Intended Use of the Tandem Source Platform

The Tandem Source™ platform is intended for use by individuals with diabetes mellitus who use Tandem Diabetes Care™ insulin pumps, their caregivers, and their healthcare providers in home and clinical settings. The Tandem Source platform supports diabetes management through the display and analysis of information uploaded from Tandem insulin pumps.

/!\ Important User Information

Thoroughly review all product instructions for warnings and other important user information before using the Tandem Device Updater. Medical devices, like other computer systems, can be vulnerable to cybersecurity risks, potentially impacting the safety and effectiveness of the device. Incorrect use of the Tandem Device Updater or your failure to follow instructions, precautions and warnings in this user guide, may result in an inoperable pump or expose your t:slim X2 pump to cybersecurity risks.

Always use Tandem Source on a Trusted Computer using a web browser through a secure internet connection. A Trusted Computer is a personal computer or a computer controlled by your healthcare provider’s office that has the latest security patches for a supported operating system, including virtual machines used at healthcare provider’s offices.

For local support in your area, see the contact information on the back cover of this user guide.

You can request a printed copy of this user guide at any time, which we will send to you free of charge within seven days of your request. See the contact information on the back cover of this user guide.

Back to Top

Important User Information Regarding the t:connect Mobile App

The information on the t:connect mobile app display may not be identical to the current status of your pump. Wireless uploads from the t:connect mobile app to Tandem Source require a compatible phone and an internet or wireless data connection. Uploads to Tandem Source do not take place in real time and should not be relied upon by healthcare providers or caregivers for remote patient monitoring. Standard carrier data rates may apply.

The feature set available within the t:connect mobile app is dependent on the pump software version and the compatible smartphone’s model and operating system (OS). See your Tandem pump user guide for available feature sets.

Failure to use the t:connect mobile app according to these Instructions for Use could result in serious injury or death. Users should always follow the advice of their healthcare professional and seek medical attention when appropriate.

These user guide is applicable above and beyond any recommendations made by the manufacturer of the mobile device on which the t:connect mobile app is installed.

For an up-to-date list of supported smartphones, please visit tandemdiabetes.com/mobilesupport, or tap Help on the t:connect mobile app Settings screen, then tap App Guide.

Back to Top

Precautions

NEVER connect your pump to a public computer. Always use a Trusted Computer.

Use of security features on your Trusted Computer is important. These security features include:

  • The use of a password or PIN to unlock the Trusted Computer.
  • Making sure that your Trusted Computer has current security software.
  • Keeping your software updated when prompted by your Trusted Computer.
  • Some web pages can be unsafe and can affect your Trusted Computer just by visiting them. You should minimize visits to unknown websites and look for 'https' in the browser address or for the padlock symbol next to the URL when visiting websites.
  • You can check system requirements at tandemdiabetes.com/support/software-updates. You can verify the tandemdiabetes.com certificate in the browser by clicking on the padlock symbol next to the URL.

Exercise caution whenever you connect your pump to a Trusted Computer and remain in the presence of the pump at all times while your pump is connected to a Trusted Computer.

Connecting the pump to a Trusted Computer that is attached to other equipment could result in previously unidentified risks to the patient, operator, or a third-party. The user should identify, analyze, evaluate, and control these risks.

Subsequent changes to a Trusted Computer could introduce new risks and require additional analysis. These changes can include but are not limited to changing the configuration of the Trusted Computer, connecting additional items to the Trusted Computer, disconnecting items from the Trusted Computer, and updating or upgrading equipment connected to the Trusted Computer.