Question

In: Nursing

. Describe (in detail) the Spaulding Classification system and list the 3 device categories.

. Describe (in detail) the Spaulding Classification system and list the 3 device categories.

Solutions

Expert Solution

The spaulding classification help the user decide which level of disinfection would be appropriate for various different types of devices that are reused,based on the potential risk of infection posted to a patient .It can distroy bacteria ,viruses ,protozoa ,and prions The spaulding classification allows for device to be placed into three categories ;non-critical,semi-critical or critical. Each device classification then has an accompanying minimum inactivation level .

NON-CRITICAL DEVICES

Non critical devices are devices that only come in contact the intact skin some examples are blood pressure cuffs or stethoscopes .At a minimum ,non-critical devices should be routinely cleaned and or treated with a disinfectent ,which can include lower /intermediate level disinfection .This is not to say a higher level   cannot be used,and in some cases that might be warranted depending on the use of the device and risk to the patient

SEMI-CRITICAL DEVICES

Only contact mucous membrane or non-intact skin for example various flexible and rigid endoscopes,anesthesia equipment , and respiratory therapy equipment .these devices ,at a minium should be cleaned and then high-level disinfected.Spaulding classification also recommended that semi critical devices should be sterilized  .

CRITICAL DEVICE

That comes in contact with sterile areas of the body ,which includes blood contact .therefore these devices at a minimum are expected to be cleaned and sterilized between uses according to spaulding classification [example foreceps ,clamps ,scissors

SOME EXAMPLE OF REUSABLE MEDICAL DEVICES ARE

surgical instruments ,such as clamps and forceps

endoscopes,such as bronchoscope ,duodenoscopes and colonoscopes, used to visualize areas inside the body

accessories to endoscope ,such as graspers and scissors

laproscopuic surgery accessories ,such as artheroscopic shavers  


Related Solutions

There are five categories of human cognitive performance, list all five and describe in detail the...
There are five categories of human cognitive performance, list all five and describe in detail the cognitive strategies.
List and describe the five categories for the business process model? Explain your answer... Detail with...
List and describe the five categories for the business process model? Explain your answer... Detail with Examples.
Skeletal system 1.list the major organs in this body system. 2. Describe ( in detail) the...
Skeletal system 1.list the major organs in this body system. 2. Describe ( in detail) the normal function of this body system. 3. Identify and explain about 3 common diseases that affect this body system. Describe diagnostic testing used to detect the disease and treatment modalities for each. 4. List 2 changes that are relevant to the body structure and function of this body system in children. 5. List 2 changes that are relevant to the body structure and function...
1.   Based on your understanding of the innate immune system list 3 broad categories (and AT...
1.   Based on your understanding of the innate immune system list 3 broad categories (and AT LEAST ONE specific example in each category) that constitute the first line of defense mechanisms by the innate immune system. (Give an approximate time line for this type of defense) 2.   If this defense system is breached describe the process that follows (second line of innate defense). Explain how pathogens are detected and dealt with at this time with specific pathogen groups in mind,...
What are the system categories that may fall into a data classification (Public, secret, top secret,...
What are the system categories that may fall into a data classification (Public, secret, top secret, etc.) scheme (file server, database server, Windows Active Directory servers, print servers, Web servers, application servers, etc)? How can we classify these systems? Can we have the same type of system in multiple classifications? Why?
Classification question:1. What features make up the following categories?2. List common examples of the...
Classification question:1. What features make up the following categories?2. List common examples of the following.BacteriaCyanobacteriaProtistsExcavataSARArcheaplastidaUnikontaFungiZygomycetesAscomycetesBasidiomycetesInvertebratesPoriferaCnidariansLophotrochozoansFlatwormsRotifersEctoproctsBrachiopodsMolluscsChitonsGastropodsCephalopodsBivalviaAnnelidsErrantiaSedentariansEcdysozoansNematodesArthropodsCheliceratesMyriapodsPancrustaceansHexapodaCrustaceansDeuterostomesEchinodermsCephalochordatesTunicatesVertebratesCyclostomesChondrichthyansActinopterygiiSarcopterygiiAlso:1. Where would caterpillars fall in these categories? Are they myriapods?2. Which category are corals and sea anemones?3. How about fish?4. Snails?5. turtles?6. shrimp?
Describe fraud. What are the three categories of fraud and list an example of each. Describe...
Describe fraud. What are the three categories of fraud and list an example of each. Describe the fraud triangle. List the key requirements of the Sarbanes-Oxley Act (SOX) List the components of the framework commonly used in corporations when analyzing their internal control systems: List the five common principles of Internal Control and give an explanation and example of each Name two reasons why internal control for cash is important. What does the term “cleared the bank” mean? What are...
List and DESCRIBE three distinct categories of jazz and give an example for each.
List and DESCRIBE three distinct categories of jazz and give an example for each.
Describe in detail the operations of the federal reserve system.
Describe in detail the operations of the federal reserve system.
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that...
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial of service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT