User's Manual

EXI HALO User Manual Halo User Manual R4
EXI Wireless Systems Inc. Page 3 of 33 June, 1999
Table of Contents
P 1. LIMITED WARRANTY ........................................................................................................................ 5
P 2. SYSTEM MAINTENANCE .................................................................................................................. 5
P 3. INTENDED AUDIENCE....................................................................................................................... 6
P 4. SCOPE...................................................................................................................................................... 6
P 5. ABOUT HALO INFANT PROTECTION SYSTEM ........................................................................ 7
P 6. ACCESS LEVELS.................................................................................................................................. 7
P 7. SYSTEM CONVENTIONS................................................................................................................... 8
P 8. SYSTEM SUPPORT.............................................................................................................................. 8
1. SYSTEM INTRODUCTION ................................................................................................................. 9
1.1. SYSTEM COMPONENTS........................................................................................................................... 9
1.2. TERMS USED IN THIS DOCUMENT............................................................................................................ 9
1.3. COMPUTER DISPLAY CONVENTIONS....................................................................................................10
2. USER LEVEL .......................................................................................................................................11
2.1. ADMITTING A PATIENT..........................................................................................................................11
2.2. DISCHARGING A PATIENT .....................................................................................................................14
2.3. SILENCING AND ACCEPTING ALARMS..................................................................................................16
3. SUPERVISOR LEVEL........................................................................................................................19
3.1. ACCESSING SUPERVISOR LEVEL...........................................................................................................19
3.2. EXITING SUPERVISOR LEVEL................................................................................................................20
4. ACTIVITY LOG MANAGEMENT....................................................................................................21
4.1. ACTIVITY LOGS.....................................................................................................................................21
4.2. NAVIGATING THE ACTIVITY LOG ...........................................................................................................22
4.3. ADDING A SUPERVISOR ANNOTATION TO AN ALARM............................................................................22
4.4. BACKING UP ACTIVITY LOGS................................................................................................................23
5. MANAGING TAGS..............................................................................................................................24
5.1. TAGS.....................................................................................................................................................24
5.2. ADDING A NEW P-TAG TO THE SYSTEM................................................................................................25
5.3. DELETING A P-TAG FROM THE SYSTEM................................................................................................26
5.4. DISABLING A P-TAG .............................................................................................................................27
5.5. UNASSIGNING A P-TAG ........................................................................................................................27
5.6. EDITING A P-TAG RECORD...................................................................................................................28
5.7. PRINTING ..............................................................................................................................................28
6. MANAGING SYSTEM USERS..........................................................................................................29
6.1. ADDING A NEW USER TO THE SYSTEM ..................................................................................................30
6.2. DELETING A USER FROM THE SYSTEM ..................................................................................................31
6.3. DISABLING A SYSTEM USER ..................................................................................................................31
6.4. EDITING A SYSTEM USER ACCESS..........................................................................................................31
7. SHUTTING AND RESTARTING THE SYSTEM...........................................................................32
7.1. SHUTTING DOWN ..................................................................................................................................32
7.2. RESTARTING THE SYSTEM.....................................................................................................................32