Hospital Security Prospects Presentation SEC 320 Table of Contents I. II. III. IV. V. VI. Getting Familiar: Banner Health ……..................................................... 3 Core Goals …........................................................................................ 4 Rising Tendencies for Security in Healthcare Organization I. Violent Behavior…………................................................5 II. Security Infringement ………………………………………..... 6 III. Terrorist Threats ………………………………………….……… 7 IV. Stealing………………………………………………….…..……... 7 Actions to Take I. For Violent Behavior ……………………………………………. 8 II. For Security Infringement ……………….……….…………… 8 III. For Terrorist Threats ………………………..…………………... 9 IV. For Stealing ……………………………………….……………..… 9 The Importance of a Comparative Examination of Cost-benefits ........... 10 References……………………………………………………….…………………..…….. 11 Banner Health works as a not-for-profit organization dealing health care services with an aim to offer outstanding care for patients. In 2010 Banner Health gained its asset to 6 percent compared to the earlier year. This year the asset turned out to be of $6,381,552 billion. This organization has many high tech modern hospitals in the states of Colorado, Nevada, Nebraska, Arizona, Alaska and California. In 14 US states 35,000 people got employed This organization is continuously trying to stay at good level and is always after promising technology and modernization so that their health service providers can offer the best of the organization to its patients. Some of these innovative, promising, effective technological applications are: Plan of Care Transformation Remote monitoring application iCare reinforced with audiovisual eICU® for maximized information use Intelligent OB system Surgical assistance using robotics Education facilities with simulation assistance Working together with MD Anderson Cancer Center Getting Familiar Core Goals The security division has to recognize and admit the possible promising tendencies as well as threats in security that can influence healthcare providing authorities like Banner Health. Vision To successfully foil criminal activities To competently pull through from security risks To abide by HIPAA policies for patient information privacy and security To encourage cultural values like uprightness, honesty, sympathy, admiration, professionalism, and answerability Mission To profitably perform security activities To come up with superb patient care To manage and make better present paraphernalia and facilities To guarantee safety and steady atmosphere for hospital staff, patients, and guests To safeguard assets of Banner Health so that it can gain more profit and can offer services for increasing needs of the target communities. Rising Tendencies for Security in Healthcare Organization: Violent Behavior Concerns: Violent behavior of patients and their relatives visitors made towards hospital staff Example: Gun shooting at Johns Hopkins hospital, Baltimore, Maryland on September 16, 2010, (Source: Fenton, Green, & Hill, 2010) Reason: Frustrated or disgruntled feelings believing the patient didn’t get enough care Security Infringement Concerns: Providing incorrect medicines Stealing secret information Example: Illegal entrance the pharmacy of Banner Health A mentally ill female fruitfully entered several hospitals disguising in a doctor’s clothes in 2010. Banner Health hospital in Ventura, California was one of these hospitals. Reason: For unquestioning nature of the hospital environment, hospitals are vulnerable to may type of security infringement. Security infringements may let the criminals get access to sensitive places like the pharmacy. They can harm people or assets. Terrorist Threats Concerns: ◦ Terrorist activities happening in healthcare settings ◦ Potential chemical assault Example: Terrorist assault in the hospital in the UK (Source: Sengupta, 2007) Reason: To attract interest from the world Impact: ◦ Changes our style of living and process of thinking ◦ Negative psychological impression ◦ Financial harm ◦ Mass victims ◦ Can form epidemics or virulent diseases Stealing Concerns: •Sedative /medicine stealing from the pharmacy •Stealing of newborns from the nursery, obstetric department or pediatric department Some people enter hospital premises to steal medicine but some staff also steals medicine. These people may sell the drugs to addicted people and gain some money. They may even use it themselves. Actions to Take Violent Behavior CPI or Crisis Prevention training for the staff Set code of behavior for hospital premises Suitable visiting hours for patient relatives Control of access of people : Temporary ID badges for visitors or guest Staff should have forgery-proof ID badges Control of boundaries for all facilities. Access control with metal detectors and K-9 members at all access points. Examination of property Sufficient observation system Mobile security personnel should observe behavior and activities of guests Security Infringement Use of card punch reader or biometric reader at entry points Control over information transfer Extra generators for power cut Liaison with police force Central command station Training program for staff: • How to establish secure information system, principles, and steps. • General security includes appropriate reporting system, ID badges, detection of probable threats, and steps for entering constrained areas. Rewards for staff Continuance and appraisal of systems Extra systems and alternative processes Close watching of sensitive locations like the server rooms Actions to Take Terrorist Threats Basic training and genuine security activities Training offered to security and general staff on how to