Click here to close now.




















Welcome!

News Feed Item

ECRI Institute's Alarm Safety Handbook Helps Hospitals Minimize a Top Threat to Patient Safety

New resource from ECRI Institute paves way for hospitals to meet the Joint Commission's 2014 National Patient Safety Goal

PLYMOUTH MEETING, Pa., Aug. 6, 2014 /PRNewswire-USNewswire/ -- Widespread. Threatening to patients. Difficult to eliminate. Characteristics of a deadly new disease? Not quite. The issue is alarm hazards—the No. 1 danger on ECRI Institute's 2014 Top 10 Health Technology Hazards list.

ECRI Institute logo

To boost hospitals' efforts to meet the Joint Commission's 2014 National Patient Safety Goal on clinical alarm safety, ECRI Institute has developed a new publication, The Alarm Safety Handbook: Strategies, Tools, and Guidance.  The handbook—available in print and electronic formats—is intended as a go-to resource that hospitals can use to scrutinize and improve their alarm management practices and curtail alarm hazards to prevent patient harm.

"Hospitals now have access to information that they can use to take action to minimize alarm hazards each step of the way," says James P. Keller, Jr., vice president, health technology evaluation and safety, ECRI Institute. "We hope hospitals look to this as a blueprint for building a sound alarm management safety process."

The handbook features 76 pages of charts, statistics, guidance, key points, and questions, along with a separate workbook of customizable tools. Topics include:

  • Making Alarm Management a Patient Safety Priority
  • Understanding Clinical Alarm Hazards—A Conceptual Model
  • Creating an Action Plan
  • Putting the Plan into Action
  • Identifying Best Practices

The tools in the accompanying workbook are designed to help hospitals identify safety vulnerabilities and develop alarm management strategies. Examples include a care area assessment checklist, a nursing staff survey, and an alarm review tool.

For many years, ECRI Institute has raised awareness about the patient safety risks from alarm fatigue and other alarm-related hazards, and is widely considered one of the nation's leading experts on alarm safety. In fact, alarm hazards takes the No. 1 spot on its 2014 Top 10 Health Technology Hazards list. Additionally, The Joint Commission has cited ECRI Institute in its recommendations. Some of the nation's leading healthcare organizations have turned to ECRI Institute's alarm management consulting team for customized assistance on their alarm management processes.

The Alarm Safety Handbook: Strategies, Tools, and Guidance (print or electronic) is $350. Members of ECRI Institute's Health Devices System™, Health Devices Gold™, SELECTplus™, and PSO Plus™ programs can download the electronic version of the handbook and workbook at no cost through their membership websites. Members of ECRI Institute's Health Technology Assessment Information Service™ and Healthcare Risk Control™ can purchase the electronic and print versions at discounted rates.

To learn more or to purchase the electronic or print publication, visit the website or contact ECRI Institute by telephone at (610) 825-6000, ext. 5889; by e-mail at [email protected]; by fax at (610) 834-0240; or by mail at 5200 Butler Pike, Plymouth Meeting, PA 19462-1298, USA. ECRI Institute also offers free resources in our free eNewsletters.

Social Sharing

— #EINews: Alarm safety handbook now available for hospitals to take on alarm hazards ly.ecri.org/hMIAc2
— #EINews ECRI Institute publishes alarm safety handbook for hospitals looking to meet Joint Commission's 2014 National Patient Safety Goal ly.ecri.org/hMIAc2

About ECRI Institute
​ECRI Institute (www.ecri.org), a nonprofit organization, dedicates itself to bringing the discipline of applied scientific research to healthcare to discover which medical procedures, devices, drugs, and processes enable improved patient care. As pioneers in this science for more than 45 years, ECRI Institute marries experience and independence with the objectivity of evidence-based research. Strict conflict-of-interest guidelines promote objectivity. ECRI Institute is designated an Evidence-based Practice Center by the U.S. Agency for Healthcare Research and Quality. ECRI Institute PSO is listed as a federally certified Patient Safety Organization by the U.S. Department of Health and Human Services. ECRI Institute developed and implements the Pennsylvania Patient Safety Reporting System, a mandatory error and near-miss reporting program for Pennsylvania hospitals and other healthcare facilities, under contract to the Pennsylvania Patient Safety Authority, winner of the 2006 John M. Eisenberg Award. Find ECRI Institute on Facebook (www.facebook.com/ECRIInstitute) and on Twitter (www.twitter.com/ECRI_Institute).

Logo - http://photos.prnewswire.com/prnh/20110112/DC29081LOGO

SOURCE ECRI Institute

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society-changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his session at @ThingsExpo, Jason Mondanaro, Director, Product Management at Metanga, discussed how you can plan to cooperate, partner, and form lasting all-star teams to change the world...
Public Cloud IaaS started its life in the developer and startup communities and has grown rapidly to a $20B+ industry, but it still pales in comparison to how much is spent worldwide on IT: $3.6 trillion. In fact, there are 8.6 million data centers worldwide, the reality is many small and medium sized business have server closets and colocation footprints filled with servers and storage gear. While on-premise environment virtualization may have peaked at 75%, the Public Cloud has lagged in adop...
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at @DevOpsSummit, Haseeb Budhani, CEO and Co-founder of Soha, shared five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the friction an...
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to tran...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.