Hospital Security Prospects Presentation
SEC 320
Table of Contents
I.
II.
III.
IV.
V.
VI.

Getting Familiar: Banner Health ……..................................................... 3
Core Goals …........................................................................................ 4
Rising Tendencies for Security in Healthcare Organization
I. Violent Behavior…………................................................5
II. Security Infringement ………………………………………..... 6
III. Terrorist Threats ………………………………………….……… 7
IV. Stealing………………………………………………….…..……... 7
Actions to Take
I. For Violent Behavior ……………………………………………. 8
II. For Security Infringement ……………….……….…………… 8
III. For Terrorist Threats ………………………..…………………... 9
IV. For Stealing ……………………………………….……………..… 9
The Importance of a Comparative Examination of Cost-benefits ........... 10
References……………………………………………………….…………………..…….. 11






Banner Health works as a not-for-profit organization
dealing health care services with an aim to offer
outstanding care for patients.
In 2010 Banner Health gained its asset to 6 percent
compared to the earlier year. This year the asset turned out
to be of $6,381,552 billion.
This organization has many high tech modern hospitals in
the states of Colorado, Nevada, Nebraska, Arizona, Alaska
and California.
In 14 US states 35,000 people got employed
This organization is continuously trying to stay at good
level and is always after promising technology and
modernization so that their health service providers can
offer the best of the organization to its patients.
Some of these innovative, promising, effective
technological applications are:
 Plan of Care Transformation
 Remote monitoring application iCare reinforced
with audiovisual eICU® for maximized information
use
 Intelligent OB system
 Surgical assistance using robotics
 Education facilities with simulation assistance
 Working together with MD Anderson Cancer Center
Getting
Familiar
Core Goals












The security division has to recognize and
admit the possible promising tendencies as
well as threats in security that can influence
healthcare providing authorities like Banner
Health.
Vision
To successfully foil criminal activities
To competently pull through from security
risks
To abide by HIPAA policies for patient
information privacy and security
To encourage cultural values like uprightness,
honesty, sympathy, admiration,
professionalism, and answerability
Mission
To profitably perform security activities
To come up with superb patient care
To manage and make better present
paraphernalia and facilities
To guarantee safety and steady atmosphere
for hospital staff, patients, and guests
To safeguard assets of Banner Health so that
it can gain more profit and can offer services
for increasing needs of the target
communities.
Rising Tendencies for Security in
Healthcare Organization: Violent
Behavior

Concerns: Violent behavior of patients
and their relatives visitors made
towards hospital staff
 Example: Gun shooting at Johns
Hopkins hospital, Baltimore,
Maryland on September 16, 2010,
(Source: Fenton, Green, & Hill, 2010)
 Reason: Frustrated or disgruntled
feelings believing the patient didn’t
get enough care
Security Infringement
Concerns:
 Providing incorrect medicines
 Stealing secret information
 Example:
 Illegal entrance the pharmacy of
Banner Health
 A mentally ill female fruitfully
entered several hospitals disguising
in a doctor’s clothes in 2010.
Banner Health hospital in Ventura,
California was one of these
hospitals.
 Reason:
 For unquestioning nature of the
hospital environment, hospitals are
vulnerable to may type of security
infringement.
 Security infringements may let the
criminals get access to sensitive
places like the pharmacy. They can
harm people or assets.

Terrorist
Threats
 Concerns:
◦ Terrorist activities happening in
healthcare settings
◦ Potential chemical assault
 Example:
Terrorist assault in the
hospital in the UK (Source:
Sengupta, 2007)
 Reason: To attract interest from
the world
 Impact:
◦ Changes our style of living and
process of thinking
◦ Negative psychological impression
◦ Financial harm
◦ Mass victims
◦ Can form epidemics or virulent
diseases
Stealing
Concerns:
•Sedative /medicine stealing
from the pharmacy
•Stealing of newborns from
the nursery, obstetric
department or pediatric
department
 Some people enter hospital
premises to steal medicine but
some staff also steals medicine.
These people may sell the drugs to
addicted people and gain some
money. They may even use it
themselves.
Actions to Take
Violent Behavior




CPI or Crisis Prevention training for the
staff
Set code of behavior for hospital premises
Suitable visiting hours for patient relatives
Control of access of people :
 Temporary ID badges for visitors or guest
 Staff should have forgery-proof ID badges
 Control of boundaries for all facilities.
 Access control with metal detectors and K-9
members at all access points.
 Examination of property
 Sufficient observation system
 Mobile security personnel should observe
behavior and activities of guests
Security Infringement
 Use of card punch reader or biometric reader
at entry points
 Control over information transfer
 Extra generators for power cut
 Liaison with police force
 Central command station
 Training program for staff:
• How to establish secure information
system, principles, and steps.
• General security includes appropriate
reporting system, ID badges, detection
of probable threats, and steps for
entering constrained areas.
 Rewards for staff
 Continuance and appraisal of systems
 Extra systems and alternative processes
 Close watching of sensitive locations like
the server rooms
Actions to Take









