EasyManua.ls Logo

Philips MX400 - Alarms; Accessories; Security Information; Protecting Personal Information

Philips MX400
534 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
1 Introduction
15
Alarms
WARNING
Do not rely exclusively on the audible alarm system for patient monitoring. Adjustment of alarm
volume to a low level or off during patient monitoring may result in patient danger. Remember
that the most reliable method of patient monitoring combines close personal surveillance with
correct operation of monitoring equipment.
Be aware that the monitors in your care area may each have different alarm settings, to suit
different patients. Always check that the alarm settings are appropriate for your patient before you
start monitoring.
Accessories
WARNING
Philips' approval: Use only Philips-approved accessories. Using other accessories may compromise
device functionality and system performance and cause a potential hazard.
Reuse: Never reuse disposable transducers, sensors, accessories and so forth that are intended for
single use, or single patient use only. Reuse may compromise device functionality and system
performance and cause a potential hazard.
Electromagnetic compatibility: Using accessories other than those specified may result in increased
electromagnetic emission or decreased electromagnetic immunity of the monitoring equipment.
Damage: Do not use a damaged sensor or one with exposed electrical contacts.
Cables and tubing: Always position cables and tubing carefully to avoid entanglement or potential
strangulation.
MR Imaging: During MR imaging, remove all transducers, sensors and cables from the patient.
Induced currents could cause burns.
Security Information
Protecting Personal Information
Protecting personal health information is a primary component of a security strategy. Each facility
using the monitors must provide the protective means necessary to safeguard personal information
consistent with country laws and regulations, and consistent with the facility’s policies for managing
this information. Protection can only be realized if you implement a comprehensive, multi-layered
strategy (including policies, processes, and technologies) to protect information and systems from
external and internal threats.
As per its intended use, the patient monitor operates in the patient vicinity and contains personal and
sensitive patient data. It also includes controls to allow you to adapt the monitor to the patient's care
model. To ensure the patient's safety and protect their personal health information you need a security
concept that includes:

Table of Contents

Related product manuals