetic immunity of the monitoring equipment.
Damage: Do not use a damaged sensor or one with exposed electrical contacts. Do not use damaged
accessories. Do not use accessories where the packaging has been damaged or opened.
Cables and tubing: Always position cables and tubing carefully to avoid entanglement or potential
strangulation.
MR Imaging: During MR imaging, remove all transducers, sensors and cables from the patient.
Induced currents could cause burns.
Use-by date: Do not use accessories where the use-by date has been exceeded.
Electrosurgery: Do not use antistatic or conductive endotracheal tubes as they may cause burns in
case of electrosurgery.
Security Information
Protecting Personal Information
Protecting personal health information is a primary component of a security strategy. Each facility
using the monitors must provide the protective means necessary to safeguard personal information
consistent with country laws and regulations, and consistent with the facility’s policies for managing
this information. Protection can only be realized if you implement a comprehensive, multi-layered
strategy (including policies, processes, and technologies) to protect information and systems from
external and internal threats.