Feeds

IVF clinics may tag embryos

My first RFID

  • alert
  • submit to reddit

Business security measures using SSL

The UK body which regulates IVF treatment is considering tagging embryos to prevent the sort of fiasco which saw mixed-race twins born to white parents after the wrong sperm was used to fertilise the mother's eggs.

The Human Fertilisation and Embryology Authority (HFEA) now wants to label all material - sperm, eggs and embryos - with barcodes or RFID tags, New Scientist reports. The plan is intended to eliminate the possibility of mix-ups which are still possible even under the "double-witnessing" protocol which "requires an embryologist to ask a colleague to witness and document every procedure in which an error could occur".

The barcoding procedure - currently under development by IMT International in Chester - uses cameras built into IVF clinic benches to scan a barcode on the bottom of dishes containing eggs. A computer system alerts staff if, for instance, the eggs do not match the patient.

The RFID alternative likewise sounds an alarm when a mismatch occurs. The RFID chips are embedded in the bottom of dishes and "if the samples don’t match [the patient], or you bring together two things that shouldn’t be in the same work area, the alarms will sound," explains Steve Troup, an embryologist on the HFEA’s advisory group on safety and new technologies.

The HFEA will, however, need to be certain that the RFID technology is not damaging to embryos. Research Instruments, a Falmouth-based outfit developing an IVF RDIF tagging system, has tested the technology on mouse embryos without apparent adverse effects. Troup reckons RFID will be safe for in vitro procedures and notes: "The tags only transmit when activated by an external signal. And they work at the low frequency of 13.5 megahertz compared with 900 to 1900 megahertz used by cellphones."

Nonetheless, more testing is planned. Troup’s own research team at the University of Liverpool will further investigate the effects of radio waves on mouse embryos, while Research Instruments is looking into the field strength generated by the RFID tags when active. ®

Related storieds

EU consults on RFID technology
Parent power detags US schoolkids
EU biometric RFID scheme unworkable, says EU tech report

Providing a secure and efficient Helpdesk

More from The Register

next story
SCREW YOU, Russia! NASA lobs $6.8bn at Boeing AND SpaceX to run space station taxis
Musk charging nearly half as much as Boeing for crew trips
PORTAL TO ELSEWHERE scried in small galaxy far, far away
Supermassive black hole dominates titchy star formation
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Edge Research Lab to tackle chilly LOHAN's final test flight
Our US allies to probe potential Vulture 2 servo freeze
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
Cracked it - Vulture 2 power podule fires servos for 4 HOURS
Pixhawk avionics juice issue sorted, onwards to Spaceport America
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.