|By PR Newswire||
|March 17, 2014 04:15 PM EDT||
PLEASANTON, Calif., March 17, 2014 /PRNewswire/ -- On March 4, 2014, Thoratec Corporation initiated a voluntary worldwide Medical Device Correction in order to update its labeling and training materials for the HeartMate II® LVAS Pocket System Controller (the "Pocket Controller"). The following information is provided as a reinforcement of the initial release.
Failure to completely connect the driveline during the process of exchanging Pocket System Controllers has resulted in serious injuries and deaths. Patients who received the Pocket Controller as a replacement for an older model (EPC System Controller) may be at a higher risk of experiencing difficulty in the controller exchange process, as there are differences between the two controller models, especially differences related to the connection of the driveline. As of February 4, 2014, the rate of serious injury or death during the process of controller exchange for patients who converted to the Pocket Controller from the EPC Controller was 1.5% (8/523), while the rate for patients who received the Pocket Controller at the time of implant was 0.1% (1/1619).
Patients who are using the HeartMate II LVAS Pocket Controller should immediately contact their doctor for retraining on use of the device and to receive updated Patient Handbook information if they have not been contacted by their doctor already. Pocket Controllers can be identified by the following model information that shows on the label on the controller: REF 105109.
Adverse reactions or quality problems experienced with the use of this product may be reported to the FDA's MedWatch Adverse Event Reporting program either online, by regular mail or by fax.
- Online: http://www.fda.gov/medwatch/report.htm
- Regular Mail: use postage-paid FDA form 3500 available at: http://www.fda.gov/MedWatch/getforms.htm. Mail to MedWatch 5600 Fishers Lane, Rockville, MD 20852-9787
- Fax: 1-800-FDA-0178
Web site: http://www.thoratec.com
SOURCE Thoratec Corporation
Dec. 9, 2016 08:30 AM EST Reads: 1,121
Dec. 9, 2016 08:30 AM EST Reads: 2,217
Dec. 9, 2016 08:00 AM EST Reads: 979
Dec. 9, 2016 07:45 AM EST Reads: 1,195
Dec. 9, 2016 07:00 AM EST Reads: 4,348
Dec. 9, 2016 06:00 AM EST Reads: 823
Dec. 9, 2016 05:00 AM EST Reads: 3,143
Dec. 9, 2016 04:45 AM EST Reads: 508
Dec. 9, 2016 04:30 AM EST Reads: 1,036
Dec. 9, 2016 04:15 AM EST Reads: 1,459
Dec. 9, 2016 04:15 AM EST Reads: 3,560
Dec. 9, 2016 04:00 AM EST Reads: 594
Dec. 9, 2016 04:00 AM EST Reads: 6,346
Dec. 9, 2016 03:30 AM EST Reads: 505
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Dec. 9, 2016 03:00 AM EST Reads: 429