Presentation is loading. Please wait.

Presentation is loading. Please wait.

Hospital Security Prospects Presentation SEC 320.

Similar presentations


Presentation on theme: "Hospital Security Prospects Presentation SEC 320."— Presentation transcript:

1 Hospital Security Prospects Presentation SEC 320

2 Table of Contents I. Getting Familiar: Banner Health ……..................................................... 3 II. Core Goals …........................................................................................ 4 III. Rising Tendencies for Security in Healthcare Organization I. Violent Behavior…………................................................5 II. Security Infringement ………………………………………..... 6 III. Terrorist Threats ………………………………………….……… 7 IV. Stealing………………………………………………….…..……... 7 IV. Actions to Take I. For Violent Behavior ……………………………………………. 8 II. For Security Infringement ……………….……….…………… 8 III. For Terrorist Threats ………………………..…………………... 9 IV. For Stealing ……………………………………….……………..… 9 V. The Importance of a Comparative Examination of Cost-benefits........... 10 VI. References……………………………………………………….…………………..…….. 11

3 Getting Familiar  Banner Health works as a not-for-profit organization dealing health care services with an aim to offer outstanding care for patients.  In 2010 Banner Health gained its asset to 6 percent compared to the earlier year. This year the asset turned out to be of $6,381,552 billion.  This organization has many high tech modern hospitals in the states of Colorado, Nevada, Nebraska, Arizona, Alaska and California.  In 14 US states 35,000 people got employed  This organization is continuously trying to stay at good level and is always after promising technology and modernization so that their health service providers can offer the best of the organization to its patients.  Some of these innovative, promising, effective technological applications are:  Plan of Care Transformation  Remote monitoring application iCare reinforced with audiovisual eICU® for maximized information use  Intelligent OB system  Surgical assistance using robotics  Education facilities with simulation assistance  Working together with MD Anderson Cancer Center

4 Core Goals The security division has to recognize and admit the possible promising tendencies as well as threats in security that can influence healthcare providing authorities like Banner Health. Vision  To successfully foil criminal activities  To competently pull through from security risks  To abide by HIPAA policies for patient information privacy and security  To encourage cultural values like uprightness, honesty, sympathy, admiration, professionalism, and answerability Mission  To profitably perform security activities  To come up with superb patient care  To manage and make better present paraphernalia and facilities  To guarantee safety and steady atmosphere for hospital staff, patients, and guests  To safeguard assets of Banner Health so that it can gain more profit and can offer services for increasing needs of the target communities.

5 Rising Tendencies for Security in Healthcare Organization: Violent Behavior  Concerns: Violent behavior of patients and their relatives visitors made towards hospital staff  Example: Gun shooting at Johns Hopkins hospital, Baltimore, Maryland on September 16, 2010, (Source: Fenton, Green, & Hill, 2010)  Reason: Frustrated or disgruntled feelings believing the patient didn’t get enough care

6 Security Infringement  Concerns:  Providing incorrect medicines  Stealing secret information  Example:  Illegal entrance the pharmacy of Banner Health  A mentally ill female fruitfully entered several hospitals disguising in a doctor’s clothes in 2010. Banner Health hospital in Ventura, California was one of these hospitals.  Reason:  For unquestioning nature of the hospital environment, hospitals are vulnerable to may type of security infringement.  Security infringements may let the criminals get access to sensitive places like the pharmacy. They can harm people or assets.

7 Terrorist Threats  Concerns: ◦ Terrorist activities happening in healthcare settings ◦ Potential chemical assault  Example: Terrorist assault in the hospital in the UK (Source: Sengupta, 2007)  Reason: To attract interest from the world  Impact: ◦ Changes our style of living and process of thinking ◦ Negative psychological impression ◦ Financial harm ◦ Mass victims ◦ Can form epidemics or virulent diseases  Concerns: Sedative /medicine stealing from the pharmacy Stealing of newborns from the nursery, obstetric department or pediatric department  Some people enter hospital premises to steal medicine but some staff also steals medicine. These people may sell the drugs to addicted people and gain some money. They may even use it themselves. Stealing

8 Actions to Take  CPI or Crisis Prevention training for the staff  Set code of behavior for hospital premises  Suitable visiting hours for patient relatives  Control of access of people :  Temporary ID badges for visitors or guest  Staff should have forgery-proof ID badges  Control of boundaries for all facilities.  Access control with metal detectors and K-9 members at all access points.  Examination of property  Sufficient observation system  Mobile security personnel should observe behavior and activities of guests  Use of card punch reader or biometric reader at entry points  Control over information transfer  Extra generators for power cut  Liaison with police force  Central command station  Training program for staff: How to establish secure information system, principles, and steps. General security includes appropriate reporting system, ID badges, detection of probable threats, and steps for entering constrained areas.  Rewards for staff  Continuance and appraisal of systems  Extra systems and alternative processes  Close watching of sensitive locations like the server rooms Violent BehaviorSecurity Infringement