act against security threats. Establishment of a quality security system Always prepare for actions through regular drills so that complacence does not weaken morale and there should be the belief that existing system can be made better Access control and control over boundaries Multi-assistance surveillance systems Enough lighting for outer locations Random change of schedules Use of high tech emerging technologies and devices to counteract advanced threats Manual for security division and code of conduct for all Stealing Proper observation systems Use of segways and K9 members Training classes on security and drug addiction for general staff Innovative mobile pharmacies accessed through fingerprint scan to prevent drug stealing Similar numbered bracelets for infant and mother and these should be tagged with electronic chips to monitor the newborn and prevent its stealing Nurses will use ID badges according to their work status and use their fingerprint along with infant’s bracelet tag to move the child to any different place HUGS safety system for prevention of infant theft Importance of a Comparative Examination of Cost-benefits How far new technological security equipments and education or plans are cost effective needs to be assessed. According to literature of Ortmeier, 2009, a comparison between the benefits of adopting new security technology and its financial cost can help make good decision. According to American Society for Industrial Security, 1998 and Bassett, 2006, the cost of adopting new technology in security sector can be below the margin of 2 percent of the possessions protected to make the adoption cost effective. We may go for more cost only if there is special interest. However, it should not be more than 5 percent even if it is very much needed. These types of cases are not usually acceptable. By making a confident analysis of cost-benefit security division can show proofs of benefits. The process is as follows: It is stated that all probable risks of the investment have to be pointed out. All the examples of benefits and cost should be tagged with calculated financial value. ASIS International Guidelines Commission, 2007 paper states that probable future expenses and income compared with present investment cost and income can show a true picture of benefits or loss. This comparison of benefits with cost can help the organization find out the ROI or return of investment of investments in security technology. The VAC or value added contribution can also be assessed. It is a complex job to measure ROI or VAC until a standard is taken for comparison. That is why it is difficult to convince the management to take on new security strategies. The security personnel need to employ innovative ideas to convince. According to Sommer, 2003 the department has to be convincing and confident. They can convince different departments first. The human resource department, IT department and other ones can be convinced first. Then the management will listen. The security officers have to assert that protecting assets and avoiding loss should not be looked at as a costly thing. When the budget makers understand value of benefits is more than value of investment, they will be ready to accept. According to Ortmeier 2009 the benefits of new addition of technology should be transfer into money figures to convince the decision makers. References American Society for Industrial Security. (1998). ASIS International presents introduction to security for business students. Alexandria, VA: American Society for Industrial Security. Asghar, M. (2009, November 14). Police Clueless in infant theft case. Retrieved June 20, 2011, from Dawn.Com: http://Archives.dawn.com/archives/144936 ASIS International Guidelines Commission. (2007). General security risk assessment guidelines. Alexandria, VA: ASIS International. Banner Health. (2011). Financial Stewarship. Retrieved from http://www.bannerhealth.com/About+Us/Banner+Financial/_Financial+Stewardship.htm Bassett, J. (2006, September). When your CEO says “show me the money”. Security Technology & Design, 16 (9), 84-86. Bragdon, B. (2006, July). What security’s worth. CSO, 5 (7), 10. Crisis Prevention. (2011) Nonviolent crisis intervention. Retrieved from http://www.crisisprevention.com/Specialties/NonviolentCrisis-Intervention Dalton, D. R. (1995). Security management: Business strategies for success. Boston, MA: Butterworth-Heinemann. Fenton, J., Green, E. L., & Hill, R. L. (2010, September 17). Police: Man upset over mother’s care at Hopkins kills her, himself. The Baltimore Sun, pp. 1-4. Retrieved from http://articles.baltimoresun.com/2010-09-17/news/bs-md-ci-shooting-hopkins20100916_1_mother-hospital-staff-east-baltimore Innovative Medical. (2011). Hugs infant security. Retrieved from http://www.innovative-medical.com/Infantsecurity/ John Hopkin’s Medicine. (2010). Update on shooting at the Johns Hopkins hospital. Retrieved from http://www.hopkinsmedicine.org/news/media/releases/update_on_shooting_at_the_johns_hopkins_hospital Ortmeier, P. J. (2009). Introduction to Security. Operations and Management (3rd ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. Rick, L. T. (2009, July 21). Local hospitals work to prevent narcotic theft. Retrieved June 20, 2011, from Rapid City Journal: www.rapidcityjournal.com/news/local/articl_07226aa2-7a01-51da-b203-14ad48fc0370.html Sengupta, K. (2007). Terror plot hatched in British hospital. The Independent. Retrieved from http://www.independent.co.uk/news/uk/crime/terror-plot-hatched-in-british-hospitals-455630.html Sommer, C. J. (2003, March). Survival of the fittest: Corporate success is dependent on strategic synergy. Loss Prevention & Security Journal, 3 (3), 16-17.