Terrorist
Threats
Basic training and genuine security activities
Training offered to security and general staff on
how to act against security threats. Establishment
of a quality security system
Always prepare for actions through regular drills
so that complacence does not weaken morale and
there should be the belief that existing system can
be made better
Access control and control over boundaries
Multi-assistance surveillance systems
Enough lighting for outer locations
Random change of schedules
Use of high tech emerging technologies and
devices to counteract advanced threats
Manual for security division and code of conduct
for all
Stealing
Proper observation systems
 Use of segways and K9 members
 Training classes on security and
drug addiction for general staff
 Innovative mobile pharmacies
accessed through fingerprint scan to
prevent drug stealing
 Similar numbered bracelets for
infant and mother and these should be
tagged with electronic chips to
monitor the newborn and prevent its
stealing
Nurses will use ID badges
according to their work status and use
their fingerprint along with infant’s
bracelet tag to move the child to any
different place
 HUGS safety system for prevention
of infant theft
Importance of a Comparative Examination of
Cost-benefits










How far new technological security equipments and education or plans are cost effective needs to be assessed.
According to literature of Ortmeier, 2009, a comparison between the benefits of adopting new security technology and its
financial cost can help make good decision.
According to American Society for Industrial Security, 1998 and Bassett, 2006, the cost of adopting new technology in security
sector can be below the margin of 2 percent of the possessions protected to make the adoption cost effective.
We may go for more cost only if there is special interest. However, it should not be more than 5 percent even if it is very much
needed. These types of cases are not usually acceptable.
By making a confident analysis of cost-benefit security division can show proofs of benefits. The process is as follows:
 It is stated that all probable risks of the investment have to be pointed out.
 All the examples of benefits and cost should be tagged with calculated financial value.
 ASIS International Guidelines Commission, 2007 paper states that probable future expenses and income compared
with present investment cost and income can show a true picture of benefits or loss.
This comparison of benefits with cost can help the organization find out the ROI or return of investment of investments in
security technology. The VAC or value added contribution can also be assessed.
It is a complex job to measure ROI or VAC until a standard is taken for comparison. That is why it is difficult to convince the
management to take on new security strategies.
The security personnel need to employ innovative ideas to convince. According to Sommer, 2003 the department has to be
convincing and confident. They can convince different departments first. The human resource department, IT department and
other ones can be convinced first. Then the management will listen.
The security officers have to assert that protecting assets and avoiding loss should not be looked at as a costly thing. When the
budget makers understand value of benefits is more than value of investment, they will be ready to accept.
According to Ortmeier 2009 the benefits of new addition of technology should be transfer into money figures to convince the
decision makers.
References

American Society for Industrial Security. (1998). ASIS International presents introduction to security for business students.
Alexandria, VA: American Society for Industrial Security.

Asghar, M. (2009, November 14). Police Clueless in infant theft case. Retrieved June 20, 2011, from Dawn.Com:
http://Archives.dawn.com/archives/144936

ASIS International Guidelines Commission. (2007). General security risk assessment guidelines. Alexandria, VA: ASIS
International.

Banner Health. (2011). Financial Stewarship. Retrieved from
http://www.bannerhealth.com/About+Us/Banner+Financial/_Financial+Stewardship.htm

Bassett, J. (2006, September). When your CEO says “show me the money”. Security Technology & Design, 16 (9), 84-86.

Bragdon, B. (2006, July). What security’s worth. CSO, 5 (7), 10.

Crisis Prevention. (2011) Nonviolent crisis intervention. Retrieved from http://www.crisisprevention.com/Specialties/NonviolentCrisis-Intervention

Dalton, D. R. (1995). Security management: Business strategies for success. Boston, MA: Butterworth-Heinemann.

Fenton, J., Green, E. L., & Hill, R. L. (2010, September 17). Police: Man upset over mother’s care at Hopkins kills her, himself. The
Baltimore Sun, pp. 1-4. Retrieved from http://articles.baltimoresun.com/2010-09-17/news/bs-md-ci-shooting-hopkins20100916_1_mother-hospital-staff-east-baltimore

Innovative Medical. (2011). Hugs infant security. Retrieved from http://www.innovative-medical.com/Infantsecurity/

John Hopkin’s Medicine. (2010). Update on shooting at the Johns Hopkins hospital. Retrieved from
http://www.hopkinsmedicine.org/news/media/releases/update_on_shooting_at_the_johns_hopkins_hospital

Ortmeier, P. J. (2009). Introduction to Security. Operations and Management (3rd ed.). Upper Saddle River, NJ: Pearson/Prentice
Hall.

Rick, L. T. (2009, July 21). Local hospitals work to prevent narcotic theft. Retrieved June 20, 2011, from Rapid City Journal:
www.rapidcityjournal.com/news/local/articl_07226aa2-7a01-51da-b203-14ad48fc0370.html

Sengupta, K. (2007). Terror plot hatched in British hospital. The Independent. Retrieved from
http://www.independent.co.uk/news/uk/crime/terror-plot-hatched-in-british-hospitals-455630.html

Sommer, C. J. (2003, March). Survival of the fittest: Corporate success is dependent on strategic synergy. Loss Prevention &
Security Journal, 3 (3), 16-17.