9 Actions to Take  Basic training and genuine security activities  Training offered to security and general staff on how to act against security threats. Establishment of a quality security system  Always prepare for actions through regular drills so that complacence does not weaken morale and there should be the belief that existing system can be made better  Access control and control over boundaries  Multi-assistance surveillance systems  Enough lighting for outer locations  Random change of schedules  Use of high tech emerging technologies and devices to counteract advanced threats  Manual for security division and code of conduct for all Terrorist Threats Stealing  Proper observation systems  Use of segways and K9 members  Training classes on security and drug addiction for general staff  Innovative mobile pharmacies accessed through fingerprint scan to prevent drug stealing  Similar numbered bracelets for infant and mother and these should be tagged with electronic chips to monitor the newborn and prevent its stealing  Nurses will use ID badges according to their work status and use their fingerprint along with infant’s bracelet tag to move the child to any different place  HUGS safety system for prevention of infant theft

10 Importance of a Comparative Examination of Cost-benefits  How far new technological security equipments and education or plans are cost effective needs to be assessed.  According to literature of Ortmeier, 2009, a comparison between the benefits of adopting new security technology and its financial cost can help make good decision.  According to American Society for Industrial Security, 1998 and Bassett, 2006, the cost of adopting new technology in security sector can be below the margin of 2 percent of the possessions protected to make the adoption cost effective.  We may go for more cost only if there is special interest. However, it should not be more than 5 percent even if it is very much needed. These types of cases are not usually acceptable.  By making a confident analysis of cost-benefit security division can show proofs of benefits. The process is as follows:  It is stated that all probable risks of the investment have to be pointed out.  All the examples of benefits and cost should be tagged with calculated financial value.  ASIS International Guidelines Commission, 2007 paper states that probable future expenses and income compared with present investment cost and income can show a true picture of benefits or loss.  This comparison of benefits with cost can help the organization find out the ROI or return of investment of investments in security technology. The VAC or value added contribution can also be assessed.  It is a complex job to measure ROI or VAC until a standard is taken for comparison. That is why it is difficult to convince the management to take on new security strategies.  The security personnel need to employ innovative ideas to convince. According to Sommer, 2003 the department has to be convincing and confident. They can convince different departments first. The human resource department, IT department and other ones can be convinced first. Then the management will listen.  The security officers have to assert that protecting assets and avoiding loss should not be looked at as a costly thing. When the budget makers understand value of benefits is more than value of investment, they will be ready to accept.  According to Ortmeier 2009 the benefits of new addition of technology should be transfer into money figures to convince the decision makers.

11 References American Society for Industrial Security. (1998). ASIS International presents introduction to security for business students. Alexandria, VA: American Society for Industrial Security. Asghar, M. (2009, November 14). Police Clueless in infant theft case. Retrieved June 20, 2011, from Dawn.Com: http://Archives.dawn.com/archives/144936 ASIS International Guidelines Commission. (2007). General security risk assessment guidelines. Alexandria, VA: ASIS International. Banner Health. (2011). Financial Stewarship. Retrieved from http://www.bannerhealth.com/About+Us/Banner+Financial/_Financial+Stewardship.htm http://www.bannerhealth.com/About+Us/Banner+Financial/_Financial+Stewardship.htm Bassett, J. (2006, September). When your CEO says “show me the money”. Security Technology & Design, 16 (9), 84-86. Bragdon, B. (2006, July). What security’s worth. CSO, 5 (7), 10. Crisis Prevention. (2011) Nonviolent crisis intervention. Retrieved from http://www.crisisprevention.com/Specialties/Nonviolent- Crisis-Intervention Dalton, D. R. (1995). Security management: Business strategies for success. Boston, MA: Butterworth-Heinemann. Fenton, J., Green, E. L., & Hill, R. L. (2010, September 17). Police: Man upset over mother’s care at Hopkins kills her, himself. The Baltimore Sun, pp. 1-4. Retrieved from http://articles.baltimoresun.com/2010-09-17/news/bs-md-ci-shooting-hopkins- 20100916_1_mother-hospital-staff-east-baltimore Innovative Medical. (2011). Hugs infant security. Retrieved from http://www.innovative-medical.com/Infantsecurity/ John Hopkin’s Medicine. (2010). Update on shooting at the Johns Hopkins hospital. Retrieved from http://www.hopkinsmedicine.org/news/media/releases/update_on_shooting_at_the_johns_hopkins_hospital Ortmeier, P. J. (2009). Introduction to Security. Operations and Management (3rd ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. Rick, L. T. (2009, July 21). Local hospitals work to prevent narcotic theft. Retrieved June 20, 2011, from Rapid City Journal: www.rapidcityjournal.com/news/local/articl_07226aa2-7a01-51da-b203-14ad48fc0370.html Sengupta, K. (2007). Terror plot hatched in British hospital. The Independent. Retrieved from http://www.independent.co.uk/news/uk/crime/terror-plot-hatched-in-british-hospitals-455630.html Sommer, C. J. (2003, March). Survival of the fittest: Corporate success is dependent on strategic synergy. Loss Prevention & Security Journal, 3 (3), 16-17.


Download ppt "Hospital Security Prospects Presentation SEC 320."

Similar presentations


Ads by Google