SMT Proprietary and Confidential

Slides:



Advertisements
Similar presentations
Tips to a Successful Monitoring Visit
Advertisements

Presumed Asbestos Training Programme. Introduction Getting Started The Interface Top Tool Bar Creating a New Site Type I Survey Type II Survey Type III.
BioTracker System ® Effortless Tissue Tracking. The BioTracker System is a tissue tracking and management system that helps to eliminate the disaster.
RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
1 ISBT 128 Industry Standard and Implementation Process Overview.
SecurePak Electronic tamper detection for packaging developed by Cypak and Swedish Postal Service.
EDRN’s Validation Study Information Management System Developed for EDRN by the DMCC Cancer Biomarkers Group Division of Cancer Prevention Jet Propulsion.
Schneider Institute for Health Policy, The Heller School for Social Policy and Management, Brandeis University Components of health services research projects.
1st Global QA Conference & 21st SQA Annual Meeting Falcon Consulting Group, LLC 1 Phase I Clinical Study Audits “A Deeper Scrutiny” Cheryl J. Priest, R.N.
Neoteric Technology Ltd – All Rights Reserved - © 2006
Library Online Catalog Tutorial Pentagon Library Last Updated March 2008.
RFID & III API MENA IUG 3rd Annual Meeting November 18 – 19, 2008 American University of Sharjah United Arab Emirates Huguette Yaghmour Director of Library.
Lecture 1: History of Operating System
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
Americas Technical Advisory Group ICCBBA ISBT 128 Blood Product Labeling – A Hospital Perspective Americas Technical Advisory Group ICCBBA.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
PMI Inventory Tracker™
Integrated Hospital Management System. Integrated Hospital Management System software is user-friendly software. The main objectives of the system is.
Various Types of Health Information Systems Health Informatics 489 Spring 2015.
Paul Ashford. Safe Blood? Ensuring the provision of safe blood is a high priority Donor selection Testing Processing Quality assurance But...
By Drudeisha Madhub Data Protection Commissioner Date:
Chapter 7 Database Auditing Models
Using Technology to Streamline the Inventory Process Sean Pugatch, AssetWorks ext
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
Data Management Solutions
Data Management Solutions DMS Products Overview IntelliTrack Inc.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Internet Banking Standard FIAT & Standard FIAT-Hybrid Registration Intuit Financial Services University Internet Banking Certification Training.
The Future of Organ Labeling and Verification
Solution Overview for NIPDEC- CDAP July 15, 2005.
HA Lions Eye Bank Galen Chow HKEH QA Forum HKE QA Forum 2012 Acknowledgements Dr Victoria Wong Ms Janice Wong Ms Jessie Ng Ms Jenny Yeung All the.
Financial Stewardship Institute Capstone Presentation 2014 Angie Donahue Jackie Etchison Turi Holte Lynn Egli Lisa Knox Pam Palanuk R eally F abulously.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Secure Electronic Transaction (SET)
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
IN THE NAME OF GOD Blood Safety S. AMINI KAFI ABAD CLINICAL AND ANATOMICAL PATHOLOGIST IRANIAN BLOOD TRANSFUSION ORGANIZATION(IBTO) RESEARCH CENTER June.
Growth With Perfection o End to end Solutions o System Integration o Application Development o Consulting Tag.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
GMP on blood/plasma collection establishments Group 2.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Authentication Training Guide 1 The Red Flag Ruling requires automotive dealerships to detect red flags that are applicable to their operation. After.
© Mahindra Satyam 2009 Configuration Management QMS Training.
CPS ® and CAP ® Examination Review OFFICE ADMINISRATION, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper.
AUDIT IN COMPUTERIZED ENVIRONMENT
Update on Transfusion Safety Management Systems Blood Products Advisory Committee Meeting, March 9, 2006 Linda Weir, CSO, CBER/OBRR/DBA.
Barcode Technology in healthcare Nowadays, published reports illustrate high rates of medical error (adverse events) and the increasing costs of healthcare.
MANAGEMENT INFORMATION SYSTEMS (MIS) AND OTHER INFORMATION SYSTEMS.
Sample Collection Training Guide. Sample Collection Overview It is the responsibility of the transfusing facility to collect and properly label blood.
P1 Document Control and Various Documents. P2 Learning Objectives What are documents and records? Documents Why are they important? What documents should.
Day in the Life (DITL) Production Operations with Energy Builder Copyright © 2015 EDataViz LLC.
6 th Annual Focus Users’ Conference 6 th Annual Focus Users’ Conference ERP Fixed Assets ERP Fixed Assets Presented by: Will Brock ERP Programmer PowerPoint.
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
The Alien Flight Student Program AFSP An overview of the applications that encompass the AFSP Program COPYRIGHT AND GOVERNMENT PURPOSE RIGHTS NOTICE Copyright.
Advancements of RFID in the Healthcare System Jesse A. Evans 3/25/07.
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Korea University Ubiquitous LAB. Chapter 11. RFID peripherals Ph.D Chang-Duk Jung.
Unit 2 Technology Systems
CESSDA SaW Training on Trust, Identifying Demand & Networking
Software Application Overview
Information System and Management
Databases.
Activating Your Account and Navigating Through TIDE
Smart Business for eGeneration Companies
TYRE MANAGEMENT SOLUTION
IIAM Electronic Referral Demonstration
Pacific Regional Workshop on Legal Identity and Identity Security 8-10th July 2019 PALAU Efrecia R. Kazuma.
Presentation transcript:

SMT Proprietary and Confidential Smart Medical Technologies, Inc. RFID in Blood Banking and Transfusion Services SMT Proprietary and Confidential

Why Blood Banking? Why RFID? High value, high volume Blood products are always in demand, and their high numbers present logistical challenges Health and safety Errors in blood banking and transfusion lead to debilitating diseases, even death Optical methods = errors Common optical methods of identification, including bar-coding, are often difficult to scan, and frequently misread RFID, the right technology Functions actively with software, and provides traceability, authentication, and tracking features not available in current systems SMT Proprietary and Confidential

Benefits of RFID in Blood Banking Applications Rules-Based Software – An Electronic Supervisor Regulates process flow Guides the user step-by step through various procedures Alerts the user to conflicts/errors If the user incorrectly proceeds or ignores a command Manages information transfer between hardware and software Updates database and selectively delegates data Built-in authentication Highly secure SMT Proprietary and Confidential

Traceability – Tracking Who, When, and Where Benefits of RFID in Blood Banking Applications Traceability – Tracking Who, When, and Where Detects sources of errors Enables an auditor to examine how and why errors occur Memory archiving Identifies the individuals who have handled the product, and the locations the product has traveled Time and date stamping Provides history of work flow, monitors product expiration, reveals bottlenecks in processing SMT Proprietary and Confidential

Authentication – Security and Protection Benefits of RFID in Blood Banking Applications Authentication – Security and Protection Restricted access Reserved to technicians carrying proper identification Accountability Technicians must review their contributions and confirm authenticity before submitting work Data integrity In contrast to magnetic-stripe information coding, chip data is not erased or scrambled by magnetic fields For SMT, by SMT RFID chips work only with proprietary software and proprietary readers/writers, and vice versa SMT Proprietary and Confidential

Versatile Tracking – Efficiency & Responsiveness Benefits of RFID in Blood Banking Applications Versatile Tracking – Efficiency & Responsiveness Short range, long range Dual RFID - high frequency for security and storage, ultra high frequency for inventory and administration Non-line of sight tracking Free orientation of product through reader, and processing of multiple samples at once Productivity Provides real-time inventory status, and positional information for re-access SMT Proprietary and Confidential

Sample Donation Procedure A Three Phase Process Prescreening Collecting info, validation, issuing RFID card and wristband Bio-Screening Measuring hemoglobin level, updating RFID card and wristband, qualifying the donor Donation Doing cross-checks, obtaining blood, preparing test samples, finalizing the donation SMT Proprietary and Confidential

Sample Donation Procedure System Components SMT Proprietary and Confidential

Sample Donation Procedure: Pre-Screening I. Donor enters the donation center II. Pre-screening technician present at donation center uses RFID-equipped ID card to obtain software clearance, and to time/date stamp the task of screening the donor SMT Proprietary and Confidential

Sample Donation Procedure: Pre-Screening III. Donor provides basic information, conducts donor questionnaire, and electronically signs donor consent form IV. Donor is issued an RFID-equipped ID card, which records the donor’s identifying information, as well as donation history Donor is also issued an RFID-equipped wristband which similarly identifies the donor, and provides clearance in the next stages of donation SMT Proprietary and Confidential

Sample Donation Procedure: Bio-Screening V. Bio-screening technician uses RFID equipped ID card to obtain software clearance, and to time/date stamp the task of measuring the donor’s blood hemoglobin level VI. Donor’s wristband provides the necessary clearance, unlocking subsequent windows in the software interface SMT Proprietary and Confidential

Sample Donation Procedure: Bio-Screening VII. Bio-screening technician obtains small sample of donor’s blood in order to determine the donor’s hemoglobin level VIII. Bio-screening technician determines donor suitability on-site SMT Proprietary and Confidential

Sample Donation Procedure: Bio-Screening IX. Bio-screening technician transmits blood hemoglobin testing result to donor wristband SMT Proprietary and Confidential

Sample Donation Procedure : The Donation X. Donation technician uses RFID equipped ID card to obtain software clearance, and to time/date stamp the task of performing the donation XI. Donation technician scans donor wristband to verify completion of pre screening and bio-screening procedures SMT Proprietary and Confidential

Sample Donation Procedure : The Donation XII. Donation technician obtains RFID equipped blood bag and transmits pertinent donor information and handling record archived on the system memory XII. Portable label printer creates eye readable blood donation label containing information relevant to the donation procedure (e.g. collection date, donor center ID#, expiration) SMT Proprietary and Confidential

Sample Donation Procedure : The Donation XV. The venipuncture SMT Proprietary and Confidential

Sample Donation Procedure : The Donation XIV. The donation technician obtains RFID-equipped pilot test tube samples and collects the donor’s blood for testing, then conveys pertinent donor information to the test tubes in order to link the blood bag to the samples SMT Proprietary and Confidential

Sample Donation Procedure : The Donation XV. The donation technician utilizes their RFID-equipped ID card to verify that collection of the blood unit and pilot samples has proceeded via established protocols SMT Proprietary and Confidential

Sample Donation Procedure : The Donation XV. The donation technician uses the donor’s RFID-equipped ID card to update the donation history, and to record a successful donation SMT Proprietary and Confidential

SMT’s Reference Material More than 1000 pages of procedures, guidelines and reference material SMT Proprietary and Confidential

SMT Proprietary and Confidential Thank You SMT Proprietary and Confidential